WorldWideScience

Sample records for key resources sector-specific

  1. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  2. Agriculture and Food: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    sliced egg sand- wich (closed-faced), frozen fish dinner, rabbit stew, shrimp-flavored instant noodles , venison jerky, buffalo burgers, alligator...meat or 2% or more poultry (e.g., chicken noodle ) Other products Cheese, onion, mushroom pizza; spaghetti sauces (less than 3% red meat), spaghetti...sauce with mushrooms and 2% meat, pork and beans, sliced egg sandwich (closed-faced), frozen fish dinner, rabbit stew, shrimp-flavored instant

  3. Water: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    National Association of Clean Water Agencies Shelly Foston Meridian Institute Michael Gritzuk Pima County (AZ) Wastewater Management Department Genevieve...agencies to assist small and medium systems, and it has helped fund and develop a variety of Web casts and security trainings. Although drinking water...warning systems and consequence man - agement planning. • Water Laboratory Alliance (WLA). EPA will fulfill its requirement under HSPD-9 to enhance the

  4. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...techniques—Information security management systems • ISO /IEC 13335, Information technology—Security tech- niques—Management of information and

  5. Transportation Systems: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    partners will be encouraged to use the assessment methodologies referenced above, or ISO 27001 and ISO 17799, which are intended to be used together...the Information Systems Audit and Control Association (ISACA), the International Organization for Standardization ( ISO ), and a number of other...programs are aligned with NCSD’s goals for the IT sector and follow best practices developed by NIST and the ISO . The cyber protective programs

  6. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  7. Sector-specific human capital and the distribution of earnings

    OpenAIRE

    Eric Smith

    2009-01-01

    This paper incorporates assignment frictions and sector-specific training into the Roy model of occupational choice. Assignment frictions represent the extent of the market whereas differences in sector-specific training reflect worker specialization. This framework thus captures Adam Smith's idea that the extent of the market determines the division of labor. The paper demonstrates the way in which the relationship between assignment frictions and specialization affects the level and composi...

  8. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  9. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  10. Knowledge Management – the Key Resource in the Knowledge Economy

    Directory of Open Access Journals (Sweden)

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  11. Key challenges of human resources for health in India

    Directory of Open Access Journals (Sweden)

    Priya Sinha

    2016-01-01

    Full Text Available Background and Objective Since independence the efforts have been to strengthen the health infrastructure, its accessibility and coverage. The human resources for health have been an important determinant for system but it has received significance recently. Even government expenditure on health has remained at not more than 1% of Gross Domestic Product which is very less as compared to world standard. Now the biggest challenge is the shortage of skilled human resource for health at all levels in the healthcare delivery system. The article aimed at understanding the current status of human resources for health and initiatives adopted to deal with existing shortage and to highlight factors leading to further shortage and to bring to notice the use of talent management strategy as a retention tool. Review Methodology The review used descriptive research design using secondary sources from journals-articles using key words. The study also used exclusion and inclusion criteria to select the articles. The study was done using extensive review of literature on health sector, health workforce, its availability and scarcity due to attrition/emigration in India. The critical review helped in setting objective for the study. Findings The review of articles provided insight into the current status of health workforce in India. The earlier studies emphasized that gap between demand and supply of human resource for health is mainly due to increasing population and burden of diseases. Studies have now identified other factors leading to further shortage as attrition/emigration of skilled health workforce. Most of the initiatives are mainly directed towards increasing supply of human resources for health to deal with the scarcity and less emphasis to control attrition. Few studies highlighted the use of talent management strategy to deal with the challenges of attrition and emigration that helps in retention and controlling further shortage. Recommendations

  12. The core business web a guide to key information resources

    CERN Document Server

    White, Gary W

    2013-01-01

    The best Business Web sites at your fingertips—24/7! The Core Business Web: A Guide to Key Information Resources is an essential resource that saves you from spending hours searching through thousands of Web sites for the business information you need. A distinguished panel of authors, all active in business librarianship, explores Web sites in their subject areas, selecting the very best from 25 functional areas of business. Each site was chosen based on the timeliness, relevance and reliability of its content, the site's ease of navigation and use, and the authority of the site's author or publisher. The rapid growth of the Internet has resulted in an ever-increasing number of Web sites offering potentially useful business information. The Core Business Web identifies, evaluates, and summarizes the most significant sites, including gateways or portals, directories, and meta-sites, to organize online resources into easy-to-follow links that allow you to access information quickly. Sites are categorized and ...

  13. Sector specific features of innovative development in the Russian economy

    Directory of Open Access Journals (Sweden)

    Krasyuk I.A.

    2017-01-01

    Full Text Available The present-day development of the Russian Federation is mostly shaped by the innovative development capacity of the national economy. Industry forms the core of such development. The paper presents the study of the current state of the innovative development in industry being the source of the basic innovations, as well as identifies the limitation factors. The authors have found out that low innovative activity of the industrial enterprises holds back the implementation of innovations in the related sectors, for instance, trade. It has also been found out that the course of the innovative development in the field of trade is also shaped by the sector-specific factors, which should be considered to adjust the innovation policy of a trading enterprise.

  14. Key Update Assistant for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2012-01-01

    developed a push-button solution - powered by stochastic model checking - that network designers can easily benefit from, and it paves the way for consumers to set up key update related security parameters. Key Update Assistant, as we named it, runs necessary model checking operations and determines...

  15. Key challenges facing water resource management in South Africa

    CSIR Research Space (South Africa)

    Ashton, P

    2008-11-01

    Full Text Available Resource Managers The Dichotomy of Water Source of destruction, dispute and poverty • Drought and desertification • Flooding and erosion • Salinization • Malnutrition and starvation • Contamination • Epidemics and diseases • Dispute...

  16. Key challenges of human resources for health in India

    OpenAIRE

    Priya Sinha

    2016-01-01

    Background and Objective Since independence the efforts have been to strengthen the health infrastructure, its accessibility and coverage. The human resources for health have been an important determinant for system but it has received significance recently. Even government expenditure on health has remained at not more than 1% of Gross Domestic Product which is very less as compared to world standard. Now the biggest challenge is the shortage of skilled human resource for health at all le...

  17. Key Lake human resources and northern business initiative

    International Nuclear Information System (INIS)

    Dudar, R.; McIntyre, J.; McInnes, B.P.

    1994-01-01

    The Key Lake Operation is committed to a policy of maximizing Saskatchewan, and particularly northern Saskatchewan, employment and business opportunities. The participation rate of northern people in the Key Lake operation's workforce has risen from 23.8% in 1983, to 42% today. Cameco's objective is to achieve 50% representation of residents of Saskatchewan's north in the Key Lake workforce by 1995. The company also extends this strategic objective to contractors. All contractors are required to maximize employment opportunities for residents of Saskatchewan's north, and report employment levels to the company as a condition of the contract. Today, contractors at the Key Lake site have achieved a northern participation rate of 47%. This paper highlights strategies for increasing northern/aboriginal participation and provides several examples of successes from these initiatives. (author)

  18. Resource management as a key factor for sustainable urban planning

    NARCIS (Netherlands)

    Agudelo Vera, C.M.; Mels, A.R.; Keesman, K.J.; Rijnaarts, H.H.M.

    2011-01-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable

  19. Resource management as a key factor for sustainable urban planning.

    Science.gov (United States)

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration. Copyright © 2011 Elsevier Ltd. All rights reserved.

  20. Human resource leadership: the key to improved results in health

    Directory of Open Access Journals (Sweden)

    O'Neil Mary L

    2008-06-01

    Full Text Available Abstract This article is the lead article in the Human Resources for Health journal's first quarterly feature. The series of seven articles has been contributed by Management Sciences for Health (MSH under the theme of leadership and management in public health and will be published article by article over the next few weeks. The journal has invited Dr Manuel M. Dayrit, Director of the WHO Department of Human Resources for Health and former Minister of Health for the Philippines to launch the feature with an opening editorial to be found in the journal's blog. This opening article describes the human resource challenges that managers around the world report and analyses why solutions often fail to be implemented. Despite rising attention to the acute shortage of health care workers, solutions to the human resource (HR crisis are difficult to achieve, especially in the poorest countries. Although we are aware of the issues and have developed HR strategies, the problem is that some old systems of leading and managing human resources for health do not work in today's context. The Leadership Development Program (LDP is grounded on the belief that good leadership and management can be learned and practiced at all levels. The case studies in this issue were chosen to illustrate results from using the LDP at different levels of the health sector. The LDP makes a profound difference in health managers' attitudes towards their work. Rather than feeling defeated by a workplace climate that lacks motivation, hope, and commitment to change, people report that they are mobilized to take action to change the status quo. The lesson is that without this capacity at all levels, global policy and national HR strategies will fail to make a difference.

  1. Key Determinants of Human Resource Management in Hospitals: Stakeholder Perspective

    Directory of Open Access Journals (Sweden)

    Buchelt Beata Irma

    2017-06-01

    Full Text Available Over the past decade, theoretical and empirical research on the various aspects of human resources (HR within the healthcare (HC sector has grown extensively due to its′ strategic importance in the sector. There is a visible tendency among researchers to pursue an effective human resource management (HRM strategies, methods, and tools. Countries implement policies which should increase the amount and competences of employees within healthcare. Providers of HC services (i.e. hospitals tend to enforce modern HRM solutions adapted from business organisations to attract, retain and develop HR. However, these seem not be as effective as they could (Hyde et al., 2013. Because of this, authors approached a researched reality from the point of view of a contextual paradigm, assuming that HRM solutions to be effective should match the reality of HC providers (Pocztowski, 2008. The aim of the research was to detect determinants which might influence the management of medical personnel in hospitals and identify the possible strength of these determinants so a more adjusted organisational and human resource management strategy could be elaborated. The list of possible determinants of hospital operations as the result of meta-analysis was elaborated. The list created the basis for interviews conducted among stakeholders and experts. Respondents were asked to appraise the factors with the usage of numerical scale considering their influence on medical personnel management in hospitals (physicians, nurses and others. In total, there were 28 interviews completed. The general conclusion which can be drawn from the analysis of these data is that hospitals should reorient their HRM practices in such the way that not only the quantitative but also the qualitative aspect of performance would be properly handled. This paper draws from HRM theory (contextual approach, stakeholder theory, and healthcare management theory, adding new insight to each in the context of

  2. Big Biomedical data as the key resource for discovery science

    Energy Technology Data Exchange (ETDEWEB)

    Toga, Arthur W.; Foster, Ian; Kesselman, Carl; Madduri, Ravi; Chard, Kyle; Deutsch, Eric W.; Price, Nathan D.; Glusman, Gustavo; Heavner, Benjamin D.; Dinov, Ivo D.; Ames, Joseph; Van Horn, John; Kramer, Roger; Hood, Leroy

    2015-07-21

    Modern biomedical data collection is generating exponentially more data in a multitude of formats. This flood of complex data poses significant opportunities to discover and understand the critical interplay among such diverse domains as genomics, proteomics, metabolomics, and phenomics, including imaging, biometrics, and clinical data. The Big Data for Discovery Science Center is taking an “-ome to home” approach to discover linkages between these disparate data sources by mining existing databases of proteomic and genomic data, brain images, and clinical assessments. In support of this work, the authors developed new technological capabilities that make it easy for researchers to manage, aggregate, manipulate, integrate, and model large amounts of distributed data. Guided by biological domain expertise, the Center’s computational resources and software will reveal relationships and patterns, aiding researchers in identifying biomarkers for the most confounding conditions and diseases, such as Parkinson’s and Alzheimer’s.

  3. Big biomedical data as the key resource for discovery science.

    Science.gov (United States)

    Toga, Arthur W; Foster, Ian; Kesselman, Carl; Madduri, Ravi; Chard, Kyle; Deutsch, Eric W; Price, Nathan D; Glusman, Gustavo; Heavner, Benjamin D; Dinov, Ivo D; Ames, Joseph; Van Horn, John; Kramer, Roger; Hood, Leroy

    2015-11-01

    Modern biomedical data collection is generating exponentially more data in a multitude of formats. This flood of complex data poses significant opportunities to discover and understand the critical interplay among such diverse domains as genomics, proteomics, metabolomics, and phenomics, including imaging, biometrics, and clinical data. The Big Data for Discovery Science Center is taking an "-ome to home" approach to discover linkages between these disparate data sources by mining existing databases of proteomic and genomic data, brain images, and clinical assessments. In support of this work, the authors developed new technological capabilities that make it easy for researchers to manage, aggregate, manipulate, integrate, and model large amounts of distributed data. Guided by biological domain expertise, the Center's computational resources and software will reveal relationships and patterns, aiding researchers in identifying biomarkers for the most confounding conditions and diseases, such as Parkinson's and Alzheimer's. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Resilience Analysis of Key Update Strategies for Resource-Constrained Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys – which we refer to as key update – is a criti...

  5. Resources for our Future. Key issues and best practices in resource efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Weterings, R.; Bastein, T.; Tukker, A. [TNO, Delft (Netherlands); Rademaker, M.; De Ridder, M. [The Hague Centre for Strategic studies HCSS, Den Haag (Netherlands)

    2013-08-15

    This book provides an analysis of the issues surrounding international resources and inspiring accounts of industrial best practices. The book consists of two distinct parts. The first part of the book brings together the results of years of research into the geopolitical, economic and ecological dimensions of material scarcity and resource efficiency. Chapter 2 discusses the main challenges and constraints related to the use of energy resources, water and land, industrial and metallic minerals, construction minerals and biotic resources, including water use and ecosystem degradation. The chapter also addresses important linkages between these various resources. Chapter 3 describes the international trends that are shaping the geopolitics of natural resources and looks at the implications for Europe and the Netherlands. Chapter 4 presents a wide range of strategies by which governments, producers and consumers may contribute to the more sustainable use of natural resources. The second part of the book describes 21 inspiring best practices in resource efficiency in a variety of industrial sectors. Based on a series of interviews with industrial pioneers, these chapters relate their first-hand experiences in improving resource efficiency. These business cases demonstrate that innovation and entrepreneurship can result in substantial improvements in resource efficiency. Chapter 5 focuses on best practices in the built environment, where substantial amounts of energy and minerals are used. Chapter 6 presents four ambitious strategies to promote sustainable food production and consumption. Chapter 7 describes recent developments in the chemical process industry, which produces most of the ingredients, compounds and semi-products for the vast range of products used by society. Chapter 8 provides four examples of the state-of-the-art in resource efficiency in the metal and high-tech industries. This chapter presents four business cases highlighting the benefits of the

  6. Agri-Environmental Resource Management by Large-Scale Collective Action: Determining KEY Success Factors

    Science.gov (United States)

    Uetake, Tetsuya

    2015-01-01

    Purpose: Large-scale collective action is necessary when managing agricultural natural resources such as biodiversity and water quality. This paper determines the key factors to the success of such action. Design/Methodology/Approach: This paper analyses four large-scale collective actions used to manage agri-environmental resources in Canada and…

  7. [Key content and formulation of national Chinese materia medica resources survey at county level].

    Science.gov (United States)

    Lu, Jian-Wei; Zhang, Xiao-Bo; Li, Hai-Tao; Guo, Lan-Ping; Zhao, Run-Huai; Zhang, Ben-Gang; Sun, Li-Ying; Huang, Lu-Qi

    2013-08-01

    According to National Census for Water, National Population Census, National Land and Resources Survey, and work experience of experimental measures for national Chinese materia medica resources(CMMR) survey,the national CMMR survey at the county level is the key point of whole survey, that includes organization and management, field survey, sorting data three key links. Organization and management works of national CMMR survey needs to finish four key contents, there are definite goals and tasks, practicable crew, preparation directory, and security assurance. Field survey works of the national CMMR survey needs to finish five key contents, there are preparation works for field survey, the choice of the key survey area (samples), fill in the questionnaire, video data collection, specimen and other physical collection. Sorting data works of the national CMMR survey needs to finish tree key contents, there are data, specimen and census results.

  8. SECTOR-SPECIFIC STRUCTURE OF THE REGIONAL ECONOMY AS A FACTOR OF ELEVATION OF RISKS TO ITS ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Rostislav BILYK

    2016-07-01

    Full Text Available The article analyzes a sector-specific specialization of the regional economy in Ukraine. It also reveals possibility and conditions of transformation of a sector-specific specialization of the region and risks to its economic security. The article suggests an assessment of influence of a sector-specific specialization on occurrence of threats to the economic security of the region.

  9. Strategy and implementation of resources control of key equipments in nuclear power plant

    International Nuclear Information System (INIS)

    Zha Qing

    2014-01-01

    The strategic resources of the construction of nuclear power plant, which include the main equipment of nuclear island, heavy forgings, the bottleneck equipment and strategic materials, is one of the key issues in the construction of nuclear power projects. The control of these strategic resources has become the focus of competition in industry and the major nuclear power groups are willing to fight for this huge advantages. The resource control strategies of key equipment of nuclear power projects are analyzed in this paper. This paper put forward specific measures and methods for the strategic resources control. By the application to a plurality of nuclear power engineering construction projects, these specific measures and methods achieved good results and will be with important guidance and reference for the construction of future nuclear power projects in China. (author)

  10. On System Engineering a Barter-Based Re-allocation of Space System Key Development Resources

    Science.gov (United States)

    Kosmann, William J.

    NASA has had a decades-long problem with cost growth during the development of space science missions. Numerous agency-sponsored studies have produced average mission level development cost growths ranging from 23 to 77%. A new study of 26 historical NASA science instrument set developments using expert judgment to re-allocate key development resources has an average cost growth of 73.77%. Twice in history, during the Cassini and EOS-Terra science instrument developments, a barter-based mechanism has been used to re-allocate key development resources. The mean instrument set development cost growth was -1.55%. Performing a bivariate inference on the means of these two distributions, there is statistical evidence to support the claim that using a barter-based mechanism to re-allocate key instrument development resources will result in a lower expected cost growth than using the expert judgment approach. Agent-based discrete event simulation is the natural way to model a trade environment. A NetLogo agent-based barter-based simulation of science instrument development was created. The agent-based model was validated against the Cassini historical example, as the starting and ending instrument development conditions are available. The resulting validated agent-based barter-based science instrument resource re-allocation simulation was used to perform 300 instrument development simulations, using barter to re-allocate development resources. The mean cost growth was -3.365%. A bivariate inference on the means was performed to determine that additional significant statistical evidence exists to support a claim that using barter-based resource re-allocation will result in lower expected cost growth, with respect to the historical expert judgment approach. Barter-based key development resource re-allocation should work on science spacecraft development as well as it has worked on science instrument development. A new study of 28 historical NASA science spacecraft

  11. Key Resources for Creating Online Nutrition Education for Those Participating in Supplemental Nutrition Assistance Program Education

    Science.gov (United States)

    Stosich, Marie C.; LeBlanc, Heidi; Kudin, Janette S.; Christofferson, Debra

    2016-01-01

    Internet-based nutrition education is becoming an important tool in serving the rural, low-income community, yet the task of creating such programming can be daunting. The authors describe the key resources used in developing an Internet-based nutrition education program for those participating in Supplemental Nutrition Assistance Program…

  12. [Essential procedure and key methods for survey of traditional knowledge related to Chinese materia medica resources].

    Science.gov (United States)

    Cheng, Gong; Huang, Lu-qi; Xue, Da-yuan; Zhang, Xiao-bo

    2014-12-01

    The survey of traditional knowledge related to Chinese materia medica resources is the important component and one of the innovative aspects of the fourth national survey of the Chinese materia medica resources. China has rich traditional knowledge of traditional Chinese medicine (TCM) and the comprehensive investigation of TCM traditional knowledge aims to promote conservation and sustainable use of Chinese materia medica resources. Building upon the field work of pilot investigations, this paper introduces the essential procedures and key methods for conducting the survey of traditional knowledge related to Chinese materia medica resources. The essential procedures are as follows. First is the preparation phrase. It is important to review all relevant literature and provide training to the survey teams so that they have clear understanding of the concept of traditional knowledge and master key survey methods. Second is the field investigation phrase. When conducting field investigations, survey teams should identify the traditional knowledge holders by using the 'snowball method', record the traditional knowledge after obtaining prior informed concerned from the traditional knowledge holders. Researchers should fill out the survey forms provided by the Technical Specification of the Fourth National Survey of Chinese Materia Medica Resources. Researchers should pay particular attention to the scope of traditional knowledge and the method of inheriting the knowledge, which are the key information for traditional knowledge holders and potential users to reach mutual agreed terms to achieve benefit sharing. Third is the data compilation and analysis phrase. Researchers should try to compile and edit the TCM traditional knowledge in accordance with intellectual property rights requirements so that the information collected through the national survey can serve as the basic data for the TCM traditional knowledge database. The key methods of the survey include regional

  13. Mobility and Sector-specific Effects of Changes in Multiple Sources ...

    African Journals Online (AJOL)

    Using the second and third Cameroon household consumption surveys, this study examined mobility and sector-specific effects of changes in multiple sources of deprivation in Cameroon. Results indicated that between 2001 and 2007, deprivations associated with human capital and labour capital reduced, while ...

  14. Resource Efficiency. Economics and Outlook for Asia and the Pacific. Key Messages and Highlights

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-09-15

    The key messages are: Global sustainability depends on the creation and implementation of effective policies to support the dynamic Asia-Pacific region to transition to a new sustainable industrial system; This will be instrumental to deal with the dual objectives of increasing the material standard of living of people and reducing poverty, to ensure the integrity of resources and the environment; Resource efficient infrastructure associated with transport, energy and housing is critical, and massive amounts of new infrastructure are currently being planned. There is a twenty to thirty year window of opportunity for this transformation; The challenge for public policy is to achieve a sustainability transition, enabled by resource efficiency and systems innovation despite the inherent growth dynamic of the industrial transformation. What is required is a new 'industrial revolution' that provides food, housing, mobility, energy, and water with only about 20% of the per-capita resource use and emissions found in current systems.

  15. Key issues for determining the exploitable water resources in a Mediterranean river basin.

    Science.gov (United States)

    Pedro-Monzonís, María; Ferrer, Javier; Solera, Abel; Estrela, Teodoro; Paredes-Arquiola, Javier

    2015-01-15

    One of the major difficulties in water planning is to determine the water availability in a water resource system in order to distribute water sustainably. In this paper, we analyze the key issues for determining the exploitable water resources as an indicator of water availability in a Mediterranean river basin. Historically, these territories are characterized by heavily regulated water resources and the extensive use of unconventional resources (desalination and wastewater reuse); hence, emulating the hydrological cycle is not enough. This analysis considers the Jucar River Basin as a case study. We have analyzed the different possible combinations between the streamflow time series, the length of the simulation period and the reliability criteria. As expected, the results show a wide dispersion, proving the great influence of the reliability criteria used for the quantification and localization of the exploitable water resources in the system. Therefore, it is considered risky to provide a single value to represent the water availability in the Jucar water resource system. In this sense, it is necessary that policymakers and stakeholders make a decision about the methodology used to determine the exploitable water resources in a river basin. Copyright © 2014 Elsevier B.V. All rights reserved.

  16. Key skills by design: adapting a central Web resource to departmental contexts

    Directory of Open Access Journals (Sweden)

    Claire McAvinia

    2002-12-01

    Full Text Available Web-based delivery of support materials for students has proved to be a popular way of helping small teams to implement key skills policies within universities. The development of 'key' or 'transferable' skills is now encouraged throughout education, but resources (both in terms of staffing and budget tend to be limited. It is difficult for key skills teams to see learners face to face, and not feasible to print or distribute large amounts of paper-based material. Web-based delivery presents a means of overcoming these problems but it can result in generic study skills material simply being published online without due consideration of the needs of different groups of learners within different subject disciplines. Therefore, although a centralized Website for skills provision can overcome logistical problems, it may be perceived as irrelevant or unusable by the student population. This paper presents a model for Web-based delivery of support for key skills which incorporates two separate approaches to the design of these resources. The model was implemented as part of a wider key skills pilot project at University College London, over a period of one year. It includes a 'core' Website, containing information and resources for staff and students. These can also be accessed via customized, departmental key skills homepages. This paper presents the basis for the design choices made in preparing these materials, and the evaluation of some of the pilot departments using them. It then draws some wider conclusions about the effectiveness of this design for supporting skills development.

  17. Human resource development – A key factor for the sustainable development of Albania

    Directory of Open Access Journals (Sweden)

    Perlat Lame

    2004-01-01

    Full Text Available This article deals with the current situation of labor resources in Albania and its trends from the viewpoint of their contributions to the overall country progress. A real partnership between business and public institutions, the efforts to formalize the economy, to promote discipline and better application of international standards are considered key issues for the future country developments. The effective management of human resources and coordination could not be reached without profound structural and economic reforms, without free entrepreneurship initiative encouragement, and without mutual confidence between the employers and the employees.

  18. Quantum key distribution with finite resources: Smooth Min entropy vs. Smooth Renyi entropy

    Energy Technology Data Exchange (ETDEWEB)

    Mertz, Markus; Abruzzo, Silvestre; Bratzik, Sylvia; Kampermann, Hermann; Bruss, Dagmar [Institut fuer Theoretische Physik III, Duesseldorf (Germany)

    2010-07-01

    We consider different entropy measures that play an important role in the analysis of the security of QKD with finite resources. The smooth min entropy leads to an optimal bound for the length of a secure key. Another bound on the secure key length was derived by using Renyi entropies. Unfortunately, it is very hard or even impossible to calculate these entropies for realistic QKD scenarios. To estimate the security rate it becomes important to find computable bounds on these entropies. Here, we compare a lower bound for the smooth min entropy with a bound using Renyi entropies. We compare these entropies for the six-state protocol with symmetric attacks.

  19. Water resources and environmental input-output analysis and its key study issues: a review

    Science.gov (United States)

    YANG, Z.; Xu, X.

    2013-12-01

    Used to study the material and energy flow in socioeconomic system, Input-Output Analysis(IOA) had been an effective analysis tool since its appearance. The research fields of Input-Output Analysis were increasingly expanded and studied in depth with the development of fundamental theory. In this paper, starting with introduction of theory development, the water resources input-output analysis and environmental input-output analysis had been specifically reviewed, and two key study issues mentioned as well. Input-Occupancy-Output Analysis and Grey Input-Output Analysis whose proposal and development were introduced firstly could be regard as the effective complements of traditional IOA theory. Because of the hypotheses of homogeneity, stability and proportionality, Input-Occupancy-Output Analysis and Grey Input-Output Analysis always had been restricted in practical application inevitably. In the applied study aspect, with investigation of abundant literatures, research of water resources input-output analysis and environmental input-output analysis had been comprehensively reviewed and analyzed. The regional water resources flow between different economic sectors had been systematically analyzed and stated, and several types of environmental input-output analysis models combined with other effective analysis tools concluded. In two perspectives in terms of external and inland aspect, the development of water resources and environmental input-output analysis model had been explained, and several typical study cases in recent years listed respectively. By the aid of sufficient literature analysis, the internal development tendency and study hotspot had also been summarized. In recent years, Chinese literatures reporting water resources consumption analysis and virtue water study had occupied a large share. Water resources consumption analysis had always been the emphasis of inland water resources IOA. Virtue water study had been considered as the new hotspot of

  20. Hysteresis in unemployment: evidence from sector-specific unemployment in Turkey

    OpenAIRE

    Barışık, Salih; Cevik, Emrah Ismail

    2009-01-01

    High levels of inflation and unemployment have been experienced together in the world after 1970’s. Efforts of decreasing inflation have been achieved in the world after 1990’s. The fact that there has been no evidence the unemployment rate beginning to decrease despite the increasing growth rates in the USA and Europe countries recalls hysteresis effect. This phenomenon observed in Turkey after 1994 and 2001 crises. This paper examines hysteresis effect in sector-specific unemployment in Tur...

  1. Key challenges for the creation and maintenance of specialist protein resources

    Science.gov (United States)

    Holliday, Gemma L; Bairoch, Amos; Bagos, Pantelis G; Chatonnet, Arnaud; Craik, David J; Finn, Robert D; Henrissat, Bernard; Landsman, David; Manning, Gerard; Nagano, Nozomi; O’Donovan, Claire; Pruitt, Kim D; Rawlings, Neil D; Saier, Milton; Sowdhamini, Ramanathan; Spedding, Michael; Srinivasan, Narayanaswamy; Vriend, Gert; Babbitt, Patricia C; Bateman, Alex

    2015-01-01

    As the volume of data relating to proteins increases, researchers rely more and more on the analysis of published data, thus increasing the importance of good access to these data that vary from the supplemental material of individual articles, all the way to major reference databases with professional staff and long-term funding. Specialist protein resources fill an important middle ground, providing interactive web interfaces to their databases for a focused topic or family of proteins, using specialized approaches that are not feasible in the major reference databases. Many are labors of love, run by a single lab with little or no dedicated funding and there are many challenges to building and maintaining them. This perspective arose from a meeting of several specialist protein resources and major reference databases held at the Wellcome Trust Genome Campus (Cambridge, UK) on August 11 and 12, 2014. During this meeting some common key challenges involved in creating and maintaining such resources were discussed, along with various approaches to address them. In laying out these challenges, we aim to inform users about how these issues impact our resources and illustrate ways in which our working together could enhance their accuracy, currency, and overall value. Proteins 2015; 83:1005–1013. © 2015 The Authors. Proteins: Structure, Function, and Bioinformatics Published by Wiley Periodicals, Inc. PMID:25820941

  2. Key factors in the successful implementation of enterprise resource planning system

    Directory of Open Access Journals (Sweden)

    Farajollah Rahnavard

    2014-04-01

    Full Text Available Enterprise Resource Planning Systems (ERP are considered as the newest and most effective tools of enterprise resource planning and include an interconnected information, management and engineering system that meets all the needs of an organization. ERP implementation is costly and time-consuming and makes fundamental change in the process, if not implemented correctly it will cause challenges in most parts of the organization and will certainly fail. Therefore, the identification of key success factors in implementing ERP helps organizations avoid the loss of the project. This research aims to identify key success factors for ERP by examining 185 managers, professionals, experts of the Information and Communication Technology Institute associated with the Ministry of Communications and Information Technology of Iran. A questionnaire was used to collect data. Findings from exploratory factor analysis indicate that five factors: 1 user friendliness, flexible and consistency 2 establishment of project management; 3 alignment with user needs; 4 Management of organizational changes, and 5 observing the principles of successful implementation of ERP affect the institute and the corresponding suggestions are proposed consistent with these findings.

