WorldWideScience

Sample records for iecm key results

  1. Induced Environment Contamination Monitor (IECM), air sampler - Results from the Space Transport System (STS-2) flight

    Science.gov (United States)

    Peters, P. N.; Hester, H. B.; Bertsch, W.; Mayfield, H.; Zatko, D.

    1983-01-01

    An investigation involving sampling the rapidly changing environment of the Shuttle cargo bay is considered. Four time-integrated samples and one rapid acquisition sample were collected to determine the types and quantities of contaminants present during ascent and descent of the Shuttle. The sampling times for the various bottles were controlled by valves operated by the Data Acquisition and Control System (DACS) of the IECM. Many of the observed species were found to be common solvents used in cleaning surfaces. When the actual volume sampled is taken into account, the relative mass of organics sampled during descent is about 20 percent less than during ascent.

  2. Assessing the effects of rural livelihood transition on non-point source pollution: a coupled ABM-IECM model.

    Science.gov (United States)

    Yuan, Chengcheng; Liu, Liming; Ye, Jinwei; Ren, Guoping; Zhuo, Dong; Qi, Xiaoxing

    2017-05-01

    Water pollution caused by anthropogenic activities and driven by changes in rural livelihood strategies in an agricultural system has received increasing attention in recent decades. To simulate the effects of rural household livelihood transition on non-point source (NPS) pollution, a model combining an agent-based model (ABM) and an improved export coefficient model (IECM) was developed. The ABM was adopted to simulate the dynamic process of household livelihood transition, and the IECM was employed to estimate the effects of household livelihood transition on NPS pollution. The coupled model was tested in a small catchment in the Dongting Lake region, China. The simulated results reveal that the transition of household livelihood strategies occurred with the changes in the prices of rice, pig, and labor. Thus, the cropping system, land-use intensity, resident population, and number of pigs changed in the small catchment from 2000 to 2014. As a result of these changes, the total nitrogen load discharged into the river initially increased from 6841.0 kg in 2000 to 8446.3 kg in 2004 and then decreased to 6063.9 kg in 2014. Results also suggest that rural living, livestock, paddy field, and precipitation alternately became the main causes of NPS pollution in the small catchment, and the midstream region of the small catchment was the primary area for NPS pollution from 2000 to 2014. Despite some limitations, the coupled model provides an innovative way to simulate the effects of rural household livelihood transition on NPS pollution with the change of socioeconomic factors, and thereby identify the key factors influencing water pollution to provide valuable suggestions on how agricultural environmental risks can be reduced through the regulation of the behaviors of farming households in the future.

  3. Key Results from the Oriented Scintillation Spectrometer Experiment

    National Research Council Canada - National Science Library

    Kurfess, J. D

    1995-01-01

    .... Results on galactic sources include the spectral observations of two new rotation-powered pulsars, PSR 1509-58 and Vela, the discovery of 110 keV cyclotron emission from the Be X-ray binary A0535...

  4. Key uncertainties in climate change policy: Results from ICAM-2

    Energy Technology Data Exchange (ETDEWEB)

    Dowlatabadi, H.; Kandlikar, M.

    1995-12-31

    A critical aspect of climate change decision-making is uncertainties in current understanding of the socioeconomic, climatic and biogeochemical processes involved. Decision-making processes are much better informed if these uncertainties are characterized and their implications understood. Quantitative analysis of these uncertainties serve to: inform decision makers about the likely outcome of policy initiatives; and help set priorities for research so that outcome ambiguities faced by the decision-makers are reduced. A family of integrated assessment models of climate change have been developed at Carnegie Mellon. These models are distinguished from other integrated assessment efforts in that they were designed from the outset to characterize and propagate parameter, model, value, and decision-rule uncertainties. The most recent of these models is ICAM 2.0. This model includes demographics, economic activities, emissions, atmospheric chemistry, climate change, sea level rise and other impact modules and the numerous associated feedbacks. The model has over 700 objects of which over 1/3 are uncertain. These have been grouped into seven different classes of uncertain items. The impact of uncertainties in each of these items can be considered individually or in combinations with the others. In this paper we demonstrate the relative contribution of various sources of uncertainty to different outcomes in the model. The analysis shows that climatic uncertainties are most important, followed by uncertainties in damage calculations, economic uncertainties and direct aerosol forcing uncertainties. Extreme uncertainties in indirect aerosol forcing and behavioral response to climate change (adaptation) were characterized by using bounding analyses; the results suggest that these extreme uncertainties can dominate the choice of policy outcomes.

  5. Human resource leadership: the key to improved results in health

    Directory of Open Access Journals (Sweden)

    O'Neil Mary L

    2008-06-01

    Full Text Available Abstract This article is the lead article in the Human Resources for Health journal's first quarterly feature. The series of seven articles has been contributed by Management Sciences for Health (MSH under the theme of leadership and management in public health and will be published article by article over the next few weeks. The journal has invited Dr Manuel M. Dayrit, Director of the WHO Department of Human Resources for Health and former Minister of Health for the Philippines to launch the feature with an opening editorial to be found in the journal's blog. This opening article describes the human resource challenges that managers around the world report and analyses why solutions often fail to be implemented. Despite rising attention to the acute shortage of health care workers, solutions to the human resource (HR crisis are difficult to achieve, especially in the poorest countries. Although we are aware of the issues and have developed HR strategies, the problem is that some old systems of leading and managing human resources for health do not work in today's context. The Leadership Development Program (LDP is grounded on the belief that good leadership and management can be learned and practiced at all levels. The case studies in this issue were chosen to illustrate results from using the LDP at different levels of the health sector. The LDP makes a profound difference in health managers' attitudes towards their work. Rather than feeling defeated by a workplace climate that lacks motivation, hope, and commitment to change, people report that they are mobilized to take action to change the status quo. The lesson is that without this capacity at all levels, global policy and national HR strategies will fail to make a difference.

  6. Do clinical safety charts improve paramedic key performance indicator results? (A clinical improvement programme evaluation).

    Science.gov (United States)

    Ebbs, Phillip; Middleton, Paul M; Bonner, Ann; Loudfoot, Allan; Elliott, Peter

    2012-07-01

    Is the Clinical Safety Chart clinical improvement programme (CIP) effective at improving paramedic key performance indicator (KPI) results within the Ambulance Service of New South Wales? The CIP intervention area was compared with the non-intervention area in order to determine whether there was a statistically significant improvement in KPI results. The CIP was associated with a statistically significant improvement in paramedic KPI results within the intervention area. The strategies used within this CIP are recommended for further consideration.

  7. Key Performance Indicators: From Promise to Payoff. The Productivity for Results Series No. 2

    Science.gov (United States)

    Casserly, Michael; Eugene, Michael

    2014-01-01

    This paper draws upon the expertise of two leading educators, Michael Casserly, director of the Council of the Great City Schools, and Michael Eugene, chief operating officer of the Orange County Public Schools in Florida. They outline a set of key performance indicators that some urban districts use to benchmark the results of their operating…

  8. Heavy Ion Physics at the CERN SPS: Roots 1974-1984 and Key Results

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    Two communities, Nuclear and Particle Physics, had to come together to open up a new field at the CERN SPS in the early eighties, bringing CERN to the forefront worldwide until the start of RHIC in 2000. I will discuss the period before that, including the basic new ideas on parton deconfinement, key workshops, alternative accelerator options in the LBL-GSI-CERN triangle, and the final convergence of the three labs on the SPS, sacrificing any home future in this field for the first two. In 1984, 5 major experiments were approved for initially O16 and S32 beams at the SPS, with an unprecedented reuse of existing experimental equipment. Subsequent evolution followed thanks to intense learning processes, leading to a second generation of much improved or completely new experiments together with Pb beams starting in 1994. I will summarise the key results and their (then still cautious) interpretation as of 2000. They were used as an input to a Press Conference at CERN, announcing the detection of a 'n...

  9. Exploring key considerations when determining bona fide inadvertent errors resulting in understatements

    Directory of Open Access Journals (Sweden)

    Chrizanne de Villiers

    2016-03-01

    Full Text Available Chapter 16 of the Tax Administration Act (28 of 2011 (the TA Act deals with understatement penalties. In the event of an ‘understatement’, in terms of Section 222 of the TA Act, a taxpayer must pay an understatement penalty, unless the understatement results from a bona fide inadvertent error. The determining of a bona fide inadvertent error on taxpayers’ returns is a totally new concept in the tax fraternity. It is of utmost importance that this section is applied correctly based on sound evaluation principles and not on professional judgement when determining if the error was indeed the result of a bona fide inadvertent error. This research study focuses on exploring key considerations when determining bona fide inadvertent errors resulting in understatements. The role and importance of tax penalty provisions is explored and the meaning of the different components in the term ‘bona fide inadvertent error’ critically analysed with the purpose to find a possible definition for the term ‘bona fide inadvertent error’. The study also compares the provisions of other tax jurisdictions with regards to errors made resulting in tax understatements in order to find possible guidelines on the application of bona fide inadvertent errors as contained in Section 222 of the TA Act. The findings of the research study revealed that the term ‘bona fide inadvertent error’ contained in Section 222 of the TA Act should be defined urgently and that guidelines must be provided by SARS on the application of the new amendment. SARS should also clarify the application of a bona fide inadvertent error in light of the behaviours contained in Section 223 of the TA Act to avoid any confusion.

  10. KEY RESULTS FROM IRRADIATION AND POST-IRRADIATION EXAMINATION OF AGR-1 UCO TRISO FUEL

    Energy Technology Data Exchange (ETDEWEB)

    Demkowicz, Paul A.; Hunn, John D.; Petti, David A.; Morris, Robert N.

    2016-11-01

    The AGR-1 irradiation experiment was performed as the first test of tristructural isotropic (TRISO) fuel in the US Advanced Gas Reactor Fuel Development and Qualification Program. The experiment consisted of 72 right cylinder fuel compacts containing approximately 3×105 coated fuel particles with uranium oxide/uranium carbide (UCO) fuel kernels. The fuel was irradiated in the Advanced Test Reactor for a total of 620 effective full power days. Fuel burnup ranged from 11.3 to 19.6% fissions per initial metal atom and time average, volume average irradiation temperatures of the individual compacts ranged from 955 to 1136°C. This paper focuses on key results from the irradiation and post-irradiation examination, which revealed a robust fuel with excellent performance characteristics under the conditions tested and have significantly improved the understanding of UCO coated particle fuel irradiation behavior within the US program. The fuel exhibited a very low incidence of TRISO coating failure during irradiation and post-irradiation safety testing at temperatures up to 1800°C. Advanced PIE methods have allowed particles with SiC coating failure to be isolated and meticulously examined, which has elucidated the specific causes of SiC failure in these specimens. The level of fission product release from the fuel during irradiation and post-irradiation safety testing has been studied in detail. Results indicated very low release of krypton and cesium through intact SiC and modest release of europium and strontium, while also confirming the potential for significant silver release through the coatings depending on irradiation conditions. Focused study of fission products within the coating layers of irradiated particles down to nanometer length scales has provided new insights into fission product transport through the coating layers and the role various fission products may have on coating integrity. The broader implications of these results and the application of

  11. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    NARCIS (Netherlands)

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  12. Keeping the Vision in Front of You: Results from Smart Start Key Participant Interviews.

    Science.gov (United States)

    Bryant, Donna; Adkins, Amee

    Smart Start is North Carolina's partnership between state government and local leaders, service providers, and families to better serve children under 6 years of age and their families. Interviews were conducted to ascertain the impressions, attitudes, and advice of 55 key participants in the 12 pioneer Smart Start counties. The interviews were…

  13. THE CCAUV.A-K3 KEY COMPARISON OF PRESSURE RECIPROCITY CALIBRATION OF LS2P MICROPHONES: RESULTS AND ANALYSIS

    DEFF Research Database (Denmark)

    Cutanda Henríquez, Vicente; Rasmussen, Knud; Nielsen, Lars

    2006-01-01

    The CCAUV.A-K3 Key Comparison has involved 15 countries organized in two loops with two common laboratories, CENAM and DPLA. The measurements took place in 2003. This is the first CCAUV key comparison organized with more than one loop, and therefore the analysis of the results required a more ela...

  14. Gemini Planet Imager Exoplanet Survey: Key Results Two Years Into The Survey

    Science.gov (United States)

    Marchis, Franck; Rameau, Julien; Nielsen, Eric L.; De Rosa, Robert J.; Esposito, Thomas; Draper, Zachary H.; Macintosh, Bruce; Graham, James R.; GPIES

    2016-10-01

    The Gemini Planet Imager Exoplanet Survey (GPIES) is targeting 600 young, nearby stars using the GPI instrument. We report here on recent results obtained with this instrument from our team.Rameau et al. (ApJL, 822 2, L2, 2016) presented astrometric monitoring of the young exoplanet HD 95086 b obtained with GPI between 2013 and 2016. Efficient Monte Carlo techniques place preliminary constraints on the orbital parameters of HD 95086 b. Under the assumption of a coplanar planet-disk system, the periastron of HD 95086 b is beyond 51 AU. Therefore, HD 95086 b cannot carve the entire gap inferred from the measured infrared excess in the SED of HD 95086. Additional photometric and spectroscopic measurements reported by de Rosa et al. (2016, apJ, in press) showed that the spectral energy distribution of HD 95086 b is best fit by low temperature (T~800-1300 K), low surface gravity spectra from models which simulate high photospheric dust content. Its temperature is typical to L/T transition objects, but the spectral type is poorly constrained. HD 95086 b is an important exoplanet to test our models of atmospheric properties of young extrasolar planets.Direct detections of debris disk are keys to infer the collisional past and understand the formation of planetary systems. Two debris disks were recently studied with GPI:- Draper et al. (submitted to ApJ, 2016) show the resolved circumstellar debris disk around HD 111520 at a projected range of ~30-100 AU using both total and polarized H-band intensity. Structures in the disks such as a large brightness asymmetry and symmetric polarization fraction are seen. Additional data would confirm if a large disruption event from a stellar fly-by or planetary perturbations altered the disk density- Esposito et al. (submitted to ApJ, 2016) combined Keck NIRC2 data taken at 1.2-2.3 microns and GPI 1.6 micron total intensity and polarized light detections that probes down to projected separations less than 10 AU to show that the HD

  15. Studies of key success factors of product development success: A reinterpretation of results

    DEFF Research Database (Denmark)

    Plichta, Kirsten; Harmsen, Hanne

    In this paper the general validity of the research area of key factors of success in product development is discussed. To be more specific we argue that validity hinges on the causal relation between success and success factrors ­ a relation that unaccounted for in the empirical studies....... The theoretical tradition of the resource-based perspective provides ­ at least to some extent ­ an account of this causality. An important point in the paper is that the key factors of success in the empi studies are not factors causally related to success, but at the most a number of valuable resources and thus......, but in the studies problems concerning implementation are not discussed. When the lists factors of success are interprested as valuable resources and capabilities, we show that some implications on the implementability might be deduced from the resource-based perspective....

  16. Are the American Psychological Association's Detainee Interrogation Policies Ethical and Effective?: Key Claims, Documents, and Results.

    Science.gov (United States)

    Pope, Kenneth S

    2011-01-01

    After 9-11, the United States began interrogating detainees at settings such as Abu Ghraib, Bagram, and Guantanamo. The American Psychological Association (APA) supported psychologists' involvement in interrogations, adopted formal policies, and made an array of public assurances. This article's purpose is to highlight key APA decisions, policies, procedures, documents, and public statements in urgent need of rethinking and to suggest questions that may be useful in a serious assessment, such as, "However well intended, were APA's interrogation policies ethically sound?"; "Were they valid, realistic, and able to achieve their purpose?"; "Were other approaches available that would address interrogation issues more directly, comprehensively, and actively, that were more ethically and scientifically based, and that would have had a greater likelihood of success?"; and "Should APA continue to endorse its post-9-11 detainee interrogation policies?"

  17. The coronas-F space mission key results for solar terrestrial physics

    CERN Document Server

    2014-01-01

    This volume is the updated and extended translation of the Russian original. It presents the results of observations of solar activity and its effects in the Earth space environment carried out from July 2001 to December 2005 on board the CORONAS-F space mission. The general characteristics of the CORONAS-F scientific payload are provided with a description of the principal experiments. The main results focus on the global oscillations of the Sun (p-modes), solar corona, solar flares, solar cosmic rays, Earth’s radiation belts, and upper atmosphere. The book will be welcomed by students, post-graduates, and scientists working in the field of solar and solar-terrestrial physics. This English edition is supplemented by sections presenting new results of the SPIRIT and TESIS experiments under the CORONAS solar program, as well as from the SONG experiment onboard the CORONAS-F satellite.

  18. The Effects of Quality Management Practices on Key Results: questionnaires sample for the industry of tourist accommodation in Spain

    Directory of Open Access Journals (Sweden)

    José Álvarez García

    2014-12-01

    Full Text Available In this research work, we examine the direct and indirect effects of quality management practices on key results and we identify the relationship between quality practices. To achieve the proposed objective, a structural model was used, taking into account the previous review of the literature, in order to identify the quality practices and causal relationships with the key results. The theoretical model and hypotheses are tested using data collected from a sample of 186 tourist accommodation companies certified with the “Q for Tourist Quality” standard in Spain, from a questionnaire based on quality practices identified in the literature and on the EFQM Model, taking some of the most relevant scales as a reference. The methodology used consists of the application of an Exploratory and Confirmatory Factorial Analysis to validate the scales (reliability, one-dimensionality and validity and define the number of items of each of the measuring instruments of the constructs proposed, to then estimate the causal model proposed, proceeding to test the hypotheses formulated by using the Structural Equation Model (SEM technique. The results achieved support the relationship between quality practices and the direct and positive impact of two of the practices, processes management and quality policy/planning, on the key results. It was also observed that the quality practices that most influence key results are quality policy/planning along with leadership, when considering the total effects (direct and indirect.

  19. LabKey Server NAb: A tool for analyzing, visualizing and sharing results from neutralizing antibody assays

    Directory of Open Access Journals (Sweden)

    Gao Hongmei

    2011-05-01

    Full Text Available Abstract Background Multiple types of assays allow sensitive detection of virus-specific neutralizing antibodies. For example, the extent of antibody neutralization of HIV-1, SIV and SHIV can be measured in the TZM-bl cell line through the degree of luciferase reporter gene expression after infection. In the past, neutralization curves and titers for this standard assay have been calculated using an Excel macro. Updating all instances of such a macro with new techniques can be unwieldy and introduce non-uniformity across multi-lab teams. Using Excel also poses challenges in centrally storing, sharing and associating raw data files and results. Results We present LabKey Server's NAb tool for organizing, analyzing and securely sharing data, files and results for neutralizing antibody (NAb assays, including the luciferase-based TZM-bl NAb assay. The customizable tool supports high-throughput experiments and includes a graphical plate template designer, allowing researchers to quickly adapt calculations to new plate layouts. The tool calculates the percent neutralization for each serum dilution based on luminescence measurements, fits a range of neutralization curves to titration results and uses these curves to estimate the neutralizing antibody titers for benchmark dilutions. Results, curve visualizations and raw data files are stored in a database and shared through a secure, web-based interface. NAb results can be integrated with other data sources based on sample identifiers. It is simple to make results public after publication by updating folder security settings. Conclusions Standardized tools for analyzing, archiving and sharing assay results can improve the reproducibility, comparability and reliability of results obtained across many labs. LabKey Server and its NAb tool are freely available as open source software at http://www.labkey.com under the Apache 2.0 license. Many members of the HIV research community can also access the LabKey

  20. Colorectal Cancer Screening Programme in Spain: Results of Key Performance Indicators After Five Rounds (2000-2012).

    Science.gov (United States)

    Binefa, Gemma; Garcia, Montse; Milà, Núria; Fernández, Esteve; Rodríguez-Moranta, Francisco; Gonzalo, Núria; Benito, Llúcia; Clopés, Ana; Guardiola, Jordi; Moreno, Víctor

    2016-01-20

    Effective quality assurance is essential in any screening programme. This article provides a unique insight into key quality indicators of five rounds of the first population-based colorectal cancer screening programme implemented in Spain (2000-2012), providing the results according to the type of screening (prevalent or first screen and incident or subsequent screen) and test (guaiac or immunochemical). The total crude participation rate increased from 17.2% (11,011) in the first round to 35.9% (22,988) in the last one. Rescreening rate was very high (88.6% in the fifth round). Positivity rate was superior with the faecal immunochemical test (6.2%) than with the guaiac-based test (0.7%) (p < 0.0001) and detection rates were also better with the immunochemical test. The most significant rise in detection rate was observed for high risk adenoma in men (45.5 per 1,000 screened). Most cancers were diagnosed at an early stage (61.4%) and there was a statistically significant difference between those detected in first or subsequent screening (52.6% and 70.0% respectively; p = 0.024). The availability of these results substantially improves data comparisons and the exchange of experience between screening programmes.

  1. Trace Elements in the Sea Surface Microlayer: Results from a Two Year Study in the Florida Keys

    Science.gov (United States)

    Ebling, A. M.; Westrich, J. R.; Lipp, E. K.; Mellett, T.; Buck, K. N.; Landing, W. M.

    2016-02-01

    Natural and anthropogenic aerosols are a significant source of trace elements to oligotrophic ocean surface waters, where they provide episodic pulses of limiting micronutrients for the microbial community. Opportunistic bacteria have been shown to experience rapid growth during deposition events. However, little is known about the fate of trace elements at the air-sea interface, i.e. the sea surface microlayer. It has been hypothesized that dust particles would be retained in the sea surface microlayer long enough to undergo chemical and physical changes that would affect the bioavailability of trace elements. In this study, aerosols, sea surface microlayer, and underlying water column samples were collected in the Florida Keys in July 2014 and May 2015 at various locations and analyzed for a suite of dissolved and particulate trace elements. Sea surface microlayer samples ( 50 μm) were collected using a cylinder of ultra-pure quartz glass; a novel adaptation of the glass plate technique. Sampling sites ranged from a more pristine environment approximately ten kilometers offshore to a more anthropogenic environment within a shallow bay a few hundred meters offshore. While it was clear from the results that dust deposition events played a large role in the chemical composition of the sea surface microlayer (elevated concentrations in dissolved and particulate trace elements associated with dust deposition), the location where the samples were collected also had a large impact on the sea surface microlayer as well as the underlying water column. The results were compared with other parameters analyzed such as Vibrio cultures as well as iron speciation, providing an important step towards our goal of understanding of the fate of trace elements in the sea surface microlayer as well as the specific effects of aeolian dust deposition on heterotrophic microbes in the upper ocean.

  2. Energy saving potential of heat insulation solar glass: Key results from laboratory and in-situ testing

    International Nuclear Information System (INIS)

    Cuce, Erdem; Cuce, Pinar Mert; Young, Chin-Huai

    2016-01-01

    HISG (heat insulation solar glass) is a recently developed multi-functional glazing technology to mitigate energy consumption of buildings. HISG can generate electricity similar to conventional PV (photovoltaic) glazing products when exposed to sunlight, however it differs from them by having some extraordinary characteristic features such as thermal insulation, which is competitive with Argon filled triple glazed windows, acoustic comfort, remarkable energy saving potential and self-cleaning ability owing to TiO_2 nano coating. Within the scope of this research, latest results from laboratory and in-situ testing of HISG are presented in terms of its key role in mitigating heating and cooling demand of buildings as well as clean energy generation. Lighting and thermal comfort related parameters such as shading coefficient, UV, IR and visible light intensity are also investigated through the tests conducted in real operating conditions. It is achieved from the results that instant electricity generation of HISG is 16% higher than that of standard PV glazing owing to its nano layer reflective film. Shading coefficient of HISG is only 0.136, which provides almost 80% reduction in solar heat gain compared to ordinary glazing. Indoor air temperature measured from HISG test house in summer time is very close to the ambient temperature, whereas it is found to be 14.7 °C higher in ordinary glass test house due to greenhouse effect. Annual heating and cooling demand tests indicate that HISG provides 38 and 48% energy saving in heating and cooling season, respectively. - Highlights: • Nano layer reflective film of HISG enables 16% more power generation. • 80% of undesired outdoor thermal radiation is prevented by HISG. • HISG has a 100% UV blocking rate. • The shading coefficient of HISG is 0.136. • HISG provides 38 and 48% energy saving in heating and cooling season.

  3. Application and practice of EU FP5. Research results in the area key action water - pollution prevention: are results fit for use?

