WorldWideScience

Sample records for message transaction set

  1. Blockchain Transaction Analysis Using Dominant Sets

    OpenAIRE

    Awan , Malik ,; Cortesi , Agostino

    2017-01-01

    Part 4: Engineering of Enterprise Software Products; International audience; Blockchain is an emerging backbone technology behind different crypto-currencies. It can also be used for other purposes and areas. There are different scalability issues associated with blockchain. It is important to know the in depth structure of blockchain by identifying common behaviors of the transactions and the effect of these behaviors on the nodes of the network. Dominant set approach can categorize the bloc...

  2. Health in arts: are arts settings better than sports settings for promoting anti-smoking messages?

    Science.gov (United States)

    Davies, Christina; Knuiman, Matthew; Pikora, Terri; Rosenberg, Michael

    2015-05-01

    Tobacco smoking is a leading cause of preventable mortality and morbidity. Since 1991, the Western Australian Health Promotion Foundation (Healthway) has sponsored the arts and sport in exchange for cigarette smoke-free events, smoke-free policies and the promotion of anti-smoking messages (e.g. Quit, Smoke Free or Smarter than Smoking). As health promoters often look for innovative and effective settings to advocate health, and as the approach of sponsoring the arts to promote health to the general population is uncommon, the purpose of this study was to evaluate the effectiveness of 'health in arts' by measuring the cognitive impact (message awareness, comprehension, acceptance and intention) of promoting anti-smoking messages at arts events, and comparing findings to sports events, a more traditional health promotion setting. A secondary analysis of the 2004-2009 Healthway Sponsorship Monitor data was conducted. A total of 12 arts events (n = 592 respondents) and 9 sports events (n = 420 respondents) sponsored by Healthway to promote an anti-smoking message were evaluated. The study was cross-sectional in design. Participants were residents of Western Australia aged 15 years or above and attended events as part of an audience or as a spectator. Descriptive and regression analyses were conducted. After adjustment for demographic variables, smoking status and clustering, arts events were found to be as effective in promoting anti-smoking message awareness, comprehension and acceptance and twice as effective on intention to act (p = .03) compared with sports events. This study provides evidence of the effectiveness of arts sponsorship to promote health to the general population, that is, health in arts. Promoting an anti-smoking message in arts settings was as, or more, effective than in sports settings. Results suggest that the arts should be utilised to communicate and reinforce anti-smoking messages to the general population. The suitability of the arts to

  3. Price Setting Transactions and the Role of Denominating Currency in FX Markets

    OpenAIRE

    Friberg, Richard; Wilander, Fredrik

    2007-01-01

    This report, commissioned by Sveriges Riksbank, examines the role of currency denomination in international trade transactions. It is divided in two parts. The first part consists of a survey of the price setting and payment practices of a large sample of Swedish exporting firms. The second part analyzes payments data from the Swedish settlement reports from 1999-2002. We examine whether invoicing patterns of Swedish and European companies changed following the creation of the EMU and how the...

  4. Improving System Security and User Privacy in Secure Electronic Transaction (SET) with X.509 v3 Certificate

    OpenAIRE

    Saidu Muhammad

    2015-01-01

    With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET...

  5. Evaluation of a Short Message Service diary methodology in a nonclinical, naturalistic setting.

    Science.gov (United States)

    Walsh, Erin I; Brinker, Jay K

    2012-11-01

    Particularly suited to repeated measures in naturalistic settings, Short Message Service (SMS) is garnering increasing attention as a viable method of data collection. The current study explored issues of practical importance for the development of this methodology, including factors impacting on attrition and compliance, and participant perception of SMS. Using a business-card-sized questionnaire key, 98 university students were sent prompt SMS messages nightly for a week. Completion and compliance were very high in all participants who responded to at least one prompt SMS; those who responded at least once (n=63) responded to 83 percent of all seven prompts, with 95 percent of responses containing appropriate alphanumeric answers to all questions. However, a time lag between recruitment and participation was associated with a failure to commence the diary study. Participants reported positive perceptions of SMS privacy and convenience.

  6. Evaluating the Outcomes of Transactional Analysis and Integrative Counselling Psychology within UK Primary Care Settings

    Directory of Open Access Journals (Sweden)

    Biljana van Rijn

    2011-07-01

    Full Text Available The paper reports on a naturalistic study that replicated the evaluative design associated with the UK National Health Service initiative IAPT − Improving Access to Psychological Therapies (CSIP 2008, NHS 2011, as previously used to assess Cognitive Behavioural Therapy (CBT, with the aim of evaluating 12-session treatments for anxiety and depression, applying Transactional Analysis and Integrative Counselling Psychology approaches within real clinical settings in primary care. Standard outcome measures were used in line with the IAPT model (CORE 10 and 34, GAD-7, PHQ-9, supplemented with measurement of the working alliance (WAI Horvath 1986 and an additional depression inventory BDI-II (Beck, 1996, and ad-herence to the therapeutic model using newly designed questionnaires. Results indicated that severity of problems was reduced using either approach, comparative to Cognitive Behavioural Therapy; that initial severity was predictive of outcome; and that working alliance increased as therapy progressed but was not directly related to outcomes. Adherence was high for both approaches. Several areas for enhance-ments to future research are suggested.

  7. Do Fitness Apps Need Text Reminders? An Experiment Testing Goal-Setting Text Message Reminders to Promote Self-Monitoring.