  3. Key issues in human resource planning for home support workers in Canada.

    Science.gov (United States)

    Keefe, Janice M; Knight, Lucy; Martin-Matthews, Anne; Légaré, Jacques

    2011-01-01

    This paper is a synthesis of research on recruitment and retention challenges for home support workers (HSWs) in Canada. Home support workers (HSWs) provide needed support with personal care and daily activities to older persons living in the community. Literature (peer reviewed, government, and non-government documents) published in the past decade was collected from systematic data base searches between January and September 2009, and yielded over 100 references relevant to home care human resources for older Canadians. Four key human resource issues affecting HSWs were identified: compensation, education and training, quality assurance, and working conditions. To increase the workforce and retain skilled employees, employers can tailor their marketing strategies to specific groups, make improvements in work environment, and learn about what workers value and what attracts them to home support work. Understanding these HR issues for HSWs will improve recruitment and retention strategies for this workforce by helping agencies to target their limited resources. Given the projected increase in demand for these workers, preparations need to begin now and consider long-term strategies involving multiple policy areas, such as health and social care, employment, education, and immigration.

  4. Climate change effects on central New Mexico's land use, transportation system and key natural resources : task 1.1 memo.

    Science.gov (United States)

    2014-12-01

    This report summarizes potential climate change effects on the availability of water, land use, transportation infrastructure, and key natural resources in central New Mexico. This work is being done as part of the Interagency Transportation, Land Us...

  5. The sustainable use of tropical coastal resources - A key conservation issue

    Energy Technology Data Exchange (ETDEWEB)

    Holdgate, M W [IUCN-World Conservation Union, Gland (Switzerland)

    1993-01-01

    The three papers covered in this review form a series, addressing broadly the same issues in increasing detail. The paper by Carl Gustaf Lundin and Olof Linden, on 'Coastal ecosystems: Attempts to manage a threatened resource', takes a wide view of the coastal zones (the regions between the seaward margins of the continental shelves, in water depths of around 200 m and the landward edge of the coastal plains at a comparable altitude above mean sea level), and the nature of the pressures upon them. The paper by Magnus A.K. Ngoile and Chris J. Horrill, on 'Coastal ecosystems productivity and ecosystem protection: Coastal ecosystem management', focuses very much on these same issues of use and pressure in the Eastern Africa Region. The paper by M.C.Oehman, A. Rajasuriya and O. Linden, on 'Human disturbances on coral reefs in Sri Lanka: A case study' looks in some depth at the situation on three selected reef systems in the one country. All the papers address the key question of how the management of coastal resources should change, in order to avoid continuing degradation and the cost and impoverishment it is likely to bring. The three papers mentioned is published in this issue of Ambio, p. 461-480

  6. Materials in world perspective. Assessment of resources, technologies and trends for key materials industries

    Energy Technology Data Exchange (ETDEWEB)

    Altenpohl, D G

    1980-01-01

    This book deals with the entire materials cycle - from extraction or harvesting to processing, manufacture, use, and reuse or disposal. It covers the present status and ongoing developments in six key materials industries in both industrialized and developing countries. Techno-economics trends, which are recognizable today, as well as important changes taking place from the mine through the refining stage on to finished products, are outlined. The 'problem triangle' of the materials industry - basic or raw materials, ecology and energy - is discussed. Of specific importance are the impacts which a given material or technology can have on the environment. Methods of assessing these impacts, which should be integrated into overall technology planning by the materials industry, are described. This book discusses resources, industry's social responsibilities and limits-to-growth. An explanation is given for opposing views on constraints and growth, not only for the materials industry, but also for the automotive and packaging industries. Thus, this book spotlights the interaction between different fields of technology and their interrelationship with and between different regions on Earth.

  7. Analyzing the Long Term Cohesive Effect of Sector Specific Driving Forces.

    Directory of Open Access Journals (Sweden)

    Yonatan Berman

    Full Text Available Financial markets are partially composed of sectors dominated by external driving forces, such as commodity prices, infrastructure and other indices. We characterize the statistical properties of such sectors and present a novel model for the coupling of the stock prices and their dominating driving forces, inspired by mean reverting stochastic processes. Using the model we were able to explain the market sectors' long term behavior and estimate the coupling strength between stocks in financial markets and the sector specific driving forces. Notably, the analysis was successfully applied to the shipping market, in which the Baltic dry index (BDI, an assessment of the price of transporting the major raw materials by sea, influences the shipping financial market. We also present the analysis of other sectors-the gold mining market and the food production market, for which the model was also successfully applied. The model can serve as a general tool for characterizing the coupling between external forces and affected financial variables and therefore for estimating the risk in sectors and their vulnerability to external stress.

  8. Establishing a library of resources to help people understand key concepts in assessing treatment claims—The “Critical thinking and Appraisal Resource Library” (CARL)

    Science.gov (United States)

    Chalmers, Iain; Atkinson, Patricia; Badenoch, Douglas; Oxman, Andrew D.; Austvoll-Dahlgren, Astrid; Nordheim, Lena; Krause, L. Kendall; Schwartz, Lisa M.; Woloshin, Steven; Burls, Amanda; Mosconi, Paola; Hoffmann, Tammy; Cusack, Leila; Albarqouni, Loai; Glasziou, Paul

    2017-01-01

    Background People are frequently confronted with untrustworthy claims about the effects of treatments. Uncritical acceptance of these claims can lead to poor, and sometimes dangerous, treatment decisions, and wasted time and money. Resources to help people learn to think critically about treatment claims are scarce, and they are widely scattered. Furthermore, very few learning-resources have been assessed to see if they improve knowledge and behavior. Objectives Our objectives were to develop the Critical thinking and Appraisal Resource Library (CARL). This library was to be in the form of a database containing learning resources for those who are responsible for encouraging critical thinking about treatment claims, and was to be made available online. We wished to include resources for groups we identified as ‘intermediaries’ of knowledge, i.e. teachers of schoolchildren, undergraduates and graduates, for example those teaching evidence-based medicine, or those communicating treatment claims to the public. In selecting resources, we wished to draw particular attention to those resources that had been formally evaluated, for example, by the creators of the resource or independent research groups. Methods CARL was populated with learning-resources identified from a variety of sources—two previously developed but unmaintained inventories; systematic reviews of learning-interventions; online and database searches; and recommendations by members of the project group and its advisors. The learning-resources in CARL were organised by ‘Key Concepts’ needed to judge the trustworthiness of treatment claims, and were made available online by the James Lind Initiative in Testing Treatments interactive (TTi) English (www.testingtreatments.org/category/learning-resources).TTi English also incorporated the database of Key Concepts and the Claim Evaluation Tools developed through the Informed Healthcare Choices (IHC) project (informedhealthchoices.org). Results We have

  9. Establishing a library of resources to help people understand key concepts in assessing treatment claims-The "Critical thinking and Appraisal Resource Library" (CARL).

    Science.gov (United States)

    Castle, John C; Chalmers, Iain; Atkinson, Patricia; Badenoch, Douglas; Oxman, Andrew D; Austvoll-Dahlgren, Astrid; Nordheim, Lena; Krause, L Kendall; Schwartz, Lisa M; Woloshin, Steven; Burls, Amanda; Mosconi, Paola; Hoffmann, Tammy; Cusack, Leila; Albarqouni, Loai; Glasziou, Paul

    2017-01-01

    People are frequently confronted with untrustworthy claims about the effects of treatments. Uncritical acceptance of these claims can lead to poor, and sometimes dangerous, treatment decisions, and wasted time and money. Resources to help people learn to think critically about treatment claims are scarce, and they are widely scattered. Furthermore, very few learning-resources have been assessed to see if they improve knowledge and behavior. Our objectives were to develop the Critical thinking and Appraisal Resource Library (CARL). This library was to be in the form of a database containing learning resources for those who are responsible for encouraging critical thinking about treatment claims, and was to be made available online. We wished to include resources for groups we identified as 'intermediaries' of knowledge, i.e. teachers of schoolchildren, undergraduates and graduates, for example those teaching evidence-based medicine, or those communicating treatment claims to the public. In selecting resources, we wished to draw particular attention to those resources that had been formally evaluated, for example, by the creators of the resource or independent research groups. CARL was populated with learning-resources identified from a variety of sources-two previously developed but unmaintained inventories; systematic reviews of learning-interventions; online and database searches; and recommendations by members of the project group and its advisors. The learning-resources in CARL were organised by 'Key Concepts' needed to judge the trustworthiness of treatment claims, and were made available online by the James Lind Initiative in Testing Treatments interactive (TTi) English (www.testingtreatments.org/category/learning-resources).TTi English also incorporated the database of Key Concepts and the Claim Evaluation Tools developed through the Informed Healthcare Choices (IHC) project (informedhealthchoices.org). We have created a database of resources called CARL

  10. Analysis of the key competitive advantage resources - the case of BRF Foods

    Directory of Open Access Journals (Sweden)

    Jacir Favretto

    2016-09-01

    Full Text Available The purpose of this article is to analyze the relationship between organizational capabilities and the competitive performance of BRF Foods, using the Resource Based View method. It is a case study, developed in agribusiness with the controller of the BRF unit located in Concordia, Santa Catarina. A document analysis of sustainability and management reports was also conducted for the year 2014. It was found that technology, central planning of raw materials and centrally planned sales are considered valuable resources. Improvement of the usage conditions of natural resources (finite, through the reduction of water and energy consumption and programs for the sustainability of agriculture, pig farming and poultry farming are considered rare resources. Design, R & D, given technology, market vision and the existence of exclusive contract are difficult resources to imitate. Among the organizational resources, brand, structured distribution capacity, development of new products and market niches are particularly important.

  11. The Development of Resources of Students in Adolescence as a Key Issue in Contemporary Education

    Directory of Open Access Journals (Sweden)

    Gosk Urszula

    2015-08-01

    Full Text Available In the presented paper, the issue of recognition and building of resources in adolescent pupils was discussed, referring to salutogenic concept of A. Antonovsky and Conservation of Resources Theory of S. E. Hobfoll. Coming out from developmental pedagogy and positive orientation in social sciences, benefits of scientific and educational actions concentrated on identifying pupils’ resources and supporting them in generating them, were shown. On the basis of Polish and foreign literature, empirical research treating about pupils’ resource, was analyzed, with special attention put to the sense of coherence and its components, stress management and behavior fostering health.

  12. The Development of Resources of Students in Adolescence as a Key Issue in Contemporary Education

    Science.gov (United States)

    Gosk, Urszula; Kuracki, Kamil

    2015-01-01

    In the presented paper, the issue of recognition and building of resources in adolescent pupils was discussed, referring to salutogenic concept of A. Antonovsky and Conservation of Resources Theory of S. E. Hobfoll. Coming out from developmental pedagogy and positive orientation in social sciences, benefits of scientific and educational actions…

  13. Quantum key distribution with finite resources: calculating the min-entropy

    Energy Technology Data Exchange (ETDEWEB)

    Bratzik, Sylvia; Mertz, Markus; Kampermann, Hermann; Abruzzo, Silvestre; Bruss, Dagmar [Heinrich-Heine-Universitaet, Duesseldorf (Germany)

    2010-07-01

    The min-entropy is an important quantity in quantum key distribution. Recently, a connection between the min- entropy and the minimal-error discrimination problem was found. We use this connection to evaluate the min-entropy for different quantum key distribution setups.

  14. From struggles to resource gains in interprofessional service networks: Key findings from a multiple case study.

    Science.gov (United States)

    Toiviainen, Hanna; Kira, Mari

    2017-07-01

    In interprofessional service networks, employees cross professional boundaries to collaborate with colleagues and clients with expertise and values different from their own. It can be a struggle to adopt shared work practices and deal with "multivoicedness." At the same time, networks allow members to engage in meaningful service provision, gain a broader understanding of the service provided, and obtain social support. Intertwined network struggles and resource gains have received limited attention in the interprofessional care literature to date. The aim of the study was to investigate the learning potential of the co-existing struggles and resource gains. This article reports findings from two interprofessional networks. Interviews were conducted with 19 employees and thematically analysed. Three types of struggles and six types of resource gains of networking were identified. The struggles relate, first, to the assumptions of networking following similar practices to those in a home organisation; second, to the challenges of dealing with the multivoicedness of networking; and, third, to the experienced gap between the networking ideals and the reality of cooperation. At the same time, the network members experience gains in emotional resources (e.g., stronger sense of meaningfulness at work), cognitive resources (e.g., understanding the customer needs from alternative perspectives), and social resources (e.g., being able to rely on other professionals' competence). Learning potential emerged from the dynamics between coexisting struggles and resource gains.

  15. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector... comments concerning new Information Collection Request--Assessment Questionnaire--IP Sector Specific Agency... http://www.regulations.gov , including any personal information provided. OMB is particularly...

  16. KEY ISSUES OF CONCEPTS' FORMATION OF THE NETWORK OF RESOURCE CENTER OF DISTANCE EDUCATION OF GENERAL EDUCATION INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Yuriy M. Bogachkov

    2013-06-01

    Full Text Available In the article the problem of constructing a network of resource centers for Distance Education to meet the needs of general secondary schools is presented. Modern educational trends in the use of Internet services in education are viewed.  Main contradictions, solution of which helps to create a network of resource centers, are identified. The definition of key terms related to the range of issues are given. The basic categories of participants, who  implementation of e-learning and networking are oriented on. There are considered the basic tasks of  distance education resource centers' functioning and types of supporting: personnel, regulatory, informative, systematic and  technical etc. The review of possible models of implementation of  students' distance education is reviewed . Three options for business models of resource centers, depending on funding  sources are offered.

  17. Distributed Factorization Computation on Multiple Volunteered Mobile Resource to Break RSA Key

    Science.gov (United States)

    Jaya, I.; Hardi, S. M.; Tarigan, J. T.; Zamzami, E. M.; Sihombing, P.

    2017-01-01

    Similar to common asymmeric encryption, RSA can be cracked by usmg a series mathematical calculation. The private key used to decrypt the massage can be computed using the public key. However, finding the private key may require a massive amount of calculation. In this paper, we propose a method to perform a distributed computing to calculate RSA’s private key. The proposed method uses multiple volunteered mobile devices to contribute during the calculation process. Our objective is to demonstrate how the use of volunteered computing on mobile devices may be a feasible option to reduce the time required to break a weak RSA encryption and observe the behavior and running time of the application on mobile devices.

  18. Some key techniques of SPOT-5 image processing in new national land and resources investigation project

    Science.gov (United States)

    Xue, Changsheng; Li, Qingquan; Li, Deren

    2004-02-01

    In 1988, the detail information on land resource was investigated in China. Fourteen years later, it has changed a lot. It is necessary that the second land resource detailed investigation should be implemented. On this condition, the New National Land and Resources Investigation Project in China, which will last 12 years, has been started since 1999. The project is directly under the administration of the Ministry of Land and Resource (MLR). It was organized and implemented By China Geological, China Land Surveying and Planning Institute (CLSPI) and Information Center of MLR. It is a grand and cross century project supported by the Central Finance, based on State and public interests and strategic characteristics. Up to now, "Land Use Dynamic Monitoring By Remote Sensing," "Arable Land Resource Investigation," "Rural Collective Land Property Right Investgiation," "Establishment of Public Consulting Standardization of Cadastral Information," "Land Resource Fundamental Maps and Data Updating," "Urban Land Price Investigation and Intensive Utilization Potential Capacity Evaluation," "Farmland Classification, Gradation, and Evaluation," "Land Use Database Construction at City or County Level" 8 subprojects have had the preliminary achievements. In this project, SPOT-1/2/4 and Landsat-7 TM data were always applied to monitor land use dynamic change as the main data resource. Certainly, IRS, CBERS-2, and IKONOS data also were tested in small areas. In 2002, the SPOT-5 data, whose spatial resolution of the panchromatic image is 2.5 meters and the spectral one is 10 meters, were applied into update the land use base map at the 1:10000 scale in 26 Chinese cities. The purpose in this paper is to communicate the experience of SPOT-5 image processing with the colleagues.

  19. Open Distribution of Virtual Containers as a Key Framework for Open Educational Resources and STEAM Subjects

    Science.gov (United States)

    Corbi, Alberto; Burgos, Daniel

    2017-01-01

    This paper presents how virtual containers enhance the implementation of STEAM (science, technology, engineering, arts, and math) subjects as Open Educational Resources (OER). The publication initially summarizes the limitations of delivering open rich learning contents and corresponding assignments to students in college level STEAM areas. The…

  20. Study on Equity and Efficiency of Health Resources and Services Based on Key Indicators in China.

    Directory of Open Access Journals (Sweden)

    Xinyu Zhang

    Full Text Available This study aims to evaluate the dialectical relationship between equity and efficiency of health resource allocation and health service utilization in China.We analyzed the inequity of health resource allocation and health service utilization based on concentration index (CI and Gini coefficient. Data envelopment analysis (DEA was used to evaluate the inefficiency of resource allocation and service utilization. Factor Analysis (FA was used to determine input/output indicators.The CI of Health Institutions, Beds in Health Institutions, Health Professionals and Outpatient Visits were -0.116, -0.012, 0.038, and 0.111, respectively. Gini coefficient for the 31 provinces varied between 0.05 and 0.43; out of these 23 (742% were observed to be technically efficient constituting the "best practice frontier". The other 8 (25.8% provinces were technically inefficient.Health professionals and outpatient services are focused on higher income levels, while the Health Institutions and Beds in Health Institutions were concentrated on lower income levels. In China, a few provinces attained a basic balance in both equity and efficiency in terms of current health resource and service utilization, thus serving as a reference standard for other provinces.

  1. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  2. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  3. EMPLOYEE ADAPTATION AS KEY ACTIVITY IN HUMAN RESOURCE MANAGEMENT UPON IMPLEMENTING AND MAINTAINING DESIRED ORGANISATIONAL CULTURE

    Directory of Open Access Journals (Sweden)

    Zdenko Stacho

    2017-11-01

    Full Text Available In order to achieve the greatest possible equivalence between human resources in a company and desired organisational culture elements declared by a company, it is necessary to interconnect activities within individual functions of human resource management with desired values, attitudes and work behaviour. Such an interconnection is crucial for a positive response of employees to a suitable organisational culture, its embedding in their behaviour and subsequent sharing and spreading of organisational values. This paper will specifically define individual activities related to the adaptation of employees which need to be carried out in this regard. Based on a research conducted between 2011 and 2013, the paper will also define the present state and level of focus of organisations operating in Slovakia on both organisational culture as a whole and organisational culture in the context of employee adaptation.

  4. KML (Keyhole Markup Language) : a key tool in the education of geo-resources.

    Science.gov (United States)

    Veltz, Isabelle

    2015-04-01

    Although going on the ground with pupils remains the best way to understand the geologic structure of a deposit, it is very difficult to bring them in a mining extraction site and it is impossible to explore whole regions in search of these resources. For those reasons the KML (with the Google earth interface) is a very complete tool for teaching geosciences. Simple and intuitive, its handling is quickly mastered by the pupils, it also allows the teachers to validate skills for IT certificates. It allows the use of KML files stemming from online banks, from personal productions of the teacher or from pupils' works. These tools offer a global approach in 3D as well as a geolocation-based access to any type of geological data. The resource on which I built this KML is taught in the curriculum of the 3 years of French high school, it is methane hydrate. This non conventional hydrocarbon molecule enters in this vague border between mineral an organic matter (as phosphate deposits). It has become for over ten year the subject of the race for the exploitation of the gas hydrates fields in order to try to supply to the world demand. The methane hydrate fields are very useful and interesting to study the 3 majors themes of geological resource: the exploration, the exploitation and the risks especially for environments and populations. The KML which I propose allows the pupils to put itself in the skin of a geologist in search of deposits or on the technician who is going to extract the resource. It also allows them to evaluate the risks connected to the effect of tectonics activity or climatic changes on the natural or catastrophic releasing of methane and its role in the increase of the greenhouse effect. This KML associated to plenty of pedagogic activities is directly downloadable for teachers at http://eduterre.ens-lyon.fr/eduterre-usages/actualites/methane/.

  5. Developing Emotional Intelligence as a key psychological resource reservoir for sustained student success

    Directory of Open Access Journals (Sweden)

    Gina Görgens-Ekermans

    2015-07-01

    Motivation for the study: Non-cognitive personal resources (such as EI may indirectly contribute to student success. Research design, approach and method: A controlled experimental research design was conducted to test the effect of an EI developmental intervention on affect balance, academic self-efficacy, cognitive thought-pattern strategies, and perceived stress, using a sample of first-year students (n = 114. Main findings: Limited support of the utility of the intervention to increase EI emerged; whilst stronger support emerged that academic self-efficacy was affected by the intervention. No direct empirical support for the impact of increased EI on the other measured psychological resources was obtained, although some trends in the data could be observed. Practical/managerial implications: Investments in EI developmental interventions, as part of student-support initiatives, should be further investigated to sufficiently justify its potential to influence sustained student success. Contribution/value-add: The results of this study lay a foundation that suggest EI could be malleable and influence academic self-efficacy. More research is necessary regarding supplementary teaching and learning initiatives focused on non-cognitive personal resources, which are complementary to the academic offering at tertiary institutions, with the expectation of increasing the student success rates.

  6. Disconnects Between Audiences, Resources, and Initiatives: Key Findings of the Coastal Areas Climate Change Education Partnership

    Science.gov (United States)

    Muller-Karger, F. E.; Ryan, J. G.; Feldman, A.; Gilbes, F.; Trotz, M.; McKayle, C.; Stone, D.; Plank, L.; Meisels, G.; Peterson, M.; Reynolds, C. J.

    2012-12-01

    The Coastal Areas Climate Change Education (CACCE) Partnership focused on defining a plan for effective education on climate change and its salient issues in coastal communities Florida and the US Caribbean territories. The approach included assessing perceptions and needs of stakeholders, evaluating the nature of available educational and information resources, and establishing a partnership that includes the public and professional organizations most relevant in planning and in addressing the resiliency of coastal communities. Information gathering activities included surveys among K-12 educators and students on climate change perceptions and current classroom activities in both Florida and the Caribbean territories; surveys of professional urban and land-use planners across Florida regarding their understanding of related in their professional practice; and conducting an inventory of relevant educational materials and information resources. Survey results showed a range of misperceptions about climate change, its causes and its likely impacts. At present, students and teachers in high and middle schools show poor understanding of climate science, and minimal time is spent in instruction on climate change in science courses in Florida and Puerto Rico schools. Also, there has to be professional development efforts and access to rich instructional content in a continuum spanning schools and professional communities including planners (which we surveyed). Architects and engineers are communities that also need to be surveyed and included in future efforts. A major obstacle to efforts at providing continuing education for planners and municipal officials is the lack of consensus on and access to regionally-specific scientific data regarding climate impacts and the relevant instructional content. It is difficult for professionals to prepare for climate change if they cannot define impacts in the Florida-Caribbean region and its coastal urban areas. Across over 1000

  7. Constructing a Cross-Domain Resource Inventory: Key Components and Results of the EarthCube CINERGI Project.

    Science.gov (United States)

    Zaslavsky, I.; Richard, S. M.; Malik, T.; Hsu, L.; Gupta, A.; Grethe, J. S.; Valentine, D. W., Jr.; Lehnert, K. A.; Bermudez, L. E.; Ozyurt, I. B.; Whitenack, T.; Schachne, A.; Giliarini, A.

    2015-12-01

    While many geoscience-related repositories and data discovery portals exist, finding information about available resources remains a pervasive problem, especially when searching across multiple domains and catalogs. Inconsistent and incomplete metadata descriptions, disparate access protocols and semantic differences across domains, and troves of unstructured or poorly structured information which is hard to discover and use are major hindrances toward discovery, while metadata compilation and curation remain manual and time-consuming. We report on methodology, main results and lessons learned from an ongoing effort to develop a geoscience-wide catalog of information resources, with consistent metadata descriptions, traceable provenance, and automated metadata enhancement. Developing such a catalog is the central goal of CINERGI (Community Inventory of EarthCube Resources for Geoscience Interoperability), an EarthCube building block project (earthcube.org/group/cinergi). The key novel technical contributions of the projects include: a) development of a metadata enhancement pipeline and a set of document enhancers to automatically improve various aspects of metadata descriptions, including keyword assignment and definition of spatial extents; b) Community Resource Viewers: online applications for crowdsourcing community resource registry development, curation and search, and channeling metadata to the unified CINERGI inventory, c) metadata provenance, validation and annotation services, d) user interfaces for advanced resource discovery; and e) geoscience-wide ontology and machine learning to support automated semantic tagging and faceted search across domains. We demonstrate these CINERGI components in three types of user scenarios: (1) improving existing metadata descriptions maintained by government and academic data facilities, (2) supporting work of several EarthCube Research Coordination Network projects in assembling information resources for their domains

  8. A key review on emergy analysis and assessment of biomass resources for a sustainable future

    International Nuclear Information System (INIS)

    Zhang Gaijing; Long Weiding

    2010-01-01

    The present study comprehensively reviews emergy analysis and performance evaluation of biomass energy. Biomass resources utilization technologies include (a) bioethanol production, (b) biomass for bio-oil, (c) biodiesel production, (d) straw as fuel in district heating plants, (e) electricity from Municipal Solid Waste (MSW) incineration power plant, (f) electricity from waste landfill gas. Systems diagrams of biomass, which are to conduct a critical inventory of processes, storage, and flows that are important to the system under consideration and are therefore necessary to evaluate, for biomasses are given. Emergy indicators, such as percent renewable (PR), emergy yield ratio (EYR), environmental load ratio (ELR) and environmental sustainability index (ESI) are shown to evaluate the environmental load and local sustainability of the biomass energy. The emergy indicators show that bio-fuels from crop are not sustainable and waste management for fuels provides an emergy recovery even lower than mining fossil fuel.

  9. A structured elicitation method to identify key direct risk factors for the management of natural resources

    Directory of Open Access Journals (Sweden)

    Michael Smith

    2015-11-01

    Full Text Available The high level of uncertainty inherent in natural resource management requires planners to apply comprehensive risk analyses, often in situations where there are few resources. In this paper, we demonstrate a broadly applicable, novel and structured elicitation approach to identify important direct risk factors. This new approach combines expert calibration and fuzzy based mathematics to capture and aggregate subjective expert estimates of the likelihood that a set of direct risk factors will cause management failure. A specific case study is used to demonstrate the approach; however, the described methods are widely applicable in risk analysis. For the case study, the management target was to retain all species that characterise a set of natural biological elements. The analysis was bounded by the spatial distribution of the biological elements under consideration and a 20-year time frame. Fourteen biological elements were expected to be at risk. Eleven important direct risk factors were identified that related to surrounding land use practices, climate change, problem species (e.g., feral predators, fire and hydrological change. In terms of their overall influence, the two most important risk factors were salinisation and a lack of water which together pose a considerable threat to the survival of nine biological elements. The described approach successfully overcame two concerns arising from previous risk analysis work: (1 the lack of an intuitive, yet comprehensive scoring method enabling the detection and clarification of expert agreement and associated levels of uncertainty; and (2 the ease with which results can be interpreted and communicated while preserving a rich level of detail essential for informed decision making.

  10. Resources changes: a key factor in a new uranium production economic cycle

    International Nuclear Information System (INIS)

    Capus, G.; Caumartin, P.

    1996-01-01

    Since the end of 1994, a change has been underway in the uranium market. As usual in such cases, surprise and disbelief first dominated, but the market actors have been adjusting quickly to what now appears to be a return to primary production as the predominant factor in uranium supply. It is a matter of fact that the fundamentals will determine the course of the uranium market, as with other cyclical commodity markets. Comparing 1995 with 1975, a time of rocketing prices and production, and forecasting another cycle with similar characteristics to the last one is tempting, but illusory. However, examining the relative conditions prevailing at these times provides keys that may be helpful in understanding future developments. (author)

  11. Enhancing the usability of seasonal to decadal (S2D) climate information - an evidence-based framework for the identification and assessment of sector-specific vulnerabilities

    Science.gov (United States)

    Funk, Daniel

    2016-04-01

    -specific critical climate conditions may be assessed by the resilience of the system of concern, the response time of an interconnected system (i.e. top-down approach using a bottom-up methodology) or alternatively, by the critical time-frame of decision-making processes (bottom-up approach). This approach counters the challenges for a vulnerability assessment of economic sectors to S2D climate events which originate from the inherent role of climate for economic sectors: climate may affect economic sectors as hazard, resource, production- or regulation factor. This implies, that climate dependencies are often indirect and nonlinear. Consequently, climate events which are critical for affected systems do not necessarily correlate with common climatological extremes. One important output of the framework is a classification system of 'climate-impact types' which classifies sector-specific problems in a systemic way. This system proves to be promising because (i) it reflects and thus differentiates the cause for the climate relevance of a specific problem (compositions of buffer factors); (ii) it integrates decision-making processes which proved to be a significant factor; (iii) it indicates a potential usability of S2D climate service products and thus integrates coping options, and (vi) it is a systemic approach which goes beyond the established 'snap-shot' of vulnerability assessments.

  12. Projections of specialist physicians in Mexico: a key element in planning human resources for health.

    Science.gov (United States)

    Nigenda, Gustavo; Muños, José Alberto

    2015-09-22

    Projections are considered a useful tool in the planning of human resources for health. In Mexico, the supply and demand of specialist doctors are clearly disconnected, and decisions must be made to reduce labour market imbalances. Thus, it is critical to produce reliable projections to assess future interactions between supply and demand. Using a service demand approach, projections of the number of specialist physicians required by the three main public institutions were calculated using the following variables: a) recent recruitment of specialists, b) physician productivity and c) retirement rates. Two types of scenarios were produced: an inertial one with no changes made to current production levels and an alternative scenario adjusted by recommended productivity levels. Results show that institutions must address productivity as a major policy element to act upon in future contracting of specialist physicians. The projections that adjusted for productivity suggest that the hiring trends for surgeons and internists should be maintained or increased to compensate for the increase in demand for services. In contrast, due to the decline in demand for obstetric and paediatric services, the hiring of new obstetrician-gynaecologists and paediatricians should be reduced to align with future demand.