    Energy Technology Data Exchange (ETDEWEB)

    Bittens, M. [Univ. Tuebingen (Germany). Center for Applied Geoscience; Prokop, G. [Umweltbundesamt, Wien (Austria)

    2003-07-01

    Embedded in the EU-funded project 'Innovative Management of Groundwater Resources in Europe - Training and RTD Co-ordination (IMAGE-TRAIN)' a two-phase (identification and testing) evaluation process was performed on basis of delivered research results from scientific projects running in the FP5 Key Action 'Management and Quality of Water - Pollution Prevention'. The 'Application and Practice Report', APR, documents available methods, concepts, and applications, which are qualified for supporting and enhancing the implementation processes of European policies and regulations with regard to the management and quality of water. Additionally, the APR determines boundary conditions for the application of available deliverable as result of the testing phase and facilitates the selection of the best available techniques for accompanying European implementation processes in accordance with the sustainable solutions strategy of European Union's 6{sup th} Environmental Action Programme 'Our Future, or choice'. IMAGE-TRAIN has the ambition to improve cooperation and interaction between ongoing research projects in the field of soil and groundwater contamination and to communicate new technology achievements to young scientists by means of training courses. IMAGE-TRAIn is a three year project which started in September 2001 and operates at two levels. (1) Senior level: At this level cluster meetings for researchers of ongoing research projects are being organised with the objective to establish topic links between RTD projects, dealing with contaminated land and groundwater and to promote their practical application. Furthermore practical case studies with selected experts are being organised to perform short feasibility studies related to current groundwater or mine water problems. (2) Junior level: At this level Advanced Study Courses are organised with theobjective to quickly transfer existing and emerging knowledge to young

  4. Pharmaceutical Market Access: current state of affairs and key challenges – results of the Market Access Launch Excellence Inventory (MALEI)

    Science.gov (United States)

    Koch, Marcus A.

    2015-01-01

    Objectives To take inventory of the current state of affairs of Market Access Launch Excellence in the life sciences industry. To identify key gaps and challenges for Market Access (MA) and discuss how they can be addressed. To generate a baseline for benchmarking MA launch excellence. Methodology An online survey was conducted with pharmaceutical executives primarily working in MA, marketing, or general management. The survey aimed to evaluate MA excellence prerequisites across the product life cycle (rated by importance and level of implementation) and to describe MA activity models in the respective companies. Composite scores were calculated from respondents’ ratings and answers. Results Implementation levels of MA excellence prerequisites generally lagged behind their perceived importance. Item importance and the respective level of implementation correlated well, which can be interpreted as proof of the validity of the questionnaire. The following areas were shown to be particularly underimplemented: 1) early integration of MA and health economic considerations in research and development decision making, 2) developing true partnerships with payers, including the development of services ‘beyond the pill’, and 3) consideration of human resource and talent management. The concept of importance-adjusted implementation levels as a hybrid parameter was introduced and shown to be a viable tool for benchmarking purposes. More than 70% of respondents indicated that their companies will invest broadly in MA in terms of capital and headcount within the next 3 years. Conclusions MA (launch) excellence needs to be further developed in order to close implementation gaps across the entire product life cycle. As MA is a comparatively young pharmaceutical discipline in a complex and dynamic environment, this effort will require strategic focus and dedication. The Market Access Launch Excellence Inventory benchmarking tool may help guide decision makers to prioritize

  5. Pharmaceutical Market Access: current state of affairs and key challenges – results of the Market Access Launch Excellence Inventory (MALEI

    Directory of Open Access Journals (Sweden)

    Marcus A. Koch

    2015-12-01

    Full Text Available Objectives: To take inventory of the current state of affairs of Market Access Launch Excellence in the life sciences industry. To identify key gaps and challenges for Market Access (MA and discuss how they can be addressed. To generate a baseline for benchmarking MA launch excellence. Methodology: An online survey was conducted with pharmaceutical executives primarily working in MA, marketing, or general management. The survey aimed to evaluate MA excellence prerequisites across the product life cycle (rated by importance and level of implementation and to describe MA activity models in the respective companies. Composite scores were calculated from respondents’ ratings and answers. Results: Implementation levels of MA excellence prerequisites generally lagged behind their perceived importance. Item importance and the respective level of implementation correlated well, which can be interpreted as proof of the validity of the questionnaire. The following areas were shown to be particularly underimplemented: 1 early integration of MA and health economic considerations in research and development decision making, 2 developing true partnerships with payers, including the development of services ‘beyond the pill’, and 3 consideration of human resource and talent management. The concept of importance-adjusted implementation levels as a hybrid parameter was introduced and shown to be a viable tool for benchmarking purposes. More than 70% of respondents indicated that their companies will invest broadly in MA in terms of capital and headcount within the next 3 years. Conclusions: MA (launch excellence needs to be further developed in order to close implementation gaps across the entire product life cycle. As MA is a comparatively young pharmaceutical discipline in a complex and dynamic environment, this effort will require strategic focus and dedication. The Market Access Launch Excellence Inventory benchmarking tool may help guide decision

  6. Constructing a Cross-Domain Resource Inventory: Key Components and Results of the EarthCube CINERGI Project.

    Science.gov (United States)

    Zaslavsky, I.; Richard, S. M.; Malik, T.; Hsu, L.; Gupta, A.; Grethe, J. S.; Valentine, D. W., Jr.; Lehnert, K. A.; Bermudez, L. E.; Ozyurt, I. B.; Whitenack, T.; Schachne, A.; Giliarini, A.

    2015-12-01

    While many geoscience-related repositories and data discovery portals exist, finding information about available resources remains a pervasive problem, especially when searching across multiple domains and catalogs. Inconsistent and incomplete metadata descriptions, disparate access protocols and semantic differences across domains, and troves of unstructured or poorly structured information which is hard to discover and use are major hindrances toward discovery, while metadata compilation and curation remain manual and time-consuming. We report on methodology, main results and lessons learned from an ongoing effort to develop a geoscience-wide catalog of information resources, with consistent metadata descriptions, traceable provenance, and automated metadata enhancement. Developing such a catalog is the central goal of CINERGI (Community Inventory of EarthCube Resources for Geoscience Interoperability), an EarthCube building block project (earthcube.org/group/cinergi). The key novel technical contributions of the projects include: a) development of a metadata enhancement pipeline and a set of document enhancers to automatically improve various aspects of metadata descriptions, including keyword assignment and definition of spatial extents; b) Community Resource Viewers: online applications for crowdsourcing community resource registry development, curation and search, and channeling metadata to the unified CINERGI inventory, c) metadata provenance, validation and annotation services, d) user interfaces for advanced resource discovery; and e) geoscience-wide ontology and machine learning to support automated semantic tagging and faceted search across domains. We demonstrate these CINERGI components in three types of user scenarios: (1) improving existing metadata descriptions maintained by government and academic data facilities, (2) supporting work of several EarthCube Research Coordination Network projects in assembling information resources for their domains

  7. Determining barriers to creating an enabling environment in Cambodia: results from a baseline study with key populations and police.

    Science.gov (United States)

    Schneiders, Mira L; Weissman, Amy

    2016-01-01

    Cambodian law enforcement's limited acceptance of harm reduction has hindered HIV program effectiveness. With funding from the Australian Department of Foreign Affairs and Trade, FHI 360 supported the Ministry of Interior to implement the Police Community Partnership Initiative (PCPI) in Cambodia's capital Phnom Penh. To guide this, FHI 360 conducted a baseline study examining police and key populations' attitudes and practices towards one another, including fear and occurrence of arrest. Between December 2012 and January 2013, a cross-sectional survey of 199 police post officers, 199 people who use drugs (PWUD) including people who inject drugs (PWID), 199 men who have sex with men (MSM), 200 transgender women (TGW) and 200 female entertainment workers (FEW) was conducted in five Phnom Penh districts. Eligible participants were ≥18 years, members of a key population from selected hotspots or police officers, deputy chiefs or chiefs. Key populations' median age was 25 years (IQR: 22-30); 40% had completed only primary school. Police were male (99.5%), with median age 43 years (IQR: 30 to 47), and 45 and 25% high school and university completion rates, respectively. Key populations feared arrest for carrying needles and syringes (67%), condoms (23%) and 19% felt afraid to access health services. Close to 75% of police reported body searching and 58% arresting key populations in the past six months for using drugs (64%), selling or distributing drugs (36%) or being violent (13%). Self-reported arrests (23% PWUD, 6% MSM, 6% TGW, 12% FEW; ppolice believed arrest was an appropriate solution to reduce HIV and drug use and reported selling sex (88%) and carrying needles and syringes (55%) as valid reasons for arrest. Key populations' fear of accessing harm reduction and health services and police's negative attitudes and practices towards key populations present major barriers to HIV prevention efforts in Cambodia. To create an enabling environment and ensure police are

  8. Antibiotic distribution channels in Thailand: results of key-informant interviews, reviews of drug regulations and database searches.

    Science.gov (United States)

    Sommanustweechai, Angkana; Chanvatik, Sunicha; Sermsinsiri, Varavoot; Sivilaikul, Somsajee; Patcharanarumol, Walaiporn; Yeung, Shunmay; Tangcharoensathien, Viroj

    2018-02-01

    To analyse how antibiotics are imported, manufactured, distributed and regulated in Thailand. We gathered information, on antibiotic distribution in Thailand, in in-depth interviews - with 43 key informants from farms, health facilities, pharmaceutical and animal feed industries, private pharmacies and regulators- and in database and literature searches. In 2016-2017, licensed antibiotic distribution in Thailand involves over 700 importers and about 24 000 distributors - e.g. retail pharmacies and wholesalers. Thailand imports antibiotics and active pharmaceutical ingredients. There is no system for monitoring the distribution of active ingredients, some of which are used directly on farms, without being processed. Most antibiotics can be bought from pharmacies, for home or farm use, without a prescription. Although the 1987 Drug Act classified most antibiotics as "dangerous drugs", it only classified a few of them as prescription-only medicines and placed no restrictions on the quantities of antibiotics that could be sold to any individual. Pharmacists working in pharmacies are covered by some of the Act's regulations, but the quality of their dispensing and prescribing appears to be largely reliant on their competences. In Thailand, most antibiotics are easily and widely available from retail pharmacies, without a prescription. If the inappropriate use of active pharmaceutical ingredients and antibiotics is to be reduced, we need to reclassify and restrict access to certain antibiotics and to develop systems to audit the dispensing of antibiotics in the retail sector and track the movements of active ingredients.

  9. KEY COMPARISON: Final report on CCEM key comparison CCEM.RF-K10.CL (GT-RF/99-2) 'Power in 50 Ω coaxial lines, frequency: 50 MHz to 26 GHz' measurement techniques and results

    Science.gov (United States)

    Janik, Dieter; Inoue, T.; Michaud, A.

    2006-01-01

    This report summarizes the results and the measuring methods of an international key comparison between twelve national metrology institutes (NMIs) and is concerning the calibration factor of RF power sensors in the coaxial 3.5 mm line for frequencies up to 26 GHz. Two RF power travelling standards fitted with male PC 3.5 mm connectors were measured at seven frequencies. The following NMIs participated: NMIJ (Japan), NRC (Canada), NIST (USA), METAS (Switzerland), CSIR-NML (South Africa), NMIA (Australia), NPL (UK), SiQ (Slovenia), IEN (Italy), VNIIFTRI (Russian Federation), SPRING (Singapore) and PTB (Germany), as the pilot laboratory. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  10. Power Beamed Photon Sails: New Capabilities Resulting From Recent Maturation Of Key Solar Sail And High Power Laser Technologies

    International Nuclear Information System (INIS)

    Montgomery, Edward E. IV

    2010-01-01

    This paper revisits some content in the First International Symposium on Beamed Energy Propulsion in 2002 related to the concept of propellantless in-space propulsion utilizing an external high energy laser to provide momentum to an ultralightweight (gossamer) spacecraft. The design and construction of the NanoSail-D solar sail demonstration spacecraft has demonstrated in space flight hardware the concept of small, very light--yet capable--spacecraft. The results of the Joint High Power Solid State Laser (JHPSSL) have also increased the effectiveness and reduced the cost of an entry level laser source. This paper identifies the impact from improved system parameters on current mission applications.

  11. The Effects of Prostate Cancer Treatment on the Sexual Behavior of Gay and Bisexual Men: Key Results from the "Restore" Study | Division of Cancer Prevention

    Science.gov (United States)

    Speaker | "The Effects of Prostate Cancer Treatment on the Sexual Behavior of Gay and Bisexual Men: Key Results from the 'Restore' Study" will be presented by B.R. Simon Rosser, PhD, MPH, Professor of the Division of Epidemiology & Community Health and Director of HIV/STI Intervention & Prevention Studies at the University of Minnesota School of Public Health in Minneapolis,

  12. SolarSyngas: Results from a virtual institute developing materials and key components for solar thermochemical fuel production

    Science.gov (United States)

    Roeb, Martin; Steinfeld, Aldo; Borchardt, Günter; Feldmann, Claus; Schmücker, Martin; Sattler, Christian; Pitz-Paal, Robert

    2016-05-01

    The Helmholtz Virtual Institute (VI) SolarSynGas brings together expertise from solar energy research and materials science to develop metal oxide based redox materials and to integrate them in a suitable way into related process technologies for two-step thermochemical production of hydrogen and carbon monoxide from water and CO2. One of the foci of experimental investigation was exploring the impact of doping on the feasibility of ceria-based materials - mainly by Zr-doping. The results indicate that a certain Zr-content enhances the reducibility and therefore the splitting performance. Increasing the Zr-content to x = 0.15 improved the specific CO2-splitting performance by 50% compared to pure ceria. This finding agrees with theoretical studies attributing the improvements to lattice modification caused by the introduction of Zr4+. Thermogravimetric relaxation experiments and equilibrium oxygen isotope exchange experiments with subsequent depth profiling analysis were carried out on ceria. As a result the reduction reaction of even dense samples of pure ceria with a grain size of about 20 µm is surface reaction controlled. The structure of the derived expression for the apparent activation energy suggests that the chemical surface exchange coefficient should show only a very weak dependence on temperature for ceria doped with lower valence cations. A solar receiver reactor exhibiting a foam-type reticulated porous ceramics made of ceria was tested. It could be shown that applying dual-scale porosity to those foams with mm-size pores for effective radiative heat transfer during reduction and μm-size pores within its struts for enhanced kinetics during oxidation allows enhancing the performance of the reactor significantly. Also a particle process concept applying solid-solid heat recovery from redox particles in a high temperature solar thermochemical process was analysed that uses ceramic spheres as solid heat transfer medium. This concept can be implemented

  13. The Key Role of Psychosocial Risk on Therapeutic Outcome in Obese Children and Adolescents. Results from a Longitudinal Multicenter Study

    Directory of Open Access Journals (Sweden)

    Markus Röbl

    2013-06-01

    Full Text Available Objective: Childhood obesity is high on the global public health agenda. Although risk factors are well known, the influence of social risk on the therapeutic outcome of lifestyle intervention is poorly examined. This study aims to investigate the influence of migration background, low education, and parental unemployment. Methods: 62,147 patients participated in multidimensional lifestyle intervention programs in 179 pediatric obesity centers. Data were collected using standardized software for longitudinal multicenter documentation. 12,305 (19.8% attended care for 6-24 months, undergoing an intensive therapy period and subsequent follow-ups for up to 3 years. A cumulative social risk score was calculated based on different risk indicators. Results: Migration background, low education, and parental employment significantly influenced the outcome of lifestyle intervention. The observed BMI-SDS reduction was significantly higher in the subgroup with low social risks factors (Δ BMI-SDS -0.19 compared to those presenting moderate (Δ BMI-SDS -0.14 and high social risk (Δ BMI-SDS -0.11. Conclusion: Our data underline the effect of children's social setting on the outcome of multidimensional lifestyle intervention. The presence of a high social risk burden is a negative predictor for successful weight loss. Specific therapeutic programs need to be developed for disadvantaged children and adolescents.

  14. What do Key Stakeholders Think About HIV Self-Testing in Canada? Results from a Cross-Sectional Survey.

    Science.gov (United States)

    Pai, N Pant; Smallwood, M; Gulati, D; Lapczak, N; Musten, A; Gaydos, C; Johnston, C; Steben, M; Wong, T; Engel, N; Kim, J

    2018-02-01

    Human immunodeficiency virus (HIV) self-testing presents an empowering alternative to facility-based testing for reaching undiagnosed HIV infected individuals, but is not currently available in Canada. We surveyed stakeholders (clinical providers, public health professionals, researchers) engaged in HIV testing initiatives nationwide to identify the concerns, opportunities and challenges to implementing HIV self-testing in Canada. An online cross-sectional survey was disseminated by the Canadian Institutes of Health Research Centre for REACH 2.0 National HIV & sexually transmitted and blood borne infections working group to stakeholders nationwide, with a target sample size of 200. Quantitative and qualitative data were analyzed using a mixed-methods, respondent-informed approach, to inform subsequent HIV self-testing in a country where self-testing is not yet accessible. A total of 183 responses were received. A majority (70.7%) (128/181) felt that self-testing was a necessary investment to reach the undiagnosed. 64.6% (117/181) felt that self-tests should be made available to their clients and 71.5% (128/179) of respondents agreed that self-test instructions required improvements. However, 50% (90/180) felt that self-testing will pose an economic challenge to current HIV testing models. Regardless, 21% urged for timely action and availability of HIV self-tests. Thematic analyses reflected the following concerns: (a) need for affordable self-tests, (b) need for expedited, customized, and accessible linkages to counselling, (c) concern for patients to cope with positive self-test results, (d) accuracy of self-tests to detect acute HIV and (e) liability in the context of non-disclosure. Stakeholders agreed to the provision of an option of HIV self-testing to reach the undiagnosed individuals. Concerns regarding costs and accuracy of self-tests, expedited linkages to counselling, and integration of self-test within prevailing HIV testing models, will need to be

  15. Towards Improving our Understanding on the Retrievals of Key Parameters Characterising Land Surface Interactions from Space: Introduction & First Results from the PREMIER-EO Project

    Science.gov (United States)

    Ireland, Gareth; North, Matthew R.; Petropoulos, George P.; Srivastava, Prashant K.; Hodges, Crona

    2015-04-01

    Acquiring accurate information on the spatio-temporal variability of soil moisture content (SM) and evapotranspiration (ET) is of key importance to extend our understanding of the Earth system's physical processes, and is also required in a wide range of multi-disciplinary research studies and applications. The utility and applicability of Earth Observation (EO) technology provides an economically feasible solution to derive continuous spatio-temporal estimates of key parameters characterising land surface interactions, including ET as well as SM. Such information is of key value to practitioners, decision makers and scientists alike. The PREMIER-EO project recently funded by High Performance Computing Wales (HPCW) is a research initiative directed towards the development of a better understanding of EO technology's present ability to derive operational estimations of surface fluxes and SM. Moreover, the project aims at addressing knowledge gaps related to the operational estimation of such parameters, and thus contribute towards current ongoing global efforts towards enhancing the accuracy of those products. In this presentation we introduce the PREMIER-EO project, providing a detailed overview of the research aims and objectives for the 1 year duration of the project's implementation. Subsequently, we make available the initial results of the work carried out herein, in particular, related to an all-inclusive and robust evaluation of the accuracy of existing operational products of ET and SM from different ecosystems globally. The research outcomes of this project, once completed, will provide an important contribution towards addressing the knowledge gaps related to the operational estimation of ET and SM. This project results will also support efforts ongoing globally towards the operational development of related products using technologically advanced EO instruments which were launched recently or planned be launched in the next 1-2 years. Key Words: PREMIER

  16. A mental health needs assessment of children and adolescents in post-conflict Liberia: results from a quantitative key-informant survey

    Science.gov (United States)

    Borba, Christina P.C.; Ng, Lauren C.; Stevenson, Anne; Vesga-Lopez, Oriana; Harris, Benjamin L.; Parnarouskis, Lindsey; Gray, Deborah A.; Carney, Julia R.; Domínguez, Silvia; Wang, Edward K.S.; Boxill, Ryan; Song, Suzan J.; Henderson, David C.

    2016-01-01

    Between 1989 and 2004, Liberia experienced a devastating civil war that resulted in widespread trauma with almost no mental health infrastructure to help citizens cope. In 2009, the Liberian Ministry of Health and Social Welfare collaborated with researchers from Massachusetts General Hospital to conduct a rapid needs assessment survey in Liberia with local key informants (n = 171) to examine the impact of war and post-war events on emotional and behavioral problems of, functional limitations of, and appropriate treatment settings for Liberian youth aged 5–22. War exposure and post-conflict sexual violence, poverty, infectious disease and parental death negatively impacted youth mental health. Key informants perceived that youth displayed internalizing and externalizing symptoms and mental health-related functional impairment at home, school, work and in relationships. Medical clinics were identified as the most appropriate setting for mental health services. Youth in Liberia continue to endure the harsh social, economic and material conditions of everyday life in a protracted post-conflict state, and have significant mental health needs. Their observed functional impairment due to mental health issues further limited their access to protective factors such as education, employment and positive social relationships. Results from this study informed Liberia's first post-conflict mental health policy. PMID:26807147

  17. New species of Diabrotica Chevrolat (Coleoptera: Chrysomelidae: Galerucinae and a key to Diabrotica and related genera: results of a synopsis of North and Central American Diabrotica species

    Directory of Open Access Journals (Sweden)

    Alexander Derunkov

    2015-02-01

    Full Text Available The following 18 new species of Diabrotica are described and illustrated as a result of the synopsis of North and Central American species: D. barclayi sp. nov., Guatemala; D. caveyi sp. nov., Costa Rica; D. costaricensis sp. nov., Costa Rica; D. dmitryogloblini sp. nov., Mexico; D. duckworthorum sp. nov., Honduras; D. hartjei sp. nov., Panama; D. josephbalyi sp. nov., Costa Rica; D. lawrencei sp. nov., Mexico; D. mantillerii sp. nov., Panama; D. martinjacobyi sp. nov., Honduras; D. mitteri sp. nov., Panama; D. perkinsi sp. nov., Guatemala; D. redfordae sp. nov., Costa Rica; D. reysmithi sp. nov., Costa Rica; D. salvadorensis sp. nov., El Salvador; D. sel sp. nov., Panama; D. spangleri sp. nov., Costa Rica; D. waltersi sp. nov., Panama. In addition, a key to separate Diabrotica from related genera is presented.

  18. A Web-Based Data Collection Platform for Multisite Randomized Behavioral Intervention Trials: Development, Key Software Features, and Results of a User Survey.

    Science.gov (United States)

    Modi, Riddhi A; Mugavero, Michael J; Amico, Rivet K; Keruly, Jeanne; Quinlivan, Evelyn Byrd; Crane, Heidi M; Guzman, Alfredo; Zinski, Anne; Montue, Solange; Roytburd, Katya; Church, Anna; Willig, James H

    2017-06-16

    Meticulous tracking of study data must begin early in the study recruitment phase and must account for regulatory compliance, minimize missing data, and provide high information integrity and/or reduction of errors. In behavioral intervention trials, participants typically complete several study procedures at different time points. Among HIV-infected patients, behavioral interventions can favorably affect health outcomes. In order to empower newly diagnosed HIV positive individuals to learn skills to enhance retention in HIV care, we developed the behavioral health intervention Integrating ENGagement and Adherence Goals upon Entry (iENGAGE) funded by the National Institute of Allergy and Infectious Diseases (NIAID), where we deployed an in-clinic behavioral health intervention in 4 urban HIV outpatient clinics in the United States. To scale our intervention strategy homogenously across sites, we developed software that would function as a behavioral sciences research platform. This manuscript aimed to: (1) describe the design and implementation of a Web-based software application to facilitate deployment of a multisite behavioral science intervention; and (2) report on results of a survey to capture end-user perspectives of the impact of this platform on the conduct of a behavioral intervention trial. In order to support the implementation of the NIAID-funded trial iENGAGE, we developed software to deploy a 4-site behavioral intervention for new clinic patients with HIV/AIDS. We integrated the study coordinator into the informatics team to participate in the software development process. Here, we report the key software features and the results of the 25-item survey to evaluate user perspectives on research and intervention activities specific to the iENGAGE trial (N=13). The key features addressed are study enrollment, participant randomization, real-time data collection, facilitation of longitudinal workflow, reporting, and reusability. We found 100% user

  19. A theory-based decision aid for patients with cancer: results of feasibility and acceptability testing of DecisionKEYS for cancer.

    Science.gov (United States)

    Hollen, Patricia J; Gralla, Richard J; Jones, Randy A; Thomas, Christopher Y; Brenin, David R; Weiss, Geoffrey R; Schroen, Anneke T; Petroni, Gina R

    2013-03-01

    Appropriate utilization of treatment is a goal for all patients undergoing cancer treatment. Proper treatment maximizes benefit and limits exposure to unnecessary measures. This report describes findings of the feasibility and acceptability of implementing a short, clinic-based decision aid and presents an in-depth clinical profile of the participants. This descriptive study used a prospective, quantitative approach to obtain the feasibility and acceptability of a decision aid (DecisionKEYS for Balancing Choices) for use in clinical settings. It combined results of trials of patients with three different common malignancies. All groups used the same decision aid series. Participants included 80 patients with solid tumors (22 with newly diagnosed breast cancer, 19 with advanced prostate cancer, and 39 with advanced lung cancer) and their 80 supporters as well as their physicians and nurses, for a total of 160 participants and 10 health professionals. The decision aid was highly acceptable to patient and supporter participants in all diagnostic groups. It was feasible for use in clinic settings; the overall value was rated highly. Of six physicians, all found the interactive format with the help of the nurse as feasible and acceptable. Nurses also rated the decision aid favorably. This intervention provides the opportunity to enhance decision making about cancer treatment and warrants further study including larger and more diverse groups. Strengths of the study included a theoretical grounding, feasibility testing of a practical clinic-based intervention, and summative evaluation of acceptability of the intervention by patient and supporter pairs. Further research also is needed to test the effectiveness of the decision aid in diverse clinical settings and to determine if this intervention can decrease overall costs.