    Science.gov (United States)

    Liu, Shuang; Willoughby, Jessica F

    2018-01-01

    Fitness tracking apps have the potential to change unhealthy lifestyles, but users' lack of compliance is an issue. The current intervention examined the effectiveness of using goal-setting theory-based text message reminders to promote tracking activities on fitness apps. We conducted a 2-week experiment with pre- and post-tests with young adults (n = 50). Participants were randomly assigned to two groups-a goal-setting text message reminder group and a generic text message reminder group. Participants were asked to use a fitness tracking app to log physical activity and diet for the duration of the study. Participants who received goal-setting reminders logged significantly more physical activities than those who only received generic reminders. Further, participants who received goal-setting reminders liked the messages and showed significantly increased self-efficacy, awareness of personal goals, motivation, and intention to use the app. The study shows that incorporating goal-setting theory-based text message reminders can be useful to boost user compliance with self-monitoring fitness apps by reinforcing users' personal goals and enhancing cognitive factors associated with health behavior change.

  8. Mining Frequent Item Sets in Asynchronous Transactional Data Streams over Time Sensitive Sliding Windows Model

    International Nuclear Information System (INIS)

    Javaid, Q.; Memon, F.; Talpur, S.; Arif, M.; Awan, M.D.

    2016-01-01

    EPs (Extracting Frequent Patterns) from the continuous transactional data streams is a challenging and critical task in some of the applications, such as web mining, data analysis and retail market, prediction and network monitoring, or analysis of stock market exchange data. Many algorithms have been developed previously for mining FPs (Frequent Patterns) from a data stream. Such algorithms are currently highly required to develop new solutions and approaches to the precise handling of data streams. New techniques, solutions, or approaches are developed to address unbounded, ordered, and continuous sequences of data and for the generation of data at a rapid speed from data streams. Hence, extracting FPs using fresh or recent data involves the high-level analysis of data streams. We have suggested an efficient technique for the window sliding model; this technique extracts new and fresh FPs from high-speed data streams. In this study, a CPILT (Compacted Tree Compact Pattern Tree) is developed to capture the latest contents in the stream and to efficiently remove outdated contents from the data stream. The main concept introduced in this work on CPILT is the dynamic restructuring of a tree, which is helpful in producing a compacted tree and the frequency descending structure of a tree on runtime. With the help of the mining technique of FP growth, a complete list of new and fresh FPs is obtained from a CPILT using an existing window. The memory usage and time complexity of the latest FPs in high-speed data streams can efficiently be determined through proper experimentation and analysis. (author)

  9. Use of an android phone application for automated text messages in international settings: A case study in an HIV clinical trial in St. Petersburg, Russia.

    Science.gov (United States)

    Forman, Leah S; Patts, Gregory J; Coleman, Sharon M; Blokhina, Elena; Lu, John; Yaroslavtseva, Tatiana; Gnatienko, Natalia; Krupitsky, Evgeny; Samet, Jeffrey H; Chaisson, Christine E

    2018-02-01

    Reproducible outcomes in clinical trials depend on adherence to study protocol. Short message service (also known as text message) reminders have been shown to improve clinical trial adherence in the United States and elsewhere. However, due to systematic differences in mobile data plans, languages, and technology, these systems are not easily translated to international settings. To gauge technical capabilities for international projects, we developed SMSMessenger, an automated Android application that uses a US server to send medication reminders to participants in a clinical trial in St. Petersburg, Russia (Zinc for HIV disease among alcohol users-a randomized controlled trial in the Russia Alcohol Research Collaboration on HIV/AIDS cohort). The application is downloaded once onto an Android study phone. When it is time for the text message reminders to be sent, study personnel access the application on a local phone, which in turn accesses the existing clinical trial database hosted on a US web server. The application retrieves a list of participants with the following information: phone number, whether a message should be received at that time, and the appropriate text of the message. The application is capable of storing multiple outgoing messages. With a few clicks, text messages are sent to study participants who can reply directly to the message. Study staff can check the local phone for incoming messages. The SMSMessenger application uses an existing clinical trial database and is able to receive real-time updates. All communications between the application and server are encrypted, and phone numbers are stored in a secure database behind a firewall. No sensitive data are stored on the phone, as outgoing messages are sent through the application and not by messaging features on the phone itself. Messages are sent simultaneously to study participants, which reduces the burden on local study staff. Costs and setup are minimal. The only local requirements

  10. Secure combination of XML signature application with message aggregation in multicast settings

    DEFF Research Database (Denmark)

    Becker, Andreas; Jensen, Meiko

    2013-01-01

    The similarity-based aggregation of XML documents is a proven method for reducing network traffic. However, when used in conjunction with XML security standards, a lot of pitfalls, but also optimization potentials exist. In this paper, we investigate these issues, showing how to exploit similarity......-based aggregation for rapid distribution of digitally signed XML data. Using our own implementation in two different experimental settings, we provide both a thorough evaluation and a security proof for our approach. By this we prove both feasibility and security, and we illustrate how to achieve a network traffic...

  11. Evaluating the use of cell phone messaging for community Ebola syndromic surveillance in high risked settings in Southern Sierra Leone.