  13. Eco-innovation Dynamics and Green Economic Change: the role of sectoral-specific patterns

    DEFF Research Database (Denmark)

    Andersen, Maj Munch; Faria, Lourenco

    2015-01-01

    This paper investigates the features of Green Economic Change process at the meso-level, the greening of industries. We posit that, as for “traditional” innovations, it is possible to identify sectoral eco-innovation patterns and that these represent key but neglected factors in the dynamics...... of green economic evolution. . The paper represents early speculative conceptual work. We have posited that, as for “general” innovations, it is possible to identify sectoral eco-innovation patterns and that these represent key but neglected factors in the dynamics of green economic chance. The paper...... identifies seven specific characteristics of eco-innovation which form the basis for identifying 4 core hypothesis which may explain sectoral heterogeneity and identify likely sectoral eco-innovation leaders....

  14. Human Resources – One of the Key Challenges of Tourism Development in the Republic of Croatia

    Directory of Open Access Journals (Sweden)

    Buneta Anđelka

    2016-12-01

    Full Text Available Tourist activity in the Republic of Croatia is one of the leading and most promising activities. It is our past, present and future. According to the National Bank, the share of revenues from travel - tourism in overall GDP in the first 9 months of 2015 was 22.2%, an increase of 1.2% compared to the same period in 2014. In the third quarter share of revenues from travel - tourism in total GDP amounted to 41.3%, as compared to the same period in 2014, representing a growth of 1.4%. The conclusion is that tourism is one of the leading economic sectors in the Republic of Croatia. Due to realized 78 million and 569,000 overnight stays (6.8% more than in 2014 and more than 8 billion of foreign exchange inflows, the Republic of Croatia on the overall tourism market has been recognized as an important destination whose development potentials have not yet been exhausted. Relevant institutions and predictions underline the fact that tourism is one of the keys for faster integration of Croatia in the entire world economy and the networked society, from which it can be read that Croatia must view this sector in a new way and allow tourism to undergo complete transformation, in order to cope with future competitive challenges more easily. According to estimates by the World Travel & Tourism Council direct and indirect employment in the tourism sector in 2008 was about 300,000 employees, but that number will have increased by additional 100,000 in the next ten years. The Croatian tourism today employs 35-40% of workers. Thus, the tourism industry is a comprehensive and a very important generator of jobs of different profiles - from catering and hotel industry to entertainment and animation. In the light of progress in the development of tourism, and regardless of specific personnel, Croatia still needs a lot of work on the construction of the existing profile of tourism personnel and management and educate the tourist interest in tourism future. In addition

  15. Cultural Resources and Cognitive Frames: Keys to an Anthropological Approach to Prediction

    Science.gov (United States)

    Lowrie, Ian

    In this chapter, I suggest a methodological and theoretical framework for preliminary investigations designed to gauge the potential societal response to the discovery of either microbial or intelligent extraterrestrial life. The uncritical use of analogies to the ethnographic record of contact between societies and the discovery of extraterrestrial life has been, rightfully, the target of sharp criticism since the earliest days of the scientific search for this life. However, I argue that by approaching this record with different epistemological premises, and shifting the focus from the material to the symbolic and cognitive dimensions of this contact, one can avoid many of the pitfalls of the analogical mode of argumentation, and provide a solid conceptual basis for the development of an adequate heuristic. Specifically, I draw upon the germinal debate between Sahlins and Obeyesekere over the nature of human meaning-making in the face of radically other societies and their meanings to treat the discovery of an intelligent civilization. In parallel, I draw upon Sharp's discussion of the relationship between the changes in the symbolic order and the material organization of society to suggest that much of this analysis also applies to the discovery of extraterrestrial microbial life. In both cases, I do not argue for a one-to-one correspondence between the historical and the contemporary, but rather use these arguments as illustrations of what I see as particularly profitable modes of conceptualizing the universal human processes of making sense out of novel objects and phenomena. Finally, this chapter argues for a mixed-methods quantitative-qualitative investigation into the character and distribution of societal resources for understanding life and intelligence, rather than the extraterrestrial as such. The qualitative is advanced as a necessary adjunct to the quantitative, as the best method for gaining access to the repertoire of cultural frames upon which

  16. Plasticity of rhizosphere hydraulic properties as a key for efficient utilization of scarce resources

    Science.gov (United States)

    Carminati, Andrea; Vetterlein, Doris

    2013-01-01

    experimental methods need to be developed and applied to different plant species and soil types, in order to understand whether such dualism in rhizosphere properties is an important mechanism for efficient utilization of scarce resources and drought tolerance. PMID:23235697

  17. A random-key encoded harmony search approach for energy-efficient production scheduling with shared resources

    Science.gov (United States)

    Garcia-Santiago, C. A.; Del Ser, J.; Upton, C.; Quilligan, F.; Gil-Lopez, S.; Salcedo-Sanz, S.

    2015-11-01

    When seeking near-optimal solutions for complex scheduling problems, meta-heuristics demonstrate good performance with affordable computational effort. This has resulted in a gravitation towards these approaches when researching industrial use-cases such as energy-efficient production planning. However, much of the previous research makes assumptions about softer constraints that affect planning strategies and about how human planners interact with the algorithm in a live production environment. This article describes a job-shop problem that focuses on minimizing energy consumption across a production facility of shared resources. The application scenario is based on real facilities made available by the Irish Center for Manufacturing Research. The formulated problem is tackled via harmony search heuristics with random keys encoding. Simulation results are compared to a genetic algorithm, a simulated annealing approach and a first-come-first-served scheduling. The superior performance obtained by the proposed scheduler paves the way towards its practical implementation over industrial production chains.

  18. In an Unpredictable and Changing Environment: Intrapreneurial Self-Capital As a Key Resource for Life Satisfaction and Flourishing.

    Science.gov (United States)

    Di Fabio, Annamaria; Palazzeschi, Letizia; Bucci, Ornella

    2017-01-01

    The twenty-first century is characterized by an unpredictable and challenging work environment, and the Intrapreneurial Self-Capital (ISC) career and life construct can be seen as a core of individual intrapreneurial resources that enables people to cope with ongoing challenges, changes, and transitions founding innovative solutions when confronted with the constraints imposed by such an environment. The ISC is a challenging construct since it can enhance behavior and attitudes through specific training, unlike personality traits, which are considered substantially stable in the literature. Against this background, the present study examined the relationship between ISC and well-being (hedonic well-being and eudaimonic well-being) controlling for the effects of personality traits. The Big Five Questionnaire (BFQ), the Intrapreneurial Self-Capital Scale (ISCS), the Satisfaction With Life Scale (SWLS), and the Flourishing Scale (FS) were administered to 258 Italian workers. Hierarchical regression analyses showed that ISC explained a percentage of incremental variance beyond that explained by personality traits in relation to both life satisfaction and flourishing. These results indicate that ISC is a key resource for hedonic well-being and eudaimonic well-being and that it offers new research and intervention opportunities.

  19. In an Unpredictable and Changing Environment: Intrapreneurial Self-Capital As a Key Resource for Life Satisfaction and Flourishing

    Directory of Open Access Journals (Sweden)

    Annamaria Di Fabio

    2017-10-01

    Full Text Available The twenty-first century is characterized by an unpredictable and challenging work environment, and the Intrapreneurial Self-Capital (ISC career and life construct can be seen as a core of individual intrapreneurial resources that enables people to cope with ongoing challenges, changes, and transitions founding innovative solutions when confronted with the constraints imposed by such an environment. The ISC is a challenging construct since it can enhance behavior and attitudes through specific training, unlike personality traits, which are considered substantially stable in the literature. Against this background, the present study examined the relationship between ISC and well-being (hedonic well-being and eudaimonic well-being controlling for the effects of personality traits. The Big Five Questionnaire (BFQ, the Intrapreneurial Self-Capital Scale (ISCS, the Satisfaction With Life Scale (SWLS, and the Flourishing Scale (FS were administered to 258 Italian workers. Hierarchical regression analyses showed that ISC explained a percentage of incremental variance beyond that explained by personality traits in relation to both life satisfaction and flourishing. These results indicate that ISC is a key resource for hedonic well-being and eudaimonic well-being and that it offers new research and intervention opportunities.

  20. Transposition and national level resources

    DEFF Research Database (Denmark)

    Vasev, Nikolay Rumenov; Vrangbæk, Karsten

    2014-01-01

    Several recent papers have summarised the status of EU implementation studies. In this paper we suggest that the issue of sector specific resources has received too little attention in previous studies. Sector specific resources include “health sector resources” and “state administrative resources......”. Our theoretical contribution is thus to add an explicit and more detailed concern for "sector specific resources" in national transposition. This can refine the understanding of resources, for example in the multi-variable models that are emerging as the state of the art in the field of EU...... implementation studies. To illustrate these points we have chosen an empirical design focusing on a directive with a potentially high impact on system resources and several ambiguous components (the Cross Border Health Care Directive). We have further chosen to focus on two Eastern European countries (Bulgaria...

  1. The NASA Regional Planetary Image Facility (RPIF) Network: A Key Resource for Accessing and Using Planetary Spatial Data

    Science.gov (United States)

    Hagerty, J. J.

    2017-12-01

    The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for

  2. A review of the surface features and properties, surfactant adsorption and floatability of four key minerals of diasporic bauxite resources.

    Science.gov (United States)

    Zhang, Ningning; Nguyen, Anh V; Zhou, Changchun

    2018-04-01

    Diasporic bauxite represents one of the major aluminum resources. Its upgrading for further processing involves a separation of diaspore (the valuable mineral) from aluminosilicates (the gangue minerals) such as kaolinite, illite, and pyrophyllite. Flotation is one of the most effective ways to realize the upgrading. Since flotation is a physicochemical process based on the difference in the surface hydrophobicity of different components, determining the adsorption characteristics of various flotation surfactants on the mineral surfaces is critical. The surfactant adsorption properties of the minerals, in turn, are controlled by the surface chemistry of the minerals, while the latter is related to the mineral crystal structures. In this paper, we first discuss the crystal structures of the four key minerals of diaspore, kaolinite, illite, and pyrophyllite as well as the broken bonds on their exposed surfaces after grinding. Next, we summarize the surface chemistry properties such as surface wettability and surface electrical properties of the four minerals, and the differences in these properties are explained from the perspective of mineral crystal structures. Then we review the adsorption mechanism and adsorption characteristics of surfactants such as collectors (cationic, anionic, and mixed surfactants), depressants (inorganic and organic), dispersants, and flocculants on these mineral surfaces. The separation of diaspore and aluminosilicates by direct flotation and reverse flotation are reviewed, and the collecting properties of different types of collectors are compared. Furthermore, the abnormal behavior of the cationic flotation of kaolinite is also explained in this section. This review provides a strong theoretical support for the optimization of the upgrading of diaspore bauxite ore by flotation and the early industrialization of the reverse flotation process. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  4. Managing water resources using isotope hydrology. One of the five key areas to sustainable development where progress is possible with the resources and technologies at our disposal today

    International Nuclear Information System (INIS)

    2002-01-01

    The IAEA supports the use of isotope hydrology to improve knowledge of water resources. Each year the IAEA allocated nearly US $3 million to its water resource programme. The Agency has also invested about US $30 million in 150 projects in 60 countries to improve water management using isotope hydrology and, in the progress, has trained hundreds of young scientists

  5. Scientific information and the Tongass land management plan: key findings derived from the scientific literature, species assessments, resource analyses, workshops, and risk assessment panels.

    Science.gov (United States)

    Douglas N. Swanston; Charles G. Shaw; Winston P. Smith; Kent R. Julin; Guy A. Cellier; Fred H. Everest

    1996-01-01

    This document highlights key items of information obtained from the published literature and from specific assessments, workshops, resource analyses, and various risk assessment panels conducted as part of the Tongass land management planning process. None of this information dictates any particular decision; however, it is important to consider during decisionmaking...

  6. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  7. How Do College Campuses Make Decisions about Allocating Resources for Student Mental Health? Findings from Key Participant Interviews

    Science.gov (United States)

    Hunt, Justin B.; Watkins, Daphne; Eisenberg, Daniel

    2012-01-01

    Given the significant burden of mental illness among young adults, colleges offer a promising venue for prevention and treatment, which can help set late adolescents and young adults on a path to success and wellbeing. Despite the potential benefits, there have been no published studies of how campuses decide about allocating resources for mental…

  8. Identifying key factors for mobilising under-utilised low carbon land resources : A case study on Kalimantan

    NARCIS (Netherlands)

    Goh, Chun Sheng; Junginger, Martin; Potter, Lesley; Faaij, André; Wicke, Birka

    2018-01-01

    Mobilising under-utilised low carbon (ULC) land for future agricultural expansion helps minimising further carbon stock loss. This study examined the regency cases in Kalimantan, a carbon loss hotspot, to understand the key factors for mobilising ULC land via narrative interviews with a range of

  9. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  11. Extending stakeholder theory to promote resource management initiatives to key stakeholders: a case study of water transfers in Alberta, Canada.

    Science.gov (United States)

    Lafreniere, Katherine C; Deshpande, Sameer; Bjornlund, Henning; Hunter, M Gordon

    2013-11-15

    Many attempts to implement resource management initiatives in Canadian and international communities have been resisted by stakeholders despite inclusion of their representatives in the decision-making process. Managers' failure to understand stakeholders' perspectives when proposing initiatives is a potential cause of this resistance. Our study uses marketing thought to enhance stakeholder theory by bringing in an audience-centric perspective. We attempt to understand how stakeholders perceive their interests in an organization and consequently decide how to influence that organization. By doing so, we investigate whether a disconnect exists between the perceptions of managers and those of stakeholders. Natural resource managers can utilize this knowledge to garner stakeholder support for the organization and its activities. We support this claim with findings from a water transfer plebiscite held in the Canadian province of Alberta. Sixteen personal interviews employing narrative inquiry were conducted to document voters' (i.e., irrigators') interpretations. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. In an Unpredictable and Changing Environment: Intrapreneurial Self-Capital As a Key Resource for Life Satisfaction and Flourishing

    OpenAIRE

    Annamaria Di Fabio; Letizia Palazzeschi; Ornella Bucci

    2017-01-01

    The twenty-first century is characterized by an unpredictable and challenging work environment, and the Intrapreneurial Self-Capital (ISC) career and life construct can be seen as a core of individual intrapreneurial resources that enables people to cope with ongoing challenges, changes, and transitions founding innovative solutions when confronted with the constraints imposed by such an environment. The ISC is a challenging construct since it can enhance behavior and attitudes through specif...

  13. Sealed Radioactive Sources. Information, Resources, and Advice for Key Groups about Preventing the Loss of Control over Sealed Radioactive Sources

    International Nuclear Information System (INIS)

    2013-10-01

    Among its many activities to improve the safety and security of sealed sources, the IAEA has been investigating the root causes of major accidents and incidents since the 1980's and publishes findings so that others can learn from them. There are growing concerns today about the possibility that an improperly stored source could be stolen and used for malicious purposes. To improve both safety and security, information needs to be in the hands of those whose actions and decisions can prevent a source from being lost or stolen in the first place. The IAEA developed this booklet to help improve communication with key groups about hazards that may result from the loss of control over sealed radioactive sources and measures that should be implemented to prevent such loss of control. Many people may benefit from the information contained in this booklet, particularly those working with sources and those likely to be involved if control over a source is lost; especially: officials in government agencies, first responders, medical users, industrial users and the metal recycling industry. The general public may also benefit from an understanding of the fundamentals of radiation safety. This booklet is comprised of several stand-alone chapters intended to communicate with these key groups. Various accidents that are described and information that is provided are relevant to more than one key group and therefore, some information is repeated throughout the booklet. This booklet seeks to raise awareness of the importance of the safety and security of sealed radioactive sources. However, it is not intended to be a comprehensive 'how to' guide for implementing safety and security measures for sealed radioactive sources. For more information on these measures, readers are encouraged to consult the key IAEA safety and security-related publications identified in this booklet

  14. Key Technology Research on the Efficient Exploitation and Comprehensive Utilization of Resources in the Deep Jinchuan Nickel Deposit

    Directory of Open Access Journals (Sweden)

    Zhiqiang Yang

    2017-08-01

    Full Text Available To understand the resource features and geology in the deep Jinchuan nickel deposit, difficult geological conditions were systematically analyzed, including high stress, fragmentized ore rock, prevalent deformation, difficult tunnel support, complicated rock mechanics, and low mining recovery. An integrated technology package was built for safe, efficient, and continuous mining in a deep, massive, and complex nickel and cobalt mine. This was done by the invention of a large-area continuous mining method with honeycomb drives; the establishment of ground control theory and a technology package for high-stress and fragmented ore rock; and the development of a new type of backfilling cement material, along with a deep backfilling technology that comprises the pipeline transport of high-density slurry with coarse aggregates. In this way, good solutions to existing problems were found to permit the efficient exploitation and comprehensive utilization of the resources in the deep Jinchuan nickel mine. In addition, a technological demonstration in an underground mine was performed using the cemented undercut-and-fill mining method for stressful, fragmented, and rheological rock.

  15. TB preventive therapy for people living with HIV: key considerations for scale-up in resource-limited settings.

    Science.gov (United States)

    Pathmanathan, I; Ahmedov, S; Pevzner, E; Anyalechi, G; Modi, S; Kirking, H; Cavanaugh, J S

    2018-06-01

    Tuberculosis (TB) is the leading cause of death for persons living with the human immunodeficiency virus (PLHIV). TB preventive therapy (TPT) works synergistically with, and independently of, antiretroviral therapy to reduce TB morbidity, mortality and incidence among PLHIV. However, although TPT is a crucial and cost-effective component of HIV care for adults and children and has been recommended as an international standard of care for over a decade, it remains highly underutilized. If we are to end the global TB epidemic, we must address the significant reservoir of tuberculous infection, especially in those, such as PLHIV, who are most likely to progress to TB disease. To do so, we must confront the pervasive perception that barriers to TPT scale-up are insurmountable in resource-limited settings. Here we review available evidence to address several commonly stated obstacles to TPT scale-up, including the need for the tuberculin skin test, limited diagnostic capacity to reliably exclude TB disease, concerns about creating drug resistance, suboptimal patient adherence to therapy, inability to monitor for and prevent adverse events, a 'one size fits all' option for TPT regimen and duration, and uncertainty about TPT use in children, adolescents, and pregnant women. We also discuss TPT delivery in the era of differentiated care for PLHIV, how best to tackle advanced planning for drug procurement and supply chain management, and how to create an enabling environment for TPT scale-up success.

  16. Status and prospects of exploration and exploitation key technologies of the deep petroleum resources in onshore China

    Directory of Open Access Journals (Sweden)

    Genshun Yao

    2018-02-01

    Full Text Available In recent years, China's deep oil and gas exploration and exploitation have developed rapidly. Technological advancements have played an important role in the rapid exploration and highly efficient development. Aimed at the complex engineering geological environment of deep oil and gas in China, this paper has combined the four technological systems that have made significant progress, mainly including: (1 seismic imaging and reservoir prediction techniques for deep–burial complex structures, includign “2W1S” technique (wide-band, wide azimuth, and small bin, RTM (Reverse Time Migration, integrated modeling technology for complex structures and variable velocity mapping technique, improving structural interpretation accuracy, ensuring high precision ofimaging, and prediction for deep geological bodies; (2 deep speed raising and efficiency drilling technology series, which significantly improved the drilling speed, in turn reduced the drilling cost and drilling risk; (3 development of a deep high-temperature and high-pressure logging technology series, which provided a guarantee for the accurate identification of reservoir properties and fluid properties; (4 the efficient development technology for deep reservoirs, especially the development and maturity of the reconstruction volume technology, improve the production of single well and the benefit of deep oil and gas development. This paper further points out the improvement direction of the four major technology series of deep oil based on the analysis of the current development of the four major technological systems. Moreover, the development of applicability and economy for technical system is the key to realize high efficiency and low-cost exploration and development of deep oil and gas. Keywords: Deep oil & gas, Exploration and exploitation technologies, Seismic, Logging, Drilling, Petroleum reservoir stimulation

  17. Measuring adherence to antiretroviral treatment in resource-poor settings: The feasibility of collecting routine data for key indicators

    Directory of Open Access Journals (Sweden)

    Tadeg Hailu

    2010-02-01

    Full Text Available Abstract Background An East African survey showed that among the few health facilities that measured adherence to antiretroviral therapy, practices and definitions varied widely. We evaluated the feasibility of collecting routine data to standardize adherence measurement using a draft set of indicators. Methods Targeting 20 facilities each in Ethiopia, Kenya, Rwanda, and Uganda, in each facility we interviewed up to 30 patients, examined 100 patient records, and interviewed staff. Results In 78 facilities, we interviewed a total of 1,631 patients and reviewed 8,282 records. Difficulties in retrieving records prevented data collection in two facilities. Overall, 94.2% of patients reported perfect adherence; dispensed medicine covered 91.1% of days in a six month retrospective period; 13.7% of patients had a gap of more than 30 days in their dispensed medication; 75.8% of patients attended clinic on or before the date of their next appointment; and 87.1% of patients attended within 3 days. In each of the four countries, the facility-specific median indicators ranged from: 97%-100% for perfect self-reported adherence, 90%-95% of days covered by dispensed medicines, 2%-19% of patients with treatment gaps of 30 days or more, and 72%-91% of appointments attended on time. Individual facilities varied considerably. The percentages of days covered by dispensed medicine, patients with more than 95% of days covered, and patients with a gap of 30 days or more were all significantly correlated with the percentages of patients who attended their appointments on time, within 3 days, or within 30 days of their appointment. Self reported recent adherence in exit interviews was significantly correlated only with the percentage of patients who attended within 3 days of their appointment. Conclusions Field tests showed that data to measure adherence can be collected systematically from health facilities in resource-poor settings. The clinical validity of these

  18. Identifying Key Features, Cutting Edge Cloud Resources, and Artificial Intelligence Tools to Achieve User-Friendly Water Science in the Cloud

    Science.gov (United States)

    Pierce, S. A.

    2017-12-01

    Decision making for groundwater systems is becoming increasingly important, as shifting water demands increasingly impact aquifers. As buffer systems, aquifers provide room for resilient responses and augment the actual timeframe for hydrological response. Yet the pace impacts, climate shifts, and degradation of water resources is accelerating. To meet these new drivers, groundwater science is transitioning toward the emerging field of Integrated Water Resources Management, or IWRM. IWRM incorporates a broad array of dimensions, methods, and tools to address problems that tend to be complex. Computational tools and accessible cyberinfrastructure (CI) are needed to cross the chasm between science and society. Fortunately cloud computing environments, such as the new Jetstream system, are evolving rapidly. While still targeting scientific user groups systems such as, Jetstream, offer configurable cyberinfrastructure to enable interactive computing and data analysis resources on demand. The web-based interfaces allow researchers to rapidly customize virtual machines, modify computing architecture and increase the usability and access for broader audiences to advanced compute environments. The result enables dexterous configurations and opening up opportunities for IWRM modelers to expand the reach of analyses, number of case studies, and quality of engagement with stakeholders and decision makers. The acute need to identify improved IWRM solutions paired with advanced computational resources refocuses the attention of IWRM researchers on applications, workflows, and intelligent systems that are capable of accelerating progress. IWRM must address key drivers of community concern, implement transdisciplinary methodologies, adapt and apply decision support tools in order to effectively support decisions about groundwater resource management. This presentation will provide an overview of advanced computing services in the cloud using integrated groundwater management case

  19. Asia's role in mitigating climate change: A technology and sector specific analysis with ReMIND-R

    International Nuclear Information System (INIS)

    Luderer, Gunnar; Pietzcker, Robert C.; Kriegler, Elmar; Haller, Markus; Bauer, Nico

    2012-01-01

    We use the ReMIND-R model to analyze the role of Asia in the context of a global effort to mitigate climate change. We introduce a novel method of secondary energy based mitigation shares, which allows us to quantify the economic mitigation potential of technologies in different regions and final energy carriers. The 2005 share of Asia in global CO 2 emissions amounts to 38%, and is projected to grow to 53% under business-as-usual until the end of the century. Asia also holds a large fraction of the global mitigation potential. A broad portfolio of technologies is deployed in the climate policy scenarios. We find that biomass in combination with CCS, other renewables, and end-use efficiency each make up a large fraction of the global mitigation potential, followed by nuclear and fossil CCS. We find considerable differences in decarbonization patterns across the final energy types electricity, heat and transport fuels. Regional differences in technology use are a function of differences in resource endowments, and structural differences in energy end use. Under climate policy, a substantial mitigation potential of non-biomass renewables emerges for China and other developing countries of Asia (OAS). Asia also accounts for the dominant share of the global mitigation potential of nuclear energy. In view of the substantial near term investments into new energy infrastructure in China and India, early adoption of climate policy prevents lock-in into carbon intensive infrastructure and thus leads to a much higher long-term mitigation potential. - Highlights: ► We develop a novel methodology for the attribution of emission reductions to technologies. ► Asia accounts for a substantial and increasing share of global CO 2 emissions. ► A broad portfolio of technologies contributes to emission reductions. ► Early action increases the long term mitigation potential of China and India.

  20. Get the Basics Right: A Description of the Key Priorities for Establishing a Neonatal Service in a Resource-Limited Setting in Cambodia.

    Science.gov (United States)

    Fox-Lewis, Shivani; Genasci Smith, Wyatt; Lor, Vary; McKellar, Gregor; Phal, Chea; Fox-Lewis, Andrew; Turner, Paul; Neou, Leakhena; Turner, Claudia

    2018-05-28

    Worldwide, reduction in under-five mortality has not sufficiently included neonates, who represent 45% of deaths in children of age under five years. The least progress has been observed in resource-limited settings. This mixed methods study conducted at a Cambodian non-governmental paediatric hospital described the key priorities of the ongoing neonatal service. Routinely collected data from the hospital and microbiology databases included the number of admissions, discharges and deaths and the number of cases of bacteraemias (2011-2016). Semi-structured interviews with the management staff explored the essential features of the service. There were 2127 neonatal admissions and 247 deaths. The incidence of facility-based neonatal mortality decreased by 81%. Bacteraemic healthcare-associated infections decreased by 68%. A dedicated area for neonatal care was perceived as crucial, allowing better infection control and delivery of staff training. In this hospital, the neonatal service prioritized basic measures, particularly, having a dedicated neonatal area. Facility-based mortality and bacteraemic healthcare-associated infections decreased.

  1. A discussion of key values to inform the design and delivery of services for HIV-affected women and couples attempting pregnancy in resource-constrained settings.

    Science.gov (United States)

    Heffron, Renee; Davies, Natasha; Cooke, Ian; Kaida, Angela; Mergler, Reid; van der Poel, Sheryl; Cohen, Craig R; Mmeje, Okeoma

    2015-01-01

    HIV-affected women and couples often desire children and many accept HIV risk in order to attempt pregnancy and satisfy goals for a family. Risk reduction strategies to mitigate sexual and perinatal HIV transmission include biomedical and behavioural approaches. Current efforts to integrate HIV and reproductive health services offer prime opportunities to incorporate strategies for HIV risk reduction during pregnancy attempts. Key client and provider values about services to optimize pregnancy in the context of HIV risk provide insights for the design and implementation of large-scale "safer conception" programmes. Through our collective experience and discussions at a multi-disciplinary international World Health Organization-convened workshop to initiate the development of guidelines and an algorithm of care to support the delivery of services for HIV-affected women and couples attempting pregnancy, we identified four values that are key to the implementation of these programmes: (1) understanding fertility care and an ability to identify potential fertility problems; (2) providing equity of access to resources enabling informed decision-making about reproductive choices; (3) creating enabling environments that reduce stigma associated with HIV and infertility; and (4) creating enabling environments that encourage disclosure of HIV status and fertility status to partners. Based on these values, recommendations for programmes serving HIV-affected women and couples attempting pregnancy include the following: incorporation of comprehensive reproductive health counselling; training to support the transfer and exchange of knowledge between providers and clients; care environments that reduce the stigma of childbearing among HIV-affected women and couples; support for safe and voluntary disclosure of HIV and fertility status; and increased efforts to engage men in reproductive decision-making at times that align with women's desires. Programmes, policies and guidelines

  2. To Which Degree Does Sector Specific Standardization Make Life Cycle Assessments Comparable?—The Case of Global Warming Potential of Smartphones

    Directory of Open Access Journals (Sweden)

    Anders S. G. Andrae

    2014-11-01

    Full Text Available Here attributional life cycle assessments (LCAs for the same smartphone model are presented by two different organizations (Orange, OGE and Huawei, HuW and the effect of different modeling approach is analyzed. A difference of around 32% (29.6 kg and 39.2 kg for CO2e baseline scores is found using same study object and sector specific LCA standard, however, different metrics, emission intensities, and LCA software programs. The CO2e difference is reduced to 12% (29.9 kg and 33.5 kg when OGE use HuW metrics for use phase power consumption and total mass, and when HuW use OGE metrics for gold mass and silicon die area. Further, a probability test confirms that present baseline climate change results, for one specific study object modeled with two largely different and independent LCA modeling approaches, are comparable if both use the European Telecommunications Standard Institute (ETSI LCA standard. The general conclusion is that the ETSI LCA standard strongly facilitates comparable CC results for technically comparable smartphone models. Moreover, thanks to the reporting requirements of ETSI LCA standard, a clear understanding of the differences between LCA modeling approaches is obtained. The research also discusses the magnitude of the CO2e reduction potential in the life cycle of smartphones.

  3. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  4. Making Higher Education More Affordable, One Course Reading at a Time: Academic Libraries as Key Advocates for Open Access Textbooks and Educational Resources

    Science.gov (United States)

    Okamoto, Karen

    2013-01-01

    Open access textbooks (OATs) and educational resources (OERs) are being lauded as a viable alternative to costly print textbooks. Some academic libraries are joining the OER movement by creating guides to open repositories. Others are promoting OATs and OERs, reviewing them, and even helping to create them. This article analyzes how academic…

  5. Spatial distribution of trachoma cases in the City of Bauru, State of São Paulo, Brazil, detected in 2006: defining key areas for improvement of health resources

    Directory of Open Access Journals (Sweden)

    Carlos Alberto Macharelli

    2013-04-01

    Full Text Available Introduction The objective of this study was to analyze the spatial behavior of the occurrence of trachoma cases detected in the City of Bauru, State of São Paulo, Brazil, in 2006 in order to use the information collected to set priority areas for optimization of health resources. Methods the trachoma cases identified in 2006 were georeferenced. The data evaluated were: schools where the trachoma cases studied, data from the 2000 Census, census tract, type of housing, water supply conditions, distribution of income and levels of education of household heads. In the Google Earth® software and TerraView® were made descriptive spatial analysis and estimates of the Kernel. Each area was studied by interpolation of the density surfaces exposing events to facilitate to recognize the clusters. Results Of the 66 cases detected, only one (1.5% was not a resident of the city's outskirts. A positive association was detected of trachoma cases and the percentage of heads of household with income below three minimum wages and schooling under eight years of education. Conclusions The recognition of the spatial distribution of trachoma cases coincided with the areas of greatest social inequality in Bauru City. The micro-areas identified are those that should be prioritized in the rationalization of health resources. There is the possibility of using the trachoma cases detected as an indicator of performance of micro priority health programs.