  20. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  1. Key terms for the assessment of the safety of vaccines in pregnancy: Results of a global consultative process to initiate harmonization of adverse event definitions.

    Science.gov (United States)

    Munoz, Flor M; Eckert, Linda O; Katz, Mark A; Lambach, Philipp; Ortiz, Justin R; Bauwens, Jorgen; Bonhoeffer, Jan

    2015-11-25

    The variability of terms and definitions of Adverse Events Following Immunization (AEFI) represents a missed opportunity for optimal monitoring of safety of immunization in pregnancy. In 2014, the Brighton Collaboration Foundation and the World Health Organization (WHO) collaborated to address this gap. Two Brighton Collaboration interdisciplinary taskforces were formed. A landscape analysis included: (1) a systematic literature review of adverse event definitions used in vaccine studies during pregnancy; (2) a worldwide stakeholder survey of available terms and definitions; (3) and a series of taskforce meetings. Based on available evidence, taskforces proposed key terms and concept definitions to be refined, prioritized, and endorsed by a global expert consultation convened by WHO in Geneva, Switzerland in July 2014. Using pre-specified criteria, 45 maternal and 62 fetal/neonatal events were prioritized, and key terms and concept definitions were endorsed. In addition recommendations to further improve safety monitoring of immunization in pregnancy programs were specified. This includes elaboration of disease concepts into standardized case definitions with sufficient applicability and positive predictive value to be of use for monitoring the safety of immunization in pregnancy globally, as well as the development of guidance, tools, and datasets in support of a globally concerted approach. There is a need to improve the safety monitoring of immunization in pregnancy programs. A consensus list of terms and concept definitions of key events for monitoring immunization in pregnancy is available. Immediate actions to further strengthen monitoring of immunization in pregnancy programs are identified and recommended. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  2. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  3. results

    Directory of Open Access Journals (Sweden)

    Salabura Piotr

    2017-01-01

    Full Text Available HADES experiment at GSI is the only high precision experiment probing nuclear matter in the beam energy range of a few AGeV. Pion, proton and ion beams are used to study rare dielectron and strangeness probes to diagnose properties of strongly interacting matter in this energy regime. Selected results from p + A and A + A collisions are presented and discussed.

  4. Modeling of integrated environmental control systems for coal-fired power plants. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, E.S.; Salmento, J.S.; Frey, H.C.; Abu-Baker, A.; Berkenpas, M.

    1991-05-01

    The Integrated Environmental Control Model (IECM) was designed to permit the systematic evaluation of environmental control options for pulverized coal-fired (PC) power plants. Of special interest was the ability to compare the performance and cost of advanced pollution control systems to ``conventional`` technologies for the control of particulate, SO{sub 2} and NO{sub x}. Of importance also was the ability to consider pre-combustion, combustion and post-combustion control methods employed alone or in combination to meet tough air pollution emission standards. Finally, the ability to conduct probabilistic analyses is a unique capability of the IECM. Key results are characterized as distribution functions rather than as single deterministic values. (VC)

  5. Modeling of integrated environmental control systems for coal-fired power plants

    Energy Technology Data Exchange (ETDEWEB)

    Rubin, E.S.; Salmento, J.S.; Frey, H.C.; Abu-Baker, A.; Berkenpas, M.

    1991-05-01

    The Integrated Environmental Control Model (IECM) was designed to permit the systematic evaluation of environmental control options for pulverized coal-fired (PC) power plants. Of special interest was the ability to compare the performance and cost of advanced pollution control systems to conventional'' technologies for the control of particulate, SO{sub 2} and NO{sub x}. Of importance also was the ability to consider pre-combustion, combustion and post-combustion control methods employed alone or in combination to meet tough air pollution emission standards. Finally, the ability to conduct probabilistic analyses is a unique capability of the IECM. Key results are characterized as distribution functions rather than as single deterministic values. (VC)

  6. Establishing Key Performance Indicators [KPIs] and Their Importance for the Surgical Management of Inflammatory Bowel Disease-Results From a Pan-European, Delphi Consensus Study.

    Science.gov (United States)

    Morar, Pritesh S; Hollingshead, James; Bemelman, Willem; Sevdalis, Nick; Pinkney, Thomas; Wilson, Graeme; Dunlop, Malcolm; Davies, R Justin; Guy, Richard; Fearnhead, Nicola; Brown, Steven; Warusavitarne, Janindra; Edwards, Cathryn; Faiz, Omar

    2017-10-27

    Key performance indicators [KPIs] exist across a range of areas in medicine. They help to monitor outcomes, reduce variation, and drive up standards across services. KPIs exist for inflammatory bowel disease [IBD] care, but none specifically cover inflammatory bowel disease [IBD] surgical service provision. This was a consensus-based study using a panel of expert IBD clinicians from across Europe. Items were developed and fed through a Delphi process to achieve consensus. Items were ranked on a Likert scale from 1 [not important] to 5 [very important]. Consensus was defined when the inter quartile range was ≤ 1, and items with a median score > 3 were considered for inclusion. A panel of 21 experts [14 surgeons and 7 gastroenterologists] was recruited. Consensus was achieved on procedure-specific KPIs for ileocaecal and perianal surgery for Crohn's disease, [N = 10] with themes relating to morbidity [N = 7], multidisciplinary input [N = 2], and quality of life [N = 1]; and for subtotal colectomy, proctocolectomy and ileoanal pouch surgery for ulcerative colitis [N = 11], with themes relating to mortality [N = 2], morbidity [N = 8], and service provision [N = 1]. Consensus was also achieved for measures of the quality of IBD surgical service provision and quality assurance in IBD surgery. This study has provided measurable KPIs for the provision of surgical services in IBD. These indicators cover IBD surgery in general, the governance and structures of the surgical services, and separate indicators for specific subareas of surgery. Monitoring of IBD services with these KPIs may reduce variation across services and improve quality. Copyright © 2017 European Crohn’s and Colitis Organisation (ECCO). Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com

  7. Foreign Language Competence and Content and Language Integrated Learning in Multilingual Schools in Catalonia: An "Ex Post Facto" Study Analysing the Results of State Key Competences Testing

    Science.gov (United States)

    Coral, Josep; Lleixà, Teresa; Ventura, Carles

    2018-01-01

    The member states of the European Union have funded many initiatives supporting the teaching and learning of foreign languages. Content and language integrated learning is one of the experimental language programmes that have been introduced in Catalonia, in the north-east of Spain. The aims of this study are to analyse the results achieved by…

  8. Alkaline Leaching of Key, Non-Radioactive Components from Simulants and Hanford Tank Sludge 241-S-110: Results of FY01 Studies

    Energy Technology Data Exchange (ETDEWEB)

    Rapko, Brian M.; Vienna, John D.; Sinkov, Serguei I.; Kim, Jinseong; Cisar, Alan J.

    2002-09-10

    This study addressed three aspects in selected alkaline leaching: first, the use of oxidants persulfate, permanganate, and ferrate as selective chromium-leaching agents from washed Hanford Tank S-110 solids under varying conditions of hydroxide concentration, temperature, and time was investigated. Second, the selective dissolution of solids containing mercury(II) oxide under alkaline conditions was examined. Various compounds were studied for their effectiveness in dissolving mercury under varying conditions of time, temperature, and hydroxide concentration in the leachate. Three compounds were studied: cysteine, iodide, and diethyldithiophosphoric acid (DEDTPA). Finally, the possibility of whether an oxidant bound to an anion-exchange resin can be used to effectively oxidize chromium(III) in alkaline solutions was addressed. The experimental results remain ambiguous to date; further work is required to reach any definitive conclusions as to the effectiveness of this approach.

  9. Replacing American snacks with tree nuts increases consumption of key nutrients among US children and adults: results of an NHANES modeling study.

    Science.gov (United States)

    Rehm, Colin D; Drewnowski, Adam

    2017-03-07

    higher in Model 1 (67.8) and in Model 2 (69.7) compared to observed diets (58.5). Replacing snacks with almonds only produced similar results; the decrease in sodium was more modest and no increase in plant omega-3 fats was observed. Replacing between-meal snacks with tree nuts or almonds led to more nutrient-rich diets that were lower in empty calories and sodium and had more favorable fatty acid profiles. Food pattern modeling using NHANES data can be used to assess the likely nutritional impact of dietary guidance.

  10. Sampling Key Populations for HIV Surveillance: Results From Eight Cross-Sectional Studies Using Respondent-Driven Sampling and Venue-Based Snowball Sampling.

    Science.gov (United States)

    Rao, Amrita; Stahlman, Shauna; Hargreaves, James; Weir, Sharon; Edwards, Jessie; Rice, Brian; Kochelani, Duncan; Mavimbela, Mpumelelo; Baral, Stefan

    2017-10-20

    In using regularly collected or existing surveillance data to characterize engagement in human immunodeficiency virus (HIV) services among marginalized populations, differences in sampling methods may produce different pictures of the target population and may therefore result in different priorities for response. The objective of this study was to use existing data to evaluate the sample distribution of eight studies of female sex workers (FSW) and men who have sex with men (MSM), who were recruited using different sampling approaches in two locations within Sub-Saharan Africa: Manzini, Swaziland and Yaoundé, Cameroon. MSM and FSW participants were recruited using either respondent-driven sampling (RDS) or venue-based snowball sampling. Recruitment took place between 2011 and 2016. Participants at each study site were administered a face-to-face survey to assess sociodemographics, along with the prevalence of self-reported HIV status, frequency of HIV testing, stigma, and other HIV-related characteristics. Crude and RDS-adjusted prevalence estimates were calculated. Crude prevalence estimates from the venue-based snowball samples were compared with the overlap of the RDS-adjusted prevalence estimates, between both FSW and MSM in Cameroon and Swaziland. RDS samples tended to be younger (MSM aged 18-21 years in Swaziland: 47.6% [139/310] in RDS vs 24.3% [42/173] in Snowball, in Cameroon: 47.9% [99/306] in RDS vs 20.1% [52/259] in Snowball; FSW aged 18-21 years in Swaziland 42.5% [82/325] in RDS vs 8.0% [20/249] in Snowball; in Cameroon 15.6% [75/576] in RDS vs 8.1% [25/306] in Snowball). They were less educated (MSM: primary school completed or less in Swaziland 42.6% [109/310] in RDS vs 4.0% [7/173] in Snowball, in Cameroon 46.2% [138/306] in RDS vs 14.3% [37/259] in Snowball; FSW: primary school completed or less in Swaziland 86.6% [281/325] in RDS vs 23.9% [59/247] in Snowball, in Cameroon 87.4% [520/576] in RDS vs 77.5% [238/307] in Snowball) than the snowball

  11. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  12. Critical evaluation of the Laboratory of Radionuclide Metrology results of the Institute of Radiation Protection and Dosimetry - IRD in the international key comparisons of activity measurement of radioactive solutions

    International Nuclear Information System (INIS)

    Iwahara, A.; Tauhata, L.; Silva, C.J. da

    2014-01-01

    The Radionuclide Metrology Laboratory (LMR) of LNMRI/IRD has been participating since 1984, in international key-comparisons of activity measurement of radioactive sources organized by BIPM and the Regional Metrology Organizations as EURAMET and APMP. The measured quantity is the activity of a radioactive solution, in becquerel (Bq), containing the radionuclide involved and the of measurement methods used are 4αβ-γ coincidence/anticoincidence, coincidence sum-peak and liquid scintillation. In this paper a summary of the methods used and a performance analysis of the results obtained are presented. (author)

  13. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  14. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  15. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  16. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  17. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  18. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  19. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  20. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  1. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  2. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  3. Dual targeting of wild-type and mutant p53 by small molecule RITA results in the inhibition of N-Myc and key survival oncogenes and kills neuroblastoma cells in vivo and in vitro.

    Science.gov (United States)

    Burmakin, Mikhail; Shi, Yao; Hedström, Elisabeth; Kogner, Per; Selivanova, Galina

    2013-09-15

    Restoration of the p53 function in tumors is a promising therapeutic strategy due to the high potential of p53 as tumor suppressor and the fact that established tumors depend on p53 inactivation for their survival. Here, we addressed the question whether small molecule RITA can reactivate p53 in neuroblastoma and suppress the growth of neuroblastoma cells in vitro and in vivo. The ability of RITA to inhibit growth and to induce apoptosis was shown in seven neuroblastoma cell lines. Mechanistic studies were carried out to determine the p53 dependence and the molecular mechanism of RITA-induced apoptosis in neuroblastoma, using cell viability assays, RNAi silencing, co-immunoprecipitation, qPCR, and Western blotting analysis. In vivo experiments were conducted to study the effect of RITA on human neuroblastoma xenografts in mice. RITA induced p53-dependent apoptosis in a set of seven neuroblastoma cell lines, carrying wild-type or mutant p53; it activated p53 and triggered the expression of proapoptotic p53 target genes. Importantly, p53 activated by RITA inhibited several key oncogenes that are high-priority targets for pharmacologic anticancer strategies in neuroblastoma, including N-Myc, Aurora kinase, Mcl-1, Bcl-2, Wip-1, MDM2, and MDMX. Moreover, RITA had a strong antitumor effect in vivo. Reactivation of wild-type and mutant p53 resulting in the induction of proapoptotic factors along with ablation of key oncogenes by compounds such as RITA may be a highly effective strategy to treat neuroblastoma. ©2013 AACR.

  4. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  5. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  6. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  7. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  8. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  9. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  10. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  11. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  12. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  13. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  14. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  15. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  16. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  17. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  18. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  19. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  20. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  1. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  2. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  3. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  4. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  5. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  6. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  7. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  8. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  9. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  10. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  11. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  12. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  13. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  14. A new molecular phylogeny of the Laurencia complex (Rhodophyta, Rhodomelaceae) and a review of key morphological characters result in a new genus, Coronaphycus, and a description of C. novus.

    Science.gov (United States)

    Metti, Yola; Millar, Alan J K; Steinberg, Peter

    2015-10-01

    Within the Laurencia complex (Rhodophyta, Rhodomelaceae), six genera have been recognized based on both molecular analyses and morphology: Laurencia, Osmundea, Chondrophycus, Palisada, Yuzurua, and Laurenciella. Recently, new material from Australia has been collected and included in the current molecular phylogeny, resulting in a new clade. This study examined the generic delineations using a combination of morphological comparisons and phylogenetic analysis of chloroplast (rbcL) nucleotide sequence. The molecular phylogeny recovered eight (rather than six) clades; Yuzurua, Laurenciella, Palisada, and Chondrophycus showed as monophyletic clades each with strong support. However, the genera Osmundea and Laurencia were polyphyletic. Consequently, the new genus Coronaphycus is proposed, resulting in the new combination Coronaphycus elatus and a description of the new species C. novus. © 2015 Phycological Society of America.

  15. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  16. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  17. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  18. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  19. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  20. The key found

    Directory of Open Access Journals (Sweden)

    Agata Stankowka

    2010-01-01

    Full Text Available Poetycka antropologia Julii Hartwig [Julia Hartwig’s poetic anthropology] written by Marcin Terlecki is a book that fills the yawning gap in our literary understanding of the twentieth century Polish poetry and constitutes the first attempt at a comprehensive and detailed presentation of the lyrical works by J. Hartwig. The modern collection in which the work appears allow M. Terlecki to reveal the poetess’ fundamental insights dominating and underlying her world outlook and epistemological views. This, in turn, puts him in a position to give an explanation to the logic embedded in the evolution under scrutiny. M. Terlecki convincingly supports his own argument concerning J. Hartwig’s poetic reception of the world proving the thesis that its fundamentals are deeply rooted in the anthropological perspective. Terlecki differentiates the latter into three basic categories. First, there is “strangeness/alienation”, which results in the need for self-definition (determination of one’s nature and basic qualities. Then, “identity”, whose reflection turns out to be not only what is different in its external shape, but also what is different inside — within the plane of one’s own culture, biography and personality. And, finally, “empathy”, born out of questions on a feasibility of contact with what is different, alien and absent. The three categories, connected by the logic of anthropological vision, are presented as basic and fundamental for the subsequent stages in Hartwig’s poetical output. At the same time, they reveal themselves as axes of anthropological reading material provided by the author — for the discussed book is the author’s own research project on “poetic anthropology”.

  1. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  2. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  3. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  4. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  5. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  6. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  7. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  8. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  9. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  10. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  11. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  12. AN INTEGRATED MODELING FRAMEWORK FOR CARBON MANAGEMENT TECHNOLOGIES

    Energy Technology Data Exchange (ETDEWEB)

    Anand B. Rao; Edward S. Rubin; Michael B. Berkenpas

    2004-03-01

    study the feasibility and cost of carbon capture and sequestration at both new and existing PC plants as well as new NGCC plants. The cost of CO{sub 2} avoidance using amine-based CO{sub 2} capture technology is found to be sensitive to assumptions about the reference plant design and operation, as well as assumptions about the CO{sub 2} capture system design. The case studies also reveal multi-pollutant interactions and potential tradeoffs in the capture of CO{sub 2}, SO{sub 2}, NO{sub 2} and NH{sub 3}. The potential for targeted R&D to reduce the cost of CO{sub 2} capture also is explored using the IECM-cs in conjunction with expert elicitations regarding potential improvements in key performance and cost parameters of amine-based systems. The results indicate that the performance of amine-based CO{sub 2} capture systems can be improved significantly, and the cost of CO{sub 2} capture reduced substantially over the next decade or two, via innovations such as new or improved sorbents with lower regeneration heat requirements, and improvements in power plant heat integration to reduce the (currently large) energy penalty of CO{sub 2} capture. Future work will explore in more detail a broader set of advanced technology options to lower the costs of CO{sub 2} capture and storage. Volume 2 of this report presents a detailed User's Manual for the IECM-cs computer model as a companion to the technical documentation in Volume 1.

  13. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  14. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  15. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  16. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  17. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  18. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  19. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  20. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  1. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  2. Quantum cryptography to satellites for global secure key distribution

    Science.gov (United States)

    Rarity, John G.; Gorman, Philip M.; Knight, Paul; Wallace, Kotska; Tapster, Paul R.

    2017-11-01

    We have designed and built a free space secure key exchange system using weak laser pulses with polarisation modulation by acousto-optic switching. We have used this system to exchange keys over a 1.2km ground range with absolute security. Building from this initial result we analyse the feasibility of exchanging keys to a low earth orbit satellite.

  3. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  4. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  5. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  6. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  7. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  8. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  9. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  10. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  11. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  12. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  13. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  14. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  15. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  16. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  17. 1998 results

    International Nuclear Information System (INIS)

    Gadonneix, P.

    1998-01-01

    This document presents the financial and commercial results of Gaz de France (GdF) company for 1998. The following points are presented successively: financial results (budget results, turnover, self-financing capacity, investments, debt situation), commercial results (some remarkable numbers and records, the tertiary and residential market, the industrial market, cogeneration and natural gas for vehicles), the strategy, 1998 realizations and perspectives (the natural gas energy in the 21. century, the development of GdF, the gas distribution and services (development of the French distribution system, export of the know-how, development of services), the transportation and storage systems threw Europe (densification of the pipeline network, the key-position of France, the north-south equilibrium of the distribution network), the natural gas production by GdF, the diversification of supplies, and the main daughter companies abroad). (J.S.)

  18. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  19. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  20. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  1. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  2. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  3. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  4. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  5. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  6. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  7. Key parameters analysis of hybrid HEMP simulator

    International Nuclear Information System (INIS)

    Mao Congguang; Zhou Hui

    2009-01-01

    According to the new standards on the high-altitude electromagnetic pulse (HEMP) developed by International Electrotechnical Commission (IEC), the target parameter requirements of the key structure of the hybrid HEMP simulator are decomposed. Firstly, the influences of the different excitation sources and biconical structures to the key parameters of the radiated electric field wave shape are investigated and analyzed. Then based on the influence curves the target parameter requirements of the pulse generator are proposed. Finally the appropriate parameters of the biconical structure and the excitation sources are chosen, and the computational result of the electric field in free space is presented. The results are of great value for the design of the hybrid HEMP simulator. (authors)

  8. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  9. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  10. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  11. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  12. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  13. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  14. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  15. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  16. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  17. Chirp investigation in EMLs towards frequency shift keying modulation

    DEFF Research Database (Denmark)

    Iglesias Olmedo, Miguel; Vegas Olmos, Juan José; Westergren, Urban

    2014-01-01

    This paper presents a chirp modeling and experimental results that support our vision of enabling frequency shift keying (FSK) exploiting the chirp effect in externally modulated lasers (EMLs).......This paper presents a chirp modeling and experimental results that support our vision of enabling frequency shift keying (FSK) exploiting the chirp effect in externally modulated lasers (EMLs)....

  18. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  19. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  20. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  1. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  2. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  3. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  4. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  5. Duplication of Key Frames of Video Streams in Wireless Networks

    OpenAIRE

    Sagatov, Evgeny S.; Sukhov, Andrei M.

    2011-01-01

    In this paper technological solutions for improving the quality of video transfer along wireless networks are investigated. Tools have been developed to allow packets to be duplicated with key frames data. In the paper we tested video streams with duplication of all frames, with duplication of key frames, and without duplication. The experiments showed that the best results are obtained by duplication of packages which contain key frames. The paper also provides an overview of the coefficient...

  6. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  7. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  8. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  9. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  10. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  11. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  12. LBTool: A stochastic toolkit for leave-based key updates

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    Quantitative techniques have been successfully employed in verification of information and communication systems. However, the use of such techniques are still rare in the area of security. In this paper, we present a toolkit that implements transient analysis on a key update method for wireless...... sensor networks. The analysis aims to find out the probability of a network key being compromised at a specific time point, which result in fluctuations over time for a specific key update method called Leave-based key update. For such a problem, the use of current tools is limited in many ways...

  13. Key factors influencing the implementation success of home telecare application.

    NARCIS (Netherlands)

    Postema, T.R.F.; Peeters, J.M.; Friele, R.D.

    2012-01-01

    Rationale: The introduction of home telecare in healthcare organizations has shown mixed results in practice. The aim of this study is to arrive at a set of key factors that can be used in further implementation of video communication. We argue that key factors are mainly found in the organizational

  14. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  15. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  16. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  17. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  18. DNA based random key generation and management for OTP encryption.

    Science.gov (United States)

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  19. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  20. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  1. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  2. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses

  3. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  4. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  5. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  6. 1 RESULTS

    African Journals Online (AJOL)

    Essa

    2011-11-07

    Nov 7, 2011 ... dependency on natural forest for firewood and timber. Key words: Agroforestry ... whereas the economic value of agroforestry products has not been quantified to ..... seed from other internal and external sources. Farmers.

  7. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  8. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  9. Iris recognition based on key image feature extraction.

    Science.gov (United States)

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  10. Fully Device-Independent Quantum Key Distribution

    Science.gov (United States)

    Vazirani, Umesh; Vidick, Thomas

    2014-10-01

    Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

  11. SARS: Key factors in crisis management.

    Science.gov (United States)

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  12. Keys of educational change in Ecuador

    Directory of Open Access Journals (Sweden)

    Agustín De la Herrán Gascón

    2018-01-01

    Full Text Available The article analyzes the educational system in Ecuador. The Ecuadorian education system arouses international interest, especially in Latin America. In this essay we will try to answer these questions: What might be the relevant keys from the public education in Ecuador? Why has it reached its present level of development, particularly in inclusive education? What fundaments and policies are behind the results of the goals from Education for All (EFA 2000-2015 From the Dakar framework for Action? (World Education Forum, 2000. In light of these issues, the goal is to understand key factors and reasons that have contributed to the development of the Ecuadorian public education. In terms of methodology, the approach is qualitative, dialectical, documentary and descriptive (Mc Millan and Schumacher, 2005. The research is proposed as a case study, where the choice of the case is justified by its novelty, its degree of development and its emphasis on inclusion and equity in all educational levels. With this aim, it is made a descriptive analysis of the rules underlying the changes in the educational system in Ecuador in the last three decades and it is carried out, particularly since 2008, following the last Constitution (Constituent Assembly, 2008. Tables as an analytical contribution of the authors are offered. Also data endorsed by authors and agencies of maximum national and international prestige are detailed and they realize the effectiveness of policies and such changes.

  13. Key attributes of expert NRL referees.

    Science.gov (United States)

    Morris, Gavin; O'Connor, Donna

    2017-05-01

    Experiential knowledge of elite National Rugby League (NRL) referees was investigated to determine the key attributes contributing to expert officiating performance. Fourteen current first-grade NRL referees were asked to identify the key attributes they believed contributed to their expert refereeing performance. The modified Delphi method involved a 3-round process of an initial semi-structured interview followed by 2 questionnaires to reach consensus of opinion. The data revealed 25 attributes that were rated as most important that underpin expert NRL refereeing performance. Results illustrate the significance of the cognitive category, with the top 6 ranked attributes all cognitive skills. Of these, the referees ranked decision-making accuracy as the most important attribute, followed by reading the game, communication, game understanding, game management and knowledge of the rules. Player rapport, positioning and teamwork were the top ranked game skill attributes underpinning performance excellence. Expert referees also highlighted a number of psychological attributes (e.g., concentration, composure and mental toughness) that were significant to performance. There were only 2 physiological attributes (fitness, aerobic endurance) that were identified as significant to elite officiating performance. In summary, expert consensus was attained which successfully provided a hierarchy of the most significant attributes of expert NRL refereeing performance.