    Science.gov (United States)

    Jia, Kangbai; Mohamed, Koroma

    2015-09-01

    Most underdeveloped countries do not meet core disease outbreak surveillance because of the lack of human resources, laboratory and infrastructural facilities. The use of cell phone technology for disease outbreak syndromic surveillance is a new phenomenon in Sierra Leone despite its successes in other developing countries like Sri Lanka. In this study we set to evaluate the effectiveness of using cell phone technology for Ebola hemorrhagic fever syndromic surveillance in a high risked community in Sierra Leone. This study evaluated the effectiveness of using cell phone messaging (text and calls) for community Ebola hemorrhagic fever syndromic surveillance in high risked community in southern Sierra Leone. All cell phone syndromic surveillance data used for this study was reported as cell phone alert messages-texts and voice calls; by the Moyamba District Health Management Team for both Ebola hemorrhagic fever suspect and mortalities. We conducted a longitudinal data analysis of the monthly cumulative confirmed Ebola hemorrhagic fever cases and mortalities collected by both the traditional sentinel and community cell phone syndromic surveillance from August 2014 to October 2014. A total of 129 and 49 Ebola hemorrhagic fever suspect and confirmed cases respectively were recorded using the community Ebola syndromic surveillance cell phone alert system by the Moyamba District Health Management Team in October 2014. The average number of Ebola hemorrhagic fever suspects and confirmed cases for October 2014 were 4.16 (Std.dev 3.76) and 1.58 (Std.dev 1.43) respectively. Thirty-four percent (n=76) of the community Ebola syndromic surveillance cell phone alerts that were followed-up within 24 hours reported Ebola hemorrhagic fever suspect cases while 65.92% (n=147) reported mortality. Our study suggests some form of underreporting by the traditional sentinel Ebola hemorrhagic fever disease surveillance system in Moyamba District southern Sierra Leone for August

  12. Transactional Memory

    CERN Document Server

    Harris, Tim; Rajwar, Ravi

    2010-01-01

    The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs.This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI(atomicity, consistency, isolation) properties of transactions provide a foundation to ensure that concurrent reads and writes of shared data do not produce inconsistent or incorrect results. At a higher level, a computation wrapped in a transaction executes atomically - either it completes successfullyand

  13. Communicating with the workforce during emergencies: developing an employee text messaging program in a local public health setting.

    Science.gov (United States)

    Karasz, Hilary N; Bogan, Sharon; Bosslet, Lindsay

    2014-01-01

    Short message service (SMS) text messaging can be useful for communicating information to public health employees and improving workforce situational awareness during emergencies. We sought to understand how the 1,500 employees at Public Health--Seattle & King County, Washington, perceived barriers to and benefits of participation in a voluntary, employer-based SMS program. Based on employee feedback, we developed the system, marketed it, and invited employees to opt in. The system was tested during an ice storm in January 2012. Employee concerns about opting into an SMS program included possible work encroachment during non-work time and receiving excessive irrelevant messages. Employees who received messages during the weather event reported high levels of satisfaction and perceived utility from the program. We conclude that text messaging is a feasible form of communication with employees during emergencies. Care should be taken to design and deploy a program that maximizes employee satisfaction.

  14. Point-of-Decision Signs and Stair Use in a University Worksite Setting: General Versus Specific Messages.

    Science.gov (United States)

    Eckhardt, Mary R; Kerr, Jacqueline; Taylor, Wendell C

    2015-01-01

    This study tested the effectiveness of two point-of-decision signs to increase stair use and investigated message content by comparing signs with general and specific messages. This study used a quasi-experimental time series design, including a 2-week baseline period: 2 weeks with a general message and 2 weeks with a specific message. The signs were placed in an eight-story university building. The subjects comprised all adults entering the building. During the study, 2997 observations of stair/elevator choice were made. A stair-prompt sign with a general message and a sign with a specific message served as the interventions. Observers measured stair/elevator choice, demographics, and traffic volume. Logistic regression analyses were employed, adjusting for covariates. The specific sign intervention showed significantly increased odds of stair use compared to baseline (odds ratio [OR] = 2.04, 95% confidence interval [CI] = 1.46-2.84). The odds of stair use were also significantly greater with the specific sign than the general sign (OR = 1.57, 95% CI = 1.13-2.20). Only the specific sign significantly increased stair use. The results indicate that a specific message may be more effective at promoting stair use.

  15. Valuation of Transactive Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Homer, Juliet S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gilbert, Erik I. [Navigant Consulting, Boulder, CO (United States); Chandler, Shawn [Navigant Consulting, Portland, OR (United States); Shandross, Richard [Navigant Consulting, Burlington, MA (United States)

    2016-05-12

    This is a final report from a project funded by the U.S. Department of Energy to formulate and test a methodology for valuation of systems where transaction-based mechanisms coordinate the exchange of value between the system’s actors. Today, the principal commodity being exchanged is electrical energy, and such mechanisms are called transactive energy systems. The authors strove to lay a foundation for meaningful valuations of transactive systems in general, and transactive energy systems as a special case. The word valuation is used in many different ways. This report proposes a valuation methodology that is inclusive of many types of valuations. Many will be familiar with cost-benefit valuations, in which both costs and benefits are assessed to determine whether the assets are worth their cost. Another set of valuation methods attempt to optimize an outcome using available resources, as is the case with integrated resource planning. In the end, this report’s methodology was most influenced by and most resembles the integrated-resource-planning approach. Regardless, we wish to enforce the premise that all valuations are comparative and should clearly specify a baseline scenario. A long, annotated list of prior valuation studies and valuation methodologies that influenced this report has been appended to this report. Much research is being conducted today concerning transactive systems, but only a handful of transactive system mechanisms have been formulated and field tested. They are found to be quite diverse, and the documentation of the various mechanisms is uneven in breadth and quality. It is therefore not adequate to simply assert that a valuation scenario includes a transactive system; certain characteristics and qualities of the chosen transactive system mechanism must be defined and stated. The report lists and discusses most of the known transactive system mechanisms. It offers a set of questions that may be used to help specify important

  16. Modelling Real Property Transactions

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2002-01-01

    for more elaborated concept sets - for a theoretical basis - was among the motives for proposing a concerted research project: Modelling Real Property Transactions. Researchers from 11 European countries co-operate in the project that gained status as a COST action as of March 1st 2001. The majority...