  6. Spatial distribution of trachoma cases in the City of Bauru, State of São Paulo, Brazil, detected in 2006: defining key areas for improvement of health resources

    Directory of Open Access Journals (Sweden)

    Carlos Alberto Macharelli

    2013-02-01

    Full Text Available Introduction The objective of this study was to analyze the spatial behavior of the occurrence of trachoma cases detected in the City of Bauru, State of São Paulo, Brazil, in 2006 in order to use the information collected to set priority areas for optimization of health resources. Methods the trachoma cases identified in 2006 were georeferenced. The data evaluated were: schools where the trachoma cases studied, data from the 2000 Census, census tract, type of housing, water supply conditions, distribution of income and levels of education of household heads. In the Google Earth® software and TerraView® were made descriptive spatial analysis and estimates of the Kernel. Each area was studied by interpolation of the density surfaces exposing events to facilitate to recognize the clusters. Results Of the 66 cases detected, only one (1.5% was not a resident of the city's outskirts. A positive association was detected of trachoma cases and the percentage of heads of household with income below three minimum wages and schooling under eight years of education. Conclusions The recognition of the spatial distribution of trachoma cases coincided with the areas of greatest social inequality in Bauru City. The micro-areas identified are those that should be prioritized in the rationalization of health resources. There is the possibility of using the trachoma cases detected as an indicator of performance of micro priority health programs.

  7. Bio-coal, torrefied lignocellulosic resourcesKey properties for its use in co-firing with fossil coal – Their status

    International Nuclear Information System (INIS)

    Agar, D.; Wihersaari, M.

    2012-01-01

    Bio-coal has received generous amounts of media attention because it potentially allows greater biomass co-firing rates and net CO 2 emission reductions in pulverised-coal power plants. However, little scientific research has been published on the feasibility of full-scale commercial production of bio-coal. Despite this, several companies and research organisations worldwide have been developing patented bio-coal technologies. Are the expectations of bio-coal realistic and are they based on accepted scientific data? This paper examines strictly peer-reviewed scientific publications in order to find an answer. The findings to date on three key properties of torrefied biomass are presented and reviewed. These properties are: the mass and energy balance of torrefaction, the friability of the product and the equilibrium moisture content of torrefied biomass. It is these properties that will have a major influence on the feasibility of bio-coal production regardless of reactor technology employed in production. The presented results will be of use in modelling commercial production of bio-coal in terms of economics and green-house gas emission balance. -- Highlights: ► A technical note on torrefaction research results. ► Presents experimental values on three key properties. ► Mass-energy balance, grindability, equilibrium moisture content of torrefied biomass. ► Results useful for modelling bio-coal production schemes.

  8. Capacity building for sustainable development. One of the five key areas to sustainable development where progress is possible with the resources and technologies at our disposal today

    International Nuclear Information System (INIS)

    2002-01-01

    Today, approximately one third of the world's population lack access to modern energy services. Poverty eradication and sustainable development will require not just access, but also clean and affordable energy services. Expanding access to such services requires careful planning. The International Atomic Energy Agency (IAEA) helps developing countries and economies in transition build their energy planning capabilities with respect to all three pillars of sustainable development - economic, environmental, and social. The Agency develops and transfers planning models tailored to their special circumstances. It transfers the latest data on technologies, resources, and economics. It trains local experts. It jointly analyzes national options and interprets results. And the IAEA helps establish the continuing local planning expertise needed to independently chart national paths to sustainable development

  9. A Bibliometric Study of the Resource-based View (RB V in International Business Research Using Barney (1991 as a Key Marker

    Directory of Open Access Journals (Sweden)

    Manuel Portugal Ferreira

    2016-06-01

    Full Text Available In this study we examine how the RBV has been included in IB research over the past twenty years using Barney’s (1991 article as a key marker. Bibliometric techniques analyzing citations, co-citations and research themes delved into, were applied to the articles published between 1991 and 2010 in five leading IB journals. Data was collected from the Social Science Citation Index (SSCI of the Institute for Scientific Information (ISI. We conclude that the RBV has been having an important impact on most of IB research themes and has been driving a large portion of current thought on the multinational corporations’ strategies, location choices and internationalization. Although, we also find areas that have been explored to much lesser extent. In addition to identify the stock of accumulated knowledge, this study contributes to highlight areas for future inquiry on how IB studies may further benefit from an RBV-oriented perspective.

  10. Hanford Analytical Services Management: One of the keys to effectively managing the Hanford Site in an environment of competing resources and priorities

    International Nuclear Information System (INIS)

    Wanek, D.M.; Mooers, G.C.; Schubert, S.A.

    1994-02-01

    The Quality Improvement Team recognized that a true partnership between RL and the Hanford Site contractors had to be established to (1) identify what the analytical needs were for the site, both short and long term, (2) determine how to meet those needs, whether by using onsite capability or contracting offsite services, and (3) ensure that all analytical services meet the high level of quality demanded by the end users of the data. The Hanford Analytical Services Management (HASM) organization was established from this concept. What makes HASM unique and virtually guarantees success is that all the participants within HASM, site contractors and RL, have parity. This ensures that the best interests of the Hanford Site are implemented and minimizes the normal parochialism when multiple contractors are competing for the same work. The HASM concept provides for consistent management to balance the analytical needs with the limited resources identified for analytical services at the Hanford Site. By contracting for analytical services, HASM provides a mechanism to meet site goals of increased commercialization

  11. Improving productivity in agriculture. One of the five key areas to sustainable development where progress is possible with the resources and technologies at our disposal today

    International Nuclear Information System (INIS)

    2002-01-01

    Despite progress made since the 1996 World Food Summit that set the goal of halving the number of undernourished people by the 2015, serious food insecurity persists in many parts of the world. Although more food is being produced worldwide than ever before, some 800 million people are still chronically malnourished. Improving agricultural productivity is a driving force for both economic and social development. When agriculture falters, income sources are lost, social ties are disrupted, and, as a result, societies become more mobile. Up-to-date technologies, improved plant and animal stock, and better soil and water management practices not only combat food insecurity, they are also important to achieving sustainable agriculture practices essential to maintaining an appropriate balance between conservation and use of all the resources required to grow crops and raise livestock. Through its programme in Food and Agriculture operated with the Food and Agriculture Organization (FAO), the International Atomic Energy Agency (IAEA) works to enhance capacities at national and international levels for identifying and alleviating constraints to sustainable food security by facilitating development and adoption of nuclear and related biotechnologies. With an annual budget of nearly $10 million, this programme helps Member States to improve productivity in agriculture, particularly through better water and soil management practices, efficient crop nutrition, and control of insect pests

  12. From invasion to latency: intracellular noise and cell motility as key controls of the competition between resource-limited cellular populations

    KAUST Repository

    Guerrero, Pilar

    2015-04-02

    © 2015, Springer-Verlag Berlin Heidelberg. In this paper we analyse stochastic models of the competition between two resource-limited cell populations which differ in their response to nutrient availability: the resident population exhibits a switch-like response behaviour while the invading population exhibits a bistable response. We investigate how noise in the intracellular regulatory pathways and cell motility influence the fate of the incumbent and invading populations. We focus initially on a spatially homogeneous system and study in detail the role of intracellular noise. We show that in such well-mixed systems, two distinct regimes exist: In the low (intracellular) noise limit, the invader has the ability to invade the resident population, whereas in the high noise regime competition between the two populations is found to be neutral and, in accordance with neutral evolution theory, invasion is a random event. Careful examination of the system dynamics leads us to conclude that (i) even if the invader is unable to invade, the distribution of survival times, PS(t), has a fat-tail behaviour (PS(t)∼t-1) which implies that small colonies of mutants can coexist with the resident population for arbitrarily long times, and (ii) the bistable structure of the invading population increases the stability of the latent population, thus increasing their long-term likelihood of survival, by decreasing the intensity of the noise at the population level. We also examine the effects of spatial inhomogeneity. In the low noise limit we find that cell motility is positively correlated with the aggressiveness of the invader as defined by the time the invader takes to invade the resident population: the faster the invasion, the more aggressive the invader.

  13. From invasion to latency: intracellular noise and cell motility as key controls of the competition between resource-limited cellular populations

    KAUST Repository

    Guerrero, Pilar; Byrne, Helen M.; Maini, Philip K.; Alarcó n, Tomá s

    2015-01-01

    © 2015, Springer-Verlag Berlin Heidelberg. In this paper we analyse stochastic models of the competition between two resource-limited cell populations which differ in their response to nutrient availability: the resident population exhibits a switch-like response behaviour while the invading population exhibits a bistable response. We investigate how noise in the intracellular regulatory pathways and cell motility influence the fate of the incumbent and invading populations. We focus initially on a spatially homogeneous system and study in detail the role of intracellular noise. We show that in such well-mixed systems, two distinct regimes exist: In the low (intracellular) noise limit, the invader has the ability to invade the resident population, whereas in the high noise regime competition between the two populations is found to be neutral and, in accordance with neutral evolution theory, invasion is a random event. Careful examination of the system dynamics leads us to conclude that (i) even if the invader is unable to invade, the distribution of survival times, PS(t), has a fat-tail behaviour (PS(t)∼t-1) which implies that small colonies of mutants can coexist with the resident population for arbitrarily long times, and (ii) the bistable structure of the invading population increases the stability of the latent population, thus increasing their long-term likelihood of survival, by decreasing the intensity of the noise at the population level. We also examine the effects of spatial inhomogeneity. In the low noise limit we find that cell motility is positively correlated with the aggressiveness of the invader as defined by the time the invader takes to invade the resident population: the faster the invasion, the more aggressive the invader.

  14. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  15. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  16. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  17. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  18. Interspecific Competition and Trade-offs in Resource Allocation are the Key to Successful Growth of Seedlings of White Spruce (Picea glauca (Moench) Voss) at Subarctic Treelines in Warming Alaska.

    Science.gov (United States)

    Okano, K.; Bret-Harte, M. S.

    2015-12-01

    Alpine treelines in Alaska have advanced for the past 50 years in response to the recent climate warming. However, further increases in temperatures may cause treeline species drought stress and increase susceptibility to insect outbreaks and fire. Complex factors such as soil conditions and plant species composition also impact the growth of seedlings, which are essential to sustain boreal forests. Our goals were to assess 1) the current optimal elevation for the treeline species Picea glauca (white spruce) seedlings and how it is altered by climate change, and 2) their growth/survival strategies at each environmental site. We studied the growth response of spruce seedlings along an altitudinal gradient at 6 sites, consisting of tundra, forest, or transitional ecotone in Denali National Park and one forest site in Fairbanks, AK. In May 2012, four-month old seedlings were planted with or without naturally occurring plants to compare the presence or absence of the interspecific interaction. Summer temperatures were increased by one small greenhouse per site. Over 2 growing seasons, growth was measured non-destructively, and then the seedlings were harvested. Relative growth rate (RGR) in height was increased significantly as the altitude was increased. Elevated temperature increased height only in seedlings at a high-altitude forest. Seedlings with neighboring plants had a higher RGR in height than seedlings that had neighbors removed, while significantly wider diameters were measured from the seedlings without neighbors. A weak trend of declining diameter width with increasing altitudes was seen. Seedlings that grew taller did not grow their stems wider, indicating trade-offs in resource allocation. None of the altitudinal sites had a clear advantage for the growth of the seedlings. Habitat microclimate and the interaction with other species could be more important than the altitude or temperatures and hence, key to the survival and growth of spruce seedlings in

  19. Algae Resources

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-06-01

    Algae are highly efficient at producing biomass, and they can be found all over the planet. Many use sunlight and nutrients to create biomass, which contain key components—including lipids, proteins, and carbohydrates— that can be converted and upgraded to a variety of biofuels and products. A functional algal biofuels production system requires resources such as suitable land and climate, sustainable management of water resources, a supplemental carbon dioxide (CO2) supply, and other nutrients (e.g., nitrogen and phosphorus). Algae can be an attractive feedstock for many locations in the United States because their diversity allows for highpotential biomass yields in a variety of climates and environments. Depending on the strain, algae can grow by using fresh, saline, or brackish water from surface water sources, groundwater, or seawater. Additionally, they can grow in water from second-use sources such as treated industrial wastewater; municipal, agricultural, or aquaculture wastewater; or produced water generated from oil and gas drilling operations.

  20. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  1. Online Resources

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics; Online Resources. Journal of Genetics. Online Resources. Volume 97. 2018 | Online resources. Volume 96. 2017 | Online resources. Volume 95. 2016 | Online resources. Volume 94. 2015 | Online resources. Volume 93. 2014 | Online resources. Volume 92. 2013 | Online resources ...

  2. Sector-specific issues and reporting methodologies supporting the General Guidelines for the voluntary reporting of greenhouse gases under Section 1605(b) of the Energy Policy Act of 1992. Volume 2: Part 4, Transportation sector; Part 5, Forestry sector; Part 6, Agricultural sector

    International Nuclear Information System (INIS)

    1994-10-01

    This volume, the second of two such volumes, contains sector-specific guidance in support of the General Guidelines for the voluntary reporting of greenhouse gas emissions and carbon sequestration. This voluntary reporting program was authorized by Congress in Section 1605(b) of the Energy Policy Act of 1992. The General Guidelines, bound separately from this volume, provide the overall rationale for the program, discuss in general how to analyze emissions and emission reduction/carbon sequestration projects, and address programmatic issues such as minimum reporting requirements, time parameters, international projects, confidentiality, and certification. Together, the General Guidelines and the guidance in these supporting documents will provide concepts and approaches needed to prepare the reporting forms. This second volume of sector-specific guidance covers the transportation sector, the forestry sector, and the agricultural sector

  3. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  4. Herpes - resources

    Science.gov (United States)

    Genital herpes - resources; Resources - genital herpes ... following organizations are good resources for information on genital herpes : March of Dimes -- www.marchofdimes.org/complications/sexually- ...

  5. Water resources

    International Nuclear Information System (INIS)

    2002-01-01

    The report entitled Climate Change Impacts and Adaptation : A Canadian Perspective, presents a summary of research regarding the impacts of climate change on key sectors over the past five years as it relates to Canada. This chapter on water resources describes how climate change will affect the supply of water in Canada. Water is one of Canada's greatest resources, which contributes about $7.5 to 23 billion per year to the Canadian economy. The decisions taken to adapt to climate change within the water resources sector will have profound implications in many other areas such as agriculture, human health, transportation and industry. The water related problems include water quality issues that relate to water shortages from droughts, or excesses from floods. The Intergovernmental Panel on Climate Change forecasts an increase in global average surface air temperatures of 1.4 to 5.8 degrees C by 2100. Such a change would impact the hydrological cycle, affecting runoff, evaporation patterns, and the amount of water stored in glaciers, lakes, wetlands and groundwater. The uncertainty as to the magnitude of these changes is due to the difficulty that climate models have in projecting future changes in regional precipitation patterns and extreme events. This chapter presents potential impacts of climate change on water resources in the Yukon, British Columbia, the Prairies, the Great Lakes basin, the Atlantic provinces, and the Arctic and Subarctic. The associated concerns for each region were highlighted. Adaptation research has focused on the impacts of supply and demand, and on options to adapt to these impacts. 60 refs., 2 tabs., 1 fig

  6. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  7. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  8. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  9. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  10. Key Issues in the Application of Knowledge Management in Education

    National Research Council Canada - National Science Library

    Mendoza, George A

    2005-01-01

    .... This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM...

  11. Resource Structuring and Ambidexterity

    DEFF Research Database (Denmark)

    Ma, Yucheng; Li, Peter Ping

    -shaped effect on organizational ambidexterity in new ventures. Further, because of the traditional culture and economic transition characteristics, new ventures actively leverage managerial ties as key social relations to obtain special resources or nurture business transactions. We propose that ties with other......Focusing on how resource structuring mechanisms and managerial ties influence organizational ambidexterity of new ventures in emerging economy, this study explores the effects of resource structuring mechanisms (i.e., resource acquiring and resource accumulating) on organizational ambidexterity....... It further examines the moderating effects of managerial ties, (i.e., ties with other firms and ties with the government) on the above relationships. Survey data from China¡¯s 202 new ventures demonstrates that the resource acquiring has an inverted U-shaped effect whereas the resource accumulating has a U...

  12. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  13. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  14. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  15. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  16. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  17. Comment on: "Recent revisions of phosphate rock reserves and resources: a critique" by Edixhoven et al. (2014) - clarifying comments and thoughts on key conceptions, conclusions and interpretation to allow for sustainable action

    Science.gov (United States)

    Scholz, R. W.; Wellmer, F.-W.

    2016-02-01

    Several recent papers deal with concerns about the longevity of the supply of the mineral phosphorus. The paper by Edixhoven et al. (2014), for instance, expresses doubts about whether the upward estimate of reserves by the IFDC (2006, 2010) and the USGS (2010) provides an accurate, reliable, and comparable picture, as it is based on reports that do not clearly differentiate between phosphate ore and phosphate products (i.e., marketable phosphate rock concentrate). Further, the indistinct use of the terms reserves and resources is criticized. Edixhoven et al. (2014) call for a differentiated inventory of world phosphate reserves including "guidelines which determine the appropriate drill hole distances and a detailed granularity". The claim that "humanity is on the safe side" with respect to future phosphate supply is doubted, as the validity of the IFDC's upgrading of the Moroccan data to 50 Gt phosphate is questioned. The main achievement of Edixhoven et al. (2014) is to elaborate that in the literature frequently used data on phosphate rock ore and phosphate concentrate are not properly distinguished, resulting in incorrect summary figures. In addition, it is commendable to raise the question how transparency concerning reserve and resources data and information on the geopotential of phosphate can be achieved because phosphorus is a special element. As fertilizer, it cannot be substituted and there are no unlimited resources as for the other main nutrients potassium in sea water and nitrogen in the air. However, the paper by Edixhoven et al. (2014) contains in the opinion of the authors some incorrect statements. Our comment elaborates first that several statements, such as that the upgrading of the Moroccan data is "solely based" on one scientific paper, are incorrect. Secondly, the paper comments on and illuminates a set of, in our opinion, misleading statements. These include the fact that the dynamic nature of reserves (which depend on price, technology

  18. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  19. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  20. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  1. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  2. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  3. ClinicalKey: a point-of-care search engine.

    Science.gov (United States)

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  4. Sustainability of common pool resources

    OpenAIRE

    Timilsina, Raja Rajendra; Kotani, Koji; Kamijo, Yoshio

    2017-01-01

    Sustainability has become a key issue in managing natural resources together with growing concerns for capitalism, environmental and resource problems. We hypothesize that the ongoing modernization of competitive societies, which we refer to as "capitalism," affects human nature for utilizing common pool resources, thus compromising sustainability. To test this hypothesis, we design and implement a set of dynamic common pool resource games and experiments in the following two types of Nepales...

  5. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  6. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  7. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  8. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  9. Human Resources Development: The Key to Sustainable Public ...

    African Journals Online (AJOL)

    Journal of Librarianship and Information Science in Africa. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 1, No 1 (2001) >. Log in or Register to get access to full text downloads.

  10. 1 Title: Enhancing Barza with key resources and information for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    nbassily

    2014-04-30

    Apr 30, 2014 ... Activity 3: Adapt e-Learning courses and materials to Barza to build skills for effective ... Provide these broadcasters with easy and reliable access to essential, ... In order to produce good agricultural programming, broadcasters need ..... Barza is a unique service, which is both exciting and challenging.

  11. In support of water-resource planning – highlighting key ...

    African Journals Online (AJOL)

    DRIFT was used to provide flow scenarios, and descriptive summaries of their consequences in terms of the condition of the river ecosystem, for examination and comparison by decision makers, managers and users. The methods used and results obtained in that study are presented and discussed in the light of the study ...

  12. Perceptions of mentoring: Expectations of a key resource for higher ...

    African Journals Online (AJOL)

    In the context of higher education, the role of mentoring new staff is variously established, though often informal. It is sometimes associated with research supervision, but more recently the increasing sophistication of the roles of staff has seen the introduction of `mentoring' to manage induction. In South Africa, a strong ...

  13. Responsible Mining: The Key to Profitable Resource Development

    Directory of Open Access Journals (Sweden)

    Robert Goodland

    2012-08-01

    Full Text Available Better mining corporations want to adopt “Responsible Mining”. This paper outlines the essentials of responsible mining and offers a guide to corporations who want become responsible. Eight principles are discussed: (1 Social and environmental assessment, (2 Transparency, (3 Acceptance by stakeholders, (4 Food production trumps questionable mining, (5 Compliance with international standards, (6 Corporate prequalification, (7 Insurance and performance bonds, and (8 Royalties, taxes and fees. These principles are followed by a discussion of No-Go Zones to mining: why some types of sites should be off-limits to all mining. The Annex on Compensatory Offsets suggests that, on occasion, there may be exceptions to a No-Go Zone.

  14. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  15. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  16. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  17. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  18. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  19. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  20. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  1. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  2. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  3. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  4. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  5. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  6. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  7. Water Resources

    International Nuclear Information System (INIS)

    Abira, M.A.

    1997-01-01

    Water is essential for life and ecological sustenance; its availability is essential component of national welfare and productivity.The country's socio-economic activities are largely dependent on the natural endowment of water resources. Kenya's water resources comprises of surface waters (rivers, lakes and wetlands) and ground water. Surface water forms 86% of total water resources while the rest is ground water Geological, topographical and climatic factors influence the natural availability and distribution of water with the rainfall distribution having the major influence. Water resources in Kenya are continuously under threat of depletion and quality degradation owing to rising population, industrialization, changing land use and settlement activities as well as natural changes. However, the anticipated climate change is likely to exacerbate the situation resulting in increased conflict over water use rights in particular, and, natural resource utilisation in general. The impacts of climate change on the water resources would lead to other impacts on environmental and socio-economic systems

  8. Do sector-specific shocks explain aggregate fluctuations?

    DEFF Research Database (Denmark)

    Busato, Francesco; Girardi, Alessandro; Argentiero, Amedeo

    -sector productivity fluctuations.(ii) Cross-sector technology shocks have very little explanatory power on productivity andemployment, while cross-sector non-technology shocks explain more than 60 percent of employmentthat is reallocated across sector; this suggests that the shocks’ transmission mechanism....... Thenon-durable sector may follow a standard RBC model, while the durable sector should incorporateconsumption habit formation....

  9. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  10. Ocean energy: key legal issues and challenges

    International Nuclear Information System (INIS)

    Wright, Glen; Rochette, Julien; O'Hagan, Anne Marie; De Groot, Jiska; Leroy, Yannick; Soininen, Niko; Salcido, Rachael; Castelos, Montserrat Abad; Jude, Simon; Kerr, Sandy

    2015-01-01

    Ocean energy is a novel renewable energy resource being developed as part of the push towards a 'Blue Economy'. The literature on ocean energy has focused on technical, environmental, and, increasingly, social and political aspects. Legal and regulatory factors have received less attention, despite their importance in supporting this new technology and ensuring its sustainable development. In this Issue Brief, we set out some key legal challenges for the development of ocean energy technologies, structured around the following core themes of marine governance: (i) international law; (ii) environmental impacts; (iii) rights and ownership; (iv) consenting processes; and (v) management of marine space and resources. (authors)

  11. SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING IN CLOUD COMPUTING

    OpenAIRE

    B. Muni Lavanya; C. Shoba Bindu

    2016-01-01

    The objective the work is intended to highlight the key features and afford finest future directions in the research community of Resource Allocation, Resource Scheduling and Resource management from 2009 to 2016. Exemplifying how research on Resource Allocation, Resource Scheduling and Resource management has progressively increased in the past decade by inspecting articles, papers from scientific and standard publications. Survey materialized in three-fold process. Firstly, investigate on t...

  12. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  13. Creativity Management Key Elements

    Directory of Open Access Journals (Sweden)

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  14. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  15. Uranium resources

    International Nuclear Information System (INIS)

    Gangloff, A.

    1978-01-01

    It is first indicated how to evaluate the mining resources as a function of the cost of production and the degree of certainty in the knowledge of the deposit. A table is given of the world resources (at the beginning 1977) and resources and reserves are compared. There is a concordance between requirements and possible production until 1990. The case of France is examined: known reserves, present and future prospection, present production (In 1978 2200 T of U metal will be produced from 3 French processing plants), production coming from Cogema. A total production of 2000 T in 1980 and 10.000 in 1985 is expected [fr

  16. Seaweed resources

    Digital Repository Service at National Institute of Oceanography (India)

    Deshmukhe, G.V.; Dhargalkar, V.K.; Untawale, A.G.

    The chapter summarizes our present knowledge of the seaweed resources of the Indian Ocean region with regard to the phytogeographical distribution, composition, biomass, utilization, cultivation, conservation and management. The voluminous data...

  17. Arthritis - resources

    Science.gov (United States)

    Resources - arthritis ... The following organizations provide more information on arthritis : American Academy of Orthopaedic Surgeons -- orthoinfo.aaos.org/menus/arthritis.cfm Arthritis Foundation -- www.arthritis.org Centers for Disease Control and Prevention -- www. ...

  18. Mineral resources

    Digital Repository Service at National Institute of Oceanography (India)

    Valsangkar, A.B.

    (placers), biogenous (ooze, limestone) or chemogenous (phosphorites and polymetallic nodules) type. In recent years, hydrothermal deposits, cobalt crust and methane gas hydrates are considered as frontier resources. Their distribution depends upon proximity...

  19. Depression - resources

    Science.gov (United States)

    Resources - depression ... Depression is a medical condition. If you think you may be depressed, see a health care provider. ... following organizations are good sources of information on depression : American Psychological Association -- www.apa.org/topics/depression/ ...

  20. Hemophilia - resources

    Science.gov (United States)

    Resources - hemophilia ... The following organizations provide further information on hemophilia : Centers for Disease Control and Prevention -- www.cdc.gov/ncbddd/hemophilia/index.html National Heart, Lung, and Blood Institute -- www.nhlbi.nih.gov/ ...

  1. Diabetes - resources

    Science.gov (United States)

    Resources - diabetes ... The following sites provide further information on diabetes: American Diabetes Association -- www.diabetes.org Juvenile Diabetes Research Foundation International -- www.jdrf.org National Center for Chronic Disease Prevention and Health Promotion -- ...

  2. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  3. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  4. Forest Resources

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-06-01

    Forest biomass is an abundant biomass feedstock that complements the conventional forest use of wood for paper and wood materials. It may be utilized for bioenergy production, such as heat and electricity, as well as for biofuels and a variety of bioproducts, such as industrial chemicals, textiles, and other renewable materials. The resources within the 2016 Billion-Ton Report include primary forest resources, which are taken directly from timberland-only forests, removed from the land, and taken to the roadside.

  5. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  6. Maximizing Resource Utilization in Video Streaming Systems

    Science.gov (United States)

    Alsmirat, Mohammad Abdullah

    2013-01-01

    Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…

  7. Small Private Key PKS on an Embedded Microprocessor

    OpenAIRE

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor...

  8. Characteristics of Key Update Strategies for Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys...... is one of the essential points in security, which restrict the amount of data that may be exposed when a key is compromised. In this paper, we investigate key update methods that may be used in wireless sensor networks, and benefiting from stochastic model checking we derive characteristics...

  9. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  10. The concept of key success factors: Theory and method

    DEFF Research Database (Denmark)

    Grunert, Klaus G.; Ellegaard, Charlotte

    1992-01-01

    Executive summary: 1. The term key success factors can be used in four different ways: a) as a necessary ingre-dient in a management information system, b) as a unique characteristic of a company, c) as a heuristic tool for managers to sharpen their thinking, d) as a description of the major skills...... and resources required to be successful in a given market. We adopt the last view. 2. The actual key success factors on a market, and those key success factors perceived by decision-makers in companies operating in the market, will be different. A number of psychological mechanisms result in misperceptions...... or resource that a business can i in, which, on the market the business is operating on, explains a major part of the observable differences in perceived value and/or relative costs. 4. Key success factors differ from core skills and resources, which are prerequisites for being on a market, but do not explain...

  11. Teaching Resources

    Science.gov (United States)

    Physics?" Poster Pamphlets/Books/SPIN-UP Resources Making and Sustaining Changes in Undergraduate AAPT.org - American Association of Physics Teachers Skip to content Skip to navigation Skip to local navigation AAPT - American Association of Physics Teachers Go Sign In / Online Services Join

  12. Resource Mobilization

    International Development Research Centre (IDRC) Digital Library (Canada)

    constitute endorsement of the product and is given only for information. ..... point where they could significantly impact an organization's financial viability. This alternative ... putting in place internal systems and processes that enable the resource .... control over the incorporation of non-profit organizations. ..... Accounting.

  13. Resource Mobilization

    International Development Research Centre (IDRC) Digital Library (Canada)

    Annex 1: The Scoping Study on Donor Funding for. Development Research in ... publication of the Resource Mobilization: A Practical Guide for Research .... applied the concept or technique, which validates the practical application of ... some other staff member would write up a grant application addressed to one, two, or a ...

  14. Chemical dependence - resources

    Science.gov (United States)

    Substance use - resources, Drug abuse - resources; Resources - chemical dependence ... are a good resource for information on drug dependence: National Council on Alcoholism and Drug Dependence -- ncadd. ...

  15. 2007 Survey of Energy Resources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-09-15

    This WEC study is a unique comprehensive compilation of global energy resources. Complementing the BP Statistical Review and the World Energy Outlook, it details 16 key energy resources with the latest data provided by 96 WEC Member Committees worldwide. This highly regarded publication is an essential tool for governments, NGOs, industry, academia and the finance community. This 21st edition is the latest in a long series of reviews of the status of the world's major energy resources. It covers not only the fossil fuels but also the major types of traditional and novel sources of energy.

  16. 2007 Survey of Energy Resources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-09-15

    This WEC study is a unique comprehensive compilation of global energy resources. Complementing the BP Statistical Review and the World Energy Outlook, it details 16 key energy resources with the latest data provided by 96 WEC Member Committees worldwide. This highly regarded publication is an essential tool for governments, NGOs, industry, academia and the finance community. This 21st edition is the latest in a long series of reviews of the status of the world's major energy resources. It covers not only the fossil fuels but also the major types of traditional and novel sources of energy.