  14. Continuous variable quantum key distribution with modulated entangled states

    DEFF Research Database (Denmark)

    Madsen, Lars S; Usenko, Vladyslav C.; Lassen, Mikael

    2012-01-01

    Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes...... based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile...... entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising...

  15. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  16. Laparoscopic radical cystectomy: key points

    Directory of Open Access Journals (Sweden)

    D. V. Perlin

    2018-01-01

    Full Text Available Background. Radical cystectomy remains the golden standard for treatment of muscle invasive bladder cancer. Objective: to duplicate with highest accuracy the open radical cystectomy procedure, which we successfully utilized earlier in our clinic, in the of laparoscopic conditions in order to preserve the advantages of minimally invasive procedures and retain the reliability of the tried and tested open surgery.Materials and methods. In the report were included 35 patients (27 men and 8 women with bladder cancer, who underwent laparoscopic radical cystectomy in Volgograd Regional Center of Urology and Nephrology between April 2013 and March 2016. Only the patients who had been submitted to full intracorporal ileal conduits were included.Results. The mean operative time was 378 minutes, the mean blood loss was 285 millilitres, the mean length of hospital stay was 12.4 days, only 20 % of patients required the narcotic anesthetics. The postoperative complication rate was 11.4 %. However, the majority of the patients were successfully treated with minimally invasive procedures. Generally, our results were similar to other reported studies.Conclusion. Laparoscopic radical cystectomy is a safe and efficient modality of treatment of bladder cancer. However, it needs more procedures and longer observation period to establish laparoscopic radical cystectomy as an alternative to open radical cystectomy.

  17. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  18. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  19. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  20. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  1. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  2. BENCHMARKING - PRACTICAL TOOLS IDENTIFY KEY SUCCESS FACTORS

    Directory of Open Access Journals (Sweden)

    Olga Ju. Malinina

    2016-01-01

    Full Text Available The article gives a practical example of the application of benchmarking techniques. The object of study selected fashion store Company «HLB & M Hennes & Mauritz», located in the shopping center «Gallery», Krasnodar. Hennes & Mauritz. The purpose of this article is to identify the best ways to develop a fashionable brand clothing store Hennes & Mauritz on the basis of benchmarking techniques. On the basis of conducted market research is a comparative analysis of the data from different perspectives. The result of the author’s study is a generalization of the ndings, the development of the key success factors that will allow to plan a successful trading activities in the future, based on the best experience of competitors.

  3. Adaptation to climate change. Key terms

    International Nuclear Information System (INIS)

    Levina, E.; Tirpak, D.

    2006-05-01

    Adaptation has become an important issue in international and domestic discussions on climate change. Numerous terms and concepts have come into common usage as a result of IPCC reports, discussions in the context of the UNFCCC and dialogs by the climate community at large. This paper examines the key adaptation terms and concepts used by the climate change community and other institutions. Conflicts and contradictions are noted with the aim of sensitizing different bodies to the differences, but particularly the Parties to the Convention and experts participating in the IPCC. Given the need to promote a common understanding among various stakeholders and the potential financial implications of various definitions, it appears important for the IPCC and the UNFCCC to work toward common definitions, at least for a core set of terms and concepts

  4. KEY CONCEPTS OF AGROECOLOGY SCIENCE. A SYSTEMATIC REVIEW

    Directory of Open Access Journals (Sweden)

    Luis Fernando Gómez-Echeverri

    2016-08-01

    Full Text Available A systematic review was conducted with the objective of determining the key concepts that are currently used in theoretical work in agroecology. They were obtained from titles and keywords of theoretical articles and books that included the term agroecology in the title. Fifteen terms with occurrences higher than three were obtained. They show that agroecology revolves around the concept of integral sustainability, and that there is agreement on neither its object of study nor goal. As a result, most key concepts concern the object of study or the goal of agroecology. Other key concepts are food sovereignty, agriculture, ecofeminism, climate change, family farming, and social movements.

  5. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  6. A Key Event Path Analysis Approach for Integrated Systems

    Directory of Open Access Journals (Sweden)

    Jingjing Liao

    2012-01-01

    Full Text Available By studying the key event paths of probabilistic event structure graphs (PESGs, a key event path analysis approach for integrated system models is proposed. According to translation rules concluded from integrated system architecture descriptions, the corresponding PESGs are constructed from the colored Petri Net (CPN models. Then the definitions of cycle event paths, sequence event paths, and key event paths are given. Whereafter based on the statistic results after the simulation of CPN models, key event paths are found out by the sensitive analysis approach. This approach focuses on the logic structures of CPN models, which is reliable and could be the basis of structured analysis for discrete event systems. An example of radar model is given to characterize the application of this approach, and the results are worthy of trust.

  7. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  8. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  9. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  10. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  11. Key determinants of managing the marketing asset of global companies

    OpenAIRE

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  12. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  13. Nutrition and healthy ageing: the key ingredients.

    Science.gov (United States)

    Kiefte-de Jong, Jessica C; Mathers, John C; Franco, Oscar H

    2014-05-01

    Healthy longevity is a tangible possibility for many individuals and populations, with nutritional and other lifestyle factors playing a key role in modulating the likelihood of healthy ageing. Nevertheless, studies of effects of nutrients or single foods on ageing often show inconsistent results and ignore the overall framework of dietary habits. Therefore, the use of dietary patterns (e.g. a Mediterranean dietary pattern) and the specific dietary recommendations (e.g. dietary approaches to stop hypertension, Polymeal and the American Healthy Eating Index) are becoming more widespread in promoting lifelong health. A posteriori defined dietary patterns are described frequently in relation to age-related diseases but their generalisability is often a challenge since these are developed specifically for the population under study. Conversely, the dietary guidelines are often developed based on prevention of disease or nutrient deficiency, but often less attention is paid to how well these dietary guidelines promote health outcomes. In the present paper, we provide an overview of the state of the art of dietary patterns and dietary recommendations in relation to life expectancy and the risk of age-related disorders (with emphasis on cardiometabolic diseases and cognitive outcomes). According to both a posteriori and a priori dietary patterns, some key 'ingredients' can be identified that are associated consistently with longevity and better cardiometabolic and cognitive health. These include high intake of fruit, vegetables, fish, (whole) grains and legumes/pulses and potatoes, whereas dietary patterns rich in red meat and sugar-rich foods have been associated with an increased risk of mortality and cardiometabolic outcomes.

  14. Key diagnostic information for the oncologist

    International Nuclear Information System (INIS)

    Zlatareva, D.

    2012-01-01

    Full text: The radiologists use many modalities for imaging of oncologic patients. In order to get the most out of these imaging studies oncologist have to provide with precise information: what is the working diagnosis, what treatment the patients has had and what is the clinical question should be answered by imaging study. The main indications for imaging are confirmation of diagnosis, evaluation of the patient for surgery or assessment of response to the therapy. These will influence the choice of the test, the protocol and interpretation of the results. Imaging plays a vital role in the management of patients with cancer. It is important not only for diagnosis, indicating sites of abnormality, and guiding biopsies, but it is also crucial in assessing disease extent and thereby determining treatment. The stage of cancer at the time of diagnosis is a key factor to define prognosis and is important element in determining appropriate treatment. The most clinically used cancer staging system is tumor node metastasis (TNM). Stage is determined from information on the tumor, regional nodes, and metastases and by grouping cases with similar prognosis. The criteria for defining anatomic extent of disease are specific for tumors at different anatomic sites and of different histologic types. Therefore, the criteria for T, N and M are defined separately for each tumor and histologic type. For Hodgkin and other lymphomas, a different system for the extent of disease and prognosis is used. It is mandatory for the radiologist to learn TNM system to provide the oncologist with key diagnostic information. Learning objectives: To understand TNM staging system for the most common malignancies To review the changes from the sixth to the seven edition of the American Joint committee on cancer staging manual To describe diagnostic information provided by CT and MRI in preoperative planning and after therapy To discuss the role of PET/CT imaging in oncology

  15. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  16. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  17. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  18. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  19. The University of Canberra quantum key distribution testbed

    International Nuclear Information System (INIS)

    Ganeshkumar, G.; Edwards, P.J.; Cheung, W.N.; Barbopoulos, L.O.; Pham, H.; Hazel, J.C.

    1999-01-01

    Full text: We describe the design, operation and preliminary results obtained from a quantum key distribution (QKD) testbed constructed at the University of Canberra. Quantum cryptographic systems use shared secret keys exchanged in the form of sequences of polarisation coded or phase encoded single photons transmitted over an optical communications channel. Secrecy of this quantum key rests upon fundamental laws of quantum physics: measurements of linear or circular photon polarisation states introduce noise into the conjugate variable and so reveal eavesdropping. In its initial realisation reported here, pulsed light from a 650nm laser diode is attenuated by a factor of 10 6 , plane-polarised and then transmitted through a birefringent liquid crystal modulator (LCM) to a polarisation sensitive single photon receiver. This transmitted key sequence consists of a 1 kHz train of weak coherent 100ns wide light pulses, polarisation coded according to the BB84 protocol. Each pulse is randomly assigned one of four polarisation states (two orthogonal linear and two orthogonal circular) by computer PCA operated by the sender ('Alice'). This quaternary polarisation shift keyed photon stream is detected by the receiver ('Bob') whose computer (PCB) randomly chooses either a linear or a circular polarisation basis. Computer PCB is also used for final key selection, authentication, privacy amplification and eavesdropping. We briefly discuss the realisation of a mesoscopic single photon QKD source and the use of the testbed to simulate a global quantum key distribution system using earth satellites. Copyright (1999) Australian Optical Society

  20. Key-lock colloids in a nematic liquid crystal.

    Science.gov (United States)

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  1. An Identification Key for Selecting Methods for Sustainability Assessments

    Directory of Open Access Journals (Sweden)

    Michiel C. Zijp

    2015-03-01

    Full Text Available Sustainability assessments can play an important role in decision making. This role starts with selecting appropriate methods for a given situation. We observed that scientists, consultants, and decision-makers often do not systematically perform a problem analyses that guides the choice of the method, partly related to a lack of systematic, though sufficiently versatile approaches to do so. Therefore, we developed and propose a new step towards method selection on the basis of question articulation: the Sustainability Assessment Identification Key. The identification key was designed to lead its user through all important choices needed for comprehensive question articulation. Subsequently, methods that fit the resulting specific questions are suggested by the key. The key consists of five domains, of which three determine method selection and two the design or use of the method. Each domain consists of four or more criteria that need specification. For example in the domain “system boundaries”, amongst others, the spatial and temporal scales are specified. The key was tested (retrospectively on a set of thirty case studies. Using the key appeared to contribute to improved: (i transparency in the link between the question and method selection; (ii consistency between questions asked and answers provided; and (iii internal consistency in methodological design. There is latitude to develop the current initial key further, not only for selecting methods pertinent to a problem definition, but also as a principle for associated opportunities such as stakeholder identification.

  2. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  3. Increase in physical activities in kindergarten children with cerebral palsy by employing MaKey-MaKey-based task systems.

    Science.gov (United States)

    Lin, Chien-Yu; Chang, Yu-Ming

    2014-09-01

    In this study, we employed Flash- and Scratch-based multimedia by using a MaKey-MaKey-based task system to increase the motivation level of children with cerebral palsy to perform physical activities. MaKey MaKey is a circuit board that converts physical touch to a digital signal, which is interpreted by a computer as a keyboard message. In this study, we used conductive materials to control this interaction. This study followed single-case design using ABAB models in which A indicated the baseline and B indicated the intervention. The experiment period comprised 1 month and a half. The experimental results demonstrated that in the case of two kindergarten children with cerebral palsy, their scores were considerably increased during the intervention phrases. The developmental applications of the results are also discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  5. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  6. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  7. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  8. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  9. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  10. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  11. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  12. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  13. Setting Organizational Key Performance Indicators in the Precision Machine Industry

    Directory of Open Access Journals (Sweden)

    Mei-Hsiu Hong

    2015-11-01

    Full Text Available The aim of this research is to define (or set organizational key performance indicators (KPIs in the precision machine industry using the concept of core competence and the supply chain operations reference (SCOR model. The research is conducted in three steps. In the first step, a benchmarking study is conducted to collect major items of core competence and to group them into main categories in order to form a foundation for the research. In the second step, a case company questionnaire and interviews are conducted to identify the key factors of core competence in the precision machine industry. The analysis is conducted based on four dimensions and hence several analysis rounds are completed. Questionnaire data is analyzed with grey relational analysis (GRA and resulted in 5–6 key factors in each dimension or sub-dimension. Based on the conducted interviews, 13 of these identified key factors are separated into one organization objective, five key factors of core competence and seven key factors of core ability. In the final step, organizational KPIs are defined (or set for the five identified key factors of core competence. The most competitive core abilities for each of the five key factors are established. After that, organizational KPIs are set based on the core abilities within 3 main categories of KPIs (departmental, office grade and hierarchal for each key factor. The developed KPI system based on organizational objectives, core competences, and core abilities allow enterprises to handle dynamic market demand and business environments, as well as changes in overall corporate objectives.

  14. Total 2003 Results

    International Nuclear Information System (INIS)

    2003-01-01

    This document presents the 2003 results of Total Group: consolidated account, special items, number of shares, market environment, 4. quarter 2003 results, full year 2003 results, upstream (key figures, proved reserves), downstream key figures, chemicals key figures, parent company accounts and proposed dividends, 2004 sensitivities, summary and outlook, operating information by segment for the 4. quarter and full year 2003: upstream (combined liquids and gas production by region, liquids production by region, gas production by region), downstream (refinery throughput by region, refined product sales by region, chemicals), impact of allocating contribution of Cepsa to net operating income by business segment: equity in income (loss) and affiliates and other items, Total financial statements: consolidated statement of income, consolidated balance sheet (assets, liabilities and shareholder's equity), consolidated statements of cash flows, business segments information. (J.S.)

  15. Uniformity: The key to better inventory management

    International Nuclear Information System (INIS)

    Boshears, G.

    1993-01-01

    The objective of this paper is to show how uniformity in describing parts and materials can be the key ingredient to more effective inventory management. Although most nuclear utilities have some type of computer system for maintenance management as well as materials tracking, few have a system to provide the various users with complete information about parts and material in stock. One of the industry's most perplexing problems is How do you know, and find, the item you need to repair a particular piece of equipment or component? In many instances it is easier to order a new one from the manufacturer rather than try to find it on-site, which can result in inaccurate usage records, over-stocking, frustration, and strain on cash flow. What is needed is a higher degree of uniformity within a station, and a utility, of catalog descriptions for parts and material that will satisfy all users-planners, craftsmen, warehouse personnel, and buyers. The results of attaining this uniformity are improved performance through searchability, duplicate stock avoidance, interchangeability, substitutability, and more accurate bills of material; economic benefits will also be noted

  16. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    Directory of Open Access Journals (Sweden)

    BURJA CAMELIA

    2014-08-01

    Full Text Available The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it analyzed the interdependence between the key financial ratios, studying the impact of liquidity ratios, solvency and efficiency on profitability. The study provides empirical evidences to identify factors that have ensured the performance of companies and their ranking in the segment of the most traded companies in Romania. Results suggest the view that the source of company success on the capital market lies in the positive signals sent to investors regarding profitability and the low risk of solvency. This study gives additional information for managerial decision-making in order to create more value and a better positioning of the companies in the market

  17. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  18. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  19. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  20. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  1. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  2. Development of key fusion technologies at JET

    International Nuclear Information System (INIS)

    2001-01-01

    The recent operational phase in JET in which Deuterium-Tritium fuel was used (DTE1) resulted in record breaking fusion performance. In addition to important contributions in plasma physics, the JET Team has also made major advances in demonstrating the viability of some of the key technologies required for the realisation of future fusion power. Two of the most important technological areas which have been successfully demonstrated in JET are the ITER scale tritium processing plant and the exchange of the divertor and maintenance of the interior of JET by totally remote means. The experiment also provided the first data on tritium retention and co-deposition in a diverted tokamak. Of the 35g of tritium injected into the JET torus, about 6g remained in the tokamak. The amount resides mainly on cool surfaces at the inboard divertor side. The precise, safe and timely execution of the remote handling shutdown proved that the design, function, performance and operational methodology of the RH equipment prepared over the years at JET are appropriate for the successful and rapid replacement of components in an activated tokamak environment. (author)

  3. Achieving organizational alignment - key to survival

    International Nuclear Information System (INIS)

    Allison, J.T.

    1997-01-01

    The restructuring of the gas and electric industry and the impact of the restructuring on organizational survival was discussed. The forces driving the trend to restructuring are commoditization of energy, demanding, fragmented customer needs, diverse, transforming technologies, and intense competition. Realigning a company to the changing marketplace is the key to survival with customers, financial markets, and with competition. This paper presented a reality-based, results oriented approach to strategy consulting. Four case studies - Telco, Natural gas holding company, Combined utility, and Duke/Louis Dreyfus - were used for illustrating different problems and different approaches to restructuring. In each case a comparison was made between the company's old organization in the early 1990's, the driving forces responsible for the change and the company's new organization in the mid 1990's. In all cases the predominance of the customer focus is quite apparent, as is the clear lines of demarcation between regulated and unregulated activities. The underlying theme in all restructuring is agility and striving for flexibility

  4. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  5. Nuclear energy: a key role despite problems

    International Nuclear Information System (INIS)

    Anderson, E.V.

    1977-01-01

    Nuclear energy is projected to be the fastest growing power source and a key to meeting power demands in spite of the many problems facing the nuclear industry in the form of delays, protests, and cancellations. Pressures for a nuclear moratorium will slow the industry, Mr. Anderson feels, but in the long run nuclear reactors will make up an increasing share of the power generating capacity. The Arthur D. Little Co. projects a fourfold increase between 1975 and 1985 on the basis of 10-year lead times for construction of nuclear power plants. Half the new generating capacity after 1985 will be nuclear. Problems besetting every stage of the nuclear fuel cycle result from debates over proliferation, waste disposal, reactor safety, and environmental damage and lead to controversy over regulations and licensing. U.S. utilities are not ordering reactors, but manufacturers are finding markets in other countries. Financial difficulties have kept domestic utilities from undertaking large investment programs until they can resolve problems of fuel costs and rate structures. New construction is inevitable, however, to meet future electrical requirements. Nuclear companies, which number nearly 1300 manufacturers and service providers, need to develop a better public image by working together to demonstrate their ability to manage the risks and uncertainties

  6. Development of key fusion technologies at JET

    International Nuclear Information System (INIS)

    1999-01-01

    The recent operational phase in JET in which Deuterium-Tritium fuel was used (DTE1) resulted in record breaking fusion performance. In addition to important contributions in plasma physics, the JET Team has also made major advances in demonstrating the viability of some of the key technologies required for the realisation of future fusion power. Two of the most important technological areas which have been successfully demonstrated in JET are the ITER scale tritium processing plant and the exchange of the divertor and maintenance of the interior of JET by totally remote means. The experiment also provided the first data on tritium retention and co-deposition in a diverted tokamak. Of the 35g of tritium injected into the JET torus, about 6g remained in the tokamak. The amount resides mainly on cool surfaces at the inboard divertor side. The precise, safe and timely execution of the remote handling shutdown proved that the design, function, performance and operational methodology of the RH equipment prepared over the years at JET are appropriate for the successful and rapid replacement of components in an activated tokamak environment. (author)

  7. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  8. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.

  9. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  10. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  11. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  12. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  13. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  14. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  15. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  16. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  17. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  18. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  19. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  20. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  1. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  2. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  3. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  4. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  5. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  6. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  7. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  8. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  9. Two-way quantum key distribution at telecommunication wavelength

    International Nuclear Information System (INIS)

    Kumar, Rupesh; Lucamarini, Marco; Di Giuseppe, Giovanni; Natali, Riccardo; Mancini, Giorgio; Tombesi, Paolo

    2008-01-01

    We report on a quantum key distribution effected with a two-way deterministic protocol over a standard telecommunication fiber. Despite the common belief of a prohibitive loss rate for such a scheme, our results show its feasibility on distances of few tenths of kilometers

  10. Three key points along an intrinsic reaction coordinate

    Indian Academy of Sciences (India)

    Unknown

    Abstract. The concept of the reaction force is presented and discussed in detail. For typical processes with energy barriers, it has a universal form which defines three key points along an intrinsic reaction co- ordinate: the force minimum, zero and maximum. We suggest that the resulting four zones be interpreted as involving ...

  11. Inspire and develop people, two key competence for safety leadership

    International Nuclear Information System (INIS)

    Gonzalez, F.; Perez, O.; Fernandez, M.; Alvarez, N.; Villadoniga, J. I.

    2014-01-01

    Developing leadership skills in organizations is key to ensuring the sustainability of excellent results in industries with high standards of safety and reliability element. In order to have a model of development of specific leadership for these organizations, Tecnatom in 2011, we initiated an internal project to find and adapt a competency model to these requirements. (Author)

  12. AMNT 2014. Key Topic: Reactor operation, safety - report. Pt. 1

    International Nuclear Information System (INIS)

    Schaffrath, Andreas

    2014-01-01

    Summary report on one session of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Safety of Nuclear Installations - Methods, Analysis, Results: Backfittings for the Improvement of Safety and Efficiency. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' will be covered in further issues of atw.

  13. Public-Key Encryption with Non-interactive Opening

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hofheinz, Dennis; Kiltz, Eike

    2008-01-01

    We formally define the primitive of public-key encryption with non-interactive opening (PKENO), where the receiver of a ciphertext C can, convincingly and without interaction, reveal what the result was of decrypting C, without compromising the scheme’s security. This has numerous applications...

  14. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  15. Bringing the Sallen-Key Biquad back to work

    DEFF Research Database (Denmark)

    Gaunholt, Hans; Guldbrandsen, Birthe

    1996-01-01

    the Sallen-Key biquad even in the high-Q case with reasonable sensitivities. The method is based on the unity gain version of the biquad and as unity gain buffer amplifiers are readily manufactured in integrated circuit technology the results may be very useful in the fabrication of integrated analog filters...

  16. The Introduction of Key Skills in Schools: Core or Casualty?

    Science.gov (United States)

    Glover, Derek; Gleeson, Denis; Johnson, Mike; Spencer, Pat; Watson, Ray

    2000-01-01

    Study of the introduction of generic Key Skills in two local education authorities in Britain found limited implementation. Results suggested the need for strategic district- and school-level management, clear aims and objectives, ownership by school staff, and cross-curricular application. (SK)

  17. Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.

    Science.gov (United States)

    Capmany, José

    2009-04-13

    We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.

  18. Key Sustainable Tourism Mechanisms for Poverty Reduction and ...

    African Journals Online (AJOL)

    Increasing populations, together with the impact of climate change, are resulting in greater competition for land and a necessity for sustainable land use. Tourism can provide a flow of benefits from conservation to rural communities to reduce poverty and promote biodiversity conservation. Three key mechanisms of ...

  19. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  20. Characterization of available light for seagrass and patch reef productivity in Sugarloaf Key, Lower Florida Keys

    Science.gov (United States)

    Toro-Farmer, Gerardo; Muller-Karger, Frank E.; Vega-Rodriguez, Maria; Melo, Nelson; Yates, Kimberly K.; Johns, Elizabeth; Cerdeira-Estrada, Sergio; Herwitz, Stan R.

    2016-01-01

    Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP) was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively). Higher photosynthetic active radiation (PAR) levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm) had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  1. Characterization of Available Light for Seagrass and Patch Reef Productivity in Sugarloaf Key, Lower Florida Keys

    Directory of Open Access Journals (Sweden)

    Gerardo Toro-Farmer

    2016-01-01

    Full Text Available Light availability is an important factor driving primary productivity in benthic ecosystems, but in situ and remote sensing measurements of light quality are limited for coral reefs and seagrass beds. We evaluated the productivity responses of a patch reef and a seagrass site in the Lower Florida Keys to ambient light availability and spectral quality. In situ optical properties were characterized utilizing moored and water column bio-optical and hydrographic measurements. Net ecosystem productivity (NEP was also estimated for these study sites using benthic productivity chambers. Our results show higher spectral light attenuation and absorption, and lower irradiance during low tide in the patch reef, tracking the influx of materials from shallower coastal areas. In contrast, the intrusion of clearer surface Atlantic Ocean water caused lower values of spectral attenuation and absorption, and higher irradiance in the patch reef during high tide. Storms during the studied period, with winds >10 m·s−1, caused higher spectral attenuation values. A spatial gradient of NEP was observed, from high productivity in the shallow seagrass area, to lower productivity in deeper patch reefs. The highest daytime NEP was observed in the seagrass, with values of almost 0.4 g·O2·m−2·h−1. Productivity at the patch reef area was lower in May than during October 2012 (mean = 0.137 and 0.177 g·O2·m−2·h−1, respectively. Higher photosynthetic active radiation (PAR levels measured above water and lower light attenuation in the red region of the visible spectrum (~666 to ~699 nm had a positive correlation with NEP. Our results indicate that changes in light availability and quality by suspended or resuspended particles limit benthic productivity in the Florida Keys.