  17. Using the Vape Shop Standardized Tobacco Assessment for Retail Settings (V-STARS) to Assess Product Availability, Price Promotions, and Messaging in New Hampshire Vape Shop Retailers.

    Science.gov (United States)

    Kong, Amanda Y; Eaddy, Jessica L; Morrison, Susan L; Asbury, Donna; Lindell, Kristine M; Ribisl, Kurt M

    2017-04-01

    This is the first statewide census of the product availability, price promotions, and product messaging of vape shops. A comprehensive list of New Hampshire vape shops was developed through a previously validated online search method. Store audits were conducted in 55 stores between January and February 2016 using the Vape Shop Standardized Tobacco Assessment for Retail Settings (V-STARS). Modifiable devices and cig-alikes were sold in 92.6% and 14.6% of stores, respectively. Cross-product promotions with tobacco products were rare, and messaging promoting e-cigarettes as effective cessation devices was found in 27.3% of all stores. Candy/fruit and menthol e-liquids were most commonly found in stores, and sampling of products was available in 83.6% of stores. Ten (18.2%) stores did not have a minimum age sign posted, and self-service sampling displays were available in about one-fifth of stores. Using V-STARS to conduct retail assessments of vape shops is feasible and is important for assessing the changing retail environment of vape shops. Vape shops distinguish themselves from traditional tobacco product retailers and offer a variety of products to customize a consumer's experience. Regulations and effective enforcement ensuring accurate health messages is essential.

  18. Using the Vape Shop Standardized Tobacco Assessment for Retail Settings (V-STARS) to Assess Product Availability, Price Promotions, and Messaging in New Hampshire Vape Shop Retailers

    Science.gov (United States)

    Kong, Amanda Y.; Eaddy, Jessica L.; Morrison, Susan L.; Asbury, Donna; Lindell, Kristine M.; Ribisl, Kurt M.

    2017-01-01

    Objectives This is the first statewide census of the product availability, price promotions, and product messaging of vape shops. Methods A comprehensive list of New Hampshire vape shops was developed through a previously validated online search method. Store audits were conducted in 55 stores between January and February 2016 using the Vape Shop Standardized Tobacco Assessment for Retail Settings (V-STARS). Results Modifiable devices and cig-alikes were sold in 92.6% and 14.6% of stores, respectively. Cross-product promotions with tobacco products were rare, and messaging promoting e-cigarettes as effective cessation devices was found in 27.3% of all stores. Candy/fruit and menthol e-liquids were most commonly found in stores, and sampling of products was available in 83.6% of stores. Ten (18.2%) stores did not have a minimum age sign posted, and self-service sampling displays were available in about one-fifth of stores. Conclusions Using V-STARS to conduct retail assessments of vape shops is feasible and is important for assessing the changing retail environment of vape shops. Vape shops distinguish themselves from traditional tobacco product retailers and offer a variety of products to customize a consumer’s experience. Regulations and effective enforcement ensuring accurate health messages is essential. PMID:29201950

  19. The effect of automated text messaging and goal setting on pedometer adherence and physical activity in patients with diabetes: A randomized controlled trial.

    Science.gov (United States)

    Polgreen, Linnea A; Anthony, Christopher; Carr, Lucas; Simmering, Jacob E; Evans, Nicholas J; Foster, Eric D; Segre, Alberto M; Cremer, James F; Polgreen, Philip M

    2018-01-01

    Activity-monitoring devices may increase activity, but their effectiveness in sedentary, diseased, and less-motivated populations is unknown. Subjects with diabetes or pre-diabetes were given a Fitbit and randomized into three groups: Fitbit only, Fitbit with reminders, and Fitbit with both reminders and goal setting. Subjects in the reminders group were sent text-message reminders to wear their Fitbit. The goal-setting group was sent a daily text message asking for a step goal. All subjects had three in-person visits (baseline, 3 and 6 months). We modelled daily steps and goal setting using linear mixed-effects models. 138 subjects participated with 48 in the Fitbit-only, 44 in the reminders, and 46 in the goal-setting groups. Daily steps decreased for all groups during the study. Average daily steps were 7123, 6906, and 6854 for the Fitbit-only, the goal-setting, and the reminders groups, respectively. The reminders group was 17.2 percentage points more likely to wear their Fitbit than the Fitbit-only group. Setting a goal was associated with a significant increase of 791 daily steps, but setting more goals did not lead to step increases. In a population of patients with diabetes or pre-diabetes, individualized reminders to wear their Fitbit and elicit personal step goals did not lead to increases in daily steps, although daily steps were higher on days when goals were set. Our intervention improved engagement and data collection, important goals for activity surveillance. This study demonstrates that new, more-effective interventions for increasing activity in patients with pre-diabetes and diabetes are needed.

  20. Entrepreneurship, Transaction Costs, and Resource Attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    transaction costs and property rights shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  1. Facilitating responsible gambling: the relative effectiveness of education-based animation and monetary limit setting pop-up messages among electronic gaming machine players.