  17. Uncertainties in key low carbon power generation technologies - Implication for UK decarbonisation targets

    International Nuclear Information System (INIS)

    Kannan, R.

    2009-01-01

    The UK government's economy-wide 60% carbon dioxide reduction target by 2050 requires a paradigm shift in the whole energy system. Numerous analytical studies have concluded that the power sector is a critical contributor to a low carbon energy system, and electricity generation has dominated the policy discussion on UK decarbonisation scenarios. However, range of technical, social and market challenges, combined with alternate market investment strategies mean that large scale deployment of key classes of low carbon electricity technologies is fraught with uncertainty. The UK MARKAL energy systems model has been used to investigate these long-term uncertainties in key electricity generation options. A range of power sector specific parametric sensitivities have been performed under a 'what-if' framework to provide a systematic exploration of least-cost energy system configurations under a broad, integrated set of input assumptions. In this paper results of six sensitivities, via restricted investments in key low carbon technologies to reflect their technical and political uncertainties, and an alternate investment strategies from perceived risk and other barriers, have been presented. (author)

  18. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  19. Improving the income taxation of the resource sector in Canada

    International Nuclear Information System (INIS)

    2003-03-01

    In October 2000, the Government of Canada announced a reduction in the general statutory rate or corporate income tax, from 28 to 21 per cent over 5 years. The reduction applied to the most highly taxed sectors, including services, but not to manufacturing and processing. The reduction did not apply to income from the non-renewable resource sector which was subject to a sector-specific income tax provision. In 2003, the government expressed an interest to extend the lower tax rate to resource income, and phase it in over a 5 year period. The proposed change is expected to improve the international competitiveness of the Canadian resource sector, particularly in relation to the United States. A common statutory rate of corporate income tax for all sectors promotes the efficient development of Canada's natural resource base. The proposed new structure is simple to administer and sends clear signals to investors. The 2003 federal budget also proposed the elimination of the federal capital tax over a 5 year period in order to strengthen the Canadian tax advantage for investment. 2 tabs., 3 figs

  20. Uranium resources

    International Nuclear Information System (INIS)

    1976-01-01

    This is a press release issued by the OECD on 9th March 1976. It is stated that the steep increases in demand for uranium foreseen in and beyond the 1980's, with doubling times of the order of six to seven years, will inevitably create formidable problems for the industry. Further substantial efforts will be needed in prospecting for new uranium reserves. Information is given in tabular or graphical form on the following: reasonably assured resources, country by country; uranium production capacities, country by country; world nuclear power growth; world annual uranium requirements; world annual separative requirements; world annual light water reactor fuel reprocessing requirements; distribution of reactor types (LWR, SGHWR, AGR, HWR, HJR, GG, FBR); and world fuel cycle capital requirements. The information is based on the latest report on Uranium Resources Production and Demand, jointly issued by the OECD's Nuclear Energy Agency (NEA) and the International Atomic Energy Agency. (U.K.)

  1. Resource Abundance and Resource Dependence in China

    NARCIS (Netherlands)

    Ji, K.; Magnus, J.R.; Wang, W.

    2010-01-01

    This paper reconsiders the ‘curse of resources’ hypothesis for the case of China, and distinguishes between resource abundance, resource rents, and resource dependence. Resource abundance and resource rents are shown to be approximately equivalent, and their association with resource dependence

  2. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  3. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  4. Identifying ELIXIR Core Data Resources.

    Science.gov (United States)

    Durinx, Christine; McEntyre, Jo; Appel, Ron; Apweiler, Rolf; Barlow, Mary; Blomberg, Niklas; Cook, Chuck; Gasteiger, Elisabeth; Kim, Jee-Hyub; Lopez, Rodrigo; Redaschi, Nicole; Stockinger, Heinz; Teixeira, Daniel; Valencia, Alfonso

    2016-01-01

    The core mission of ELIXIR is to build a stable and sustainable infrastructure for biological information across Europe. At the heart of this are the data resources, tools and services that ELIXIR offers to the life-sciences community, providing stable and sustainable access to biological data. ELIXIR aims to ensure that these resources are available long-term and that the life-cycles of these resources are managed such that they support the scientific needs of the life-sciences, including biological research. ELIXIR Core Data Resources are defined as a set of European data resources that are of fundamental importance to the wider life-science community and the long-term preservation of biological data. They are complete collections of generic value to life-science, are considered an authority in their field with respect to one or more characteristics, and show high levels of scientific quality and service. Thus, ELIXIR Core Data Resources are of wide applicability and usage. This paper describes the structures, governance and processes that support the identification and evaluation of ELIXIR Core Data Resources. It identifies key indicators which reflect the essence of the definition of an ELIXIR Core Data Resource and support the promotion of excellence in resource development and operation. It describes the specific indicators in more detail and explains their application within ELIXIR's sustainability strategy and science policy actions, and in capacity building, life-cycle management and technical actions. The identification process is currently being implemented and tested for the first time. The findings and outcome will be evaluated by the ELIXIR Scientific Advisory Board in March 2017. Establishing the portfolio of ELIXIR Core Data Resources and ELIXIR Services is a key priority for ELIXIR and publicly marks the transition towards a cohesive infrastructure.

  5. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  6. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  7. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  8. Uranium resource processing. Secondary resources

    International Nuclear Information System (INIS)

    Gupta, C.K.; Singh, H.

    2003-01-01

    This book concentrates on the processing of secondary sources for recovering uranium, a field which has gained in importance in recent years as it is environmental-friendly and economically in tune with the philosophy of sustainable development. Special mention is made of rock phosphate, copper and gold tailings, uranium scrap materials (both natural and enriched) and sea water. This volume includes related area of ore mineralogy, resource classification, processing principles involved in solubilization followed by separation and safety aspects

  9. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  10. Energy resources

    CERN Document Server

    Simon, Andrew L

    1975-01-01

    Energy Resources mainly focuses on energy, including its definition, historical perspective, sources, utilization, and conservation. This text first explains what energy is and what its uses are. This book then explains coal, oil, and natural gas, which are some of the common energy sources used by various industries. Other energy sources such as wind, solar, geothermal, water, and nuclear energy sources are also tackled. This text also looks into fusion energy and techniques of energy conversion. This book concludes by explaining the energy allocation and utilization crisis. This publ

  11. Resources Management Officer | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Resources Management Officer (RMO) contributes intellectual, technical and ... by initiating, coordinating, and monitoring key processes, activities and issues. ... managing the publication site and overseeing the final quality control by the ...

  12. use of electronic resources by graduate students of the department

    African Journals Online (AJOL)

    respondent's access electronic resources from the internet via Cybercafé .There is a high ... KEY WORDS: Use, Electronic Resources, Graduate Students, Cybercafé. INTRODUCTION ... Faculty of Education, University of Uyo, Uyo. Olu Olat ...

  13. Assessing the contribution of Community-Based Natural Resources ...

    African Journals Online (AJOL)

    Adisa, B.O.

    2013-09-20

    Sep 20, 2013 ... environmental sustainability in Ondo State, Nigeria. Adisa, Banji O. ... Key words: Assessment, community-based, natural resources, socio-environmental sustainability, ... Natural resources occur within environments that are.

  14. From Exam to Education: The Math Exam/Education Resources

    Science.gov (United States)

    Bruni, Carmen; Koch, Christina; Konrad, Bernhard; Lindstrom, Michael; Moyles, Iain; Thompson, Will

    2016-01-01

    The Math Exam/Education Resources (MER) is an open online learning resource hosted at The University of British Columbia (UBC), aimed at providing mathematics education resources for students and instructors at UBC. In this paper, there will be a discussion of the motivation for creating this resource on the MediaWiki platform, key features of the…

  15. European key issues concerning natural gas: Dependence and vulnerability

    International Nuclear Information System (INIS)

    Reymond, Mathias

    2007-01-01

    Due to the high demand for natural gas from emerging countries and because natural gas has become an increasingly valuable resource is electricity production, natural gas demand should increase. This paper re-examines the geopolitical key issues related to natural gas as well as the uneven distribution of natural gas resources on a worldwide scale. This paper proposes to define the significance of liquefied natural gas in gas exchanges and it analyses the problem of European gas vulnerability using several indicators

  16. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  17. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  18. Sustainability of common pool resources.

    Science.gov (United States)

    Timilsina, Raja Rajendra; Kotani, Koji; Kamijo, Yoshio

    2017-01-01

    Sustainability has become a key issue in managing natural resources together with growing concerns for capitalism, environmental and resource problems. We hypothesize that the ongoing modernization of competitive societies, which we refer to as "capitalism," affects human nature for utilizing common pool resources, thus compromising sustainability. To test this hypothesis, we design and implement a set of dynamic common pool resource games and experiments in the following two types of Nepalese areas: (i) rural (non-capitalistic) and (ii) urban (capitalistic) areas. We find that a proportion of prosocial individuals in urban areas is lower than that in rural areas, and urban residents deplete resources more quickly than rural residents. The composition of proself and prosocial individuals in a group and the degree of capitalism are crucial in that an increase in prosocial members in a group and the rural dummy positively affect resource sustainability by 65% and 63%, respectively. Overall, this paper shows that when societies move toward more capitalistic environments, the sustainability of common pool resources tends to decrease with the changes in individual preferences, social norms, customs and views to others through human interactions. This result implies that individuals may be losing their coordination abilities for social dilemmas of resource sustainability in capitalistic societies.

  19. 291 Communication and Human Resources Management and Their ...

    African Journals Online (AJOL)

    User

    Key words: Culture, Communication, Human Resources Management,. Educational ... transactions, communicating through all forms of media, and dealing with ..... imparting traditional aesthetics, historical, technical and social ethics, and.

  20. Mineral resources

    International Nuclear Information System (INIS)

    1991-09-01

    This paper reports that to prevent the concentration of control over federal oil and gas resources in a few companies or individuals, Congress has limited the number of acres of oil and gas leases that one party may control in a single state. An exception to this limitation involves lease acreage within the boundaries of development contracts. These contracts permit oil and gas lease operators and pipeline companies to contract with enough lessees to economically justify large-scale drilling operations for the production and transportation of oil and gas, subject to approval by the Secretary of the Interior, who must find that such contracts are in the public interest. Since 1986 Interior has entered into or approved 10 contracts with 12 lease operators for exploration of largely unleased federal lands-ranging from about 180,000 to 3.5 million acres in four western states-and has designated them as developmental contracts. GAO believes that the 10 contracts do not satisfy the legal requirements for development contracts because they are for oil and gas exploration on largely unleased federal lands, rather than for developing existing leases. By designating the 10 contracts as development contracts, Interior has enabled nine of the 12 contract parties to accumulate lease acreage that vastly exceeds the statutory acreage limitation. All nine of the contract parties were major or large independent oil companies. As a result, other parties who wish to participate in developing federal oil and gas resources within the four states may be adversely affected because the parties to Interior's contracts have been able to compete for and obtain lease acreage beyond the statutory acreage limitation. Although Interior believes that the Secretary has the discretion under law to use development contracts in the current manner, in April 1989 it ceased issuing these contracts pending completion of GAO's review

  1. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  2. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  3. Strategic Human Resources Management

    Directory of Open Access Journals (Sweden)

    Marta Muqaj

    2016-07-01

    Full Text Available Strategic Human Resources Management (SHRM represents an important and sensitive aspect of the functioning and development of a company, business, institution, state, public or private agency of a country. SHRM is based on a point of view of the psychological practices, especially by investing on empowerment, broad training and teamwork. This way it remains the primary resource to maintain stability and competitiveness. SHRM has lately evolved on fast and secure steps, and the transformation from Management of Human Resources to SHRM is becoming popular, but it still remains impossible to exactly estimate how much SHRM has taken place in updating the practices of HRM in organizations and institutions in general. This manuscript aims to make a reflection on strategic management, influence factors in its practices on some organizations. Researchers aim to identify influential factors that play key roles in SHRM, to determine its challenges and priorities which lay ahead, in order to select the most appropriate model for achieving a desirable performance. SHRM is a key factor in the achievement of the objectives of the organization, based on HR through continuous performance growth, it’s a complex process, unpredictable and influenced by many outside and inside factors, which aims to find the shortest way to achieve strategic competitive advantages, by creating structure planning, organizing, thinking values, culture, communication, perspectives and image of the organization. While traditional management of HR is focused on the individual performance of employees, the scientific one is based on the organizational performance, the role of the HRM system as main factor on solving business issues and achievement of competitive advantage within its kind.

  4. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  5. Enhancing Cloud Resource Utilisation using Statistical Analysis

    OpenAIRE

    Sijin He; Li Guo; Yike Guo

    2014-01-01

    Resource provisioning based on virtual machine (VM) has been widely accepted and adopted in cloud computing environments. A key problem resulting from using static scheduling approaches for allocating VMs on different physical machines (PMs) is that resources tend to be not fully utilised. Although some existing cloud reconfiguration algorithms have been developed to address the problem, they normally result in high migration costs and low resource utilisation due to ignoring the multi-dimens...

  6. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  7. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  8. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  9. Information resources

    Science.gov (United States)

    Friend, Milton; Franson, J. Christian; Friend, Milton; Gibbs, Samantha E.J.; Wild, Margaret A.

    2015-10-19

    During recent decades, natural resources agency personnel and others involved with the management and stewardship of wildlife have experienced an increasing need to access information and obtain technical assistance for addressing a diverse array of wildlife disease issues. This Chapter provides a broad overview of selected sources for obtaining supplemental information and technical assistance for addressing wildlife disease issues in North America. Specifically, examples of existing major wildlife disease programs focusing on free-ranging wildlife populations are highlighted; training opportunities for enhancing within-agency wildlife disease response are identified; a selected reading list of wildlife disease references is provided; and selected Web sites providing timely information on wildlife disease are highlighted. No attempt is made to detail all the North American programs and capabilities that address disease in free-ranging wildlife populations. Instead, this Chapter is focused on enhancing awareness of the types of capabilities that exist as potential sources for assistance and collaboration between wildlife conservation agency personnel and others in addressing wildlife disease issues.

  10. Ensembl variation resources

    Directory of Open Access Journals (Sweden)

    Marin-Garcia Pablo

    2010-05-01

    Full Text Available Abstract Background The maturing field of genomics is rapidly increasing the number of sequenced genomes and producing more information from those previously sequenced. Much of this additional information is variation data derived from sampling multiple individuals of a given species with the goal of discovering new variants and characterising the population frequencies of the variants that are already known. These data have immense value for many studies, including those designed to understand evolution and connect genotype to phenotype. Maximising the utility of the data requires that it be stored in an accessible manner that facilitates the integration of variation data with other genome resources such as gene annotation and comparative genomics. Description The Ensembl project provides comprehensive and integrated variation resources for a wide variety of chordate genomes. This paper provides a detailed description of the sources of data and the methods for creating the Ensembl variation databases. It also explores the utility of the information by explaining the range of query options available, from using interactive web displays, to online data mining tools and connecting directly to the data servers programmatically. It gives a good overview of the variation resources and future plans for expanding the variation data within Ensembl. Conclusions Variation data is an important key to understanding the functional and phenotypic differences between individuals. The development of new sequencing and genotyping technologies is greatly increasing the amount of variation data known for almost all genomes. The Ensembl variation resources are integrated into the Ensembl genome browser and provide a comprehensive way to access this data in the context of a widely used genome bioinformatics system. All Ensembl data is freely available at http://www.ensembl.org and from the public MySQL database server at ensembldb.ensembl.org.

  11. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  12. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  13. Innovation, resources and economic growth

    International Nuclear Information System (INIS)

    Curzio, A.Q.; Fortis, M.; Zoboli, R.

    1994-01-01

    The book is concerned with the following items: 1. Technological Creativity and Institutions, 2. Innovation at Work in an Historical-Economic Perspective: Energy and Industrial Materials, 3. Scientific Revolutions and Strategies of Economic Supremacy: Advanced Materials and Biotechnologies, 4. Economic Growth and Agro-Food Policies in Key Problem Regions: Former USSR and LDCs, 5. Economic Growth and Natural Resources at Risk: Climate Change, Forests and Water and in Conclusion: Innovation and Resources in a Global Policy Perspective. Only one chapter have regard to energy problems: Energie efficient technologies: past and future perspectives. (UA)

  14. Optimal beneficiation of global resources

    Energy Technology Data Exchange (ETDEWEB)

    Aloisi de Larderel, J. (Industry and Environment Office, Paris (France). United Nations Environment Programme)

    1989-01-01

    The growth of the world's population and related human activities are clearly leaving major effects on the environment and on the level of use of natural resources: forests are disappearing, air pollution is leading to acid rains, changes are occuring in the atmospheric ozone and global climate, more and more people lack access to reasonable safe supplies of water, soil pollution is becoming a problem, mineral and energy resources are increasingly being used. Producing more with less, producing more, polluting less, these are basic challenges that the world now faces. Low- and non-waste technologies are certainly one of the keys to those challenges.

  15. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  16. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  17. Information Systems Management: an Australian view of the key issues

    Directory of Open Access Journals (Sweden)

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  18. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  19. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  20. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  1. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  2. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  3. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  4. Empirical Analysis of Resource-Use Conflicts Between Smallholder ...

    African Journals Online (AJOL)

    Key factors significantly enhancing resource-use conflicts were increasing herd size, market integration, and increase in household wealthy differentiation. A key factor likely to significantly minimize the conflicts was strong local leadership. The mechanism employed to resolving resource use-conflicts was formation of ...

  5. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  6. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  7. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  8. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  9. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  10. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  11. What can we learn from resource pulses?

    Science.gov (United States)

    Yang, Louie H; Bastow, Justin L; Spence, Kenneth O; Wright, Amber N

    2008-03-01

    An increasing number of studies in a wide range of natural systems have investigated how pulses of resource availability influence ecological processes at individual, population, and community levels. Taken together, these studies suggest that some common processes may underlie pulsed resource dynamics in a wide diversity of systems. Developing a common framework of terms and concepts for the study of resource pulses may facilitate greater synthesis among these apparently disparate systems. Here, we propose a general definition of the resource pulse concept, outline some common patterns in the causes and consequences of resource pulses, and suggest a few key questions for future investigations. We define resource pulses as episodes of increased resource availability in space and time that combine low frequency (rarity), large magnitude (intensity), and short duration (brevity), and emphasize the importance of considering resource pulses at spatial and temporal scales relevant to specific resource-onsumer interactions. Although resource pulses are uncommon events for consumers in specific systems, our review of the existing literature suggests that pulsed resource dynamics are actually widespread phenomena in nature. Resource pulses often result from climatic and environmental factors, processes of spatiotemporal accumulation and release, outbreak population dynamics, or a combination of these factors. These events can affect life history traits and behavior at the level of individual consumers, numerical responses at the population level, and indirect effects at the community level. Consumers show strategies for utilizing ephemeral resources opportunistically, reducing resource variability by averaging over larger spatial scales, and tolerating extended interpulse periods of reduced resource availability. Resource pulses can also create persistent effects in communities through several mechanisms. We suggest that the study of resource pulses provides opportunities

  12. Debunking Astronomical Fiction Science: A Resource Guide

    Science.gov (United States)

    Fraknoi, A.

    2010-08-01

    This resource guide is for educators who receive questions about controversial topics and want readings or websites to brush up on the facts or to recommend to students or the public. This is by no means a complete list, but a short guide of some of the key resources that may be of help. A version of this was distributed at the meeting during the oral session. Longer version of this list can be found online at education/resources/pseudobib.html'>http://www.astrosociety.org/education/resources/pseudobib.html.

  13. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  14. Electricity sector human resources review

    Energy Technology Data Exchange (ETDEWEB)

    Facette, J. [Canadian Association of Technicians and Technologists (Canada)

    2005-07-01

    The electricity industry is expanding, with new supply and infrastructure development equivalent to 35 per cent of existing capacity over the next 20 years. This paper examines the preliminary results of a human resources sector review providing industry specific labor force data. The key objectives of the review were to develop detailed industry profiles, identify root causes of human resources issues, identify industry best practices and develop a human resources strategy for the Canadian electricity sector. Estimates of current employment were provided, with age of employees, retirement projections, regional projections and estimated supply/demand gaps. Current shortages were identified, including wind energy technicians. The paper also identified a declining Canadian born labor force and a concurrent dependence on immigrants. A project research methodology was provided with a list of participating major employers. tabs., figs.

  15. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  16. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  17. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  18. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  19. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  20. World resources: engineering solutions

    Energy Technology Data Exchange (ETDEWEB)

    1976-01-01

    The proceedings include 10 papers that contribute to population environment; fossil fuel resources and energy conservation; nuclear and solar power; production of ores and manufacture and use of metallic resources; resources of manufactured and natural nonmetallic materials; water as a reusable resource; and timber as a replaceable resource.

  1. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  2. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  3. Key drivers of overseas expansion of service franchise chains

    OpenAIRE

    Baena Graciá, Verónica; Cerviño Fernández, Julio

    2012-01-01

    Based on the agency and signaling theories, this paper attempts to identify the effects of management and franchising experience, brand awareness, international franchise ratio, and franchisor’s size on international expansion in the service franchise sector. Specifically, the Spanish franchise system was considered and therefore, a total of 125 chains with presence in 44 foreign countries with a combined 2,944 outlets were examined. The results show that management and franchi...

  4. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  5. Resource Discovery and Universal Access: Understanding Enablers and Barriers from the User Perspective

    OpenAIRE

    Beyene, Wondwossen

    2016-01-01

    Resource discovery tools are keys to explore, find , and retrieve resources from multitudes of collections hosted by library and information systems. Modern resource discovery tools provide facet - rich interfaces that provide multiple alternatives to ex pose resources for their potential users and help them navigate to the resources they need. This paper examines one of those tools from the perspective of universal access, ...

  6. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  7. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  8. Small Private Key MQPKS on an Embedded Microprocessor

    Directory of Open Access Journals (Sweden)

    Hwajeong Seo

    2014-03-01

    Full Text Available Multivariate quadratic (MQ cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011, a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  9. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  10. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  11. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  12. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  13. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  14. eSIP-Saúde: Mozambique's novel approach for a sustainable human resources for health information system.

    Science.gov (United States)

    Waters, Keith P; Mazivila, Moises Ernesto; Dgedge, Martinho; Necochea, Edgar; Manharlal, Devan; Zuber, Alexandra; de Faria Leão, Beatriz; Bossemeyer, Debora; Vergara, Alfredo E

    2016-11-05

    Over the past decade, governments and international partners have responded to calls for health workforce data with ambitious investments in human resources information systems (HRIS). However, documentation of country experiences in the use of HRIS to improve strategic planning and management has been lacking. The purpose of this case presentation is to document for the first time Mozambique's novel approach to HRIS, sharing key success factors and contributing to the scant global knowledge base on HRIS. Core components of the system are a Government of Mozambique (GOM) registry covering all workers in the GOM payroll and a "health extension" which adds health-sector-specific data to the GOM registry. Separate databases for pre-service and in-service training are integrated through a business intelligence tool. The first aim of the HRIS was to identify the following: who and where are Mozambique's health workers? As of July 2015, 95 % of countrywide health workforce deployment information was populated in the HRIS, allowing the identification of health professionals' physical working location and their pay point. HRIS data are also used to quantify chronic issues affecting the Ministry of Health (MOH) health workforce. Examples include the following: HRIS information was used to examine the deployment of nurses trained in antiretroviral therapy (ART) vis-à-vis the health facilities where ART is being provided. Such results help the MOH align specialized skill sets with service provision. Twenty-five percent of the MOH health workforce had passed the 2-year probation period but had not been updated in the MOH information systems. For future monitoring of employee status, the MOH established a system of alerts in semi-monthly reports. As of August 2014, 1046 health workers were receiving their full salary but no longer working at the facilities. The MOH is now analyzing this situation to improve the retirement process and coordination with Social Security. The

  15. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  16. A key distribution scheme using elliptic curve cryptography in wireless sensor networks

    CSIR Research Space (South Africa)

    Louw, J

    2016-12-01

    Full Text Available Wireless sensor networks (WSNs) have become increasingly popular in many applications across a broad range of fields. Securing WSNs poses unique challenges mainly due to their resource constraints. Traditional public key cryptography (PKC...

  17. Workshop proceedings: "We are the Olifants" - Key stakeholder workshop for the Upper Olifants River study

    CSIR Research Space (South Africa)

    Funke, Nicola S

    2013-03-31

    Full Text Available Project Leader, Natural Resources and the Environment Council for Scientific and Industrial Research March 2013 Workshop Proceedings Page v EXECUTIVE SUMMARY The Upper Olifants Key Stakeholder Workshop took place at the CSIR Knowledge...

  18. ClinicalKey 2.0: Upgrades in a Point-of-Care Search Engine.

    Science.gov (United States)

    Huslig, Mary Ann; Vardell, Emily

    2015-01-01

    ClinicalKey 2.0, launched September 23, 2014, offers a mobile-friendly design with a search history feature for targeting point-of-care resources for health care professionals. Browsing is improved with searchable, filterable listings of sources highlighting new resources. ClinicalKey 2.0 improvements include more than 1,400 new Topic Pages for quick access to point-of-care content. A sample search details some of the upgrades and content options.

  19. KEY PERFORMANCE INDICATORS FOR HEALTHCARE RESEARCH ORGANIZATIONS BETWEEN 2011 AND 2015

    OpenAIRE

    ANISKEVICH A.S.; HALFIN R.A.

    2017-01-01

    In this work we identify 16 key indicators to evaluate the performance of healthcare research organizations. These indicators comprehensively characterize such aspects of performance as research output and relevance, human resource development, integration into the international scientific community, distribution of scientific knowledge, promotion of the prestige of science, and resource provision. Below, we review the existing classification of medical research institutions and their key fea...

  20. Nuclear fuel resources: enough to last?

    International Nuclear Information System (INIS)

    Price, R.; Blaise, J.R.

    2002-01-01

    The need to meet ever-growing energy demands in an environmentally sustainable manner has turned attention to the potential for nuclear energy to play an expanded role in future energy supply mixes. One of the key aspects in defining the sustainability of any energy source is the availability of fuel resources. This article shows that available nuclear energy fuel resources can meet future needs for hundreds, even thousands, of years

  1. Human Resource Development in Hybrid Libraries

    OpenAIRE

    Prakasan, E. R.; Swarna, T.; Vijai Kumar, *

    2000-01-01

    This paper explores the human resources and development implications in hybrid libraries. Due to technological changes in libraries, which is a result of the proliferation of electronic resources, there has been a shift in workloads and workflow, requiring staff with different skills and educational backgrounds. Training of staff at all levels in information technology is the key to manage change, alleviate anxiety in the workplace and assure quality service in the libraries. Staff developmen...

  2. TEN KEY CONCEPTS AND THE SUCCESS OF ROMANIAN ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Ada Mirela TOMESCU

    2006-01-01

    Full Text Available This paper is focused on ten key concepts which influence the success of theorganizations at the beginning of XXI century. The great changes generatedby globalization determine firms to be more competitive. This means that wehave to focus on: mission, leadership, emotional intelligence, innovation,organizational culture, human resources, total quality management, ethics,conflict management, brand, and the value offered to the clients.

  3. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  4. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  5. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  6. Network resource management

    NARCIS (Netherlands)

    2009-01-01

    The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth,

  7. The Global Resource Nexus

    NARCIS (Netherlands)

    Ridder, M. de; Duijne, F. van; Jong, S. de; Jones, J.; Luit, E. van; Bekkers, F.F.; Auping, W.

    2014-01-01

    Supply and demand of resources are connected in a complex way. This interconnectivity has been framed as the global resource nexus and can conceivebly include all types of resources. This study focus on the nexus of five essential natural resources: land, food, energy, water and minerals. Together

  8. Knowledge and Natural Resources

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Justinussen, Jens Christian Svabo

    2016-01-01

    Arctic economies are generally natural resource based economies, whether they are indigenous economies largely dependent on living on the land or industrialized economies depending on marine resources, mineral resources or fossil or renewable energy resources. However, the central role of knowledge...

  9. The Resource-Based View and Value: The Customer-Based View of the Firm

    Science.gov (United States)

    Clulow, Val; Barry, Carol; Gerstman, Julie

    2007-01-01

    Purpose: The resource-based view (RBV) explores the role of key resources, identified as intangible assets and capabilities, in creating competitive advantage and superior performance. To a great extent the conceptual analysis and empirical research within the RBV has focused on the firm's perspective of key resources and the value to the firm of…

  10. Australian uranium resources

    International Nuclear Information System (INIS)

    Battey, G.C.; Miezitis, Y.; McKay, A.D.

    1987-01-01

    Australia's uranium resources amount to 29% of the WOCA countries (world outside centrally-planned-economies areas) low-cost Reasonably Assured Resources and 28% of the WOCA countries low-cost Estimated Additional Resources. As at 1 January 1986, the Bureau of Mineral Resources estimated Australia's uranium resources as: (1) Cost range to US$80/kg U -Reasonably Assured Resources, 465 000 t U; Estimated Additional Resources, 256 000 t U; (2) Cost range US$80-130/kg U -Reasonably Assured Resources, 56 000 t U; Estimated Additional Resources, 127 000 t U. Most resources are contained in Proterozoic unconformity-related deposits in the Alligator Rivers uranium field in the Northern Territory (Jabiluka, Ranger, Koongarra, Nabarlek deposits) and the Proterozoic stratabound deposit at Olympic Dam on the Stuart Shelf in South Australia

  11. Designing organizational structures: Key thoughts for development.

    Science.gov (United States)

    Killingsworth, Patricia; Eschenbacher, Lynn

    2018-04-01

    Current strategies and concepts to consider in developing a system-level organizational structure for the pharmacy enterprise are discussed. There are many different ways to design an organizational structure for the pharmacy enterprise within a health system. The size of the organization, the number of states in which it operates, and the geographic spread and complexity of the pharmacy business lines should be among the key considerations in determining the optimal organizational and decision-making structures for the pharmacy enterprise. The structure needs to support incorporation of the pharmacy leadership (both system-level executives and local leaders) into all strategic planning and discussions at the hospital and health-system levels so that they can directly represent the pharmacy enterprise instead of relying on others to develop strategy on their behalf. It is important that leaders of all aspects of the pharmacy enterprise report through the system's top pharmacy executive, who should be a pharmacist and have a title consistent with those of other leaders reporting at the same organizational level (e.g., chief pharmacy officer). Pharmacy leaders need to be well positioned within an organization to advocate for the pharmacy enterprise and use all resources to the best of their ability. As the scope and complexity of pharmacy services grow, it is critical to ensure that leadership of the pharmacy enterprise is unified under a single pharmacy executive team. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  12. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  13. Outreach: Key to Sustainable Nuclear Knowledge Management

    International Nuclear Information System (INIS)

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  14. Key performance indicators in British military trauma.