  2. Communicating Emotion through Haptic Design: A Study Using Physical Keys

    DEFF Research Database (Denmark)

    Kjellerup, Marie Kjær; Larsen, Anne Cathrine; Maier, Anja

    2014-01-01

    This paper explores how designers may communicate with the users of their products through haptic design. More specifically, how tactile properties of materials evoke emotions such as satisfaction, joy, or disgust. A research through design approach has been followed; mood- and material boards...... and prototypes of four ‘haptically enhanced’ (physical) keys were created. Types of keys selected include home, bicycle, hobby, and basement. An experiment with ten participants was conducted, using word association and a software to elicit product emotions (PrEmo). Results show a mapping between the designer...

  3. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  4. Turboelectric Aircraft Drive Key Performance Parameters and Functional Requirements

    Science.gov (United States)

    Jansen, Ralph H.; Brown, Gerald V.; Felder, James L.; Duffy, Kirsten P.

    2016-01-01

    The purpose of this paper is to propose specific power and efficiency as the key performance parameters for a turboelectric aircraft power system and investigate their impact on the overall aircraft. Key functional requirements are identified that impact the power system design. Breguet range equations for a base aircraft and a turboelectric aircraft are found. The benefits and costs that may result from the turboelectric system are enumerated. A break-even analysis is conducted to find the minimum allowable electric drive specific power and efficiency that can preserve the range, initial weight, operating empty weight, and payload weight of the base aircraft.

  5. Microscale optical cryptography using a subdiffraction-limit optical key

    Science.gov (United States)

    Ogura, Yusuke; Aino, Masahiko; Tanida, Jun

    2018-04-01

    We present microscale optical cryptography using a subdiffraction-limit optical pattern, which is finer than the diffraction-limit size of the decrypting optical system, as a key and a substrate with a reflectance distribution as an encrypted image. Because of the subdiffraction-limit spatial coding, this method enables us to construct a secret image with the diffraction-limit resolution. Simulation and experimental results demonstrate, both qualitatively and quantitatively, that the secret image becomes recognizable when and only when the substrate is illuminated with the designed key pattern.

  6. Optimisation of key performance measures in air cargo demand management

    OpenAIRE

    Alexander May; Adrian Anslow; Udechukwu Ojiako; Yue Wu; Alasdair Marshall; Maxwell Chipulu

    2014-01-01

    This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that ...

  7. Lower and Upper Bounds for Deniable Public-Key Encryption

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Nielsen, Jesper Buus; Nordholt, Peter Sebastian

    2011-01-01

    the parties to change their internal state to make it look like a given ciphertext decrypts to a message different from what it really decrypts to. Deniable encryption was in this way introduced to allow to deny a message exchange and hence combat coercion. Depending on which parties can be coerced...... that it is impossible to construct a non-interactive bi-deniable public-key encryption scheme with better than polynomial security. Specifically, we give an explicit bound relating the security of the scheme to how efficient the scheme is in terms of key size. Our impossibility result establishes a lower bound...

  8. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  9. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  10. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  11. Key Features of the Manufacturing Vision Development Process

    DEFF Research Database (Denmark)

    Dukovska-Popovska, Iskra; Riis, Jens Ove; Boer, Harry

    2005-01-01

    of action research. The methodology recommends wide participation of people from different hierarchical and functional positions, who engage in a relatively short, playful and creative process and come up with a vision (concept) for the future manufacturing system in the company. Based on three case studies......This paper discusses the key features of the process of Manufacturing Vision Development, a process that enables companies to develop their future manufacturing concept. The basis for the process is a generic five-phase methodology (Riis and Johansen 2003) developed as a result of ten years...... of companies going through the initial phases of the methodology, this research identified the key features of the Manufacturing Vision Development process. The paper elaborates the key features by defining them, discussing how and when they can appear, and how they influence the process....

  12. Tomographic Approach in Three-Orthogonal-Basis Quantum Key Distribution

    International Nuclear Information System (INIS)

    Liang Wen-Ye; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zheng-Fu; Wen Hao

    2015-01-01

    At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations. (paper)

  13. Randomness determines practical security of BB84 quantum key distribution

    Science.gov (United States)

    Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2015-11-01

    Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

  14. Keys to the success of the CB Conquero

    Directory of Open Access Journals (Sweden)

    C. Fernández-Espínola

    2016-12-01

    Full Text Available When a team gets sport successes to level profesional, generates the topics that will be investigated such as the key factors of the succes. The main aim of this study is to analyze the influencie of different factors like the sports context, the social context and training aspects in the success of the Club Baloncesto Conquero through direct perception of thirteen informants associated with the team and the basketball in Huelva. An interview was carried out, related with those factors and the keys to success. The results revealed that workforce planning along the great work of coaching staff, medical staff and physical trainer have been key to the team gets sport successes.

  15. Quantum key distribution without sending a quantum signal

    International Nuclear Information System (INIS)

    Ralph, T C; Walk, N

    2015-01-01

    Quantum Key Distribution is a quantum communication technique in which random numbers are encoded on quantum systems, usually photons, and sent from one party, Alice, to another, Bob. Using the data sent via the quantum signals, supplemented by classical communication, it is possible for Alice and Bob to share an unconditionally secure secret key. This is not possible if only classical signals are sent. While this last statement is a long standing result from quantum information theory it turns out only to be true in a non-relativistic setting. If relativistic quantum field theory is considered we show it is possible to distribute an unconditionally secure secret key without sending a quantum signal, instead harnessing the intrinsic entanglement between different regions of space–time. The protocol is practical in free space given horizon technology and might be testable in principle in the near term using microwave technology. (paper)

  16. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  17. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  18. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  19. Are the Keys loved to death? A study of diver specialization levels and preferences in the Florida Keys

    Science.gov (United States)

    Shona Paterson; David K. Loomis

    2010-01-01

    This paper presents research conducted for the Florida Reef Resilience Program on nonresident recreational SCUBA divers in three zones of the Florida Keys. When divers were segmented into specialization subgroups for analysis, divers in different subgroups tended to use different geographic locations. These results suggest differences in user preferences; yet when...

  20. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  1. Election 2000: The Keys Point to Gore.

    Science.gov (United States)

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  2. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  3. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  4. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  5. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  6. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  7. Quantum key distribution on Hannover Campus

    Energy Technology Data Exchange (ETDEWEB)

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  8. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  9. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  10. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  11. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  12. Student Engagement: Key to Personalized Learning

    Science.gov (United States)

    Ferlazzo, Larry

    2017-01-01

    Personalized learning has the potential to greatly improve student achievement--but realistic teachers know that any instructional strategy will only be effective if students are willing to do the work. That is why Larry Ferlazzo emphasizes the importance of weaving intrinsic motivation into every personalized learning classroom. Four key elements…

  13. Time to refine key climate policy models

    Science.gov (United States)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  14. The LOFAR Magnetism Key Science Project

    NARCIS (Netherlands)

    Anderson, James; Beck, Rainer; Bell, Michael; de Bruyn, Ger; Chyzy, Krzysztof; Eislöffel, Jochen; Enßlin, Torsten; Fletcher, Andrew; Haverkorn, Marijke; Heald, George; Horneffer, Andreas; Noutsos, Aris; Reich, Wolfgang; Scaife, Anna; the LOFAR collaboration, [No Value

    2012-01-01

    Measuring radio waves at low frequencies offers a new window to study cosmic magnetism, and LOFAR is the ideal radio telescope to open this window widely. The LOFAR Magnetism Key Science Project (MKSP) draws together expertise from multiple fields of magnetism science and intends to use LOFAR to

  15. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  16. Soil fauna: key to new carbon models

    NARCIS (Netherlands)

    Filser, Juliane; Faber, J.H.; Tiunov, Alexei V.; Brussaard, L.; Frouz, J.; Deyn, de G.B.; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, M.; Wall, D.H.; Querner, Pascal; Eijsackers, Herman; Jimenez, Juan Jose

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential

  17. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  20. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  1. Key developments of the EP1000 design

    International Nuclear Information System (INIS)

    Noviello, L.

    1999-01-01

    In 1994, a group of European utilities initiated, together with Westinghouse and its industrial partner GENESI (an Italian consortium including ANSALDO and FIAT), a program designated EPP (European Passive Plant) to evaluate Westinghouse passive nuclear plant technology for application in Europe. The Phase I of the European Passive Plant program involved the evaluation of the Westinghouse 600 MWe AP600 and 1000 MWe Simplified Pressurized Water Reactor (SPWR) designs against the European Utility Requirements (EUR), and when necessary, the investigation of possible modifications to achieve compliance with the EUR. In Phase 1 of the program, which has been completed in 1996, the following major tasks were accomplished: The impacts of the European Utility Requirements (EUR) on the Westinghouse nuclear island design were evaluated. A 1000 MWe passive plant reference design (EP1000) was developed which conforms to the EUR and is expected to be licensable in Europe. With respect to the NSSS and containment, the EP1000 reference design closely follows those of the Westinghouse SPWR design, while the AP600 design has been taken as the basis for the design of the auxiliary systems. Extensive design and testing efforts have been made for the AP600 and SPWR during the respective multi-year programs. While the results of these programs have been and will continue to be utilised, at the maximum extent, to minimise the work to be performed on the EP1000 design, the compliance with EUR is a key design requirement for the EP1000 The ultimate objective of Phase 2 of the program is to develop design details and perform supporting analyses to produce a Safety Case Report (SCR) for submittal to European Safety Authorities. The first part of Phase 2, hereafter referred as Phase 2A, started at the beginning of 1997 and will be completed at the end of 1998. Scope of this phase of the program is to develop the design modifications of important systems and structures so to comply with the

  2. Key conclusions from AVOID Work Stream One

    Science.gov (United States)

    Warren, Rachel

    2010-05-01

    AVOID work stream (WS1)one has produced emission scenarios that simulate potential future global emission pathways for greenhouse gases during the 21st century. The study explored the influence of three key features of such pathways: (1) the year in which emissions peak globally, (2) the rate of emission reduction, and (3) the minimum level to which emissions are eventually reduced. It examined the resultant climate change, climate change impacts and economic implications using computer simulations. Avoided impacts, carbon taxes and GDP change increase throughout the 21st century in the models. AVOID-WS1 showed that in the absence of climate policy it is very likely that global mean temperatures would exceed 3 degrees and there are evens chances that the temperature would rise by 4 degrees relative to pre-industrial times. Scenarios that peak emissions in 2016 were more effective at constraining temperatures to below 3 degrees than those that peaked in 2030: one ‘2016' scenario achieved a probability of 45% of avoiding breaching of a 2 degree threshold. Scenarios peaking in 2030 were inconsistent with constraining temperatures to below 2 degrees. Correspondingly, scenarios that peak in 2030 are more effective at avoiding climate impacts than scenarios that peak in 2016, for all sectors that we studied. Hence the date at which emissions peak is more important than the rate of subsequent emissions reduction in determining the avoided impacts. Avoided impacts increase with time, being negligible in the 2030s, significant by the 2050s and large by the 2080s. Finally, the choice of GCM influences the magnitude of the avoided impacts strongly, so that the uncertainties in our estimates of avoided impacts for each scenario are larger than the difference between the scenarios. Our economic analysis is based on models which differ greatly in the assumptions that they make, but generally show that the date at which emissions peak is a stronger driver of induced GDP changes

  3. VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. SENTHILKUMAR

    2015-05-01

    Full Text Available A novel implementation of code based cryptography (Cryptocoding technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys. New algorithm is developed for reduced key size with optimal performance. Error Control Algorithm is employed for both generation of round keys and diffusion of non-linearity among them. Two new functions for bit inversion and its reversal are developed for cryptocoding. Probability of retrieving original key from any other round keys is reduced by diffusing nonlinear selective bit inversions on round keys. Randomized selective bit inversions are done on equal length of key bits by Round Constant Feedback Shift Register within the error correction limits of chosen code. Complexity of retrieving the original key from any other round keys is increased by optimal hardware usage. Proposed design is simulated and synthesized using VHDL coding for Spartan3E FPGA and results are shown. Comparative analysis is done between 128 bit Advanced Encryption Standard round keys and proposed round keys for showing security strength of proposed algorithm. This paper concludes that chip based multi-layer key distribution of proposed algorithm is an enhanced solution to the existing threats on cryptography algorithms.

  4. The ultimate security bounds of quantum key distribution protocols

    International Nuclear Information System (INIS)

    Nikolopoulos, G.M.; Alber, G.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols exploit quantum correlations in order to establish a secure key between two legitimate users. Recent work on QKD has revealed a remarkable link between quantum and secret correlations. In this talk we report on recent results concerning the ultimate upper security bounds of various QKD schemes (i.e., the maximal disturbance up to which the two legitimate users share quantum correlations) under the assumption of general coherent attacks. In particular, we derive an analytic expression for the ultimate upper security bound of QKD schemes that use two mutually unbiased bases. As long as the two legitimate users focus on the sifted key and treat each pair of data independently during the post processing, our results are valid for arbitrary dimensions of the information carriers. The bound we have derived is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is also discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions, however, such equivalence is generally no longer valid. (author)

  5. Securing quantum key distribution systems using fewer states

    Science.gov (United States)

    Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.

    2018-04-01

    Quantum key distribution (QKD) allows two remote users to establish a secret key in the presence of an eavesdropper. The users share quantum states prepared in two mutually unbiased bases: one to generate the key while the other monitors the presence of the eavesdropper. Here, we show that a general d -dimension QKD system can be secured by transmitting only a subset of the monitoring states. In particular, we find that there is no loss in the secure key rate when dropping one of the monitoring states. Furthermore, it is possible to use only a single monitoring state if the quantum bit error rates are low enough. We apply our formalism to an experimental d =4 time-phase QKD system, where only one monitoring state is transmitted, and obtain a secret key rate of 17.4 ±2.8 Mbits/s at a 4 dB channel loss and with a quantum bit error rate of 0.045 ±0.001 and 0.037 ±0.001 in time and phase bases, respectively, which is 58.4% of the secret key rate that can be achieved with the full setup. This ratio can be increased, potentially up to 100%, if the error rates in time and phase basis are reduced. Our results demonstrate that it is possible to substantially simplify the design of high-dimensional QKD systems, including those that use the spatial or temporal degrees of freedom of the photon, and still outperform qubit-based (d =2 ) protocols.

  6. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  7. GLOBAL TRADE. THE KEY TO TRANSATLANTIC COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mădălina Laura CUCIURIANU

    2015-04-01

    Full Text Available Global trade has an important characteristic in terms of open global markets by means of eliminating barriers to trade and investment. The United States and the European Union, two major international actors and competitors in the economic field, have both the opportunity to change the global trade by concluding the negotiations of the Transatlantic Trade and Investment Partnership. For this reason, this paper tries to find the connections between global trade and transatlantic competitiveness in the way that the global trade can be considered a key to transatlantic competitiveness. The United States and the European Union are global actors and competitors in the global economy and the play field is the global trade. In order to be aware of the importance ofglobal trade in the transatlantic competitiveness, this paper includes also an analysis of the concrete actions that both economic powers are taking in key-sectors of the transatlantic economy.

  8. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  9. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  10. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  11. A ''master key'' to chemical separation processes

    International Nuclear Information System (INIS)

    Madic, Ch.; Hill, C.

    2002-01-01

    One of the keys to sorting nuclear waste is extracting minor actinides - the most troublesome long-lived elements - from the flow of waste by separating them from lanthanides, which have very similar chemical properties to actinides, for possible transmutation into shorter-lived elements. Thanks to a European initiative coordinated by CEA, this key is now available: its name is Sanex. There now remains to develop tough, straightforward industrial processes to integrate it into a new nuclear waste management approach by 2005. Sanex joins the Diamex process, used for the combined separation of lanthanides and minor actinides from fission products. A third process, Sesame, designed to separate americium, completes the list of available separation processes. (authors)

  12. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  13. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  14. Key Success Factors in Medical Tourism Marketing

    OpenAIRE

    Yung-Sheng Yang

    2013-01-01

    The planners in tourism businesses and medical institutes, the evaluation criteria and dimensions for Medical Tourism Marketing are determined by experts through expert interviews. The weights and correlations among the dimensions and criteria are determined by Analytic Hierarchy Process (AHP) to construct an evaluating indicator model suitable for Medical Tourism Marketing. By organizing the overall weight of the key success factors in Medical Tourism Marketing, the top five indicators conta...

  15. PROVIDING QUALITY – A KEY TO SUCCESS

    OpenAIRE

    Oana Staiculescu; Angel-Cristian Staiculescu

    2012-01-01

    Providing a high quality products and services is a key to business success. That is because high quality promotes customer satisfaction and customer satisfaction has a direct link to business revenue. Clients want quality products and services in order to feel they are getting value for money, especially in these hard economic times. Although it is well known that advertising may win new customers, quality can be the reason to keep them. A good manager is aware that the costs of winning mark...

  16. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  17. Key factors of teenagers' mobile advertising acceptance

    OpenAIRE

    Martí Parreño, José; Sanz Blas, Silvia; Ruiz Mafé, Carla; Aldás Manzano, Joaquín

    2013-01-01

    Purpose – The purpose of this paper is to analyse key drivers of teenagers’ attitude toward mobile advertising and its effects on teenagers’ mobile advertising acceptance. Design/methodology/approach – A proposed model of affective (irritation and entertainment) and cognitive (perceived usefulness) antecedents of attitude toward mobile advertising and its effects on mobile advertising acceptance is analysed. The sample consisted of 355 Spanish teenagers. The model was tested us...

  18. Key performance indicators for successful simulation projects

    OpenAIRE

    Jahangirian, M; Taylor, SJE; Young, T; Robinson, S

    2016-01-01

    There are many factors that may contribute to the successful delivery of a simulation project. To provide a structured approach to assessing the impact various factors have on project success, we propose a top-down framework whereby 15 Key Performance Indicators (KPI) are developed that represent the level of successfulness of simulation projects from various perspectives. They are linked to a set of Critical Success Factors (CSF) as reported in the simulation literature. A single measure cal...

  19. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  20. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  1. Parallel Device-Independent Quantum Key Distribution

    OpenAIRE

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  2. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  3. Measurement-device-independent quantum key distribution with correlated source-light-intensity errors

    Science.gov (United States)

    Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin

    2018-04-01

    We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.

  4. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  5. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  6. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  7. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  8. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  9. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  10. Key components of financial-analysis education for clinical nurses.

    Science.gov (United States)

    Lim, Ji Young; Noh, Wonjung

    2015-09-01

    In this study, we identified key components of financial-analysis education for clinical nurses. We used a literature review, focus group discussions, and a content validity index survey to develop key components of financial-analysis education. First, a wide range of references were reviewed, and 55 financial-analysis education components were gathered. Second, two focus group discussions were performed; the participants were 11 nurses who had worked for more than 3 years in a hospital, and nine components were agreed upon. Third, 12 professionals, including professors, nurse executive, nurse managers, and an accountant, participated in the content validity index. Finally, six key components of financial-analysis education were selected. These key components were as follows: understanding the need for financial analysis, introduction to financial analysis, reading and implementing balance sheets, reading and implementing income statements, understanding the concepts of financial ratios, and interpretation and practice of financial ratio analysis. The results of this study will be used to develop an education program to increase financial-management competency among clinical nurses. © 2015 Wiley Publishing Asia Pty Ltd.

  11. Aerosol typing - key information from aerosol studies

    Science.gov (United States)

    Mona, Lucia; Kahn, Ralph; Papagiannopoulos, Nikolaos; Holzer-Popp, Thomas; Pappalardo, Gelsomina

    2016-04-01

    Aerosol typing is a key source of aerosol information from ground-based and satellite-borne instruments. Depending on the specific measurement technique, aerosol typing can be used as input for retrievals or represents an output for other applications. Typically aerosol retrievals require some a priori or external aerosol type information. The accuracy of the derived aerosol products strongly depends on the reliability of these assumptions. Different sensors can make use of different aerosol type inputs. A critical review and harmonization of these procedures could significantly reduce related uncertainties. On the other hand, satellite measurements in recent years are providing valuable information about the global distribution of aerosol types, showing for example the main source regions and typical transport paths. Climatological studies of aerosol load at global and regional scales often rely on inferred aerosol type. There is still a high degree of inhomogeneity among satellite aerosol typing schemes, which makes the use different sensor datasets in a consistent way difficult. Knowledge of the 4d aerosol type distribution at these scales is essential for understanding the impact of different aerosol sources on climate, precipitation and air quality. All this information is needed for planning upcoming aerosol emissions policies. The exchange of expertise and the communication among satellite and ground-based measurement communities is fundamental for improving long-term dataset consistency, and for reducing aerosol type distribution uncertainties. Aerosol typing has been recognized as one of its high-priority activities of the AEROSAT (International Satellite Aerosol Science Network, http://aero-sat.org/) initiative. In the AEROSAT framework, a first critical review of aerosol typing procedures has been carried out. The review underlines the high heterogeneity in many aspects: approach, nomenclature, assumed number of components and parameters used for the

  12. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    International Nuclear Information System (INIS)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-01-01

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  13. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  14. Means to form key competencies by teaching „Chemistry and environmental protection” in grade 8

    International Nuclear Information System (INIS)

    Manev, Stefan; Dimitrova, Velichka; Gushterova, Pavlina

    2011-01-01

    Abstract: A comparison was made of expected results set in grade 8 „Chemistry and environment preservation” curriculum and requirements to form one of eight key competencies „Mathematical literacy and basic knowledge in science and technologies”. The results obtained allow to make some recommendations towards improvement of teaching through a more effective use of science content to form key competencies. Keywords: teaching, science, chemistry, key competencies, curriculum

  15. Law, Policy and Nonproliferation Project Events and Workshops: Key Themes, Results and Related Materials 2008 - 2009

    Science.gov (United States)

    2010-04-01

    biological precursors are obtained legally from legitimate corporations, these suppliers should incorporate some sort of chemical or genetic “barcode...traditionally come under the rubric of limited engagement, especially as such policy evolved during the Cold War between the US and USSR. With the end...information that may enable access to dual-use technology. A “bar-coding” procedure, by which a genetic sequence or chemical signature is used to

  16. Flexible Graduate is Successful Graduate. Key Factors of Successful Job Interview, Results of a Comparative Analysis

    Directory of Open Access Journals (Sweden)

    Vendolska Iva

    2016-06-01

    Full Text Available The conditions on the labour market have changed dramatically in the last twenty years and the importance of human resources has increased. A company has to find, keep, and educate those workers who are able to adapt quickly to changes in the market. Such a company is then able to innovate constantly, which ensures its long-term competitiveness. Moreover, after finishing their education young people experience problems when seeking suitable employment. University graduates face stronger competition from other graduates when seeking employment. This target risk group of university graduates in particular is included in the primary research, together with the other side of the labour market, employers. The importance of individual criteria that are pivotal for employers during job interviews was examined on the basis of an anonymous questionnaire. 18 criteria were assessed and compared on a scale from 1 to 5. The correlation between the rate of importance of the given criterion and the group of respondents was tested. It was discovered that the criterion employers consider the most important is the flexibility and adaptability of a job candidate. This criterion is followed by willingness to learn, loyalty, and self-reliance. Those considered least important were these criteria: a stay abroad, courses/certificates, and studying at a particular university. On the other hand, the students consider the most important criteria to be foreign language skills, followed by communication skills, and willingness to learn and an internship during their studies. The criteria that were seen as the most important were: self-confidence, experience of a stay abroad, and the particular university that the student graduated from. The most significant difference in the assessment of the criteria between the employers and students was identified as being an internship during one’s studies.

  17. AMNT 2014. Key Topic: Reactor operation, safety - report. Pt. 1

    Energy Technology Data Exchange (ETDEWEB)

    Schaffrath, Andreas [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Garching (Germany). Forschungszentrum

    2014-10-15

    Summary report on one session of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Safety of Nuclear Installations - Methods, Analysis, Results: Backfittings for the Improvement of Safety and Efficiency. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' will be covered in further issues of atw.

  18. Safety and reliability in industrial organizations - The key factors

    International Nuclear Information System (INIS)

    Cooke, R.A.; Sarkis, H.D.

    1992-01-01

    A survey-based technique has been developed that measures and generates comparative data on important organizational, work group, and job-level variables that are directly related to on-the-job accidents. This paper describes the results of an analysis of data from more than 2,700 employees in the chemical, oil, construction, and wood products industries. These analyses indicate that several key variables are significantly related to accidents in the workplace

  19. Extraordinary results

    International Nuclear Information System (INIS)

    Cicova, V.

    2012-01-01

    For the first time in the history, Slovenske elektrarne became the first winner in a new category Business and Biodiversity in the competition of European companies aimed at the environment protection. Excellent results were achieved by a long-term co-operation with the Tatras National Park, in particular in saving the endangered animals.

  20. Ganil results

    International Nuclear Information System (INIS)

    Tamain, B.