    Science.gov (United States)

    Wohl, Michael J A; Gainsbury, Sally; Stewart, Melissa J; Sztainert, Travis

    2013-12-01

    Although most gamblers set a monetary limit on their play, many exceed this limit--an antecedent of problematic gambling. Responsible gambling tools may assist players to gamble within their means. Historically, however, the impact of such tools has been assessed in isolation. In the current research, two responsible gambling tools that target adherence to a monetary limit were assessed among 72 electronic gaming machine (EGM) players. Participants watched an educational animation explaining how EGMs work (or a neutral video) and then played an EGM in a virtual reality environment. All participants were asked to set a monetary limit on their play, but only half were reminded when that limit was reached. Results showed that both the animation and pop-up limit reminder helped gamblers stay within their preset monetary limit; however, an interaction qualified these main effects. Among participants who did not experience the pop-up reminder, those who watched the animation stayed within their preset monetary limits more than those who did not watch the animation. For those who were reminded of their limit, however, there was no difference in limit adherence between those who watched the animation and those who did not watch the animation. From a responsible gambling perspective, the current study suggests that there is no additive effect of exposure to both responsible gambling tools. Therefore, for minimal disruption in play, a pop-up message reminding gamblers of their preset monetary limit might be preferred over the lengthier educational animation.

  2. MapMySmoke: feasibility of a new quit cigarette smoking mobile phone application using integrated geo-positioning technology, and motivational messaging within a primary care setting.

    Science.gov (United States)

    Schick, Robert S; Kelsey, Thomas W; Marston, John; Samson, Kay; Humphris, Gerald W

    2018-01-01

    Approximately 11,000 people die in Scotland each year as a result of smoking-related causes. Quitting smoking is relatively easy; maintaining a quit attempt is a very difficult task with success rates for unaided quit attempts stubbornly remaining in the single digits. Pharmaceutical treatment can improve these rates by lowering the overall reward factor of nicotine. However, these and related nicotine replacement therapies do not operate on, or address, the spatial and contextual aspects of smoking behaviour. With the ubiquity of smartphones that can log spatial, quantitative and qualitative data related to smoking behaviour, there exists a person-centred clinical opportunity to support smokers attempting to quit by first understanding their smoking behaviour and subsequently sending them dynamic messages to encourage health behaviour change within a situational context. We have built a smartphone app-MapMySmoke-that works on Android and iOS platforms. The deployment of this app within a clinical National Health Service (NHS) setting has two distinct phases: (1) a 2-week logging phase where pre-quit patients log all of their smoking and craving events; and (2) a post-quit phase where users receive dynamic support messages and can continue to log craving events, and should they occur, relapse events. Following the initial logging phase, patients consult with their general practitioner (GP) or healthcare provider to review their smoking patterns and to outline a precise, individualised quit attempt plan. Our feasibility study consists of assessment of an initial app version during and after use by eight patients recruited from an NHS Fife GP practice. In addition to evaluation of the app as a potential smoking cessation aid, we have assessed the user experience, technological requirements and security of the data flow. In an initial feasibility study, we have deployed the app for a small number of patients within one GP practice in NHS Fife. We recruited eight

  3. Unconventional uranium transactions

    International Nuclear Information System (INIS)

    Anderson, S.C.

    1981-01-01

    The purpose of this paper is to describe some representative unconventional transactions which have been observed in the uranium market; to explain the circumstances giving rise to these transactions; and to describe the benefits resulting from these transactions. Unconventional transactions are usually quite specialized, since they are tailored to meet the particular needs of specific market participants. Nevertheless, most of these transactions fall into the following basic categories: multi-party (back-to-back; bridge); swap (deconversion; nationality); barter; inventory financing (leasing with repurchase obligation; sale with repurchase option). These transactions are explained and discussed. (U.K.)

  4. Managerial accounting for transaction costs

    OpenAIRE

    Лабынцев, Николай Тихонович

    2015-01-01

    Essence and significance of transaction accounting and its basic concepts – transaction and transaction costs – have been determined. Main types of transaction costs and elements of transaction accounting for expenses have been considered. Source documents forms for the purpose of accounting for transaction costs have been worked out.

  5. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  6. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  7. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  8. Entrepreneurship, transaction costs, and resource attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2006-01-01

    transaction costs shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction.......This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognise how exactly...

  9. Entrepreneurship, transaction costs, and resource attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2006-01-01

    This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognise how exactly t...... transaction costs shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  10. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  11. Emissions trading to combat climate change: The impact of scheme design on transaction costs

    OpenAIRE

    Betz, Regina

    2006-01-01

    This paper explores the likely impact of emissions trading design on transaction costs. Transaction costs include both the costs for the private sector to comply with the scheme rules and the costs of scheme administration. In economic theory transaction costs are often assumed to be zero. But transaction costs are real costs and there is no reason for treating them differently to other costs. Thus, in setting up an emissions trading scheme, transaction costs have to be taken into account in ...

  12. Resources and transaction costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2005-01-01

    from resources depends on the property rights that he or she holds and on the transaction costs of exchanging, defining, and protecting them. While transaction costs are a major source of value dissipation, reducing such dissipation may create value. Implications for the RBV analysis of sustained...

  13. Resources and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2004-01-01

    resources depends on the propertyrights that she holds to those resources and on the transaction costs of exchanging,defining and protecting the relevant property rights. While transaction costs aremajor sources of value dissipation, value may be created by reducing suchdissipation. Implications for the RBV...

  14. Combining Tasking and Transactions

    OpenAIRE

    Kienzle, Jörg

    1999-01-01

    This position paper discusses the issues in design and development of a transaction support for Ada 95. Transactions and other fault tolerance mechanisms are reviewed, and their applicability in a concurrent programming language is analyzed. Possible ways of integration are presented and implementation problems are discussed.

  15. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  16. Networks and Transaction Costs

    DEFF Research Database (Denmark)

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation...... determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs observed for different input and output markets. At a first stage we estimate a multiple input...... transaction cost functions for all traded farm inputs and outputs. Estimation results based on a sample of 315 Polish farms imply a significant influence of social network structures on farm’s transaction costs. Moreover, estimated transaction costs correspond to a reasonable amount of farm specific shadow...