    Science.gov (United States)

    Stannard, Adam; Tai, Nigel R; Bowley, Douglas M; Midwinter, Mark; Hodgetts, Tim J

    2008-08-01

    Key performance indicators (KPI) are tools for assessing process and outcome in systems of health care provision and are an essential component in performance improvement. Although KPI have been used in British military trauma for 10 years, they remain poorly defined and are derived from civilian metrics that do not adjust for the realities of field trauma care. Our aim was to modify current trauma KPI to ensure they more faithfully reflect both the military setting and contemporary evidence in order to both aid accurate calibration of the performance of the British Defence Medical Services and act as a driver for performance improvement. A workshop was convened that was attended by senior, experienced doctors and nurses from all disciplines of trauma care in the British military. "Speciality-specific" KPI were developed by interest groups using evidence-based data where available and collective experience where this was lacking. In a final discussion these were streamlined into 60 KPI covering each phase of trauma management. The introduction of these KPI sets a number of important benchmarks by which British military trauma can be measured. As part of a performance improvement programme, these will allow closer monitoring of our performance and assist efforts to develop, train, and resource British military trauma providers.

  15. Energy efficiency and CO2: is electricity the key factor?

    Energy Technology Data Exchange (ETDEWEB)

    Bamberger, Y.

    2007-07-01

    Europe must face soon to the depletion of fossil energy resources. Efficiency in end energy uses is a key to prepare this challenge. First, the report shows that significant energy efficiency capacities remain in the main economy sectors in France and Europe: buildings, industry, transportation. The key technologies, mainly electricity-driven, are briefly presented, together with the related main tracks for R and D: heat pumps, thermal insulation, induction and mechanical vapour compression for industry, plugged hybrid vehicle, LED sources for lighting. Their ability to decrease CO2 emissions is shown. Control equipment and users behaviour are pointed out, mainly with the key role of price energy with recent French experience : load shifting, peak shaving. Finally, the report shows that a firm policy, based on high performance equipments, could lead to a significant decrease of energy needs in France around 2030.

  16. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  17. Data Resource Profile: United Nations Children’s Fund (UNICEF)

    Science.gov (United States)

    Murray, Colleen; Newby, Holly

    2012-01-01

    The United Nations Children’s Fund (UNICEF) plays a leading role in the collection, compilation, analysis and dissemination of data to inform sound policies, legislation and programmes for promoting children’s rights and well-being, and for global monitoring of progress towards the Millennium Development Goals. UNICEF maintains a set of global databases representing nearly 200 countries and covering the areas of child mortality, child health, maternal health, nutrition, immunization, water and sanitation, HIV/AIDS, education and child protection. These databases consist of internationally comparable and statistically sound data, and are updated annually through a process that draws on a wealth of data provided by UNICEF’s wide network of >150 field offices. The databases are composed primarily of estimates from household surveys, with data from censuses, administrative records, vital registration systems and statistical models contributing to some key indicators as well. The data are assessed for quality based on a set of objective criteria to ensure that only the most reliable nationally representative information is included. For most indicators, data are available at the global, regional and national levels, plus sub-national disaggregation by sex, urban/rural residence and household wealth. The global databases are featured in UNICEF’s flagship publications, inter-agency reports, including the Secretary General’s Millennium Development Goals Report and Countdown to 2015, sector-specific reports and statistical country profiles. They are also publicly available on www.childinfo.org, together with trend data and equity analyses. PMID:23211414

  18. Data resource profile: United Nations Children's Fund (UNICEF).

    Science.gov (United States)

    Murray, Colleen; Newby, Holly

    2012-12-01

    The United Nations Children's Fund (UNICEF) plays a leading role in the collection, compilation, analysis and dissemination of data to inform sound policies, legislation and programmes for promoting children's rights and well-being, and for global monitoring of progress towards the Millennium Development Goals. UNICEF maintains a set of global databases representing nearly 200 countries and covering the areas of child mortality, child health, maternal health, nutrition, immunization, water and sanitation, HIV/AIDS, education and child protection. These databases consist of internationally comparable and statistically sound data, and are updated annually through a process that draws on a wealth of data provided by UNICEF's wide network of >150 field offices. The databases are composed primarily of estimates from household surveys, with data from censuses, administrative records, vital registration systems and statistical models contributing to some key indicators as well. The data are assessed for quality based on a set of objective criteria to ensure that only the most reliable nationally representative information is included. For most indicators, data are available at the global, regional and national levels, plus sub-national disaggregation by sex, urban/rural residence and household wealth. The global databases are featured in UNICEF's flagship publications, inter-agency reports, including the Secretary General's Millennium Development Goals Report and Countdown to 2015, sector-specific reports and statistical country profiles. They are also publicly available on www.childinfo.org, together with trend data and equity analyses.

  19. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  20. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  1. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  2. 15 CFR Appendix I to Subpart P of... - Florida Keys National Marine Sanctuary Boundary Coordinates

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Florida Keys National Marine Sanctuary... OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT NATIONAL MARINE SANCTUARY PROGRAM REGULATIONS Florida Keys National Marine Sanctuary Pt. 922, Subpt. P, App. I Appendix I to Subpart P of Part 922...

  3. ERP as an organization innovation : Key users and cross-boundary knowledge management

    NARCIS (Netherlands)

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  4. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  5. Fuzzy resource optimization for safeguards

    International Nuclear Information System (INIS)

    Zardecki, A.; Markin, J.T.

    1991-01-01

    Authorization, enforcement, and verification -- three key functions of safeguards systems -- form the basis of a hierarchical description of the system risk. When formulated in terms of linguistic rather than numeric attributes, the risk can be computed through an algorithm based on the notion of fuzzy sets. Similarly, this formulation allows one to analyze the optimal resource allocation by maximizing the overall detection probability, regarded as a linguistic variable. After summarizing the necessary elements of the fuzzy sets theory, we outline the basic algorithm. This is followed by a sample computation of the fuzzy optimization. 10 refs., 1 tab

  6. Correlation chart of Pennsylvanian rocks in Alabama, Tennessee, Kentucky, Virginia, West Virginia, Ohio, Maryland, and Pennsylvania showing approximate position of coal beds, coal zones, and key stratigraphic units: Chapter D.2 in Coal and petroleum resources in the Appalachian basin: distribution, geologic framework, and geochemical character

    Science.gov (United States)

    Ruppert, Leslie F.; Trippi, Michael H.; Slucher, Ernie R.; Ruppert, Leslie F.; Ryder, Robert T.

    2014-01-01

    The Appalachian basin, one of the largest Pennsylvanian bituminous coal-producing regions in the world, currently contains nearly one-half of the top 15 coal-producing States in the United States (Energy Information Agency, 2006). Anthracite of Pennsylvanian age occurs in synclinal basins in eastern Pennsylvania, but production is minimal. A simplified correlation chart was compiled from published and unpublished sources as a means of visualizing currently accepted stratigraphic relations between the rock formations, coal beds, coal zones, and key stratigraphic units in Alabama, Tennessee, Kentucky, Virginia, West Virginia, Ohio, Maryland, and Pennsylvania. The thickness of each column is based on chronostratigraphic divisions (Lower, Middle, and Upper Pennsylvanian), not the thickness of strata. Researchers of Pennsylvanian strata in the Appalachian basin also use biostratigraphic markers and other relative and absolute geologic age associations between the rocks to better understand the spatial relations of the strata. Thus, the stratigraphic correlation data in this chart should be considered provisional and will be updated as coal-bearing rocks within the Appalachian coal regions continue to be evaluated.

  7. Optimization of space system development resources

    Science.gov (United States)

    Kosmann, William J.; Sarkani, Shahram; Mazzuchi, Thomas

    2013-06-01

    NASA has had a decades-long problem with cost growth during the development of space science missions. Numerous agency-sponsored studies have produced average mission level cost growths ranging from 23% to 77%. A new study of 26 historical NASA Science instrument set developments using expert judgment to reallocate key development resources has an average cost growth of 73.77%. Twice in history, a barter-based mechanism has been used to reallocate key development resources during instrument development. The mean instrument set development cost growth was -1.55%. Performing a bivariate inference on the means of these two distributions, there is statistical evidence to support the claim that using a barter-based mechanism to reallocate key instrument development resources will result in a lower expected cost growth than using the expert judgment approach. Agent-based discrete event simulation is the natural way to model a trade environment. A NetLogo agent-based barter-based simulation of science instrument development was created. The agent-based model was validated against the Cassini historical example, as the starting and ending instrument development conditions are available. The resulting validated agent-based barter-based science instrument resource reallocation simulation was used to perform 300 instrument development simulations, using barter to reallocate development resources. The mean cost growth was -3.365%. A bivariate inference on the means was performed to determine that additional significant statistical evidence exists to support a claim that using barter-based resource reallocation will result in lower expected cost growth, with respect to the historical expert judgment approach. Barter-based key development resource reallocation should work on spacecraft development as well as it has worked on instrument development. A new study of 28 historical NASA science spacecraft developments has an average cost growth of 46.04%. As barter-based key

  8. When resources get sparse

    DEFF Research Database (Denmark)

    Graungaard, Anette Hauskov; Andersen, John Sahl; Skov, Liselotte

    2011-01-01

    resources through positive cognitive reappraisals of their circumstances, the consequences of those circumstances and their coping possibilities. Nine main coping strategies were identified constituting transformative pathways in resource-creation. A theory of resource-creation is proposed as an addition...... coped with parenting a disabled child and how they maintained their energy and personal resources. We explored parents' experiences, coping and resources over a two-year period after their child was diagnosed with a severely disabling condition using a qualitative, longitudinal approach. Findings were...... to the current understanding of coping and the role of positive emotions. Coping and resources were found to be closely interrelated and portals of intervention are discussed....

  9. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  10. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  11. Developing Human Resources through Actualizing Human Potential

    Science.gov (United States)

    Clarken, Rodney H.

    2012-01-01

    The key to human resource development is in actualizing individual and collective thinking, feeling and choosing potentials related to our minds, hearts and wills respectively. These capacities and faculties must be balanced and regulated according to the standards of truth, love and justice for individual, community and institutional development,…

  12. Human resources for health in Europe

    National Research Council Canada - National Science Library

    McKee, Martin; Dubois, Carl-Ardy; Nolte, Ellen

    2006-01-01

    ... systems in the field of personnel. The authors also identify which strategies are most likely to lead to the optimal management of health professionals in the future. Human Resources for Health in Europe is key reading for health policymakers and postgraduates taking courses in health services management, health policy and health economics. It is also ...

  13. Sustainable Aquatic Resource Management Initiative | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... identify key choices in a state-of-the-art publication. They will also undertake field research in collaboration with the Centre for Resource Management and Environmental Studies (CERMES), University of the West Indies, on the application of new thinking (resilience, Complex Adaptive Systems theory) to coastal practices.

  14. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  15. Why Interfaces are the Key for Developing Climate Services

    Science.gov (United States)

    Cortekar, Jörg; Bender, Steffen; Groth, Markus

    2015-04-01

    Responding to climate change today involves both mitigation to address the cause and adaptation as a response to already on-going and expected changes. But to what exactly do we have to adapt? And what happens, when environmental, economical or administrative boundary conditions changes? In recent years the concept of climate services has evolved to provide user tailored information to meet individual adaptation needs. According to the Global Framework for Climate Services, climate services involve high-quality data e.g. on temperature, rainfall, wind, etc., as well as maps, risk and vulnerability analyses, assessments, and long-term projections and scenarios. Depending on specific user's needs, these data and information products may be combined with non-meteorological sector-specific data, such as agricultural production, flood risk maps or health trends, and other socio-economic variables to support decision-making of stakeholders who are affected by climate change. This, still non-exhaustive list already indicates that many different scientific disciplines are involved in the development and provision of climate services. Integrating different and equally important scientific approaches to contribute to the solution of one specific problem is challenging. In economics, for instance, many different and promising methods and tools such as cost-benefit-analyses are available which play a key role in providing policy makers and other stakeholders with data and information in order to create a robust decision-making basis for efficiently using scarce budgets. Cost-benefit-analysis is a well-established method in economic theory, its application in the field of climate change adaptation, however, is still new. The bulk of cost and benefit assessments currently pursues a top-down-approach. That is, the required data is generated by downscaling cost and benefit estimations of global impact assessment models to a specific region. In many cases global information are not

  16. Solar Resource Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Renne, D.; George, R.; Wilcox, S.; Stoffel, T.; Myers, D.; Heimiller, D.

    2008-02-01

    This report covers the solar resource assessment aspects of the Renewable Systems Interconnection study. The status of solar resource assessment in the United States is described, and summaries of the availability of modeled data sets are provided.

  17. Hydrography - Water Resources

    Data.gov (United States)

    NSGIC Education | GIS Inventory — A Water Resource is a DEP primary facility type related to the Water Use Planning Program. The sub-facility types related to Water Resources that are included are:...

  18. Current Resource Imagery Projects

    Data.gov (United States)

    Farm Service Agency, Department of Agriculture — Map showing coverage of current Resource imagery projects. High resolution/large scale Resource imagery is typically acquired for the U.S. Forest Service and other...

  19. Vermont Natural Resources Atlas

    Data.gov (United States)

    Vermont Center for Geographic Information — The purpose of the�Natural Resources Atlas�is to provide geographic information about environmental features and sites that the Vermont Agency of Natural Resources...

  20. Resources, Technology, and Strategy

    DEFF Research Database (Denmark)

    Resources, Technology and Strategy brings together contributors from Europe, North America and Asia to consider the strategic relationship between technology and other resources, such as production capabilities, marketing prowess, finance and organisational culture. Throughout the book...

  1. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  2. Cultural Resource Predictive Modeling

    Science.gov (United States)

    2017-10-01

    CR cultural resource CRM cultural resource management CRPM Cultural Resource Predictive Modeling DoD Department of Defense ESTCP Environmental...resource management ( CRM ) legal obligations under NEPA and the NHPA, military installations need to demonstrate that CRM decisions are based on objective...maxim “one size does not fit all,” and demonstrate that DoD installations have many different CRM needs that can and should be met through a variety

  3. Condition, use, and management of water resources among ...

    African Journals Online (AJOL)

    The study found that water supply in Harshin district is 100% surface water ... Besides, 76% of the respondents were not satisfied with the quality of drinking water. ... Key words: Water resources, pastoralists, rainwater, water-harvesting, gender ...

  4. Resource-Use Efficiency in Rice Production Under Small Scale ...

    African Journals Online (AJOL)

    acer

    specific objectives of the study were to determine resource use efficiency, describe ... economic level. ... this key variable with a view to stepping ... focused on small-scale irrigation systems for ... farmers were assumed to be operating under.

  5. Effective Management of Human Resources for Business and ...

    African Journals Online (AJOL)

    DR Nneka

    resources, the personality of the individual plays a key role. ... growth? It is pertinent to point out here that, consequent upon a myriad of changes, .... end, SRD ignites trusting relationships, consolidates integrity, clarifies decision, and provides ...

  6. Modelling distributed energy resources in energy service networks

    CERN Document Server

    Acha, Salvador

    2013-01-01

    Focuses on modelling two key infrastructures (natural gas and electrical) in urban energy systems with embedded technologies (cogeneration and electric vehicles) to optimise the operation of natural gas and electrical infrastructures under the presence of distributed energy resources

  7. Assessing Water and Carbon Footprints for Sustainable Water Resource Management

    Science.gov (United States)

    The key points of this presentation are: (1) Water footprint and carbon footprint as two sustainability attributes in adaptations to climate and socioeconomic changes, (2) Necessary to evaluate carbon and water footprints relative to constraints in resource capacity, (3) Critical...

  8. Cervical cancer screening and practice in low resource countries ...

    African Journals Online (AJOL)

    Key words: Cervical cancer screening; human papillomavirus, low resource countries; Nigeria; premalignant disease. ... has led to a significant decline in the incidence of cervical .... and malignant lesions as integration of the viral DNA into the.

  9. Improving the Financial Resourcing Process for Civil/Military Operations

    National Research Council Canada - National Science Library

    Gadbois, Karen

    2004-01-01

    .... This was evident in the most recent stability operation in Afghanistan. Although financial resourcing is key to the planning process prior to operational commencement the intricacies of the rules and financial mechanisms are not sufficiently addressed...

  10. Energy for lunar resource exploitation

    Science.gov (United States)

    Glaser, Peter E.

    1992-02-01

    Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.

  11. World resources 1992-93

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    The World Resources series is intended to meet the critical need for accessible, accurate information on some of the most pressing issues of our time. Wise management of natural resources and protection of the global environment are essential to achieve sustainable economic development and hence to alleviate poverty, improve the human condition, and preserve the biological systems on which all life depends. This volume has a special focus on sustainable development, in support of the upcoming 1992 United Nations Conference on Environment and Development (UNCED). Part 1 consists of four special chapters on sustainable development: an overview chapter and three case studies of what sustainable development might mean in industrial countries, low-income countries, and rapidly industrializing countries. Additional material pertinent to this topic is found throughout the volume. Part 2 continues the tradition of examining in each volume a particular region in more detail - in this case, an overview of the severe environmental and resource problems faced by Central Europe as that region makes a difficult transition to more democratic governments and more market-oriented economies. Part 3 reports on basic conditions and trends, key issues, major problems and efforts to resolve them, and recent developments in each of the major resource categories, from population and human development to energy to atmosphere and climate. Where data exist, the chapters give a 20-year perspective on trends in the physical environment - spanning the time between the first United Nations Conference on the Environment and UNCED. Supporting data, as well as the core data tables from the World Resources Data Base, are found in Part 4. Chapters have been processed separately for inclusion on the data base

  12. Reasoning abstractly about resources

    Science.gov (United States)

    Clement, B.; Barrett, A.

    2001-01-01

    r describes a way to schedule high level activities before distributing them across multiple rovers in order to coordinate the resultant use of shared resources regardless of how each rover decides how to perform its activities. We present an algorithm for summarizing the metric resource requirements of an abstract activity based n the resource usages of its potential refinements.

  13. Save Our Water Resources.

    Science.gov (United States)

    Bromley, Albert W.

    The purpose of this booklet, developed as part of Project SOAR (Save Our American Resources), is to give Scout leaders some facts about the world's resources, the sources of water pollution, and how people can help in obtaining solutions. Among the topics discussed are the world's water resources, the water cycle, water quality, sources of water…

  14. The cellulose resource matrix

    NARCIS (Netherlands)

    Keijsers, E.R.P.; Yilmaz, G.; Dam, van J.E.G.

    2013-01-01

    The emerging biobased economy is causing shifts from mineral fossil oil based resources towards renewable resources. Because of market mechanisms, current and new industries utilising renewable commodities, will attempt to secure their supply of resources. Cellulose is among these commodities, where

  15. Ohio Water Resources Council

    Science.gov (United States)

    Ohio.gov State Agencies | Online Services Twitter YouTube EPA IMAGE Ohio Water Resources Committee Ohio enjoys abundant water resources. Few states enjoy as many streams, rivers, lakes and wetlands as Ohio. Numerous agencies and organizations are involved in protecting Ohio's valuable water resources

  16. Avoiding the resource curse the case Norway

    International Nuclear Information System (INIS)

    Holden, Steinar

    2013-01-01

    In many countries, natural resources have been detrimental to the economic development. The literature on “the resource curse” shows a bleak relationship: countries with large natural resources generally experience lower economic growth than other countries. Norway does not fit into this picture. Economic growth has much higher than in most other industrialized countries. This paper describes the key features of the Norwegian management of the petroleum resources. The main focus is on the management of the revenues from the petroleum sector, but the effects of the petroleum sector on the Norwegian economy more generally are also discussed. - Highlights: • In Norway, the sizeable petroleum resources have led to higher economic growth and a higher GDP per capita, measured in purchasing power parities. • This paper describes the key features of the Norwegian management of the petroleum resources. • The main focus is on the management of the revenues from the petroleum sector • Effects of the petroleum sector on the Norwegian economy more generally are also discussed

  17. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  18. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  19. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  20. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  1. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  2. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  3. Self managing experiment resources

    International Nuclear Information System (INIS)

    Stagni, F; Ubeda, M; Charpentier, P; Tsaregorodtsev, A; Romanovskiy, V; Roiser, S; Graciani, R

    2014-01-01

    Within this paper we present an autonomic Computing resources management system, used by LHCb for assessing the status of their Grid resources. Virtual Organizations Grids include heterogeneous resources. For example, LHC experiments very often use resources not provided by WLCG, and Cloud Computing resources will soon provide a non-negligible fraction of their computing power. The lack of standards and procedures across experiments and sites generated the appearance of multiple information systems, monitoring tools, ticket portals, etc... which nowadays coexist and represent a very precious source of information for running HEP experiments Computing systems as well as sites. These two facts lead to many particular solutions for a general problem: managing the experiment resources. In this paper we present how LHCb, via the DIRAC interware, addressed such issues. With a renewed Central Information Schema hosting all resources metadata and a Status System (Resource Status System) delivering real time information, the system controls the resources topology, independently of the resource types. The Resource Status System applies data mining techniques against all possible information sources available and assesses the status changes, that are then propagated to the topology description. Obviously, giving full control to such an automated system is not risk-free. Therefore, in order to minimise the probability of misbehavior, a battery of tests has been developed in order to certify the correctness of its assessments. We will demonstrate the performance and efficiency of such a system in terms of cost reduction and reliability.

  4. Resource sharing in libraries concepts, products, technologies, and trends

    CERN Document Server

    Breeding, Marshall

    2014-01-01

    Supplementing your local collection through resource sharing is a smart way to ensure your library has the resources to satisfy the needs of your users. Marshall Breeding's new Library Technology Report explores technologies and strategies for sharing resources, helping you streamline workflows and improve resource-sharing services by covering key strategies like interlibrary loan, consortial borrowing, document delivery, and shared collections. You'll also learn about such trends and services as:OCLC WorldCat Resource Sharing, and other systems that facilitate cooperative, reciprocal lendingS

  5. The Future of Electricity Resource Planning

    Energy Technology Data Exchange (ETDEWEB)

    Kahrl, Fredrich [Energy and Environmental Economics, Inc., San Francisco, CA (United States); Mills, Andrew [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lavin, Luke [Energy and Environmental Economics, Inc., San Francisco, CA (United States); Ryan, Nancy [Energy and Environmental Economics, Inc., San Francisco, CA (United States); Olsen, Arne [Energy and Environmental Economics, Inc., San Francisco, CA (United States); Schwartz, Lisa [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-09-14

    Electricity resource planning is the process of identifying longer-term investments to meet electricity reliability requirements and public policy goals at a reasonable cost. Resource planning processes provide a forum for regulators, electric utilities, and electricity industry stakeholders to evaluate the economic, environmental, and social benefits and costs of different investment options. By facilitating a discussion on future goals, challenges and strategies, resource planning processes often play an important role in shaping utility business decisions. Resource planning emerged more than three decades ago in an era of transition, where declining electricity demand and rising costs spurred fundamental changes in electricity industry regulation and structure. Despite significant changes in the industry, resource planning continues to play an important role in supporting investment decision making. Over the next two decades, the electricity industry will again undergo a period of transition, driven by technological change, shifting customer preferences and public policy goals. This transition will bring about a gradual paradigm shift in resource planning, requiring changes in scope, approaches and methods. Even as it changes, resource planning will continue to be a central feature of the electricity industry. Its functions — ensuring the reliability of high voltage (“bulk”) power systems, enabling oversight of regulated utilities and facilitating low-cost compliance with public policy goals — are likely to grow in importance as the electricity industry enters a new period of technological, economic and regulatory change. This report examines the future of electricity resource planning in the context of a changing electricity industry. The report examines emerging issues and evolving practices in five key areas that will shape the future of resource planning: (1) central-scale generation, (2) distributed generation, (3) demand-side resources, (4

  6. Hybrid resource provisioning for clouds

    International Nuclear Information System (INIS)

    Rahman, Mahfuzur; Graham, Peter

    2012-01-01

    Flexible resource provisioning, the assignment of virtual machines (VMs) to physical machine, is a key requirement for cloud computing. To achieve 'provisioning elasticity', the cloud needs to manage its available resources on demand. A-priori, static, VM provisioning introduces no runtime overhead but fails to deal with unanticipated changes in resource demands. Dynamic provisioning addresses this problem but introduces runtime overhead. To reduce VM management overhead so more useful work can be done and to also avoid sub-optimal provisioning we propose a hybrid approach that combines static and dynamic provisioning. The idea is to adapt a good initial static placement of VMs in response to evolving load characteristics, using live migration, as long as the overhead of doing so is low and the effectiveness is high. When this is no longer so, we trigger a revised static placement. (Thus, we are essentially applying local multi-objective optimization to tune a global optimization with reduced overhead.) This approach requires a complicated migration decision algorithm based on current and predicted:future workloads, power consumptions and memory usage in the host machines as well as network burst characteristics for the various possible VM multiplexings (combinations of VMs on a host). A further challenge is to identify those characteristics of the dynamic provisioning that should trigger static re-provisioning.

  7. Economic Values and Resource Use

    Directory of Open Access Journals (Sweden)

    Jan Mikael Malmaeus

    2016-05-01

    Full Text Available Absolute decoupling of GDP growth from resource use implies that economic output can be increased without simultaneously increasing input. The essential meaning of this proposition is that the economic values that represent the GDP can be realized by increasing resource efficiency. Given that the GDP is first and foremost a measure of economic activity rather than welfare the possibility of absolute decoupling is theoretically limited. This paper demonstrates theoretically and empirically that economic values at the macroeconomic level are fundamentally determined by the use of production factors, primarily labor and physical capital. Technical innovations or efficiency gains increasing utility without raising the costs of production do not add to the GDP unless they stimulate investments in physical capital. Hence the neoclassical notion of productivity is only found to be relevant as a microeconomic concept. In practice, GDP growth is mostly explained by capital accumulation and a key question is whether or not capital accumulation can be decoupled from the use of materials and energy. This will determine the possibility of decoupling of GDP growth from resource use and environmental impact. Alternative measures of progress focusing on welfare rather than economic activity are more likely to achieve absolute decoupling.

  8. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  9. Turning Video Resource Management into Cloud Computing

    Directory of Open Access Journals (Sweden)

    Weili Kou

    2016-07-01

    Full Text Available Big data makes cloud computing more and more popular in various fields. Video resources are very useful and important to education, security monitoring, and so on. However, issues of their huge volumes, complex data types, inefficient processing performance, weak security, and long times for loading pose challenges in video resource management. The Hadoop Distributed File System (HDFS is an open-source framework, which can provide cloud-based platforms and presents an opportunity for solving these problems. This paper presents video resource management architecture based on HDFS to provide a uniform framework and a five-layer model for standardizing the current various algorithms and applications. The architecture, basic model, and key algorithms are designed for turning video resources into a cloud computing environment. The design was tested by establishing a simulation system prototype.

  10. Sustainable Biomass Resources for Biogas Production

    DEFF Research Database (Denmark)

    Meyer, Ane Katharina Paarup

    The aim of this thesis was to identify and map sustainable biomass resources, which can be utilised for biogas production with minimal negative impacts on the environment, nature and climate. Furthermore, the aim of this thesis was to assess the resource potential and feasibility of utilising...... such biomasses in the biogas sector. Sustainability in the use of biomass feedstock for energy production is of key importance for a stable future food and energy supply, and for the functionality of the Earths ecosystems. A range of biomass resources were assessed in respect to sustainability, availability...... from 39.3-66.9 Mtoe, depending on the availability of the residues. Grass from roadside verges and meadow habitats in Denmark represent two currently unutilised sources. If utilised in the Danish biogas sector, the results showed that the resources represent a net energy potential of 60,000 -122,000 GJ...

  11. Wind power in Scotland - a critique of recent resource assessments

    International Nuclear Information System (INIS)

    Twidell, J.W.

    1995-01-01

    A critical analysis of 4 recent UK official reports relating to the renewable energy resources of Scotland, particularly the large wind resource, and including institutional and economic factors. Key points are listed with comments for use in supporting wind power developments. (Author)

  12. Motivation and policies of human resources management in the organization

    Directory of Open Access Journals (Sweden)

    Jovanović Goca

    2017-01-01

    Full Text Available Organizations today operate in an uncertain environment, accompanied by constant change and technological innovation. The greatest impact on performance as the key feature of human resources business. Motivation and employee satisfaction becoming the basis of a modern organization. Motivated employees today represent a strategic resource which confer a competitive advantage of the organization.

  13. (JASR) Vol. 12, No. 2, 2012 DEPLETING FOREST RESOURCES

    African Journals Online (AJOL)

    HP

    deteriorating forest resources of Nigeria and its impact on climate change. Key words: Forest Resources, ... Mangrove Forest. Sub Total. 905,930 .... South America” Global Biogeographical Cycle vol 9, pp 329-350. Miller, K. R., Reid, W. V., ...

  14. Efficient Resource Utilization in Shared-Everything Environments

    NARCIS (Netherlands)

    S. Manegold (Stefan); J.K. Obermaier

    1998-01-01

    textabstractEfficient resource usage is a key to achieve better performance in parallel database systems. Up to now, most research has focussed on balancing the load on several resources of the same type, i.e. balancing either CPU load or I/O load. In this paper, we present floating probe, a

  15. Efficient resource utilization in shared-everything environments

    NARCIS (Netherlands)

    S. Manegold (Stefan); J.K. Obermaier

    1997-01-01

    textabstractEfficient resource usage is a key to achieve better performance in parallel database systems. Up to now, most research has focussed on balancing the load on several resources of the same type, i.e. balancing either CPU load or I/O load. In this paper, we present emph{floating probe, a

  16. Living with geo-resources and geo-hazards

    NARCIS (Netherlands)

    Hangx, Suzanne|info:eu-repo/dai/nl/30483579X; Niemeijer, André|info:eu-repo/dai/nl/370832132

    2015-01-01

    Two of the key strategic topics on the European Committee’s Horizon2020 Roadmap revolve around geo-resources and geo-hazards, and their impact on societal and economic development. On the way towards a better policy for sustainable geo-resources production, such as oil, gas, geothermal energy and

  17. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  18. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Science.gov (United States)

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  19. Key figures. Year 2006; Chiffres cles. Annee 2006

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  20. Key figures. Year 2005; Chiffres cles. Annee 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  1. Lightning Safety Tips and Resources

    Science.gov (United States)

    ... Services Careers Contact Us Glossary Safety National Program Lightning Safety Tips and Resources Weather.gov > Safety > Lightning Safety Tips and Resources Lightning Resources Lightning strikes ...