    1992-06-01

    Recent Ganil results are presented: hot nuclei properties and multifragmentation, study of flow change around the inversion energy. Mesons and hard photons production are also briefly discussed. Correlations with studies that have been led in Saturne energy range, and the developments that can be foreseen in the future have been discussed

  1. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  2. Key Future Engineering Capabilities for Human Capital Retention

    Science.gov (United States)

    Sivich, Lorrie

    Projected record retirements of Baby Boomer generation engineers have been predicted to result in significant losses of mission-critical knowledge in space, national security, and future scientific ventures vital to high-technology corporations. No comprehensive review or analysis of engineering capabilities has been performed to identify threats related to the specific loss of mission-critical knowledge posed by the increasing retirement of tenured engineers. Archival data from a single diversified Fortune 500 aerospace manufacturing engineering company's engineering career database were analyzed to ascertain whether relationships linking future engineering capabilities, engineering disciplines, and years of engineering experience could be identified to define critical knowledge transfer models. Chi square, logistic, and linear regression analyses were used to map patterns of discipline-specific, mission-critical knowledge using archival data of engineers' perceptions of engineering capabilities, key developmental experiences, and knowledge learned from their engineering careers. The results from the study were used to document key engineering future capabilities. The results were then used to develop a proposed human capital retention plan to address specific key knowledge gaps of younger engineers as veteran engineers retire. The potential for social change from this study involves informing leaders of aerospace engineering corporations on how to build better quality mentoring or succession plans to fill the void of lost knowledge from retiring engineers. This plan can secure mission-critical knowledge for younger engineers for current and future product development and increased global competitiveness in the technology market.

  3. Key-data of energy (June 2001)

    International Nuclear Information System (INIS)

    2001-06-01

    The energy actors and the economical context of energy are changing: the world exchanges and the deregulation of markets impose to dispose of reliable and relevant indicators to understand the French energy choices and stakes and to compare them with the European and worldwide data. This 2001 edition of the key energy data of France aims at shading light on the French energy policy which is based on: an imperative of supply security, an abatement of CO 2 emissions and a respect of environment, a growth of the economic competitiveness, a maintenance of the public utility missions, and on employment. Graphs, curves, charts and appendixes illustrate and complete this document. (J.S.)

  4. Data key to quest for quality.

    Science.gov (United States)

    Chang, Florence S; Nielsen, Jon; Macias, Charles

    2013-11-01

    Late-binding data warehousing reduces the time it takes to obtain data needed to make crucial decisions. Late binding refers to when and how tightly data from the source applications are bound to the rules and vocabularies that make it useful. In some cases, data can be seen in real time. In historically paper-driven environments where data-driven decisions may be a new concept, buy-in from clinicians, physicians, and hospital leaders is key to success in using data to improve outcomes.

  5. Stahlschüssel key to steel

    CERN Document Server

    Wegst, W S

    2016-01-01

    The Key to Steel (Stahlschlüssel/Stahlschluessel) cross reference book will help you to decode / decipher steel designations and find equivalent materials worldwide. The 2016 edition includes more than 70,000 standard designations and trade names from approximately 300 steelmakers and suppliers. Presentation is trilingual: English, French, and German. Materials covered include structural steels, tool steels, valve steels, high temperature steels and alloys, stainless and heat-resisting steels, and more. Standards and designations from 25 countries are cross-referenced.

  6. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  7. Key Developments in Ionic Liquid Crystals

    OpenAIRE

    Fernandez, A.A.; Kouwer, P.H.J.

    2016-01-01

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a...

  8. NCAP projection displays: key issues for commercialization

    Science.gov (United States)

    Tomita, Akira; Jones, Philip J.

    1992-06-01

    Recently there has been much interest in a new polymer nematic dispersion technology, often called as NCAP, PDLC, PNLC, LCPC, etc., since projection displays using this technology have been shown to produce much brighter display images than projectors using conventional twisted nematic (TN) lightvalves. For commercializing projection displays based on this polymer nematic dispersion technology, the new materials must not only meet various electro- optic requirements, e.g., operational voltage, `off-state'' scattering angle, voltage holding ratio and hysteresis, but must also be stable over the lifetime of the product. This paper reports recent progress in the development of NCAP based projection displays and discusses some of the key commercialization issues.

  9. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  10. Ocean energy: key legal issues and challenges

    International Nuclear Information System (INIS)

    Wright, Glen; Rochette, Julien; O'Hagan, Anne Marie; De Groot, Jiska; Leroy, Yannick; Soininen, Niko; Salcido, Rachael; Castelos, Montserrat Abad; Jude, Simon; Kerr, Sandy

    2015-01-01

    Ocean energy is a novel renewable energy resource being developed as part of the push towards a 'Blue Economy'. The literature on ocean energy has focused on technical, environmental, and, increasingly, social and political aspects. Legal and regulatory factors have received less attention, despite their importance in supporting this new technology and ensuring its sustainable development. In this Issue Brief, we set out some key legal challenges for the development of ocean energy technologies, structured around the following core themes of marine governance: (i) international law; (ii) environmental impacts; (iii) rights and ownership; (iv) consenting processes; and (v) management of marine space and resources. (authors)

  11. 5 keys to business analytics program success

    CERN Document Server

    Boyer, John; Green, Brian; Harris, Tracy; Van De Vanter, Kay

    2012-01-01

    With business analytics is becoming increasingly strategic to all types of organizations and with many companies struggling to create a meaningful impact with this emerging technology, this work-based on the combined experience of 10 organizations that display excellence and expertise on the subject-shares the best practices, discusses the management aspects and sociology that drives success, and uncovers the five key aspects behind the success of some of the top business analytics programs in the industry. Readers will learn about numerous topics, including how to create and manage a changing

  12. Local innovation: The key to globalisation

    Directory of Open Access Journals (Sweden)

    Srivardhini K. Jha

    2013-12-01

    Full Text Available The round table discussion draws the panellists to weigh in on how multinational enterprises from developed countries are innovating in and for emerging markets, the challenges faced, and lessons learnt. The key takeaways are that MNEs are increasingly innovating for the Indian market, alongside their contribution to global products. They are doing so by developing close relationships with field facing organisations, co-creating with customers, empowering engineers, and taking a clean slate approach to product development. This approach has given them dividends not only in the local market but also in the global market.

  13. Geotechnics - the key to ground water protection

    DEFF Research Database (Denmark)

    Baumann, Jens; Foged, Niels; Jørgensen, Peter

    2000-01-01

    During the past 5 to 10 years research into ground water protection has proved that fractures in clay till may increase the hydraulic conductivity and herby the vulnerability of the ground water considerably. However, research has not identified a non-expensive and efficient method to map...... the fracture conditions of the various clay tills. Tests performed at the Danish Geotechnical Institute with large undisturbed columns of clay till show that there is a relation between the strength of the clay till and the hydraulic conductivity. Geotechnical methods may therefore be the key to determine...

  14. Predicting Key Events in the Popularity Evolution of Online Information.

    Science.gov (United States)

    Hu, Ying; Hu, Changjun; Fu, Shushen; Fang, Mingzhe; Xu, Wenwen

    2017-01-01

    The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  15. Predicting Key Events in the Popularity Evolution of Online Information.

    Directory of Open Access Journals (Sweden)

    Ying Hu

    Full Text Available The popularity of online information generally experiences a rising and falling evolution. This paper considers the "burst", "peak", and "fade" key events together as a representative summary of popularity evolution. We propose a novel prediction task-predicting when popularity undergoes these key events. It is of great importance to know when these three key events occur, because doing so helps recommendation systems, online marketing, and containment of rumors. However, it is very challenging to solve this new prediction task due to two issues. First, popularity evolution has high variation and can follow various patterns, so how can we identify "burst", "peak", and "fade" in different patterns of popularity evolution? Second, these events usually occur in a very short time, so how can we accurately yet promptly predict them? In this paper we address these two issues. To handle the first one, we use a simple moving average to smooth variation, and then a universal method is presented for different patterns to identify the key events in popularity evolution. To deal with the second one, we extract different types of features that may have an impact on the key events, and then a correlation analysis is conducted in the feature selection step to remove irrelevant and redundant features. The remaining features are used to train a machine learning model. The feature selection step improves prediction accuracy, and in order to emphasize prediction promptness, we design a new evaluation metric which considers both accuracy and promptness to evaluate our prediction task. Experimental and comparative results show the superiority of our prediction solution.

  16. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  17. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  18. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  19. SAGE results

    International Nuclear Information System (INIS)

    Gavrin, V.N.

    1996-01-01

    The Russian-American Gallium solar neutrino Experiment (SAGE) is described. The solar neutrino flux measured by 31 extractions through October, 1993 is presented. The result of 69+/-10(stat)+5/-7(syst) SNU is to be compared with a Standard Solar Model prediction of 132 SNU. The initial results of a measurement of experimental efficiencies are also discussed by exposing the gallium target to neutrinos from an artificial source. The capture rate of neutrinos from this source is very close to that which is expected. The result can be expressed as a ratio of the measured capture rate to the anticipated rate from the source activity. This ratio is 0.93+0.15, -0.17 where the systematic and statistical errors have been combined. To first order the experimental efficiencies are in agreement with those determined during solar neutrino measurements and in previous auxiliary measurements. One must conclude that the discrepancy between the measured solar neutrino flux and that predicted by the solar models can not arise from an experimental artifact. (author)

  20. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  1. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  2. Characterization Of Dissolved Organic Mattter In The Florida Keys Ecosystem

    Science.gov (United States)

    Adams, D. G.; Shank, G. C.

    2009-12-01

    Over the past few decades, Scleractinian coral populations in the Florida Keys have increasingly experienced mortality due to bleaching events as well as microbial mediated illnesses such as black band and white band disease. Such pathologies seem to be most correlated with elevated sea surface temperatures, increased UV exposures, and shifts in the microbial community living on the coral itself. Recent studies indicate that corals’ exposure to UV in the Florida Keys is primarily controlled by the concentration of CDOM (Chromophoric Dissolved Organic Matter) in the water column. Further, microbial community alterations may be linked to changes in concentration and chemical composition of the larger DOM (Dissolved Organic Matter) pool. Our research characterized the spatial and temporal properties of DOM in Florida Bay and along the Keys ecosystems using DOC analyses, in-situ water column optical measurements, and spectral analyses including absorbance and fluorescence measurements. We analyzed DOM characteristics along transects running from the mouth of the Shark River at the southwest base of the Everglades, through Florida Bay, and along near-shore Keys coastal waters. Two 12 hour time-series samplings were also performed at the Seven-Mile Bridge, the primary Florida Bay discharge channel to the lower Keys region. Photo-bleaching experiments showed that the chemical characteristics of the DOM pool are altered by exposure to solar radiation. Results also show that DOC (~0.8-5.8 mg C/L) and CDOM (~0.5-16.5 absorbance coefficient at 305nm) concentrations exhibit seasonal fluctuations in our study region. EEM analyses suggest seasonal transitions between primarily marine (summer) and terrestrial (winter) sources along the Keys. We are currently combining EEM-PARAFAC analysis with in-situ optical measurements to model changes in the spectral properties of DOM in the water column. Additionally, we are using stable δ13C isotopic analysis to further characterize DOM

  3. Optical image encryption using password key based on phase retrieval algorithm

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-04-01

    A novel optical image encryption system is proposed using password key based on phase retrieval algorithm (PRA). In the encryption process, a shared image is taken as a symmetric key and the plaintext is encoded into the phase-only mask based on the iterative PRA. The linear relationship between the plaintext and ciphertext is broken using the password key, which can resist the known plaintext attack. The symmetric key and the retrieved phase are imported into the input plane and Fourier plane of 4f system during the decryption, respectively, so as to obtain the plaintext on the CCD. Finally, we analyse the key space of the password key, and the results show that the proposed scheme can resist a brute force attack due to the flexibility of the password key.

  4. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  5. Careful assessment key in managing prostatitis.

    Science.gov (United States)

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  6. KEY FACTORS IN MARKETING FOCUSED SERVICES BUSINESSES

    Directory of Open Access Journals (Sweden)

    Doris Yohanna Martínez Castrillón

    2016-07-01

    Full Text Available This article aims to identify the key success factors in the marketing area and describe them as managerial allies for companies that wish to position themselves in the market under a good sustainable performance , for it has been consulted theoretical references of Marketing as a management partner with collection and integration of data. Methodologically, it is located within the type of descriptive research field, with a design of transactional non-experimental, with an intentional non-probabilistic stratified sample of four reporting units. The findings established fifteen (15 points of influence called "key success factors (FCE in the area of marketing, and managerial allies of service companies in the security, surveillance and protection sector in industrial, commercial and residential sectors. Finally, it is intended that the actions of marketing service companies should focus to the welfare of both the organization, such as users, both in the environment, and economic, social and technological, characterized by ethics, sustainable development and transparency to respond appropriately.

  7. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  8. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.; Ferreira, Luciana C.; Sequeira, Ana M.M.; Meekan, Mark G.; Duarte, Carlos M.; Bailey, Helen; Bailleul, Fred; Bowen, W. Don; Caley, M. Julian; Costa, Daniel P.; Eguí luz, Victor M.; Fossette, Sabrina; Friedlaender, Ari S.; Gales, Nick; Gleiss, Adrian C.; Gunn, John; Harcourt, Rob; Hazen, Elliott L.; Heithaus, Michael R.; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L.; Lowe, Christopher G.; Madsen, Peter T.; Marsh, Helene; Phillips, Richard A.; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A.; Simpfendorfer, Colin A.; Sims, David W.; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N.; Wikelski, Martin; Womble, Jamie N.; Thums, Michele

    2016-01-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  9. Key Questions in Marine Megafauna Movement Ecology

    KAUST Repository

    Hays, Graeme C.

    2016-03-12

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Technical advances make this an exciting time for animal movement studies, with a range of small, reliable data-loggers and transmitters that can record horizontal and vertical movements as well as aspects of physiology and reproductive biology.Forty experts identified key questions in the field of movement ecology.Questions have broad applicability across species, habitats, and spatial scales, and apply to animals in both marine and terrestrial habitats as well as both vertebrates and invertebrates, including birds, mammals, reptiles, fish, insects, and plankton. © 2016 Elsevier Ltd.

  10. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    Science.gov (United States)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  11. Anomaly Monitoring Method for Key Components of Satellite

    Directory of Open Access Journals (Sweden)

    Jian Peng

    2014-01-01

    Full Text Available This paper presented a fault diagnosis method for key components of satellite, called Anomaly Monitoring Method (AMM, which is made up of state estimation based on Multivariate State Estimation Techniques (MSET and anomaly detection based on Sequential Probability Ratio Test (SPRT. On the basis of analysis failure of lithium-ion batteries (LIBs, we divided the failure of LIBs into internal failure, external failure, and thermal runaway and selected electrolyte resistance (Re and the charge transfer resistance (Rct as the key parameters of state estimation. Then, through the actual in-orbit telemetry data of the key parameters of LIBs, we obtained the actual residual value (RX and healthy residual value (RL of LIBs based on the state estimation of MSET, and then, through the residual values (RX and RL of LIBs, we detected the anomaly states based on the anomaly detection of SPRT. Lastly, we conducted an example of AMM for LIBs, and, according to the results of AMM, we validated the feasibility and effectiveness of AMM by comparing it with the results of threshold detective method (TDM.

  12. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  13. No-signaling quantum key distribution: solution by linear programming

    Science.gov (United States)

    Hwang, Won-Young; Bae, Joonwoo; Killoran, Nathan

    2015-02-01

    We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob's bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csiszár-Körner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.

  14. Quantum key distribution for composite dimensional finite systems

    Science.gov (United States)

    Shalaby, Mohamed; Kamal, Yasser

    2017-06-01

    The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.

  15. Simultaneous classical communication and quantum key distribution using continuous variables*

    Science.gov (United States)

    Qi, Bing

    2016-10-01

    Presently, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are very different communication modalities. Dedicated devices are commonly required to implement QKD. In this paper, we propose a scheme which allows classical communication and QKD to be implemented simultaneously using the same communication infrastructure. More specially, we propose a coherent communication scheme where both the bits for classical communication and the Gaussian distributed random numbers for QKD are encoded on the same weak coherent pulse and decoded by the same coherent receiver. Simulation results based on practical system parameters show that both deterministic classical communication with a bit error rate of 10-9 and secure key distribution could be achieved over tens of kilometers of single-mode fibers. It is conceivable that in the future coherent optical communication network, QKD will be operated in the background of classical communication at a minimal cost.

  16. Key Generation for Fast Inversion of the Paillier Encryption Function

    Science.gov (United States)

    Hirano, Takato; Tanaka, Keisuke

    We study fast inversion of the Paillier encryption function. Especially, we focus only on key generation, and do not modify the Paillier encryption function. We propose three key generation algorithms based on the speeding-up techniques for the RSA encryption function. By using our algorithms, the size of the private CRT exponent is half of that of Paillier-CRT. The first algorithm employs the extended Euclidean algorithm. The second algorithm employs factoring algorithms, and can construct the private CRT exponent with low Hamming weight. The third algorithm is a variant of the second one, and has some advantage such as compression of the private CRT exponent and no requirement for factoring algorithms. We also propose the settings of the parameters for these algorithms and analyze the security of the Paillier encryption function by these algorithms against known attacks. Finally, we give experimental results of our algorithms.

  17. Symmetric Blind Information Reconciliation for Quantum Key Distribution

    International Nuclear Information System (INIS)

    Kiktenko, Evgeniy O.

    2017-01-01

    Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.

  18. Key Questions in Building Defect Prediction Models in Practice

    Science.gov (United States)

    Ramler, Rudolf; Wolfmaier, Klaus; Stauder, Erwin; Kossak, Felix; Natschläger, Thomas

    The information about which modules of a future version of a software system are defect-prone is a valuable planning aid for quality managers and testers. Defect prediction promises to indicate these defect-prone modules. However, constructing effective defect prediction models in an industrial setting involves a number of key questions. In this paper we discuss ten key questions identified in context of establishing defect prediction in a large software development project. Seven consecutive versions of the software system have been used to construct and validate defect prediction models for system test planning. Furthermore, the paper presents initial empirical results from the studied project and, by this means, contributes answers to the identified questions.

  19. Key Nuclear Verification Priorities: Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  20. Key Nuclear Verification Priorities - Safeguards and Beyond

    International Nuclear Information System (INIS)

    Carlson, J.

    2010-01-01

    In addressing nuclear verification priorities, we should look beyond the current safeguards system. Non-proliferation, which the safeguards system underpins, is not an end in itself, but an essential condition for achieving and maintaining nuclear disarmament. Effective safeguards are essential for advancing disarmament, and safeguards issues, approaches and techniques are directly relevant to the development of future verification missions. The extent to which safeguards challenges are successfully addressed - or otherwise - will impact not only on confidence in the safeguards system, but on the effectiveness of, and confidence in, disarmament verification. To identify the key nuclear verification priorities, we need to consider the objectives of verification, and the challenges to achieving these. The strategic objective of IAEA safeguards might be expressed as: To support the global nuclear non-proliferation regime by: - Providing credible assurance that states are honouring their safeguards commitments - thereby removing a potential motivation to proliferate; and - Early detection of misuse of nuclear material and technology - thereby deterring proliferation by the risk of early detection, enabling timely intervention by the international community. Or to summarise - confidence-building, detection capability, and deterrence. These will also be essential objectives for future verification missions. The challenges to achieving these involve a mix of political, technical and institutional dimensions. Confidence is largely a political matter, reflecting the qualitative judgment of governments. Clearly assessments of detection capability and deterrence have a major impact on confidence. Detection capability is largely thought of as 'technical', but also involves issues of legal authority, as well as institutional issues. Deterrence has both political and institutional aspects - including judgments on risk of detection and risk of enforcement action being taken. The

  1. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  2. Key Lake Mining Corporation metallurgical complex

    International Nuclear Information System (INIS)

    Lendrum, F.C.

    1984-02-01

    The Key Lake uranium mine is located in Saskatchewan, 550 km northeast of Saskatoon. It began operations in 1983, and is licensed and regulated by both Saskatchewan government agencies and the Canadian Atomic Energy Control Board. This report examines the metallurgical processes used at the mill and discusses the spills that occurred in the first four months the mine was in operation. It finds that all spills of an acidic nature in the mill were small amounts in the CCD or solution pretreatment sections. Contingency procedures are in place and sumps are capable of handling spills. The only major change in design contemplated will be converting the secondary crushing from the use of an impact crusher to the use of a semi-autogeneous grinding mill. The monitoring program set out by the AECB and Saskatchewan Environment is thorough. It monitors effluents and water pathways, and includes aquatic biota and sediments. Air monitoring is also required by Saskatchewan Environment

  3. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  4. Key Developments in Ionic Liquid Crystals.

    Science.gov (United States)

    Alvarez Fernandez, Alexandra; Kouwer, Paul H J

    2016-05-16

    Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  5. Key Developments in Ionic Liquid Crystals

    Directory of Open Access Journals (Sweden)

    Alexandra Alvarez Fernandez

    2016-05-01

    Full Text Available Ionic liquid crystals are materials that combine the classes of liquid crystals and ionic liquids. The first one is based on the multi-billion-dollar flat panel display industry, whilst the latter quickly developed in the past decades into a family of highly-tunable non-volatile solvents. The combination yields materials with a unique set of properties, but also with many challenges ahead. In this review, we provide an overview of the key concepts in ionic liquid crystals, particularly from a molecular perspective. What are the important molecular parameters that determine the phase behavior? How should they be introduced into the molecules? Finally, which other tools does one have to realize specific properties in the material?

  6. Secure Key Management in the Cloud

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  7. Climate Watchlist: Key issues for Cancun negotiations

    Energy Technology Data Exchange (ETDEWEB)

    Chandani, Achala; Siegele, Linda

    2010-11-15

    We must mitigate and adapt to climate change. On this, the international community is agreed. But exactly how to do that is still up for debate. There were high hopes that last year's UN climate talks in Copenhagen would deliver a legally binding agreement for action on climate change. But the outcome — the Copenhagen Accord — was instead a political 'statement of intent' that fell significantly short of expectations. Now, after a year of interim meetings and several negotiating texts, parties to the UN Framework Convention on Climate Change (UNFCCC) are gathering in Cancun, Mexico, to try again. Their success will largely depend on settling disputes — particularly between the developed and developing world — about six key issues: shared vision; adaptation; climate finance; technology transfer; reducing emissions from deforestation and degradation; and post-2012 emissions reduction targets.

  8. Accountability in district nursing practice: key concepts.

    Science.gov (United States)

    Griffith, Richard

    2015-03-01

    Public trust and confidence in district nurses is essential to the nurse-patient relationship that underpins effective care and treatment. That trust and confidence has even greater focus for district nurses who care for patients in their own homes. Those patients need to be able to count on the professionalism and probity of their district nurses. The professionalism and probity of district nurses is based on their accountability, which protects the public by imposing standards on district nurses and holds them answerable for their acts and omissions. This is the first of a series of articles on accountability in district nursing practice to mark the introduction of the revised Nursing and Midwifery Code on the 31 March 2015. This month's article considers the key concepts of accountability.

  9. Phosphoinositides: Key modulators of energy metabolism☆

    Science.gov (United States)

    Bridges, Dave; Saltiel, Alan R.

    2014-01-01

    Phosphoinositides are key players in many trafficking and signaling pathways. Recent advances regarding the synthesis, location and functions of these lipids have dramatically improved our understanding of how and when these lipids are generated and what their roles are in animal physiology. In particular, phosphoinositides play a central role in insulin signaling, and manipulation of PtdIns(3,4,5)P3 levels in particular, may be an important potential therapeutic target for the alleviation of insulin resistance associated with obesity and the metabolic syndrome. In this article we review the metabolism, regulation and functional roles of phosphoinositides in insulin signaling and the regulation of energy metabolism. This article is part of a Special Issue entitled Phosphoinositides. PMID:25463477

  10. Key Questions in Marine Megafauna Movement Ecology.

    Science.gov (United States)

    Hays, Graeme C; Ferreira, Luciana C; Sequeira, Ana M M; Meekan, Mark G; Duarte, Carlos M; Bailey, Helen; Bailleul, Fred; Bowen, W Don; Caley, M Julian; Costa, Daniel P; Eguíluz, Victor M; Fossette, Sabrina; Friedlaender, Ari S; Gales, Nick; Gleiss, Adrian C; Gunn, John; Harcourt, Rob; Hazen, Elliott L; Heithaus, Michael R; Heupel, Michelle; Holland, Kim; Horning, Markus; Jonsen, Ian; Kooyman, Gerald L; Lowe, Christopher G; Madsen, Peter T; Marsh, Helene; Phillips, Richard A; Righton, David; Ropert-Coudert, Yan; Sato, Katsufumi; Shaffer, Scott A; Simpfendorfer, Colin A; Sims, David W; Skomal, Gregory; Takahashi, Akinori; Trathan, Philip N; Wikelski, Martin; Womble, Jamie N; Thums, Michele

    2016-06-01

    It is a golden age for animal movement studies and so an opportune time to assess priorities for future work. We assembled 40 experts to identify key questions in this field, focussing on marine megafauna, which include a broad range of birds, mammals, reptiles, and fish. Research on these taxa has both underpinned many of the recent technical developments and led to fundamental discoveries in the field. We show that the questions have broad applicability to other taxa, including terrestrial animals, flying insects, and swimming invertebrates, and, as such, this exercise provides a useful roadmap for targeted deployments and data syntheses that should advance the field of movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Teamwork the key to good patient care.