  17. Networks and Transaction Costs

    DEFF Research Database (Denmark)

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs observed for different input and output markets. At a first stage we estimate a multiple input......Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation...... transaction cost functions for all traded farm inputs and outputs. Estimation results based on a sample of 315 Polish farms imply a significant influence of social network structures on farm’s transaction costs. Moreover, estimated transaction costs correspond to a reasonable amount of farm specific shadow...

  18. Simple messages help set the record straight about scientific agreement on human-caused climate change: the results of two experiments.

    Directory of Open Access Journals (Sweden)

    Teresa A Myers

    Full Text Available Human-caused climate change is happening; nearly all climate scientists are convinced of this basic fact according to surveys of experts and reviews of the peer-reviewed literature. Yet, among the American public, there is widespread misunderstanding of this scientific consensus. In this paper, we report results from two experiments, conducted with national samples of American adults, that tested messages designed to convey the high level of agreement in the climate science community about human-caused climate change. The first experiment tested hypotheses about providing numeric versus non-numeric assertions concerning the level of scientific agreement. We found that numeric statements resulted in higher estimates of the scientific agreement. The second experiment tested the effect of eliciting respondents' estimates of scientific agreement prior to presenting them with a statement about the level of scientific agreement. Participants who estimated the level of agreement prior to being shown the corrective statement gave higher estimates of the scientific consensus than respondents who were not asked to estimate in advance, indicating that incorporating an "estimation and reveal" technique into public communication about scientific consensus may be effective. The interaction of messages with political ideology was also tested, and demonstrated that messages were approximately equally effective among liberals and conservatives. Implications for theory and practice are discussed.

  19. The impact of brief messages on HSV-2 screening uptake among female defendants in a court setting: a randomized controlled trial utilizing prospect theory.

    Science.gov (United States)

    Roth, Alexis M; Van Der Pol, Barbara; Fortenberry, J Dennis; Dodge, Brian; Reece, Michael; Certo, David; Zimet, Gregory D

    2015-01-01

    Epidemiologic data demonstrate that women involved with the criminal justice system in the United States are at high risk for sexually transmitted infections, including herpes simplex virus type 2 (HSV-2). Female defendants were recruited from a misdemeanor court to assess whether brief framed messages utilizing prospect theory could encourage testing for HSV-2. Participants were randomly assigned to a message condition (gain, loss, or control), completed an interviewer-administered survey assessing factors associated with antibody test uptake/refusal and were offered free point-of-care HSV-2 serologic testing. Although individuals in the loss-frame group accepted testing at the highest rate, an overall statistical difference in HSV-2 testing behavior by group (p ≤ .43) was not detected. The majority of the sample (74.6%) characterized receiving a serological test for HSV-2 as health affirming. However, this did not moderate the effect of the intervention nor was it significantly associated with test acceptance (p ≤ .82). Although the effects of message framing are subtle, the findings have important theoretical implications given the participants' characterization of HSV-2 screening as health affirming despite being a detection behavior. Implications of study results for health care providers interested in brief, low cost interventions are also explored.

  20. Transactions in Software Components: Container-Interposed Transactions

    Czech Academy of Sciences Publication Activity Database

    Procházka, M.; Plášil, František

    2002-01-01

    Roč. 3, č. 2 (2002), s. - ISSN 1525-9293 R&D Projects: GA ČR GA201/99/0244; GA AV ČR IAA2030902 Institutional research plan: AV0Z1030915 Keywords : transactions * component-based software architectures * transaction propagation policy * transaction attributes * container -interposed transactions Subject RIV: JC - Computer Hardware ; Software

  1. Improved Message Authentication and Confidentiality Checking

    International Nuclear Information System (INIS)

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  2. Enhancing the Supervision of Community Health Workers With WhatsApp Mobile Messaging: Qualitative Findings From 2 Low-Resource Settings in Kenya.

    Science.gov (United States)

    Henry, Jade Vu; Winters, Niall; Lakati, Alice; Oliver, Martin; Geniets, Anne; Mbae, Simon M; Wanjiru, Hannah

    2016-06-20

    An estimated half of all mobile phone users in Kenya use WhatsApp, an instant messaging platform that provides users an affordable way to send and receive text messages, photos, and other media at the one-to-one, one-to-many, many-to-one, or many-to-many levels. A mobile learning intervention aimed at strengthening supervisory support for community health workers (CHWs) in Kibera and Makueni, Kenya, created a WhatsApp group for CHWs and their supervisors to support supervision, professional development, and team building. We analyzed 6 months of WhatsApp chat logs (from August 19, 2014, to March 1, 2015) and conducted interviews with CHWs and their supervisors to understand how they used this instant messaging tool. During the study period, 1,830 posts were made by 41participants. Photos were a key component of the communication among CHWs and their supervisors: 430 (23.4%) of all posts contained photos or other media. Of the remaining 1,400 text-based posts, 87.6% (n = 1,227) related to at least 1 of 3 defined supervision objectives: (1) quality assurance, (2) communication and information, or (3) supportive environment. This supervision took place in the context of posts about the roll out of the new mobile learning intervention and the delivery of routine health care services, as well as team-building efforts and community development. Our preliminary investigation demonstrates that with minimal training, CHWs and their supervisors tailored the multi-way communication features of this mobile instant messaging technology to enact virtual one-to-one, group, and peer-to-peer forms of supervision and support, and they switched channels of communication depending on the supervisory objectives. We encourage additional research on how health workers incorporate mobile technologies into their practices to develop and implement effective supervisory systems that will safeguard patient privacy, strengthen the formal health system, and create innovative forms of

  3. Mixed messages

    Science.gov (United States)

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  4. The message is the message-maker.