  2. ERP IMPLANTATION: KEY FACTORS OF SUCCESS AND IMPACT ON PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Dumitru Valentin

    2008-05-01

    Full Text Available The implantation of an ERP (abbreviation for "Enterprise Resource Planning" system is an enterprise project that implies the remodeling of the information system, mostly the rethinking of management procedures within the organization. The expansion and the complexity of these projects demand a theoretical framework and « optimal practices » in order to model and to evaluate the key factors of implementation success and to analyze its impact on the organization’s performance. The research problem of our communication can be divided into three research questions: - What conceptual framework for ERP implantation? - What are the key factors of success in ERP implantation? - What is the relationship between ERP implantation and enterprise performance?

  3. Key Nutritional Strategies to Optimize Performance in Para Athletes.

    Science.gov (United States)

    Scaramella, Jacque; Kirihennedige, Nuwanee; Broad, Elizabeth

    2018-05-01

    Para athletes are a high-risk population for inadequate dietary intake leading to insufficiencies in nutrients important to athletic performance. This is partly due to minimal support and resources, especially in sport nutrition education, combined with limited prior nutrition knowledge and risks associated with different impairment types. Inadequate energy, carbohydrate, protein, iron, and vitamin D status are of particular concern in Para athletes. Assessment of these key nutrients, along with sport nutrition education, is needed to empower Para athletes with the knowledge to understand their individual nutrition needs and maximize athletic performance. Copyright © 2018 Elsevier Inc. All rights reserved.

  4. The regulation, the key for the development of renewable energies

    International Nuclear Information System (INIS)

    Saez de Miera, G.

    2007-01-01

    Regulation, rather than mere availability of resources-water, wind, sun-, is the key factor for an appropriate development of the renewable energies. A comparative analysis of the main regulatory support schemes feed-in-tariffs, green certificates and auctions is done in this paper, concluding that systems based on feed-in-tariff are more efficient and effective. Finally, we describe and analyze the regulatory arrangements in place to support wind energy in Spain, a well-known worldwide success, which is based on three basic foundations: predictability, stability and sufficiency. (Author)

  5. Can individual and social patterns of resource use buffer animal populations against resource decline?

    Directory of Open Access Journals (Sweden)

    Sam C Banks

    Full Text Available Species in many ecosystems are facing declines of key resources. If we are to understand and predict the effects of resource loss on natural populations, we need to understand whether and how the way animals use resources changes under resource decline. We investigated how the abundance of arboreal marsupials varies in response to a critical resource, hollow-bearing trees. Principally, we asked what mechanisms mediate the relationship between resources and abundance? Do animals use a greater or smaller proportion of the remaining resource, and is there a change in cooperative resource use (den sharing, as the availability of hollow trees declines? Analyses of data from 160 sites surveyed from 1997 to 2007 showed that hollow tree availability was positively associated with abundance of the mountain brushtail possum, the agile antechinus and the greater glider. The abundance of Leadbeater's possum was primarily influenced by forest age. Notably, the relationship between abundance and hollow tree availability was significantly less than 1:1 for all species. This was due primarily to a significant increase by all species in the proportional use of hollow-bearing trees where the abundance of this resource was low. The resource-sharing response was weaker and inconsistent among species. Two species, the mountain brushtail possum and the agile antechinus, showed significant but contrasting relationships between the number of animals per occupied tree and hollow tree abundance. The discrepancies between the species can be explained partly by differences in several aspects of the species' biology, including body size, types of hollows used and social behaviour as it relates to hollow use. Our results show that individual and social aspects of resource use are not always static in response to resource availability and support the need to account for dynamic resource use patterns in predictive models of animal distribution and abundance.

  6. Identification of Key Indicators for Sustainable Construction Materials

    Directory of Open Access Journals (Sweden)

    Humphrey Danso

    2018-01-01

    Full Text Available Studies on sustainable construction materials are on the rise with their environmental, social, and economic benefits. This study identifies the key indicators for measuring sustainable construction materials. The design used for the study was that of a survey which relied on a questionnaire with five-point Likert scale to generate data for the analysis. For this purpose, 25 indicators from the three dimensions (environmental, social, and economic identified from the literature were presented to the respondents in a structured questionnaire, and responses were collected and analysed using SPSS. The study identified three key environmental indicators for measuring sustainable construction materials, and these indicators are human toxicity, climate change, and solid waste. Furthermore, adaptability, thermal comfort, local resources, and housing for all were identified as the four key social indicators for sustainable construction materials. In addition, maintenance cost, operational cost, initial cost, long-term savings, and life span were found to be the five key economic indicators for measuring sustainable construction materials. The study therefore suggests that these twelve indicators should be considered in future studies that seek to measure sustainable construction materials.

  7. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  8. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  9. KEY PERFORMANCE INDICATORS DISCLOSURES BY THE INTEGRATED REPORTING

    Directory of Open Access Journals (Sweden)

    BOBITAN ROXANA-IOANA

    2016-02-01

    Full Text Available We are in a new era of corporate reporting where the corporate reporting landscape was changed. Institutional and small investors, financial analysts and other key stakeholders are demanding more information about long-term strategies and profitability of companies. Also, the increasing complexity of business models, growing awareness of climate change and resource scarcity and communication are expectations of the role of business in the 21st century and which the key of performance indicators (KPIs is. The companies must change the way these KPIs are being incorporated throughout the annual report and how these are linked to the company’s strategy and business model, their risks and risk mitigation, and their incentive schemes. Regarding this, integrated reporting, continue to gain momentum, the spotlight on the depth, breadth and quality of KPIs being reported will only strengthen. The aim of this discussion paper is to describe which are the most important key performance indicators in sprit of integrating reporting. A good and very known example for the integrated reporting is Philips Electronics, the Dutch healthcare and lighting company, a pioneer that embrace this concept, and the paper make an analysis of the most important key performance indicators.

  10. World energy resources

    Directory of Open Access Journals (Sweden)

    Clerici A.

    2015-01-01

    Full Text Available As energy is the main “fuel” for social and economic development and since energy-related activities have significant environmental impacts, it is important for decision-makers to have access to reliable and accurate data in an user-friendly format. The World Energy Council (WEC has for decades been a pioneer in the field of energy resources and every three years publishes its flagship report Survey of Energy Resources. A commented analysis in the light of latest data summarized in such a report, World Energy Resources (WER 2013, is presented together with the evolution of the world energy resources over the last twenty years.

  11. World energy resources

    Science.gov (United States)

    Clerici, A.; Alimonti, G.

    2015-08-01

    As energy is the main "fuel" for social and economic development and since energy-related activities have significant environmental impacts, it is important for decision-makers to have access to reliable and accurate data in an user-friendly format. The World Energy Council (WEC) has for decades been a pioneer in the field of energy resources and every three years publishes its flagship report Survey of Energy Resources. A commented analysis in the light of latest data summarized in such a report, World Energy Resources (WER) 2013, is presented together with the evolution of the world energy resources over the last twenty years.

  12. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  13. 2005 resource options report

    International Nuclear Information System (INIS)

    Morris, T.

    2005-01-01

    This resource options report (ROR) fulfils regulatory requirements in British Columbia's two-year resource planning process. It identifies a wide range of resources and technologies that could be used to meet BC Hydro's future electricity demand. As such, it facilitates a transparent public review of resource options which include both supply-side and demand-side options. The resource options that will be used in the 2005 integrated electricity plan (IEP) were characterized. This ROR also documents where there is a general agreement or disagreement on the resource type characterization, based on the First Nations and Stakeholder engagement. BC Hydro used current information to provide realistic ranges on volume and cost to characterize environmental and social attributes. The BC Hydro system was modelled to assess the benefit and cost of various resource options. The information resulting from this ROR and IEP will help in making decisions on how to structure competitive acquisition calls and to determine the level of transmission services needed to advance certain BC Hydro projects. The IEP forecasts the nature and quantity of domestic resources required over the next 20 years. A strategic direction on how those needs will be met has been created to guide the management of BC Hydro's energy resources. Supply-side options include near-commercial technologies such as energy storage, ocean waves, tidal, fuel cells and integrated coal gasification combined cycle technology. Supply-side options also include natural gas, coal, biomass, geothermal, wind, and hydro. 120 refs., 39 tabs., 21 figs., 6 appendices

  14. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  15. Common challenge in resource efficiency improvement

    International Nuclear Information System (INIS)

    La Motta, Sergio; Peronaci, Marcello

    2015-01-01

    Energy efficiency and technology improvements on their own will not achieve the Low Carbon Societies (LCS) goals. Thus, resource efficiency and a circular economy are keys to a low carbon society. Resource efficiency improvement potential has been analysed from the industrial and territorial management perspectives. Exploring synergies between LCS and the larger area of sustainable development and green economy, highlighting co-benefits and trade-offs, is of utmost importance to pave the way to a more equitable and largely participated low carbon transition.

  16. Water advisory demand evaluation and resource toolkit

    OpenAIRE

    Paluszczyszyn, D.; Illya, S.; Goodyer, E.; Kubrycht, T.; Ambler, M.

    2016-01-01

    Cities are living organisms, 24h / 7day, with demands on resources and outputs. Water is a key resource whose management has not kept pace with modern urban life. Demand for clean water and loads on waste water no longer fit diurnal patterns; and they are impacted by events that are outside the normal range of parameters that are taken account of in water management. This feasibility study will determine how the application of computational intelligence can be used to analyse a mix of dat...

  17. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  18. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  19. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  20. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  1. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  2. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  3. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  4. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  5. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  6. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  7. Greenland and Natural Resources

    DEFF Research Database (Denmark)

    Lyck, Lise

    Greenland policy can delay and maybe change the future of the forecasted development of the use of natural resources. This book is relevant for anyone interested in Greenland in general and the development of Greenland both politically and economically and in relation natural resources....

  8. Resources and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2004-01-01

    resources depends on the propertyrights that she holds to those resources and on the transaction costs of exchanging,defining and protecting the relevant property rights. While transaction costs aremajor sources of value dissipation, value may be created by reducing suchdissipation. Implications for the RBV...

  9. Physical resources and infrastructure

    NARCIS (Netherlands)

    Foeken, D.W.J.; Hoorweg, J.; Foeken, D.W.J.; Obudho, R.A.

    2000-01-01

    This chapter describes the main physical characteristics as well as the main physical and social infrastructure features of Kenya's coastal region. Physical resources include relief, soils, rainfall, agro-ecological zones and natural resources. Aspects of the physical infrastructure discussed are

  10. Renewable material resource potential

    NARCIS (Netherlands)

    van Weenen, H.; Wever, R.; Quist, J.; Tukker, A.; Woudstra, J.; Boons, F.A.A.; Beute, N.

    2010-01-01

    Renewable material resources, consist of complex systems and parts. Their sub-systems and sub-sub-systems, have unique, specific, general and common properties. The character of the use that is made of these resources, depends on the availability of knowledge, experience, methods, tools, machines

  11. Human Resource Construction

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    Centering on strategic objective of reform and development,CIAE formulated its objectives in human resource construction for the 13th Five-year Plan period,and achieved new apparent progress in human resource construction in 2015.1 Implementation of"LONGMA Project"

  12. Selected Resources and Bibliography

    Science.gov (United States)

    New Directions for Higher Education, 2011

    2011-01-01

    This chapter provides an annotated bibliography of resources pertaining to international branch campuses (IBCs). This collection of references has been selected to represent the breadth of emerging scholarship on cross-border higher education and is intended to provide further resources on a range of concerns surrounding cross-border higher…

  13. Resources for blueberry growers

    Science.gov (United States)

    Local extension agents and USDA-ARS research scientists are excellent resources for various aspects of blueberry production, but several print and web-based resources are also available to help commercial blueberry growers. Growers are encouraged to consider the source for all web-based information....

  14. Open Educational Resources

    Science.gov (United States)

    McShane, Michael Q.

    2017-01-01

    While digital products have made significant inroads into the educational resources market, textbooks and other print materials still command about 60 percent of sales. But whether print or digital, all of these commercial offerings now face threats from a burgeoning effort to promote "open" resources for education--that is, materials…

  15. Australian Government Information Resources

    OpenAIRE

    Chapman, Bert

    2017-01-01

    Provides an overview of Australian Government information resources. Features content from Australian Government agency websites such as the Department of Environment and Energy, Department of Defence, Australian National Maritime Museum, ANZAC Memorial in Sydney, Department of Immigration & Border Protection, Australian Bureau of Statistics, Australian Dept. of Agriculture and Water Resources, Australian Parliament, Australian Treasury, Australian Transport Safety Board, and Australian Parl...

  16. Resources in Technology 7.

    Science.gov (United States)

    International Technology Education Association, Reston, VA.

    This volume of Resources in Technology contains the following eight instructional modules: (1) "Processing Technology"; (2) "Water--A Magic Resource"; (3) "Hazardous Waste Disposal--The NIMBY (Not in My Backyard) Syndrome"; (4) "Processing Fibers and Fabrics"; (5) "Robotics--An Emerging…

  17. Supplier Resource Mobilization

    DEFF Research Database (Denmark)

    Ellegaard, Chris; Kragh, Hanne; Andersen, Poul Houman

    theoretical perspectives. This review, synthesis, and resultant discussion allow us to propose that future research should look closer at the resource activation process on the supplier side, the role of the buyer-supplier relationship in resource mobilization, and the approach of the buying company...

  18. Studies of key success factors of product development success: A reinterpretation of results

    DEFF Research Database (Denmark)

    Plichta, Kirsten; Harmsen, Hanne

    In this paper the general validity of the research area of key factors of success in product development is discussed. To be more specific we argue that validity hinges on the causal relation between success and success factrors ­ a relation that unaccounted for in the empirical studies....... The theoretical tradition of the resource-based perspective provides ­ at least to some extent ­ an account of this causality. An important point in the paper is that the key factors of success in the empi studies are not factors causally related to success, but at the most a number of valuable resources and thus......, but in the studies problems concerning implementation are not discussed. When the lists factors of success are interprested as valuable resources and capabilities, we show that some implications on the implementability might be deduced from the resource-based perspective....

  19. Self-regulation : women's key to unlocking the resources in the self-domain

    NARCIS (Netherlands)

    Dubbelt, L.; Demerouti, E.; Rispens, S.

    2016-01-01

    In this study we examined in organizational contexts in which women have a minority position whether women's daily in-role performance benefits from spent time on personal interests that provide motivation, energy, and intention necessary to remain motivated and productive at work (i.e., self-work

  20. Modeling succession of key resource-harvesting traits of mixotrophic plankton

    DEFF Research Database (Denmark)

    Berge, Terje; Chakraborty, Subhendu; Hansen, Per Juel

    2017-01-01

    Unicellular eukaryotes make up the base of the ocean food web and exist as a continuum in trophic strategy from pure heterotrophy (phagotrophic zooplankton) to pure photoautotrophy (‘phytoplankton’), with a dominance of mixotrophic organisms combining both strategies. Here we formulate a trait-ba......, 2 August 2016; doi:10.1038/ismej.2016.92....

  1. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    Science.gov (United States)

    2012-06-20

    .../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Email: Include the...

  2. Modeling succession of key resource-harvesting traits of mixotrophic plankton

    DEFF Research Database (Denmark)

    Berge, Terje; Chakraborty, Subhendu; Hansen, Per Juel

    2017-01-01

    Unicellular eukaryotes make up the base of the ocean food web and exist as a continuum in trophic strategy from pure heterotrophy (phagotrophic zooplankton) to pure photoautotrophy (‘phytoplankton’), with a dominance of mixotrophic organisms combining both strategies. Here we formulate a trait-ba...

  3. Accumulation by development: The key role of poverty reduction narratives for resource capture in rural Cambodia

    NARCIS (Netherlands)

    A. Scheidel (Arnim)

    2016-01-01

    textabstractIndigenous shifting agriculture has been criticized for its negative effects on forest carbon stocks and mitigation policies have consequently fostered different forest management approaches. This has caused land disputes with indigenous populations in countries of the South, who have

  4. Key challenges for the creation and maintenance of specialist protein resources

    NARCIS (Netherlands)

    Holliday, G.L.; Bairoch, A.; Bagos, P.G.; Chatonnet, A.; Craik, D.J.; Finn, R.D.; Henrissat, B.; Landsman, D.; Manning, G.; Nagano, N.; O'Donovan, C.; Pruitt, K.D.; Rawlings, N.D.; Saier, M.; Sowdhamini, R.; Spedding, M.; Srinivasan, N.; Vriend, G.; Babbitt, P.C.; Bateman, A.

    2015-01-01

    As the volume of data relating to proteins increases, researchers rely more and more on the analysis of published data, thus increasing the importance of good access to these data that vary from the supplemental material of individual articles, all the way to major reference databases with

  5. Management of living resources as a key factor in the settlement patterns

    DEFF Research Database (Denmark)

    Hendriksen, Kåre

    on the average taxable income in the district. Most of the population has continued the hunting of marine mammals as the primary livelihood, while fishing for most forms a secondary occupation. As the income from hunting is rarely included in the official financial records the local people are perceived as poor...... small settlements scattered across the 400 km of coastline. The district was considered as poor and without development potentials, but because of the halibut fishery that developed in the 1990s, the district has gained a crucial role in Greenland's export income. However this has had little impact...... by the central government. In a combined effort to maximize tax income from fishing for halibut and provide labor for the expected mining industry the governance has changed the allocation of quotas for halibut in favor of larger boats. This promotes the boats typically coming from the southern districts...

  6. Designing The Human Resource Scorecard as a Performance Measurement of Human Resource

    Directory of Open Access Journals (Sweden)

    Erlinda Muslim

    2016-08-01

    Full Text Available Abstract. This study discusses the importance of performance measurement in a company because it can be used to assess the success of the company. The purpose of this study is to design and measure the performance of a MIGAS company using the Human Resource Scorecard approach by establishing the priority weight of strategic objectives and Key Performance Indicators on the Strategy Map through the Analytical Network Process. Results of this study are acquiring 16 strategic objectives, and 20 leading indicators and 17 lag ging indicators. Results of the priority weight show that the company is more focused on the operational perspective, then the financial perspective, strategic perspective, and the last is the customer perspective. From the design and measurement results obtained from this study, a plan of the Human Resource Scorecard design was created that can be used by the company. Keywords: performance measurement, human resource scorecard, strategy map, key performance indicator, analytical network process

  7. Merge of terminological resources

    DEFF Research Database (Denmark)

    Henriksen, Lina; Braasch, Anna

    2012-01-01

    In our globalized world, the amount of cross-national communication increases rapidly, which also calls for easy access to multi-lingual high quality terminological resources. Sharing of terminology resources is currently becoming common practice, and efficient strategies for integration...... – or merging – of terminology resources are strongly needed. This paper discusses prerequisites for successful merging with the focus on identification of candidate duplicates of a subject domain found in the resources to be merged, and it describes automatic merging strategies to be applied to such duplicates...... in electronic terminology resources. Further, some perspectives of manual, supplementary assessment methods supporting the automatic procedures are sketched. Our considerations are primarily based on experience gained in the IATE and EuroTermBank projects, as merging was a much discussed issue in both projects....

  8. Uranium market and resources

    International Nuclear Information System (INIS)

    Capus, G.; Arnold, T.

    2005-01-01

    Under the combined effect of various factors, such as interrogations related to facing the climatic changes, the increasing prices of oil versus announced decrease of its resources, the major geopolitical evolution and the remarkable development of Asia, we live nowadays a revival of nuclear power in the very front of stage. In tis context, the following question is posed: could the nuclear fission be a sustainable source of energy when taking into consideration the availability of uranium resources? The article aims at pinpointing the knowledge we have about the world uranium resources, their limits of uncertainty and the relation between knowledge resources and market evolution. To conclude, some susceptible tracks are proposed to improve the using process of uranium resources particularly in softening the impact of high prices

  9. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  10. ECONOMICS OF HUMAN RESOURCES

    Directory of Open Access Journals (Sweden)

    IOANA - JULIETA JOSAN

    2011-04-01

    Full Text Available The purpose of this paper is to analyze human resources in terms of quantitative and qualitative side with special focus on the human capital accumulation influence. The paper examines the human resources trough human capital accumulation in terms of modern theory of human resources, educational capital, health, unemployment and migration. The findings presented in this work are based on theoretical economy publications and data collected from research materials. Sources of information include: documents from organizations - the EUROSTAT, INSSE - studies from publications, books, periodicals, and the Internet. The paper describes and analyzes human resources characteristics, human resource capacities, social and economic benefits of human capital accumulation based on economy, and the government plans and policies on health, education and labor market.

  11. Uranium market and resources

    International Nuclear Information System (INIS)

    Capus, G.; Arnold, Th.

    2004-01-01

    The controversy about the extend of the uranium resources worldwide is still important, this article sheds some light on this topic. Every 2 years IAEA and NEA (nuclear energy agency) edit an inventory of uranium resources as reported by contributing countries. It appears that about 4.6 millions tons of uranium are available at a recovery cost less than 130 dollars per kg of uranium and a total of 14 millions tons of uranium can be assessed when including all existing or supposed resources. In fact there is enough uranium to sustain a moderate growth of the park of nuclear reactors during next decades and it is highly likely that the volume of uranium resources can allow a more aggressive development of nuclear energy. It is recalled that a broad use of the validated breeder technology can stretch the durability of uranium resources by a factor 50. (A.C.)

  12. Quantifying global exergy resources

    International Nuclear Information System (INIS)

    Hermann, Weston A.

    2006-01-01

    Exergy is used as a common currency to assess and compare the reservoirs of theoretically extractable work we call energy resources. Resources consist of matter or energy with properties different from the predominant conditions in the environment. These differences can be classified as physical, chemical, or nuclear exergy. This paper identifies the primary exergy reservoirs that supply exergy to the biosphere and quantifies the intensive and extensive exergy of their derivative secondary reservoirs, or resources. The interconnecting accumulations and flows among these reservoirs are illustrated to show the path of exergy through the terrestrial system from input to its eventual natural or anthropogenic destruction. The results are intended to assist in evaluation of current resource utilization, help guide fundamental research to enable promising new energy technologies, and provide a basis for comparing the resource potential of future energy options that is independent of technology and cost

  13. Uranium, resources, production and demand

    International Nuclear Information System (INIS)

    1986-01-01

    Periodic assessments of world uranium supply have been conducted by the OECD Nuclear Energy Agency (NEA) and the International Atomic Energy Agency (IAEA) since the mid 1960s. Published every two years, the report Uranium resources, production and demand, commonly referred to as the red book, has become an essential reference document for nuclear planners and policy makers in the international nuclear community. The latest red book, published in 1986, was based on data collected mainly in early 1985. Most of the data for 1985 were therefore provisional. The statistical update 1986 provides updated 1985 data collected in 1986 and provisional data for 1986. This is the first time such an annual update of key Red Book statistical data has been prepared. This year it covers only OECD countries with a secretariat estimate for the rest of Woca

  14. Managing key capabilities: A challenge for nuclear plant building companies

    International Nuclear Information System (INIS)

    Pascal Corbel

    2003-01-01

    The nuclear plant building industry faces a paradoxical situation. The use of nuclear reactors to produce energy for civil purposes is both a promising technology, with potentially huge outlets, and a technology facing declining demand. One of the key problems is then: how to maintain the capabilities necessary to benefit from the potential recovery? The resource-based view of strategic management has shown the importance of different types of resources and capabilities in gaining a sustainable competitive advantage. Successful incumbents in the market of nuclear station building have built those kinds of distinctive capabilities that give them a competitive advantage over potential new entrants. But we show that, without a permanent activity in plant building, preserving those capabilities necessitates specific strategic action. We firstly develop the argument that the nuclear plant building industry is in a paradoxical situation in terms of demand and technical performance trends. Secondly, we try to identify the key capabilities of the incumbents. We show that companies in that field use mainly three types of distinctive capabilities: pure technical and scientific knowledge in direct relation to the use of nuclear as an energy generator, competences in risk management and competences in large project management, including financing. Thirdly, we show that although some of those capabilities are used through other nuclear-related activities such as plant maintenance or fuel supply, some of them necessitate taking strategic actions in order to be preserved. We argue that this should be a priority of nuclear equipment company managers in the next few years. (author)

  15. Using the key success factor concept in competitor intelligence and benchmarking

    DEFF Research Database (Denmark)

    Bisp, Søren; Sørensen, Elin; Grunert, Klaus G.

    1997-01-01

    A key success factor is regarded as a skill or a resource that a business can invest in, which explains a major part of the observable differences in perceived value of the offer and/or relative costs of bringing that offer to the marketplace. Key success factors are potentially useful in structu......A key success factor is regarded as a skill or a resource that a business can invest in, which explains a major part of the observable differences in perceived value of the offer and/or relative costs of bringing that offer to the marketplace. Key success factors are potentially useful...... in structuring the generation of market intelligence in competitor analysis and benchmarking. To this end, a method was developed, based on a reverse laddering procedure, which elicits decision-makers' subjec causal maps. When aggregated, these maps can be used to derive competitor analysis systems. The paper...

  16. Use of rich-media resources by engineering undergraduates

    Science.gov (United States)

    Gillie, Martin; Dahli, Ranim; Saunders, Fiona C.; Gibson, Andrew

    2017-11-01

    The ability to develop and distribute digital teaching resources in higher education has developed rapidly over the last decade but research into how students use such resources has received limited attention. This study uses questionnaire results, Internet analytic data and semi-structured interviews to examine the use of three types of rich-media teaching resources - lecture podcasts, key-concept videos and tutorial solution videos - by engineering undergraduates. It is found that students value all three types of resource, especially for revision and as a supplement to lectures. Students find short, focused resources more useful than longer ones. Non-native English speakers and those with disabilities derive particular benefits from the resources. The effect of rich-media resources on lecture attendance is found to be small, and two-way.

  17. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  18. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  19. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  20. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  1. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  2. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  3. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  4. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  5. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  6. Database resources for the tuberculosis community.

    Science.gov (United States)

    Lew, Jocelyne M; Mao, Chunhong; Shukla, Maulik; Warren, Andrew; Will, Rebecca; Kuznetsov, Dmitry; Xenarios, Ioannis; Robertson, Brian D; Gordon, Stephen V; Schnappinger, Dirk; Cole, Stewart T; Sobral, Bruno

    2013-01-01

    Access to online repositories for genomic and associated "-omics" datasets is now an essential part of everyday research activity. It is important therefore that the Tuberculosis community is aware of the databases and tools available to them online, as well as for the database hosts to know what the needs of the research community are. One of the goals of the Tuberculosis Annotation Jamboree, held in Washington DC on March 7th-8th 2012, was therefore to provide an overview of the current status of three key Tuberculosis resources, TubercuList (tuberculist.epfl.ch), TB Database (www.tbdb.org), and Pathosystems Resource Integration Center (PATRIC, www.patricbrc.org). Here we summarize some key updates and upcoming features in TubercuList, and provide an overview of the PATRIC site and its online tools for pathogen RNA-Seq analysis. Copyright © 2012 Elsevier Ltd. All rights reserved.

  7. Space and Planetary Resources

    Science.gov (United States)

    Abbud-Madrid, Angel

    2018-02-01

    The space and multitude of celestial bodies surrounding Earth hold a vast wealth of resources for a variety of space and terrestrial applications. The unlimited solar energy, vacuum, and low gravity in space, as well as the minerals, metals, water, atmospheric gases, and volatile elements on the Moon, asteroids, comets, and the inner and outer planets of the Solar System and their moons, constitute potential valuable resources for robotic and human space missions and for future use in our own planet. In the short term, these resources could be transformed into useful materials at the site where they are found to extend mission duration and to reduce the costly dependence from materials sent from Earth. Making propellants and human consumables from local resources can significantly reduce mission mass and cost, enabling longer stays and fueling transportation systems for use within and beyond the planetary surface. Use of finely grained soils and rocks can serve for habitat construction, radiation protection, solar cell fabrication, and food growth. The same material could also be used to develop repair and replacement capabilities using advanced manufacturing technologies. Following similar mining practices utilized for centuries on Earth, identifying, extracting, and utilizing extraterrestrial resources will enable further space exploration, while increasing commercial activities beyond our planet. In the long term, planetary resources and solar energy could also be brought to Earth if obtaining these resources locally prove to be no longer economically or environmentally acceptable. Throughout human history, resources have been the driving force for the exploration and settling of our planet. Similarly, extraterrestrial resources will make space the next destination in the quest for further exploration and expansion of our species. However, just like on Earth, not all challenges are scientific and technological. As private companies start working toward

  8. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  9. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  10. Securing renewable resource supplies for changing market demands in a bio-based economy

    NARCIS (Netherlands)

    Dam, van J.E.G.; Klerk-Engels, de B.; Struik, P.C.; Rabbinge, R.

    2005-01-01

    Establishment of a bio-based economy has been recognised as one of the key issues for sustainable development For future developments renewable resources will play a key role as CO2 neutral raw material for sustainable industrial production to curb depletion of fossil resources. Options to fully

  11. A cyber-physical approach to secret key generation in smart environments

    OpenAIRE

    Barsocchi, Paolo; Chessa, Stefano; Martinovic, Ivan; Oligeri, Gabriele

    2011-01-01

    Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computa...

  12. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  13. Handbook of human resources management

    CERN Document Server

    2016-01-01

    Human resources topics are gaining more and more strategic importance in modern business management. Only those companies that find the right answers to the following questions have a sustainable basis for their future success: - How can we attract and select the right talent for our teams? - How can we develop the skills and behaviors which are key for our business? - How can we engage and retain the talent we need for our future? While most other management disciplines have their standards and procedures, Human Resources still lacks a broadly accepted basis for its work. Both the structured collection of reflected real-life experience and the multi-perspective view support readers in making informed and well-balanced decisions. With this handbook, Springer provides a landmark reference work on today’s HR management, based on the combined experience of more than 85 globally selected HR leaders and HR experts. Rather than theoretical discussions about definitions, the handbook focuses on sharing practical e...