    Science.gov (United States)

    Baillie, Jonathan

    2013-05-01

    In a year when, with the inception of the new Clinical Commissioning Groups, the way that healthcare is procured and delivered will see radical changes, this month's HefmA 2013 National Conference & Exhibition will have as its theme, 'Many Players, One Goal: The Patient'. As HEJ editor, Jonathan Baillie reports, among the wide-ranging estates and facilities topics set for discussion will be 'Getting the patient environment right'; 'Dementia Building for the Future'; 'Waterborne Infections; Lessons Learned'; 'Incorporating lean thinking into design', and the key challenges faced by the estates and facilities sector. The keynote address, touching on a wide range of issues common to all large organisations, will be given by one of the best known 'women in football', and will also reflect particularly on the importance of teamwork.

  12. Bench press exercise: the key points.

    Science.gov (United States)

    Padulo, J; Laffaye, G; Chaouachi, A; Chamari, K

    2015-06-01

    The bench press exercise (BPE) is receiving increasing interest as a field testing, training/therapeutic modality to improve neuromuscular performance or to increase bone mass density. Several studies have been performed using BPE as a standard for increasing upper-limb strength. For this purpose, the position of the bar, the loads, the sets, the number of repetitions, the recovery time in-between sets, the movement speed, the muscular work and the use of the determination of the one repetition maximum (1-RM) are the classical tools investigated in the literature that have been shown to affect the BPE effect on neuromuscular. The goal of the present short review is to make a picture of the current knowledge on the bench press exercise, which could be very helpful for a better understanding of this standard movement and its effects. Based on the related literature, several recommendations on these key points are presented here.

  13. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  14. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  15. Key Value Considerations for Consultant Pharmacists.

    Science.gov (United States)

    Meyer, Lee; Perry, Ronald G; Rhodus, Susan M; Stearns, Wendy

    2016-07-01

    Managing the efficiency and costs of residents' drug regimens outside the acute-care hospital and through transitions of care requires a toolbox filled with cost-control tools and careful collaboration among the pharmacy provider(s), facility staff, and the consultant/senior care pharmacist. This article will provide the reader with key long-term care business strategies that affect the profitability of the pharmacy provider in various care settings while, at the same time, ensuring optimal therapy for residents as they transition across levels of care. Readers can take away ideas on how to access critical information, what they can do with this information, and how they can improve the overall care process. Four experts in various aspects of pharmacy management share their insights on pharmacy practice issues including formulary management, performance metrics, short-cycle dispensing challenges/solutions, cost-control measures, facility surveys, billing practices, medication reconciliation, prospective medication reviews, and transitions of care.

  16. Key world energy statistics. 2004 edition

    International Nuclear Information System (INIS)

    2004-01-01

    Key World Energy Statistics from the IEA contains timely, clearly-presented data on the supply, transformation and consumption of all major energy sources. The IEA energy balances and statistics databases on CD-Rom provide annual historical energy data extracted from four IEA/OECD data bases: energy statistics and energy balances, which contain data for most of the OECD countries for the years 1960 to 2002 and energy statistics and balances for more than 100 non-OECD countries for the years 1971 to 2002. The CDs and/or hard-copies and PDFs can be purchased individually: Energy Balances of OECD Countries 2004; Energy Statistics of OECD Countries 2004; Energy Balances of Non OECD Countries 2004; Energy Statistics of Non-OECD Countries 2004

  17. Altruity: Key to the Fight Against Poverty

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2012-06-01

    Full Text Available This paper presents the concept of altruity and illustrates its philosophical and practical importance in the fight against poverty. Altruity –a highly specific form of rational altruism– is the duty that comes with freedom. The individual duty of altruity is the necessary counterpart of the right to individual freedoms. It is, by its very nature, distinct from (though complementary to generosity, and devoid of any expectation of reciprocity (while not excluding it. The idea of altruity is the cornerstone of a theory of individual responsibility, and of a theory of justice, which provide a conceptual framework for the struggle against poverty. And because it is only meaningful if implemented with a pre-defined method, it also provides a framework for action, as the FACTS Initiative has shown. Altruity thus emerges as one of the keys to the fight against poverty.

  18. Risk management of key issues of FPSO

    Science.gov (United States)

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  19. Simultaneous transmission for an encrypted image and a double random-phase encryption key

    Science.gov (United States)

    Yuan, Sheng; Zhou, Xin; Li, Da-Hai; Zhou, Ding-Fu

    2007-06-01

    We propose a method to simultaneously transmit double random-phase encryption key and an encrypted image by making use of the fact that an acceptable decryption result can be obtained when only partial data of the encrypted image have been taken in the decryption process. First, the original image data are encoded as an encrypted image by a double random-phase encryption technique. Second, a double random-phase encryption key is encoded as an encoded key by the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. Then the amplitude of the encrypted image is modulated by the encoded key to form what we call an encoded image. Finally, the encoded image that carries both the encrypted image and the encoded key is delivered to the receiver. Based on such a method, the receiver can have an acceptable result and secure transmission can be guaranteed by the RSA cipher system.

  20. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  1. CCM key comparison CCM.D-K4 'Hydrometer'

    Science.gov (United States)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was

  2. Managing clinical education through understanding key principles.

    Science.gov (United States)

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  3. Cryptanalysis on a parallel keyed hash function based on chaotic maps

    International Nuclear Information System (INIS)

    Guo Wei; Wang Xiaoming; He Dake; Cao Yang

    2009-01-01

    This Letter analyzes the security of a novel parallel keyed hash function based on chaotic maps, proposed by Xiao et al. to improve the efficiency in parallel computing environment. We show how to devise forgery attacks on Xiao's scheme with differential cryptanalysis and give the experiment results of two kinds of forgery attacks firstly. Furthermore, we discuss the problem of weak keys in the scheme and demonstrate how to utilize weak keys to construct collision.

  4. A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes

    OpenAIRE

    Chen, Bin; Ignatenko, Tanya; Willems, Frans M. J.; Maes, Roel; van der Sluis, Erik; Selimis, Georgios

    2017-01-01

    Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the cryptographic keys thus avoiding the need to store and manage the device cryptographic keys. Therefore...

  5. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  6. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  7. Quantum key distribution with an unknown and untrusted source

    Science.gov (United States)

    Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong

    2009-03-01

    The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).

  8. Optimisation of key performance measures in air cargo demand management

    Directory of Open Access Journals (Sweden)

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  9. MoKey: A versatile exergame creator for everyday usage.

    Science.gov (United States)

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  10. Adaptive spatial filtering for daytime satellite quantum key distribution

    Science.gov (United States)

    Gruneisen, Mark T.; Sickmiller, Brett A.; Flanagan, Michael B.; Black, James P.; Stoltenberg, Kurt E.; Duchane, Alexander W.

    2014-11-01

    The rate of secure key generation (SKG) in quantum key distribution (QKD) is adversely affected by optical noise and loss in the quantum channel. In a free-space atmospheric channel, the scattering of sunlight into the channel can lead to quantum bit error ratios (QBERs) sufficiently large to preclude SKG. Furthermore, atmospheric turbulence limits the degree to which spatial filtering can reduce sky noise without introducing signal losses. A system simulation quantifies the potential benefit of tracking and higher-order adaptive optics (AO) technologies to SKG rates in a daytime satellite engagement scenario. The simulations are performed assuming propagation from a low-Earth orbit (LEO) satellite to a terrestrial receiver that includes an AO system comprised of a Shack-Hartmann wave-front sensor (SHWFS) and a continuous-face-sheet deformable mirror (DM). The effects of atmospheric turbulence, tracking, and higher-order AO on the photon capture efficiency are simulated using statistical representations of turbulence and a time-domain waveoptics hardware emulator. Secure key generation rates are then calculated for the decoy state QKD protocol as a function of the receiver field of view (FOV) for various pointing angles. The results show that at FOVs smaller than previously considered, AO technologies can enhance SKG rates in daylight and even enable SKG where it would otherwise be prohibited as a consequence of either background optical noise or signal loss due to turbulence effects.

  11. Key aspects about education for refugee children

    Directory of Open Access Journals (Sweden)

    Mª Jesús Vega Pascual

    2003-01-01

    Full Text Available This presentation entitled «Key Aspects about Education for Refugee Children:Refugee Camp Situation», is based on the 2003 UNHCR Guidelines on Education and highlights the relevance of the education even in situations of emergency and crisis, interms of protection and psychosocial well-being of children. It also mentions key issues to consider when working with refugees, internally displaced people, asylum-seekers,stateless and other populations of concen to UNHCR. Aspects such as refugee children’s rights, UNHCR policy commitments to education, participation of refugees and their communities in the design, establishement and implementation of education programmes, specially in emergencies, will be dealt with in this presentation. It will alsomentions topics such as the school drop out, education for vulnerable groups and the need for promoting a gender sentitive approach, bearing in mind that the hard experience of exile, the changes of family structure, the ethnic, cultural, religious and legal differences are key when working with this populationEsta presentación titulada "Consideraciones esenciales sobre la educación de los niños refugiados: la situación en los campos de refugiados", está basada en las Directrices del ACNUR sobre Eduación de 2003, y pretende resaltar la importancia de la educación en las situaciones de refugiados, incluso en situaciones de emergencia o crisis, y cómo ésta juega en favor de la protección y del bienestar psicosocial de los niños. Se mencionan las peculiaridades más relevantes que deben tenerse en cuenta cuando se trabaja con refugiados, desplazados internos, solicitantes de asilo, apátridas y otras poblaciones de las que se ocupa el ACNUR. Se verán aspectos como los derechos de los niños refugiados, los compromisos del Alto Comisionado en materia de Educación, la participación de los refugiados y sus comunidades para diseñar, establecer e impartir programas de educación especialmente

  12. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  13. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  14. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  15. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  16. Key acceptability attributes of orodispersible films.

    Science.gov (United States)

    Scarpa, Mariagiovanna; Paudel, Amrit; Kloprogge, Frank; Hsiao, Wen Kai; Bresciani, Massimo; Gaisford, Simon; Orlu, Mine

    2018-04-01

    The features rendering orodispersible films (ODFs) patient-centric formulations are widely discussed in the scientific literature. However there is a lack of research studies exploring ODF characteristics with a potential impact on end-user acceptability. The aim of this study was to identify the key ODF characteristics affecting end-user acceptability by developing in vitro test methods for the prediction of ODFs acceptability and correlate these formulation characteristics with the data obtained from a human panel study. Four drug-free single-polymer films were prepared by solvent casting. Solutions of poly(vinyl) alcohol (PVOH) 39 KDa (P1), PVOH 197 KDa (P2), carboxymethylcellulose (CMC) 395 KDa (C1), and CMC 725 KDa (C2) were prepared. Texture analysis and Dynamic Mechanical Analysis (DMA) were used to assess film tack. Petri dish and drop methods were used to assess disintegration time. A human panel of 24 healthy young adults was employed to identify end-user acceptability criteria of the four study film samples. Texture analysis data of ODF tack were not found to be in agreement with the in vivo perceived stickiness in the mouth. However, measurement of the area under the adhesive force curve obtained by DMA correlated with in vivo perceived stickiness data for all samples. The disintegration times obtained by drop method were more comparable to human panel data than the petri dish method. Hence DMA and drop methods proved to be promising methodologies for the prediction of the end-user acceptability. The type and molecular weight of the film-forming polymer had a strong influence on stickiness perception, whereas only polymeric molecular weight influenced perceived disintegration time. The human panel study showed that Participant Reported Outcomes (PROs) for the perceived stickiness in the mouth and disintegration time of test films received significantly different scores between samples, and thus were identified as the key attributes with the

  17. The HST Key Project on the Extragalactic Distance Scale

    Science.gov (United States)

    Freedman, W. L.

    1994-12-01

    One of the major unresolved problems in observational cosmology is the determination of the Hubble Constant, (H_0). The Hubble Space Telescope (HST) Key Project on the Extragalactic Distance Scale aims to provide a measure of H_0 to an accuracy of 10%. Historically the route to H_0 has been plagued by systematic errors; hence there is no quick and easy route to a believeable value of H_0. Achieving plausible error limits of 10% requires careful attention to eliminating potential sources of systematic error. The strategy adopted by the Key Project team is threefold: First, to discover Cepheids in spiral galaxies located in the field and in small groups that are suitable for the calibration of several independent secondary methods. Second, to make direct Cepheid measurements of 3 spiral galaxies in the Virgo cluster and 2 members of the Fornax cluster. Third, to provide a check on the the Cepheid distance scale via independent distance estimates to nearby galaxies, and in addition, to undertake an empirical test of the sensitivity of the zero point of the Cepheid PL relation to heavy-element abundances. First results from the HST Key Project will be presented. We have now determined Cepheid distances to 4 galaxies using the HST: these are the nearby galaxies M81 and M101, the edge-on galaxy NGC 925, and the face-on spiral galaxy M100 in the Virgo cluster. Recently we have measured a Cepheid distance for M100 of 17 +/- 2 Mpc, which yields a value of H_0 = 80 +/- 17 km/sec/Mpc. This work was carried out in collaboration with the other members of the HST Key Project team, R. Kennicutt, J. Mould, F. Bresolin, S. Faber, L. Ferrarese, H. Ford, J. Graham, J. Gunn, M. Han, P. Harding, J. Hoessel, R. Hill, J. Huchra, S. Hughes, G. Illingworth, D. Kelson, B. Madore, R. Phelps, A. Saha, N. Silbermann, P. Stetson, and A. Turner.

  18. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  19. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  20. Designing organizational structures: Key thoughts for development.

    Science.gov (United States)

    Killingsworth, Patricia; Eschenbacher, Lynn

    2018-04-01

    Current strategies and concepts to consider in developing a system-level organizational structure for the pharmacy enterprise are discussed. There are many different ways to design an organizational structure for the pharmacy enterprise within a health system. The size of the organization, the number of states in which it operates, and the geographic spread and complexity of the pharmacy business lines should be among the key considerations in determining the optimal organizational and decision-making structures for the pharmacy enterprise. The structure needs to support incorporation of the pharmacy leadership (both system-level executives and local leaders) into all strategic planning and discussions at the hospital and health-system levels so that they can directly represent the pharmacy enterprise instead of relying on others to develop strategy on their behalf. It is important that leaders of all aspects of the pharmacy enterprise report through the system's top pharmacy executive, who should be a pharmacist and have a title consistent with those of other leaders reporting at the same organizational level (e.g., chief pharmacy officer). Pharmacy leaders need to be well positioned within an organization to advocate for the pharmacy enterprise and use all resources to the best of their ability. As the scope and complexity of pharmacy services grow, it is critical to ensure that leadership of the pharmacy enterprise is unified under a single pharmacy executive team. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  1. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  2. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  3. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  4. Outreach: Key to Sustainable Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  5. Identifying Key Attributes for Protein Beverages.

    Science.gov (United States)

    Oltman, A E; Lopetcharat, K; Bastian, E; Drake, M A

    2015-06-01

    This study identified key attributes of protein beverages and evaluated effects of priming on liking of protein beverages. An adaptive choice-based conjoint study was conducted along with Kano analysis to gain insight on protein beverage consumers (n = 432). Attributes evaluated included label claim, protein type, amount of protein, carbohydrates, sweeteners, and metabolic benefits. Utility scores for levels and importance scores for attributes were determined. Subsequently, two pairs of clear acidic whey protein beverages were manufactured that differed by age of protein source or the amount of whey protein per serving. Beverages were evaluated by 151 consumers on two occasions with or without priming statements. One priming statement declared "great flavor," the other priming statement declared 20 g protein per serving. A two way analysis of variance was applied to discern the role of each priming statement. The most important attribute for protein beverages was sweetener type, followed by amount of protein, followed by type of protein followed by label claim. Beverages with whey protein, naturally sweetened, reduced sugar and ≥15 g protein per serving were most desired. Three consumer clusters were identified, differentiated by their preferences for protein type, sweetener and amount of protein. Priming statements positively impacted concept liking (P 0.05). Consistent with trained panel profiles of increased cardboard flavor with higher protein content, consumers liked beverages with 10 g protein more than beverages with 20 g protein (6.8 compared with 5.7, P appeal. © 2015 Institute of Food Technologists®

  6. Key performance indicators in British military trauma.

    Science.gov (United States)

    Stannard, Adam; Tai, Nigel R; Bowley, Douglas M; Midwinter, Mark; Hodgetts, Tim J

    2008-08-01

    Key performance indicators (KPI) are tools for assessing process and outcome in systems of health care provision and are an essential component in performance improvement. Although KPI have been used in British military trauma for 10 years, they remain poorly defined and are derived from civilian metrics that do not adjust for the realities of field trauma care. Our aim was to modify current trauma KPI to ensure they more faithfully reflect both the military setting and contemporary evidence in order to both aid accurate calibration of the performance of the British Defence Medical Services and act as a driver for performance improvement. A workshop was convened that was attended by senior, experienced doctors and nurses from all disciplines of trauma care in the British military. "Speciality-specific" KPI were developed by interest groups using evidence-based data where available and collective experience where this was lacking. In a final discussion these were streamlined into 60 KPI covering each phase of trauma management. The introduction of these KPI sets a number of important benchmarks by which British military trauma can be measured. As part of a performance improvement programme, these will allow closer monitoring of our performance and assist efforts to develop, train, and resource British military trauma providers.

  7. Modeling molecular mixing in a spatially inhomogeneous turbulent flow

    Science.gov (United States)

    Meyer, Daniel W.; Deb, Rajdeep

    2012-02-01

    Simulations of spatially inhomogeneous turbulent mixing in decaying grid turbulence with a joint velocity-concentration probability density function (PDF) method were conducted. The inert mixing scenario involves three streams with different compositions. The mixing model of Meyer ["A new particle interaction mixing model for turbulent dispersion and turbulent reactive flows," Phys. Fluids 22(3), 035103 (2010)], the interaction by exchange with the mean (IEM) model and its velocity-conditional variant, i.e., the IECM model, were applied. For reference, the direct numerical simulation data provided by Sawford and de Bruyn Kops ["Direct numerical simulation and lagrangian modeling of joint scalar statistics in ternary mixing," Phys. Fluids 20(9), 095106 (2008)] was used. It was found that velocity conditioning is essential to obtain accurate concentration PDF predictions. Moreover, the model of Meyer provides significantly better results compared to the IECM model at comparable computational expense.

  8. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  9. The Efficacy of Key Performance Indicators in Ontario Universities as Perceived by Key Informants

    Science.gov (United States)

    Chan, Vivian

    2015-01-01

    The Ontario Ministry of Education and Training's Task Force on University Accountability first proposed key performance indicators (KPIs) for colleges and universities in Ontario in the early 1990s. The three main KPIs for Ontario universities are the rates of (1) graduation, (2) employment, and (3) Ontario Student Assistance Program loan default.…

  10. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  11. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  12. A fingerprint key binding algorithm based on vector quantization and error correction

    Science.gov (United States)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  13. Security of public key encryption technique based on multiple chaotic systems

    International Nuclear Information System (INIS)

    Wang Kai; Pei Wenjiang; Zou Liuhua; Cheung Yiuming; He Zhenya

    2006-01-01

    Recently, a new public key encryption technique based on multiple chaotic systems has been proposed [B. Ranjan, Phys. Rev. Lett. 95 (2005) 098702]. This scheme employs m-chaotic systems and a set of linear functions for key exchange over an insecure channel. Security of the proposed algorithm grows as (NP) m , where N, P are the size of the key and the computational complexity of the linear functions respectively. In this Letter, the fundamental weakness of the cryptosystem is pointed out and a successful attack is described. Given the public keys and the initial vector, one can calculate the secret key based on Parseval's theorem. Both theoretical and experimental results show that the attacker can access to the secret key without difficulty. The lack of security discourages the use of such algorithm for practical applications

  14. [Key content and formulation of national Chinese materia medica resources survey at county level].

    Science.gov (United States)

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  15. Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys

    Science.gov (United States)

    Takahashi, Junko; Fukunaga, Toshinori

    This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.

  16. Key factors influencing the implementation success of a home telecare application.

    NARCIS (Netherlands)

    Postema, T.R.F.; Peeters, J.M.; Freide, R.D.

    2012-01-01

    Rationale The introduction of home telecare in healthcare organizations has shown mixed results in practice. The aim of this study is to arrive at a set of key factors that can be used in further implementation of video communication. We argue that key factors are mainly found in the organizational

  17. User-based key frame detection in social web video

    OpenAIRE

    Chorianopoulos, Konstantinos

    2012-01-01

    Video search results and suggested videos on web sites are represented with a video thumbnail, which is manually selected by the video up-loader among three randomly generated ones (e.g., YouTube). In contrast, we present a grounded user-based approach for automatically detecting interesting key-frames within a video through aggregated users' replay interactions with the video player. Previous research has focused on content-based systems that have the benefit of analyzing a video without use...

  18. AMNT 2014. Key topic: Reactor operation, safety - report. Pt. 2

    International Nuclear Information System (INIS)

    Fischer, Klaus-Christian; Willschuetz, Hans-Georg; Wortmann, Birgit

    2014-01-01

    Summary report on the following sessions of the Annual Conference on Nuclear Technology held in Frankfurt, 6 to 8 May 2014: - Thermo Dynamics and Fluid Dynamics: Experiments and Backfittings for the Improvement of Safety and Efficiency; - Safety of Nuclear Installations - Methods, Analyses, Results: In-Vessel Phenomena; Ex-Vessel Phenomena; - Standards and Regulations; Hazard and Safety Analysis; and Validation and Uncertainty Analysis. The other Sessions of the Key Topics 'Reactor Operation, Safety', 'Competence, Innovation, Regulation' and 'Fuel, Decommissioning and Disposal' have been covered in atw 10 (2014) and will be covered in further issues of atw.

  19. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  20. Key Biodiversity Areas in the Philippines: Priorities for Conservation

    Directory of Open Access Journals (Sweden)

    R.G.R. Ambal

    2012-08-01

    Full Text Available A process for identifying Key Biodiversity Areas (KBAs for the Philippines was undertaken in two phases. The 128 terrestrial and freshwater KBAs were identified in 2006 and the 123 marine KBAs were identified in 2009. A total of 228 KBAs resulted from the integration of the terrestrial, freshwater and marine KBAs. These KBAs represent the known habitat of 855 globally important species of plants, corals, molluscs, elasmobranchs, fishes, amphibians, reptiles, birds and mammals in the country. Inclusion of these KBAs in the country’s protected area system will be a significant step towards ensuring the conservation of the full scope of the country’s natural heritage.

  1. Digital games in medical education: Key terms, concepts, and definitions.

    Science.gov (United States)

    Bigdeli, Shoaleh; Kaufman, David

    2017-01-01

    Introduction: Game-based education is fast becoming a key instrument in medical education. Method: In this study, papers related to games were filtered and limited to full-text peer-reviewed published in English. Results: To the best of researchers' knowledge, the concepts used in the literature are varied and distinct, and the literature is not conclusive on the definition of educational games for medical education. Conclusion: This paper attempts to classify terms, concepts and definitions common to gamification in medical education.

  2. An alternative green screen keying method for film visual effects

    OpenAIRE

    Zhi, Jin

    2015-01-01

    This study focuses on a green screen keying method developed especially for film visual effects. There are a series of ways of using existing tools for creating mattes from green or blue screen plates. However, it is still a time-consuming process, and the results vary especially when it comes to retaining tiny details, such as hair and fur. This paper introduces an alternative concept and method for retaining edge details of characters on a green screen plate, also, a number of connected mat...

  3. Set-aside key to creating industry

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    The Canadian Wind Energy Association (CanWEA) submitted a plan of wind energy industry development to the Regie de l'energie of Quebec at its May wind set-aside hearings. According to the plan, CanWEA wants to see Hydro-Quebec buy 10 MW of wind power a year starting in 2001, progressively increasing to 50 MW power per year in four years. According to CanWEA the size of the set-aside must be large enough to foster competition in the turbine manufacturing sector, as well as put a downward pressure on wind energy prices. In 1996, Hydro-Quebec pledged to buy 10 MW of wind power per year over 10 years. It raised the target to 20 MW per year over 10 years in 1997, which was raised to 30 MW per year by a parliamentary commission in the spring of 1998. Hydro-Quebec contends that it cannot buy more than 30 MW, given that some of the utility's large industrial customers won't want to pay the increased cost of wind energy, and before buying any wind power there will have to be a decision about who will pay the additional cost. The Regie de l'energie has the power to decide whether Hydro-Quebec should spread the cost over the entire customer base, or just charge those customers willing to pay. According to the Regie, the wind set-aside is not simply an energy supply question, it is also a matter of developing a wind turbine manufacturing industry. It is this larger objective and other key issues, such as the economic spin-offs from developing wind energy, its role in regional development and its environmental impacts that will determine the the size of the set-aside and the price to be paid for wind power by Hydro-Quebec

  4. Key elements of communication in cancer care.

    Science.gov (United States)

    Maex, E; De Valck, C

    2006-01-01

    In this chapter the "communication compass" is introduced. It defines the key elements of communication and provides a language with which to communicate about communication in cancer care. The communication compass consists of two axes. One axis defines the associated perspectives of the clinician and the patient, the other axis the content of information and emotional experience. "Two lovers sat on a park bench with their bodies touching each other, holding hands in the moonlight. There was silence between them. So profound was their love for each other, they needed no words to express it." (Samuel Johnson). Sometimes communication just flows. There are these special moments, as fleeting as they are intense. Often communication is stuck. It is as if we speak another language and never manage to understand one another. The lovers on the park bench need no words to express what they feel, neither do they need words to speak about communication. Where communication gets stuck, we need a suitable language to speak about communication. Professional communication cannot be learned from a cookbook. Most of all it implies a readiness to communicate, which means openness to the other. The old adage that it is impossible not to communicate is only true if no criterion of quality is applied. As soon as some mutual understanding is implied in the definition of communication, the fact that it is at all possible to communicate becomes a miracle. Since there is an important gap between theory and practice, we created a tool that aims to bridge that gap. We call it the communication compass. It does not propose a model of "ideal communication," but provides a language with which to examine and analyze specific situations and to determine what the pitfalls and possibilities are. It is useful as a tool for identifying communicational difficulties in daily clinical practice and it can serve as a model for training basic communication skills.