    Science.gov (United States)

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  5. 26 CFR 1.1221-2 - Hedging transactions.

    Science.gov (United States)

    2010-04-01

    ... serves a hedging function, or that the transaction serves a similar function or purpose. (4) Coordination... business units. A separate set of books and records is maintained with respect to the activities, assets... under the marking member's method of accounting. (iii) Treatment of intercompany hedging transactions...

  6. Point-of-purchase messages framed in terms of cost, convenience, taste, and energy improve healthful snack selection in a college foodservice setting.

    Science.gov (United States)

    Buscher, L A; Martin, K A; Crocker, S

    2001-08-01

    To examine the effects of a point-of-purchase (POP) intervention emphasizing various properties of healthful food items on college students' snack purchases. In Study 1, vegetable baskets (containing cut pieces of vegetables), fruit baskets (containing cut pieces of fruit), pretzels, and yogurt were promoted in separate POP interventions. Food sales were monitored over 2-week baseline, 4-week intervention, and 2-week follow-up periods. In Study 2, yogurt was promoted across a 2-week baseline, 12-week intervention, and 2-week follow-up periods and an intercept survey was conducted. Approximately 2,280 university students were potentially exposed to the intervention, and 72 students responded to the intercept survey. POP messages were placed on an 11 x 17-in poster located at the cafeteria entrance, and two 4 x 2.5-in signs placed next to the targeted food item. Messages emphasized the Budget-friendly, Energizing, Sensory/taste, Time efficient/convenient (BEST) stimulus properties of food. Daily sales of the targeted food items. Analyses of variance with Tukey post hoc tests were used to compare food sales during the baseline, intervention, and follow-up periods. In Study 1, yogurt and pretzel sales increased during the intervention and post-intervention periods (P.05), but whole fruit sales increased during the fruit basket intervention and follow-up (P<.05). In Study 2, yogurt sales were significantly greater during the intervention and follow-up periods than at baseline (P<.01). Using the BEST properties in POP interventions may be beneficial in promoting the consumption of healthful foods among university students, particularly when the targeted foods are priced comparably to less healthful foods.

  7. The Berne Model and Advertising Messages: A Psychographic Study.

    Science.gov (United States)

    Martin, Charles H.

    This study relates Eric Berne's theory of Transactional Analysis to the effectiveness of advertising messages. A 30 item Personality Mode Test was constructed in order to assess subject agreement with statements reflecting Berne's three personality states: parent (social evaluative), adult (controlled rationality), and child (emotiveness). After…

  8. Transactional Network Platform: Applications

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  9. Transaction aware tape-infrastructure monitoring

    International Nuclear Information System (INIS)

    Nikolaidis, Fotios; Kruse, Daniele Francesco

    2014-01-01

    Administrating a large scale, multi protocol, hierarchical tape infrastructure like the CERN Advanced STORage manager (CASTOR)[2], which stores now 100 PB (with an increasing step of 25 PB per year), requires an adequate monitoring system for quick spotting of malfunctions, easier debugging and on demand report generation. The main challenges for such system are: to cope with CASTOR's log format diversity and its information scattered among several log files, the need for long term information archival, the strict reliability requirements and the group based GUI visualization. For this purpose, we have designed, developed and deployed a centralized system consisting of four independent layers: the Log Transfer layer for collecting log lines from all tape servers to a single aggregation server, the Data Mining layer for combining log data into transaction context, the Storage layer for archiving the resulting transactions and finally the Web UI layer for accessing the information. Having flexibility, extensibility and maintainability in mind, each layer is designed to work as a message broker for the next layer, providing a clean and generic interface while ensuring consistency, redundancy and ultimately fault tolerance. This system unifies information previously dispersed over several monitoring tools into a single user interface, using Splunk, which also allows us to provide information visualization based on access control lists (ACL). Since its deployment, it has been successfully used by CASTOR tape operators for quick overview of transactions, performance evaluation, malfunction detection and from managers for report generation.

  10. Configurations of Control: A Transaction Cost Approach

    NARCIS (Netherlands)

    R.F. Speklé (Roland)

    2003-01-01

    textabstractIn this paper, I present a theory of management control based on Transaction Cost Economics. This theory seeks to integrate into a single framework a set of insights as to the nature of the organization's activities, the control problems that are inherent in these activities, and the

  11. FIRM SIZE EFFECTS ON TRANSACTION COSTS

    NARCIS (Netherlands)

    NOOTEBOOM, B

    1993-01-01

    Associated with effects of scale, scope, experience and learning there are effects of firm size on transaction costs; in the stages of contact, contract and control. These effects are due to ''threshold costs'' in setting up contacts, contracts and governance schemes, and to differences with respect

  12. 12 CFR 226.3 - Exempt transactions.

    Science.gov (United States)

    2010-01-01

    ... personal property used or expected to be used as the principal dwelling of the consumer; or (2) A private... convenience of the user, the revised text is set forth as follows: § 226.3 Exempt transactions. This... the consumer, in which the amount financed exceeds $25,000 or in which there is an express written...

  13. Value and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2003-01-01

    caused by transaction costs), andnew types of resources (i.e., capture and protection capabilities), clarifies the roleof contracting in the exercise of market power, and suggests that `strategizing'and `economizing' perspectives are related to a larger extent than is normallyrecognized. Refutable......AbstractWe forge linkages between the economics of property rights (Coase, Demsetz,Cheung, Barzel) and strategic management. Property rights to resources consistof the rights to consume, obtain income from, and alienate these resources.Transaction costs are the costs of exchanging, protecting...... and capturing propertyrights. We clarify the key role of transaction costs with respect to understandingvalue creation and the limitations and opportunities of strategizing relative tocompetitive forces. The economics of property rights identifies new sources ofvalue creation (i.e., reducing the dissipation...