  14. Human resource development for decommissioning

    International Nuclear Information System (INIS)

    Yanagihara, Satoshi

    2016-01-01

    This paper summarized the features of decommissioning work and the methods how to develop human resources. The general flow of decommissioning includes the following steps: (1) evaluation of facility characteristics, (2) planning, (3) decontamination and disassembly of equipment and structures contaminated with radioactivity, (4) radioactivity measurement, (5) treatment and disposal of radioactive waste, and (6) release from legal restrictions (termination of decommissioning). For this purpose, techniques in various fields are required. In the evaluation of facility characteristics, radiation measurement and calculation of activation amount in the core part are required. In decontamination and dismantling, cutting technology (mechanical cutting, thermal cutting, etc.), decontamination technology, and remote control technology are required. In the nuclear power education in the past, the fields related to design, construction, operation, and maintenance among the plant life cycle were the main parts. Much attention was not payed to decommissioning and the treatment/disposal of radioactive waste in the second half of life cycle. As university education, Hokkaido University and Fukui University have lectures on decommissioning. Furthermore, the education and research for students are proceeding at seven universities, with a focus on common reactors including those of Fukushima Daiichi Power Station. It is a key for promoting decommissioning, to incorporate project management, risk analysis, cost evaluation, and decision making into education, and to foster human resources heading toward challenging problems including social problems. (A.O.)

  15. Agroecology: the key role of arbuscular mycorrhizas in ecosystem services.

    Science.gov (United States)

    Gianinazzi, Silvio; Gollotte, Armelle; Binet, Marie-Noëlle; van Tuinen, Diederik; Redecker, Dirk; Wipf, Daniel

    2010-11-01

    The beneficial effects of arbuscular mycorrhizal (AM) fungi on plant performance and soil health are essential for the sustainable management of agricultural ecosystems. Nevertheless, since the 'first green revolution', less attention has been given to beneficial soil microorganisms in general and to AM fungi in particular. Human society benefits from a multitude of resources and processes from natural and managed ecosystems, to which AM make a crucial contribution. These resources and processes, which are called ecosystem services, include products like food and processes like nutrient transfer. Many people have been under the illusion that these ecosystem services are free, invulnerable and infinitely available; taken for granted as public benefits, they lack a formal market and are traditionally absent from society's balance sheet. In 1997, a team of researchers from the USA, Argentina and the Netherlands put an average price tag of US $33 trillion a year on these fundamental ecosystem services. The present review highlights the key role that the AM symbiosis can play as an ecosystem service provider to guarantee plant productivity and quality in emerging systems of sustainable agriculture. The appropriate management of ecosystem services rendered by AM will impact on natural resource conservation and utilisation with an obvious net gain for human society.

  16. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  17. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  18. Adaptive radar resource management

    CERN Document Server

    Moo, Peter

    2015-01-01

    Radar Resource Management (RRM) is vital for optimizing the performance of modern phased array radars, which are the primary sensor for aircraft, ships, and land platforms. Adaptive Radar Resource Management gives an introduction to radar resource management (RRM), presenting a clear overview of different approaches and techniques, making it very suitable for radar practitioners and researchers in industry and universities. Coverage includes: RRM's role in optimizing the performance of modern phased array radars The advantages of adaptivity in implementing RRMThe role that modelling and

  19. Developing a strategic human resources plan for the Urban Angel.

    Science.gov (United States)

    Owen, Susan M

    2011-01-01

    In healthcare a significant portion of the budget is related to human resources. However, many healthcare organizations have yet to develop and implement a focused organizational strategy that ensures all human resources are managed in a way that best supports the successful achievement of corporate strategies. St. Michael's Hospital, in Toronto, Ontario, recognized the benefits of a strategic human resources management plan. During an eight-month planning process, St. Michael's Hospital undertook the planning for and development of a strategic human resources management plan. Key learnings are outlined in this paper.

  20. Academic Primer Series: Eight Key Papers about Education Theory.

    Science.gov (United States)

    Gottlieb, Michael; Boysen-Osborn, Megan; Chan, Teresa M; Krzyzaniak, Sara M; Pineda, Nicolas; Spector, Jordan; Sherbino, Jonathan

    2017-02-01

    Many teachers adopt instructional methods based on assumptions of best practices without attention to or knowledge of supporting education theory. Familiarity with a variety of theories informs education that is efficient, strategic, and evidence-based. As part of the Academic Life in Emergency Medicine Faculty Incubator Program, a list of key education theories for junior faculty was developed. A list of key papers on theories relevant to medical education was generated using an expert panel, a virtual community of practice synthetic discussion, and a social media call for resources. A three-round, Delphi-informed voting methodology including novice and expert educators produced a rank order of the top papers. These educators identified 34 unique papers. Eleven papers described the general use of education theory, while 23 papers focused on a specific theory. The top three papers on general education theories and top five papers on specific education theory were selected and summarized. The relevance of each paper for junior faculty and faculty developers is also presented. This paper presents a reading list of key papers for junior faculty in medical education roles. Three papers about general education theories and five papers about specific educational theories are identified and annotated. These papers may help provide foundational knowledge in education theory to inform junior faculty teaching practice.

  1. Customer service: the key to market differentiation.

    Science.gov (United States)

    Stahl, D A

    1997-06-01

    Fierce competition in the subacute care environment makes customer service orientation essential. Four steps help to achieve quality customer service are: (1) institute core values; (2) identify your customers; (3) understand human resources; and (4) establish an efficient system.

  2. Reciprocal Relationships between Job Resources, Personal Resources, and Work Engagement

    Science.gov (United States)

    Xanthopoulou, Despoina; Bakker, Arnold B.; Demerouti, Evangelia; Schaufeli, Wilmar B.

    2009-01-01

    This study examined longitudinal relationships between job resources, personal resources, and work engagement. On the basis of Conservation of Resources theory, we hypothesized that job resources, personal resources, and work engagement are reciprocal over time. The study was conducted among 163 employees, who were followed-up over a period of 18…

  3. Community-based natural resource management

    DEFF Research Database (Denmark)

    Treue, Thorsten; Nathan, Iben

    that deliver credible and easily accessible information. Checks and balances can be supported through civil society as well as the media. Finally, the private sector plays a key and potentially beneficial role in the harvest, transport and marketing of CBNRM products. Thus, dialogue partners should include......This technical note is the product of a long process of consultation with a wide range of resource persons who have over the years been involved in the Danish support to Community Based Natural Resource Management. It gives a brief introduction to community-based natural resource management (CBNRM...... from CBNRM will be useful when designing community-based climate adaptation strategies. Thus, this note is a contribution to an ongoing debate as well as a product of the long-standing experiences of Danida's environmental portfolio. CBNRM is not a stand-alone solution to secure poverty reduction...

  4. BOOK REVIEW: Key Science Physics: New Edition and Key Science Physics for International Schools: Extension File

    Science.gov (United States)

    Maybank, Maureen

    1999-09-01

    When handling , I recalled how one set of sixth-form students that I taught affectionately referred to Jim Breithaupt's large format book Understanding Physics for Advanced Level as `Big Jim'. This package, for GCSE students and teachers, is its younger brother. Key Science Physics was reviewed in this journal over four years ago. Now it is in a new edition with an expanded ring file of teacher resources (a Teacher's Guide and Extension File). It has been expanded for a wider range of students to meet the requirements of all GCSE syllabuses with additional topics for IGCSE and IB. The international bit seems to be among materials in the file of resources and does not appear in the title of the students' textbook. This is not one of those purchases that will only get occasional use and be left in a department library but it is one that contains sufficient excellent material to become central to any GCSE Physics course. For the students there is a single-volume 396-page textbook in full colour (not a heavyweight book). Marginal comments point out places where an Activity or Assignment from the Extension File fits in. All the materials in the teacher's Extension File are cross referenced to the numbering of this textbook, i.e. its Themes, Topics, Checkpoints, Tests etc, not to page numbers. The margin is used in other attractive ways to highlight a summary, propose a first thought or provide a topic summary. The text is fruitful mix of pure physics, applications and personalities. To support the students' practical work the Extension File contains photocopiable sheets. For the activities and assignments a few contain a harder version to give access to the higher levels of attainment. Four alternatives to practical questions are given; there are also exam questions and multiple choice questions for each topic. These all have helpful mark schemes on the teacher's answers pages. What else do you get? A Glossary collection of sheets to photocopy with space to enter a

  5. Museum specimens reveal loss of pollen host plants as key factor driving wild bee decline in The Netherlands

    NARCIS (Netherlands)

    Scheper, J.A.; Reemer, M.; Kats, van R.J.M.; Ozinga, W.A.; Linden, van der G.T.J.; Schaminee, J.H.J.; Siepel, H.; Kleijn, D.

    2014-01-01

    Evidence for declining populations of both wild and managed bees has raised concern about a potential global pollination crisis. Strategies to mitigate bee loss generally aim to enhance floral resources. However, we do not really know whether loss of preferred floral resources is the key driver of

  6. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  7. Resources, constraints and capabilities

    NARCIS (Netherlands)

    Dhondt, S.; Oeij, P.R.A.; Schröder, A.

    2018-01-01

    Human and financial resources as well as organisational capabilities are needed to overcome the manifold constraints social innovators are facing. To unlock the potential of social innovation for the whole society new (social) innovation friendly environments and new governance structures

  8. A Resource Conservation Unit.

    Science.gov (United States)

    Porter, Philip D.

    1979-01-01

    Describes a variety of learning activities for teaching elementary and junior high students about air, water, and energy conservation techniques. Suggests community resources, social studies objectives, language skills, and 20 activities. (CK)

  9. Limited Income and Resources

    Data.gov (United States)

    U.S. Department of Health & Human Services — Information for those with limited income and resources (those who may qualify for or already have the Low Income Subsidy to lower their prescription drug coverage...

  10. Other Resources for Researchers

    African Journals Online (AJOL)

    The AfricaPortal is an online resource of policy research on African issues. ... Over 3000 Open Access books, journals and digital documents relating to African ... guides. http://www.lib.monash.edu.au/tutorials/citing/harvard.html Harvard Style.

  11. Semiotic resources for navigation

    DEFF Research Database (Denmark)

    Due, Brian Lystgaard; Lange, Simon Bierring

    2018-01-01

    This paper describes two typical semiotic resources blind people use when navigating in urban areas. Everyone makes use of a variety of interpretive semiotic resources and senses when navigating. For sighted individuals, this especially involves sight. Blind people, however, must rely on everything...... else than sight, thereby substituting sight with other modalities and distributing the navigational work to other semiotic resources. Based on a large corpus of fieldwork among blind people in Denmark, undertaking observations, interviews, and video recordings of their naturally occurring practices...... of walking and navigating, this paper shows how two prototypical types of semiotic resources function as helpful cognitive extensions: the guide dog and the white cane. This paper takes its theoretical and methodological perspective from EMCA multimodal interaction analysis....

  12. Bridge resource program.

    Science.gov (United States)

    2013-09-01

    The mission of Rutgers Universitys Center for Advanced Infrastructure and Transportation (CAIT) Bridge Resource Program (BRP) is to provide bridge engineering support to the New Jersey Department of Transportation (NJDOT)s Bridge Engineering an...

  13. Uranium resources and requirements

    International Nuclear Information System (INIS)

    Silver, J.M.; Wright, W.J.

    1975-08-01

    Australia has about 19% of the reasonably assured resources of uranium in the Western World recoverable at costs of less than $A20 per kilogram, or about 9% of the resources (reasonably assured and estimated additional) recoverable at costs of less than $A30 per kilogram. Australia's potential for further discoveries of uranium is good. Nevertheless, if Australia did not export any of these resources it would probably have only a marginal effect on the development of nuclear power; other resources would be exploited earlier and prices would rise, but not sufficiently to make the costs of nuclear power unattractive. On the other hand, this policy could deny to Australia real benefits in foreign currency earnings, employment and national development. (author)

  14. OAS :: Accountability :: Human Resources

    Science.gov (United States)

    OAS, including its organizational structure, each organizational unit's staffing, vacant posts, and a list of procurement notices for formal bids, links to the performance contract and travel control Plan Human Resources Organizational Structure Functions of each organizational unit Vacant Posts

  15. Rangeland and water resources

    African Journals Online (AJOL)

    Session B3 Management for sustainable use — Rangeland and water resources. ... The theme of optimsing integrated catchment management will be treated ... land system, catchment, basin), with a focus on law, policy and implementation.

  16. BEI Resource Repository

    Data.gov (United States)

    U.S. Department of Health & Human Services — BEI Resources provides reagents, tools and information for studying Category A, B, and C priority pathogens, emerging infectious disease agents, non-pathogenic...

  17. People Are a Resource.

    Science.gov (United States)

    Schubert, Clarence

    1979-01-01

    This is a description of a model for demonstrating an approach to improving slums in Indonesia and the Philippines. The strategy of using people rather than financial capital as a resource is discussed. (SA)

  18. Myasthenia gravis - resources

    Science.gov (United States)

    Resources - myasthenia gravis ... The following organizations provide information on myasthenia gravis : Myasthenia Gravis Foundation of America -- www.myasthenia.org National Institute of Neurological Disorders and Stroke -- www.ninds.nih.gov/Disorders/Patient- ...

  19. Green Power Partner Resources

    Science.gov (United States)

    EPA Green Power Partners can access tools and resources to help promote their green power commitments. Partners use these tools to communicate the benefits of their green power use to their customers, stakeholders, and the general public.

  20. Modern water resources engineering

    CERN Document Server

    Yang, Chih

    2014-01-01

    The Handbook of Environmental Engineering series is an incredible collection of methodologies that study the effects of pollution and waste in their three basic forms: gas, solid, and liquid. This exciting new addition to the series, Volume 15: Modern Water Resources Engineering , has been designed to serve as a water resources engineering reference book as well as a supplemental textbook. We hope and expect it will prove of equal high value to advanced undergraduate and graduate students, to designers of water resources systems, and to scientists and researchers. A critical volume in the Handbook of Environmental Engineering series, chapters employ methods of practical design and calculation illustrated by numerical examples, include pertinent cost data whenever possible, and explore in great detail the fundamental principles of the field. Volume 15: Modern Water Resources Engineering, provides information on some of the most innovative and ground-breaking advances in the field today from a panel of esteemed...

  1. - Oklahoma Water Resources Center

    Science.gov (United States)

    Development Ag Business Community & Rural Development Crops Family & Consumer Sciences Gardening Family & Consumer Sciences Food & Ag Products Center Horticulture & Landscape Architecture & Landscape Architecture Natural Resource Ecology & Management Plant & Soil Sciences

  2. MonitoringResources.org—Supporting coordinated and cost-effective natural resource monitoring across organizations

    Science.gov (United States)

    Bayer, Jennifer M.; Scully, Rebecca A.; Weltzin, Jake F.

    2018-05-21

    Natural resource managers who oversee the Nation’s resources require data to support informed decision-making at a variety of spatial and temporal scales that often cross typical jurisdictional boundaries such as states, agency regions, and watersheds. These data come from multiple agencies, programs, and sources, often with their own methods and standards for data collection and organization. Coordinating standards and methods is often prohibitively time-intensive and expensive. MonitoringResources.org offers a suite of tools and resources that support coordination of monitoring efforts, cost-effective planning, and sharing of knowledge among organizations. The website was developed by the Pacific Northwest Aquatic Monitoring Partnership—a collaboration of Federal, state, tribal, local, and private monitoring programs—and the U.S. Geological Survey (USGS), with funding from the Bonneville Power Administration and USGS. It is a key component of a coordinated monitoring and information network.

  3. Lunar resource base

    Science.gov (United States)

    Pulley, John; Wise, Todd K.; Roy, Claude; Richter, Phil

    A lunar base that exploits local resources to enhance the productivity of a total SEI scenario is discussed. The goals were to emphasize lunar science and to land men on Mars in 2016 using significant amounts of lunar resources. It was assumed that propulsion was chemical and the surface power was non-nuclear. Three phases of the base build-up are outlined, the robotic emplacement of the first elements is detailed and a discussion of future options is included.

  4. Hanford cultural resources laboratory

    International Nuclear Information System (INIS)

    Wright, M.K.

    1995-01-01

    This section of the 1994 Hanford Site Environmental Report describes activities of the Hanford Cultural Resources Laboratory (HCRL) which was established by the Richland Operations Office in 1987 as part of PNL.The HCRL provides support for the management of the archaeological, historical, and traditional cultural resources of the site in a manner consistent with the National Historic Preservation Act, the Native American Graves Protection and Repatriation Act, and the American Indian Religious Freedom Act

  5. Timber resources of Ohio

    Science.gov (United States)

    Neal P. Kingsley; Carl E. Mayer

    1970-01-01

    Under the authority of the McSweeney-McNary Forest Research Act of May 22, 1928, and subsequent amendments, the Forest Service, U. S. Department of Agriculture, conducts a series of continuing forest surveys of all states to provide up-to-date information about the forest resources of the Nation. A resurvey of the timber resources of Ohio was made in 1966 and 1967 by...

  6. Uranium resource assessments

    International Nuclear Information System (INIS)

    1981-01-01

    The objective of this investigation is to examine what is generally known about uranium resources, what is subject to conjecture, how well do the explorers themselves understand the occurrence of uranium, and who are the various participants in the exploration process. From this we hope to reach a better understanding of the quality of uranium resource estimates as well as the nature of the exploration process. The underlying questions will remain unanswered. But given an inability to estimate precisely our uranium resources, how much do we really need to know. To answer this latter question, the various Department of Energy needs for uranium resource estimates are examined. This allows consideration of whether or not given the absence of more complete long-term supply data and the associated problems of uranium deliverability for the electric utility industry, we are now threatened with nuclear power plants eventually standing idle due to an unanticipated lack of fuel for their reactors. Obviously this is of some consequence to the government and energy consuming public. The report is organized into four parts. Section I evaluates the uranium resource data base and the various methodologies of resource assessment. Part II describes the manner in which a private company goes about exploring for uranium and the nature of its internal need for resource information. Part III examines the structure of the industry for the purpose of determining the character of the industry with respect to resource development. Part IV arrives at conclusions about the emerging pattern of industrial behavior with respect to uranium supply and the implications this has for coping with national energy issues

  7. Hanford cultural resources laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Wright, M.K.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report describes activities of the Hanford Cultural Resources Laboratory (HCRL) which was established by the Richland Operations Office in 1987 as part of PNL.The HCRL provides support for the management of the archaeological, historical, and traditional cultural resources of the site in a manner consistent with the National Historic Preservation Act, the Native American Graves Protection and Repatriation Act, and the American Indian Religious Freedom Act.

  8. Municipal Solid Waste Resources

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-06-01

    Municipal solid waste (MSW) is a source of biomass material that can be utilized for bioenergy production with minimal additional inputs. MSW resources include mixed commercial and residential garbage such as yard trimmings, paper and paperboard, plastics, rubber, leather, textiles, and food wastes. Waste resources such as landfill gas, mill residues, and waste grease are already being utilized for cost-effective renewable energy generation. MSW for bioenergy also represents an opportunity to divert greater volumes of residential and commercial waste from landfills.

  9. The Platform Architecture and Key Technology of Cloud Service that Support Wisdom City Management

    Directory of Open Access Journals (Sweden)

    Liang Xiao

    2013-05-01

    Full Text Available According to the new requirement of constructing “resource sharing and service on demand” wisdom city system, this paper put forward the platform architecture of cloud service for wisdom city management which support IaaS, PaaS and SaaS three types of service model on the basis of researching the operation mode of the wisdom city which under cloud computing environment and through the research of mass storing technology of cloud data, building technology of cloud resource pool, scheduling management methods and monitoring technology of cloud resource, security management and control technology of cloud platform and other key technologies. The platform supports wisdom city system to achieve business or resource scheduling management optimization and the unified and efficient management of large-scale hardware and software, which has the characteristics of cross-domain resource scheduling, cross-domain data sharing, cross-domain facilities integration and cross-domain service integration.

  10. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  11. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  12. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  13. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  14. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  15. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  16. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  17. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  18. The hidden winners of renewable energy promotion: Insights into sector-specific wage differentials

    International Nuclear Information System (INIS)

    Antoni, Manfred; Janser, Markus; Lehmer, Florian

    2015-01-01

    In light of Germany's energy system transformation, this paper examines differences in employment structures and wage differentials between renewable energy establishments and their sector peers. To do so, we have developed a novel data set by linking company-level information from the German Renewable Energy Federation with administrative establishment-level data from the Institute for Employment Research. Descriptive evidence shows significant differences in wages and several other characteristics between renewable energy establishments and their sector peers. Our estimates give evidence that human capital and other establishment-level characteristics mostly explain the wage differential among manufacturers and energy providers. However, we find a persistent ‘renewable energy wage premium' of more than ten percent in construction/installation activities and architectural/engineering services. We interpret this premium as a positive indirect effect of the promotion of renewable energies for the benefit of employees in renewable energy establishments within these two sectors. - Highlights: • Renewable energy (RE) firms pay considerably more than their non-RE sector peers. • In manufacturing and energy supply, firm attributes explain mainly the wage gap. • In installation, planning and project management one third remains unexplained. • This unexplained rest represents a ‘RE wage premium’ of around 10 percent. • The employees in both sectors are the ‘hidden winners’ of RE promotion.

  19. An Analysis of Industry and Sector-Specific Impacts of a Japan-Philippines Economic Partnership

    OpenAIRE

    Escolar, Royce Elvin O.

    2004-01-01

    The paper aims to identify industry and macrolevel factors that affect competitiveness of selected sectors upon the implementation of the JPEPA. Priority sectors identified by the Department of Trade and Industry, accounting for 82% of total Philippine exports to Japan in 2002, were included in the study. For Philippine industries to gain, market access issues on trade facilitation, nontariff barriers and recognition of standards come into play especially for the service and agricultural sect...

  20. International trade and migration in the presence of sector-specific labor quality pricing distortions

    NARCIS (Netherlands)

    Huizinga, H.P.

    1995-01-01

    In one of two sectors, there are labor quality pricing distortions in the sense that labor obtains the average rather than marginal product. This may be due to a failure on the part of employers to observe individual labor quality or due to an income redistributing union. Relatively low quality

  1. Political Environments, Sector-Specific Configurations, and Strategic Devices: Understanding Institutional Reform in Uruguay

    OpenAIRE

    Fernando Filgueira; Juan Andrés Moraes

    1999-01-01

    This paper argues for a multi-level explanatory model for understanding institutional reform. The expanding but still modest accumulation in the field tends to clump together different levels of efficient causes. Statements like “reform will be more likely in countries that have swiftly proceeded with macroeconomic reform and stabilization and have the legitimacy and power to push further reform” refer to general political conditions. The notion that reforms will be harder where costs are con...

  2. Increasing biomass resource availability through supply chain analysis

    International Nuclear Information System (INIS)

    Welfle, Andrew; Gilbert, Paul; Thornley, Patricia

    2014-01-01

    Increased inclusion of biomass in energy strategies all over the world means that greater mobilisation of biomass resources will be required to meet demand. Strategies of many EU countries assume the future use of non-EU sourced biomass. An increasing number of studies call for the UK to consider alternative options, principally to better utilise indigenous resources. This research identifies the indigenous biomass resources that demonstrate the greatest promise for the UK bioenergy sector and evaluates the extent that different supply chain drivers influence resource availability. The analysis finds that the UK's resources with greatest primary bioenergy potential are household wastes (>115 TWh by 2050), energy crops (>100 TWh by 2050) and agricultural residues (>80 TWh by 2050). The availability of biomass waste resources was found to demonstrate great promise for the bioenergy sector, although are highly susceptible to influences, most notably by the focus of adopted waste management strategies. Biomass residue resources were found to be the resource category least susceptible to influence, with relatively high near-term availability that is forecast to increase – therefore representing a potentially robust resource for the bioenergy sector. The near-term availability of UK energy crops was found to be much less significant compared to other resource categories. Energy crops represent long-term potential for the bioenergy sector, although achieving higher limits of availability will be dependent on the successful management of key influencing drivers. The research highlights that the availability of indigenous resources is largely influenced by a few key drivers, this contradicting areas of consensus of current UK bioenergy policy. - Highlights: • As global biomass demand increases, focus is placed indigenous resources. • A Biomass Resource Model is applied to analyse UK biomass supply chain dynamics. • Biomass availability is best increased

  3. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  4. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  5. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  6. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  7. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  8. Creation and Long-term Preservation of Digital Multimedia Resources:Some Preliminary Practices

    Institute of Scientific and Technical Information of China (English)

    ZHAO BAOYING; LUO YUNCHUAN

    2008-01-01

    This paper gives a comprehensive introduction of National Cultural Information Resources Sharing Project.It discusses the best practices in creation and long-term preservation of multimedia digital resources,and recommends solutions to the key issues in resource selection,standards & specifications and copyright.

  9. Work Engagement Accumulation of Task, Social, Personal Resources: A Three-Wave Structural Equation Model

    Science.gov (United States)

    Weigl, Matthias; Hornung, Severin; Parker, Sharon K.; Petru, Raluca; Glaser, Jurgen; Angerer, Peter

    2010-01-01

    Drawing on Conservation of Resources Theory and previous research on work engagement, the present study investigates gain spirals between employees' engagement and their task, social, and personal resources. It focuses on the key resources of job control, positive work relationships, and active coping behavior. In a three-wave design, work…

  10. NATURAL RESOURCES ASSESSMENT

    International Nuclear Information System (INIS)

    D.F. Fenster

    2000-01-01

    The purpose of this report is to summarize the scientific work that was performed to evaluate and assess the occurrence and economic potential of natural resources within the geologic setting of the Yucca Mountain area. The extent of the regional areas of investigation for each commodity differs and those areas are described in more detail in the major subsections of this report. Natural resource assessments have focused on an area defined as the ''conceptual controlled area'' because of the requirements contained in the U.S. Nuclear Regulatory Commission Regulation, 10 CFR Part 60, to define long-term boundaries for potential radionuclide releases. New requirements (proposed 10 CFR Part 63 [Dyer 1999]) have obviated the need for defining such an area. However, for the purposes of this report, the area being discussed, in most cases, is the previously defined ''conceptual controlled area'', now renamed the ''natural resources site study area'' for this report (shown on Figure 1). Resource potential can be difficult to assess because it is dependent upon many factors, including economics (demand, supply, cost), the potential discovery of new uses for resources, or the potential discovery of synthetics to replace natural resource use. The evaluations summarized are based on present-day use and economic potential of the resources. The objective of this report is to summarize the existing reports and information for the Yucca Mountain area on: (1) Metallic mineral and mined energy resources (such as gold, silver, etc., including uranium); (2) Industrial rocks and minerals (such as sand, gravel, building stone, etc.); (3) Hydrocarbons (including oil, natural gas, tar sands, oil shales, and coal); and (4) Geothermal resources. Groundwater is present at the Yucca Mountain site at depths ranging from 500 to 750 m (about 1,600 to 2,500 ft) below the ground surface. Groundwater resources are not discussed in this report, but are planned to be included in the hydrology

  11. NATURAL RESOURCES ASSESSMENT

    Energy Technology Data Exchange (ETDEWEB)

    D.F. Fenster

    2000-12-11

    The purpose of this report is to summarize the scientific work that was performed to evaluate and assess the occurrence and economic potential of natural resources within the geologic setting of the Yucca Mountain area. The extent of the regional areas of investigation for each commodity differs and those areas are described in more detail in the major subsections of this report. Natural resource assessments have focused on an area defined as the ''conceptual controlled area'' because of the requirements contained in the U.S. Nuclear Regulatory Commission Regulation, 10 CFR Part 60, to define long-term boundaries for potential radionuclide releases. New requirements (proposed 10 CFR Part 63 [Dyer 1999]) have obviated the need for defining such an area. However, for the purposes of this report, the area being discussed, in most cases, is the previously defined ''conceptual controlled area'', now renamed the ''natural resources site study area'' for this report (shown on Figure 1). Resource potential can be difficult to assess because it is dependent upon many factors, including economics (demand, supply, cost), the potential discovery of new uses for resources, or the potential discovery of synthetics to replace natural resource use. The evaluations summarized are based on present-day use and economic potential of the resources. The objective of this report is to summarize the existing reports and information for the Yucca Mountain area on: (1) Metallic mineral and mined energy resources (such as gold, silver, etc., including uranium); (2) Industrial rocks and minerals (such as sand, gravel, building stone, etc.); (3) Hydrocarbons (including oil, natural gas, tar sands, oil shales, and coal); and (4) Geothermal resources. Groundwater is present at the Yucca Mountain site at depths ranging from 500 to 750 m (about 1,600 to 2,500 ft) below the ground surface. Groundwater resources are not discussed in this

  12. NASA Water Resources Program

    Science.gov (United States)

    Toll, David L.

    2011-01-01

    With increasing population pressure and water usage coupled with climate variability and change, water issues are being reported by numerous groups as the most critical environmental problems facing us in the 21st century. Competitive uses and the prevalence of river basins and aquifers that extend across boundaries engender political tensions between communities, stakeholders and countries. In addition to the numerous water availability issues, water quality related problems are seriously affecting human health and our environment. The potential crises and conflicts especially arise when water is competed among multiple uses. For example, urban areas, environmental and recreational uses, agriculture, and energy production compete for scarce resources, not only in the Western U.S. but throughout much of the U.S. and also in numerous parts of the world. Mitigating these conflicts and meeting water demands and needs requires using existing water resources more efficiently. The NASA Water Resources Program Element works to use NASA products and technology to address these critical water issues. The primary goal of the Water Resources is to facilitate application of NASA Earth science products as a routine use in integrated water resources management for the sustainable use of water. This also includes the extreme events of drought and floods and the adaptation to the impacts from climate change. NASA satellite and Earth system observations of water and related data provide a huge volume of valuable data in both near-real-time and extended back nearly 50 years about the Earth's land surface conditions such as precipitation, snow, soil moisture, water levels, land cover type, vegetation type, and health. NASA Water Resources Program works closely to use NASA and Earth science data with other U.S. government agencies, universities, and non-profit and private sector organizations both domestically and internationally. The NASA Water Resources Program organizes its

  13. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  14. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  15. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  16. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  17. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  18. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  19. Phase-encoded measurement device independent quantum key distribution without a shared reference frame

    Science.gov (United States)

    Zhuo-Dan, Zhu; Shang-Hong, Zhao; Chen, Dong; Ying, Sun

    2018-07-01

    In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.

  20. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    NARCIS (Netherlands)

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model