  5. Human Health Effects of Trichloroethylene: Key Findings and Scientific Issues

    Science.gov (United States)

    Jinot, Jennifer; Scott, Cheryl Siegel; Makris, Susan L.; Cooper, Glinda S.; Dzubow, Rebecca C.; Bale, Ambuja S.; Evans, Marina V.; Guyton, Kathryn Z.; Keshava, Nagalakshmi; Lipscomb, John C.; Barone, Stanley; Fox, John F.; Gwinn, Maureen R.; Schaum, John; Caldwell, Jane C.

    2012-01-01

    Background: In support of the Integrated Risk Information System (IRIS), the U.S. Environmental Protection Agency (EPA) completed a toxicological review of trichloroethylene (TCE) in September 2011, which was the result of an effort spanning > 20 years. Objectives: We summarized the key findings and scientific issues regarding the human health effects of TCE in the U.S. EPA’s toxicological review. Methods: In this assessment we synthesized and characterized thousands of epidemiologic, experimental animal, and mechanistic studies, and addressed several key scientific issues through modeling of TCE toxicokinetics, meta-analyses of epidemiologic studies, and analyses of mechanistic data. Discussion: Toxicokinetic modeling aided in characterizing the toxicological role of the complex metabolism and multiple metabolites of TCE. Meta-analyses of the epidemiologic data strongly supported the conclusions that TCE causes kidney cancer in humans and that TCE may also cause liver cancer and non-Hodgkin lymphoma. Mechanistic analyses support a key role for mutagenicity in TCE-induced kidney carcinogenicity. Recent evidence from studies in both humans and experimental animals point to the involvement of TCE exposure in autoimmune disease and hypersensitivity. Recent avian and in vitro mechanistic studies provided biological plausibility that TCE plays a role in developmental cardiac toxicity, the subject of substantial debate due to mixed results from epidemiologic and rodent studies. Conclusions: TCE is carcinogenic to humans by all routes of exposure and poses a potential human health hazard for noncancer toxicity to the central nervous system, kidney, liver, immune system, male reproductive system, and the developing embryo/fetus. PMID:23249866

  6. Exploration of the Key Lake uranium deposits, Saskatchewan, Canada

    International Nuclear Information System (INIS)

    Gatzweiler, R.; Schmeling, B.; Tan, B.

    1981-01-01

    In 1969, one year after the discovery of the Rabbit Lake uranium deposit, exploration started in the Key Lake area as part of a major uranium rush into Northern Saskatchewan, and within the frame of a joint venture. The area was not chosen on the basis of a particular metallogenetic concept. The lack of exploratory success in 1969 and 1970, together with the introduction in March 1970 of foreign ownership restrictions for uranium mining in Canada, discouraged six of the nine companies forming the original joint venture. In 1971 the three remaining companies decided to continue under a redefined concept, based on the knowledge obtained from the Rabbit Lake deposit (Uranerz had acquired a 49% share in 1970) and from the newly discovered uranium deposits in the Pine Creek Geosyncline, Australia. In the same year, exploration work resulted in the discovery of two high-grade mineralized boulders and significant radioactive and geochemical anomalies 5 km SW of Key Lake deposits. Subsequent exploration, aimed at finding the source of the mineralized boulders, comprised geological, glacial geological and ground radiometric surveys, boulder tracing, air-photo interpretation, lake sediment and muskeg sampling surveys, radon surveys, ground magnetic, gravity, electromagnetic and IP surveys, and drilling. The systematic exploration efforts resulted in the discovery of the Gaertner ore body in July 1975 and the Deilmann ore body in June 1976, where glacial geology, lake sediment sampling, magnetic and electromagnetic surveys were the key methods in defining the drilling targets. Three further years and a total of about 2400 drillholes were needed to fully delineate the two ore bodies. (author)

  7. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  8. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  9. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  10. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Yang [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Wan-Su, E-mail: 2010thzz@sina.com [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei [Zhengzhou Information Science and Technology Institute, Zhengzhou, 450001 (China); Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2017-04-25

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  11. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  12. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  13. High-dimensional quantum key distribution with the entangled single-photon-added coherent state

    International Nuclear Information System (INIS)

    Wang, Yang; Bao, Wan-Su; Bao, Hai-Ze; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-01-01

    High-dimensional quantum key distribution (HD-QKD) can generate more secure bits for one detection event so that it can achieve long distance key distribution with a high secret key capacity. In this Letter, we present a decoy state HD-QKD scheme with the entangled single-photon-added coherent state (ESPACS) source. We present two tight formulas to estimate the single-photon fraction of postselected events and Eve's Holevo information and derive lower bounds on the secret key capacity and the secret key rate of our protocol. We also present finite-key analysis for our protocol by using the Chernoff bound. Our numerical results show that our protocol using one decoy state can perform better than that of previous HD-QKD protocol with the spontaneous parametric down conversion (SPDC) using two decoy states. Moreover, when considering finite resources, the advantage is more obvious. - Highlights: • Implement the single-photon-added coherent state source into the high-dimensional quantum key distribution. • Enhance both the secret key capacity and the secret key rate compared with previous schemes. • Show an excellent performance in view of statistical fluctuations.

  14. Identification of the Key Genes and Pathways in Esophageal Carcinoma.

    Science.gov (United States)

    Su, Peng; Wen, Shiwang; Zhang, Yuefeng; Li, Yong; Xu, Yanzhao; Zhu, Yonggang; Lv, Huilai; Zhang, Fan; Wang, Mingbo; Tian, Ziqiang

    2016-01-01

    Objective . Esophageal carcinoma (EC) is a frequently common malignancy of gastrointestinal cancer in the world. This study aims to screen key genes and pathways in EC and elucidate the mechanism of it. Methods . 5 microarray datasets of EC were downloaded from Gene Expression Omnibus. Differentially expressed genes (DEGs) were screened by bioinformatics analysis. Gene Ontology (GO) enrichment, Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment, and protein-protein interaction (PPI) network construction were performed to obtain the biological roles of DEGs in EC. Quantitative real-time polymerase chain reaction (qRT-PCR) was used to verify the expression level of DEGs in EC. Results . A total of 1955 genes were filtered as DEGs in EC. The upregulated genes were significantly enriched in cell cycle and the downregulated genes significantly enriched in Endocytosis. PPI network displayed CDK4 and CCT3 were hub proteins in the network. The expression level of 8 dysregulated DEGs including CDK4, CCT3, THSD4, SIM2, MYBL2, CENPF, CDCA3, and CDKN3 was validated in EC compared to adjacent nontumor tissues and the results were matched with the microarray analysis. Conclusion . The significantly DEGs including CDK4, CCT3, THSD4, and SIM2 may play key roles in tumorigenesis and development of EC involved in cell cycle and Endocytosis.

  15. Identification of the Key Genes and Pathways in Esophageal Carcinoma

    Directory of Open Access Journals (Sweden)

    Peng Su

    2016-01-01

    Full Text Available Objective. Esophageal carcinoma (EC is a frequently common malignancy of gastrointestinal cancer in the world. This study aims to screen key genes and pathways in EC and elucidate the mechanism of it. Methods. 5 microarray datasets of EC were downloaded from Gene Expression Omnibus. Differentially expressed genes (DEGs were screened by bioinformatics analysis. Gene Ontology (GO enrichment, Kyoto Encyclopedia of Genes and Genomes (KEGG enrichment, and protein-protein interaction (PPI network construction were performed to obtain the biological roles of DEGs in EC. Quantitative real-time polymerase chain reaction (qRT-PCR was used to verify the expression level of DEGs in EC. Results. A total of 1955 genes were filtered as DEGs in EC. The upregulated genes were significantly enriched in cell cycle and the downregulated genes significantly enriched in Endocytosis. PPI network displayed CDK4 and CCT3 were hub proteins in the network. The expression level of 8 dysregulated DEGs including CDK4, CCT3, THSD4, SIM2, MYBL2, CENPF, CDCA3, and CDKN3 was validated in EC compared to adjacent nontumor tissues and the results were matched with the microarray analysis. Conclusion. The significantly DEGs including CDK4, CCT3, THSD4, and SIM2 may play key roles in tumorigenesis and development of EC involved in cell cycle and Endocytosis.

  16. Development of commercial hybrid electric vehicle with native key components

    Directory of Open Access Journals (Sweden)

    S. V. Bakhmutov

    2014-01-01

    Full Text Available The perspectives of development of medium weight cargo vehicles with hybrid powertrain including Russian native key components are considered in this article. Series-parallel scheme of HEV is more relevant owing to limitations of series and parallel schemes. An example of this technology is described. This technical solution has good facilities for variation of HEV and AWD type. The authors have patented it. In addition, another main issue is to choose the types of key components with good correlation for parameters of ICE, electric motors, batteries, and inverter. Using mathematical model of the vehicle a selection and correlation of technical characteristics were carried out to meet ecological and economical requirements. After computing calculation two control strategies were accepted. The first strategy contributes to good fuel consumption, while the other one is aimed at ecology. Researchers use test benches to confirm the results of calculation, and this one was built by the authors applying native components. The result of experiment on the test bench is the growth of fuel consumption of the medium weight cargo vehicle by 25% and compliance with ecological class Euro-4.

  17. Water mobility key to improved floods

    Energy Technology Data Exchange (ETDEWEB)

    Pamenter, C B

    1967-03-01

    The use of polymer floods in the U.S. and Canada is discussed. A 2-yr laboratory study conducted by Dow Chemical Co. early in the life of polymer flooding showed that polymers improved the mobility ratio without damage to porosity or permeability of reservoir rock. A pilot test was made in the Niagara Field, Ky., and the results of this pilot compared to the performance of a waterflood that had been operating in this field for about 4 yr. The results showed that polymer flooding was superior to conventional waterflooding and had a distinct behavior. Another pilot flood conducted by Dow in the Albrecht Field, Starr County, Tex., showed similar results. Union Oil Co. of California also conducted pilot tests in 4 of their California reservoirs. Additional recoverable reserves resulting from polymer flooding for 2 of these reservoirs were estimated at 95,000 and 70,000 bbl. The other 2 tests were not as satisfactory, but this behavior is thought to be the result of not using enough polymer. Two other projects discussed are the NE. Hallsville Field unit in East Texas and the Squirrel sand reservoir in Woodson County, Kans., which were conducted by Hunt Oil Co. and Brazos Oil and Gas Co., respectively.

  18. Determinants of Key Account Management Effectiveness: The Case ...

    African Journals Online (AJOL)

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  19. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  20. Tolerance Evaluation of Poloidal Shear Keys for ITER TF Coil

    International Nuclear Information System (INIS)

    Fu Youkun; Neil, M.; Cees Jong

    2006-01-01

    There are 18 ITER Toroidal Field (TF) Coils. Unlike the other ITER coils, these coils are structurally linked. These links consist of friction between the coil legs in the central vault formed by the inner straight legs of the coils, four outer inter-coil structures (OIS) and one inner inter-coil structure (IIS). The OIS consists essentially of bands around all 18 coils to provide shear support by forming shear panels with the coil case, and the IIS consists of poloidal circular keys placed directly between the coil cases. Global analysis of the 'perfect' coil shape has shown high stresses in the IIS, in the poloidal keyways. Optimization has successfully reduced these stresses to acceptable values as regards the expected fatigue resistance. However it is necessary to confirm that the stresses are still acceptable when realistic values of geometry variations are included (i.e. the effect of coil and case tolerances). Because of the extensive mechanical links between coils the poloidal key stresses can also be affected by tolerances elsewhere in the case. As the first step in assessment of the possible variations in stresses, a substructure technique is being used to develop a local model of the key region. The result of geometry variations between individual coils is a loss in the 18 fold symmetry used to simplify previous analyses. With the new and optimized model it should be possible to relax the 18-fold symmetry, but a full analysis of all 18 coils is still not possible. Systematic ways of representing the tolerance variation in the finite element model have been developed so that parametric studies can be undertaken without a full reconstruction of the model. (author)

  1. Key performance indicators: Global product development

    DEFF Research Database (Denmark)

    Taylor, Thomas Paul; Ahmed-Kristensen, Saeema

    2014-01-01

    The decision to globalise parts of product development is a consequence of an increasingly competitive world market. The variety of risks and opportunities as a result of the decision make it difficult for management to evaluate if global product development has been successful. This paper invest...

  2. Quantum mechanics - a key to understanding magnetism

    International Nuclear Information System (INIS)

    Van Vleck, J.H.

    1978-01-01

    A translation is presented of J.H. van Vleck's lecture read at the 1977 Nobel Prize avarding ceremony. The basic results obtained using quantum mechanics in solving the problems of magnetism and especially paramagnetism are chronologically arranged. (Z.J.)

  3. Key Findings of AAP Store Survey

    Science.gov (United States)

    Melendes, Bob; And Others

    1977-01-01

    Results of the Association of American Publishers "College Bookstore Marketing Survey" in the fall of 1976 are summarized. The intent was to improve college textbook publisher services to college stores in the areas of order fulfillment, publication scheduling, print quantities, shipping, billing, and processing of returns. (LBH)

  4. Personality, a key factor in personalized medicine?

    NARCIS (Netherlands)

    Boersma, Gretha J.; Benthem, Lambertus; van Beek, Andre P.; van Dijk, Gertjan; Scheurink, Anton J. W.

    2011-01-01

    The incidence of health problems resulting from obesity is growing and obesity and its related diseases has become one of the main causes in death in industrialized societies. Environmental influences are crucial for the interactions between genetic, neurohormonal and metabolic factors that may be

  5. Cloud Feedback Key to Marine Heatwave off Baja California

    Science.gov (United States)

    Myers, Timothy A.; Mechoso, Carlos R.; Cesana, Gregory V.; DeFlorio, Michael J.; Waliser, Duane E.

    2018-05-01

    Between 2013 and 2015, the northeast Pacific Ocean experienced the warmest surface temperature anomalies in the modern observational record. This "marine heatwave" marked a shift of Pacific decadal variability to its warm phase and was linked to significant impacts on marine species as well as exceptionally arid conditions in western North America. Here we show that the subtropical signature of this warming, off Baja California, was associated with a record deficit in the spatial coverage of co-located marine boundary layer clouds. This deficit coincided with a large increase in downwelling solar radiation that dominated the anomalous energy budget of the upper ocean, resulting in record-breaking warm sea surface temperature anomalies. Our observation-based analysis suggests that a positive cloud-surface temperature feedback was key to the extreme intensity of the heatwave. The results demonstrate the extent to which boundary layer clouds can contribute to regional variations in climate.

  6. Stensund wastewater aquaculture. Studies of key factors for its optimization

    Energy Technology Data Exchange (ETDEWEB)

    Guterstam, B.; Forsberg, L.E. [Stensund Ecological Center, Stensunds Fold Center, S-61991 Trosa (Sweden); Buczynska, A. [Faculty of Process and Environmental Engineering, Technical University of Lodz, 175 Wolczanska strasse, PL-90942 Lodz (Poland); Frelek, K. [Department of Analytical Chemistry, Medical University of Gdansk, Al. Gen. J. Hallera 107, PL-80416 Gdansk (Poland); Pilkaityte, R. [Natural Science Faculty, University of Klaipeda, LT-5813 Klaipeda (Lithuania); Reczek, L. [Department of Water Supply and Sewage Systems, Warsaw Agricultural University, 166 Nowoursynowska strasse, PL-02787 Warsaw (Poland); Rucevska, I. [Latvian Environmental Data Center, Straumes 2, Jurmala LV 2015 (Latvia)

    1998-10-21

    This paper is a summary of an in-depth study of key factors in the function of a 7-year-old aquaculture system designed for treatment and recycling of domestic wastewater at Stensund, Trosa, Sweden. The reported areas are: wastewater flows, reduction of biochemical oxygen demand (BOD), chemical oxygen demand (COD), phosphorus, nitrogen, and fecal bacteria. Plant production is recorded as harvested biomass, and energy results are given as generated heat and electricity consumption. Special studies were conducted on the reduction of copper by anaerobic treatment. Nitrification was studied with different filter media. Microalgal autofocculation of phosphorus was studied in relation to pH and water hardness for the green algal genus Scenedesmus. Limiting factors for the growth of Daphnia magna in the zooplankton step of the constructed aquatic food-web was studied in a specially designed reproduction test. The results are analyzed in order to optimize the function of the wastewater aquaculture

  7. Precautionary allergen labelling: perspectives from key stakeholder groups

    DEFF Research Database (Denmark)

    DunnGalvin, A.; Chan, C. -H.; Crevel, R.

    2015-01-01

    to summarize the perspectives of all the key stakeholders (including clinicians, patients, food industry and regulators), with the aim of defining common health protection and risk minimization goals. The lack of agreed reference doses has resulted in inconsistent application of PAL by the food industry...... and in levels of contamination that prompt withdrawal action by enforcement officers. So there is a poor relationship between the presence or absence of PAL and actual reaction risk. This has led to a loss of trust in PAL, reducing the ability of consumers with food allergies to make informed choices....... The result has been reduced avoidance, reduced quality of life and increased risk-taking by consumers who often ignore PAL. All contributing stakeholders agree that PAL must reflect actual risk. PAL should be transparent and consistent with rules underpinning decision-making process being communicated...

  8. Integrated vehicle-based safety systems light-vehicle field operational test key findings report.

    Science.gov (United States)

    2011-01-01

    "This document presents key findings from the light-vehicle field operational test conducted as part of the Integrated Vehicle-Based Safety Systems program. These findings are the result of analyses performed by the University of Michigan Transportat...

  9. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  10. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  11. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  12. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  13. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  14. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  15. Key scientific problems from Cosmic Ray History

    Science.gov (United States)

    Lev, Dorman

    2016-07-01

    Recently was published the monograph "Cosmic Ray History" by Lev Dorman and Irina Dorman (Nova Publishers, New York). What learn us and what key scientific problems formulated the Cosmic Ray History? 1. As many great discoveries, the phenomenon of cosmic rays was discovered accidentally, during investigations that sought to answer another question: what are sources of air ionization? This problem became interesting for science about 230 years ago in the end of the 18th century, when physics met with a problem of leakage of electrical charge from very good isolated bodies. 2. At the beginning of the 20th century, in connection with the discovery of natural radioactivity, it became apparent that this problem is mainly solved: it was widely accepted that the main source of the air ionization were α, b, and γ - radiations from radioactive substances in the ground (γ-radiation was considered as the most important cause because α- and b-radiations are rapidly absorbed in the air). 3. The general accepted wrong opinion on the ground radioactivity as main source of air ionization, stopped German meteorologist Franz Linke to made correct conclusion on the basis of correct measurements. In fact, he made 12 balloon flights in 1900-1903 during his PhD studies at Berlin University, carrying an electroscope to a height of 5500 m. The PhD Thesis was not published, but in Thesis he concludes: "Were one to compare the presented values with those on ground, one must say that at 1000 m altitude the ionization is smaller than on the ground, between 1 and 3 km the same amount, and above it is larger with values increasing up to a factor of 4 (at 5500 m). The uncertainties in the observations only allow the conclusion that the reason for the ionization has to be found first in the Earth." Nobody later quoted Franz Linke and although he had made the right measurements, he had reached the wrong conclusions, and the discovery of CR became only later on about 10 years. 4. Victor Hess, a

  16. Key Issues in Global Technological Innovation Projects

    Directory of Open Access Journals (Sweden)

    Roberto Sbragia

    2012-04-01

    Full Text Available This article aimed to identify those issues that were present in global technological innovation projects carried out by Brazilian multinational companies and which performance criterions these undertakings met. We investigated 36 global technological innovation projects from Brazilian multinational enterprises through a web-survey. Findings show that these companies went beyond the traditional iron triangle to evaluate their technological efforts and considered additional performance dimensions such as customer satisfaction, business results, and preparation for the future. Results also show high degree of presence for issues emerging from the industry, moderate degree of presence for issues emerging from both the project and R&D activities, and low degree of presence for issues emerging from the headquarters, the subsidiaries, and the external environment. Further research is needed to find out if and how these issues influenced the performance of the global technological innovation projects studied.DOI:10.5585/gep.v3i1.72

  17. KEY PERFORMING FACTORS OF LEADING ROMANIAN COMPANIES

    OpenAIRE

    BURJA CAMELIA; BURJA VASILE

    2014-01-01

    The analysis of financial economic ratios provides managers and external partners feedback on the results obtained from operational activities and the associated performance and risks. This paper studies the functional dependence of the companies’ success (on performance) over internal financial management elements. The research was carried out for the most traded non-financial securities Bucharest listed companies and covers the period 2011- 2013. To carry out its purpose it a...

  18. Design alternatives, components key to optimum flares

    International Nuclear Information System (INIS)

    Cunha-Leite, O.

    1992-01-01

    A properly designed flare works as an emissions control system with greater than 98% combustion efficiency. The appropriate use of steam, natural gas, and air-assisted flare tips can result in smokeless combustion. Ground flare, otherwise the elevated flare is commonly chosen because it handles larger flow releases more economically. Flaring has become more complicated than just lighting up waste gas. Companies are increasingly concerned about efficiency. In addition, U.S. Occupational Safety and Health Administration (OSHA) and U.S. Environmental Protection Agency (EPA) have become more active, resulting in tighter regulations on both safety and emissions control. These regulations have resulted in higher levels of concern and involvement in safety and emissions matters, not to mention smoke, noise, glare, and odor. This first to two articles on flare design and components looks at elevated flares, flare tips, incinerator-type flares, flare pilots, and gas seals. Part 2 will examine knockout drums, liquid-seal drums, ignition systems, ground flares, vapor recovery systems, and flare noise

  19. Optimal energy management of urban rail systems: Key performance indicators

    International Nuclear Information System (INIS)

    González-Gil, A.; Palacin, R.; Batty, P.

    2015-01-01

    Highlights: • An overall picture of urban rail energy use is provided. • Performance indicators are developed for urban rail system energy optimisation. • A multi-level methodology for assessing energy efficiency measures is presented. - Abstract: Urban rail systems are facing increasing pressure to minimise their energy consumption and thusly reduce their operational costs and environmental impact. However, given the complexity of such systems, this can only be effectively achieved through a holistic approach which considers the numerous interdependences between subsystems (i.e. vehicles, operations and infrastructure). Such an approach requires a comprehensive set of energy consumption-related Key Performance Indicators (KEPIs) that enable: a multilevel analysis of the actual energy performance of the system; an assessment of potential energy saving strategies; and the monitoring of the results of implemented measures. This paper proposes an original, complete list of KEPIs developed through a scientific approach validated by different stakeholders. It consists of a hierarchical list of 22 indicators divided into two levels: 10 key performance indicators, to ascertain the performance of the whole system and complete subsystems; and 12 performance indicators, to evaluate the performance of single units within subsystems, for example, a single rail vehicle or station. Additionally, the paper gives a brief insight into urban rail energy usage by providing an adequate context in which to understand the proposed KEPIs, together with a methodology describing their application when optimising the energy consumption of urban rail systems

  20. Curated Collections for Educators: Five Key Papers about Program Evaluation.

    Science.gov (United States)

    Thoma, Brent; Gottlieb, Michael; Boysen-Osborn, Megan; King, Andrew; Quinn, Antonia; Krzyzaniak, Sara; Pineda, Nicolas; Yarris, Lalena M; Chan, Teresa

    2017-05-04

    The evaluation of educational programs has become an expected part of medical education. At some point, all medical educators will need to critically evaluate the programs that they deliver. However, the evaluation of educational programs requires a very different skillset than teaching. In this article, we aim to identify and summarize key papers that would be helpful for faculty members interested in exploring program evaluation. In November of 2016, the 2015-2016 Academic life in emergency medicine (ALiEM) Faculty Incubator program highlighted key papers in a discussion of program evaluation. This list of papers was augmented with suggestions by guest experts and by an open call on Twitter. This resulted in a list of 30 papers on program evaluation. Our authorship group then engaged in a process akin to a Delphi study to build consensus on the most important papers about program evaluation for medical education faculty. We present our group's top five most highly rated papers on program evaluation. We also summarize these papers with respect to their relevance to junior medical education faculty members and faculty developers. Program evaluation is challenging. The described papers will be informative for junior faculty members as they aim to design literature-informed evaluations for their educational programs.