  14. Providing hedging protection for the transaction

    International Nuclear Information System (INIS)

    Richardson, D.W.

    1999-01-01

    This presentation dealt with methods for assessing commodity price risk in an asset transaction; the setting of risk management objectives; building hedging into the financing; and internal reporting and accounting to mitigate trading risks. It also provided some recent examples of successful hedging in gas asset transactions. The objectives of risk management and the nature of hedging and speculation were explored. An approach to price risk management was proposed. The development of price risk management tools, and techniques for managing risks involving interest rates, foreign exchange, and commodities were examined. figs

  15. Disincentives to voluntary transactions

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Current legal, regulatory and institutional standards and practices provide several disincentives for a utility wishing to engage in voluntary wheeling transactions, and are discussed here. These disincentives largely arise from the fact that regulation, like the transmission system itself, is based on the notion of integrated utilities engaging in transactions largely for reliability reasons. Factors which fall into this category are: a pricing regime based on embedded costs, the ratemaking treatment of revenues derived from coordination and transmission services, and several provisions in legislation and FERC regulations

  16. The Econometric Procedures of Specific Transaction Identification

    Directory of Open Access Journals (Sweden)

    Doszyń Mariusz

    2017-06-01

    Full Text Available The paper presents the econometric procedures of identifying specific transactions, in which atypical conditions or attributes may occur. These procedures are based on studentized and predictive residuals of the accordingly specified econometric models. The dependent variable is a unit transactional price, and explanatory variables are both the real properties’ attributes and accordingly defined artificial binary variables. The utility of the proposed method has been verified by means of a real market data base. The proposed procedures can be helpful during the property valuation process, making it possible to reject real properties that are specific (both from the point of view of the transaction conditions and the properties’ attributes and, consequently, to select an appropriate set of similar attributes that are essential for the valuation process.

  17. Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Butler, Michael J.; de Jong, Eduard; Longley, Mark; Olivieira, J.N.; Zave, P.

    A transacted memory that is implemented using EEPROM technology offers persistence, undoability and auditing. The transacted memory system is formally specified in Z, and refined in two steps to a prototype C implementation / SPIN model. Conclusions are offered both on the transacted memory system

  18. Modelling Real Property Transactions

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2003-01-01

    Der er store forskelle i financieringsomkostningerne ved hussalg i forskellige lande. Er disse forskelle nødvendige? og kan udgifterne reduceres? Sådanne spørgsmål søger forskningsprojektet ?Modelling Real Property Transactions?, officielt sat i værk indenfor rammerne af COST (European Co...

  19. Ring Confidential Transactions

    Directory of Open Access Journals (Sweden)

    Shen Noether

    2016-12-01

    Full Text Available This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.

  20. Should We Ban Instant Messaging In School?

    Science.gov (United States)

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  1. Use of electronic fare transaction data for corridor planning.

    Science.gov (United States)

    2017-06-01

    This report documents the initial phase of a project that developed, tested, and used a methodology and tool set for converting electronic transit agency fare card transaction data, the Puget Sound regions ORCA electronic fare card, into informati...

  2. A transaction assessment method for allocation of transmission services

    Science.gov (United States)

    Banunarayanan, Venkatasubramaniam

    The purpose of this research is to develop transaction assessment methods for allocating transmission services that are provided by an area/utility to power transactions. Transmission services are the services needed to deliver, or provide the capacity to deliver, real and reactive power from one or more supply points to one or more delivery points. As the number of transactions increase rapidly in the emerging deregulated environment, accurate quantification of the transmission services an area/utility provides to accommodate a transaction is becoming important, because then appropriate pricing schemes can be developed to compensate for the parties that provide these services. The Allocation methods developed are based on the "Fair Resource Allocation Principle" and they determine for each transaction the following: the flowpath of the transaction (both real and reactive power components), generator reactive power support from each area/utility, real power loss support from each area/utility. Further, allocation methods for distributing the cost of relieving congestion on transmission lines caused by transactions are also developed. The main feature of the proposed methods is representation of actual usage of the transmission services by the transactions. The proposed method is tested extensively on a variety of systems. The allocation methods developed in this thesis for allocation of transmission services to transactions is not only useful in studying the impact of transactions on a transmission system in a multi-transaction case, but they are indeed necessary to meet the criteria set forth by FERC with regard to pricing based on actual usage. The "consistency" of the proposed allocation methods has also been investigated and tested.

  3. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model......We argue that in the presence of transaction costs, observed productivity measures may in many cases understate the true productivity, as production data seldom distinguish between resources entering the production process and resources of a similar type that are sacrificed for transaction costs....... Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...

  4. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  5. Transaction based approach

    Science.gov (United States)

    Hunka, Frantisek; Matula, Jiri

    2017-07-01

    Transaction based approach is utilized in some methodologies in business process modeling. Essential parts of these transactions are human beings. The notion of agent or actor role is usually used for them. The paper on a particular example describes possibilities of Design Engineering Methodology for Organizations (DEMO) and Resource-Event-Agent (REA) methodology. Whereas the DEMO methodology can be regarded as a generic methodology having its foundation in the theory of Enterprise Ontology the REA methodology is regarded as the domain specific methodology and has its origin in accountancy systems. The results of these approaches is that the DEMO methodology captures everything that happens in the reality with a good empirical evidence whereas the REA methodology captures only changes connected with economic events. Economic events represent either change of the property rights to economic resource or consumption or production of economic resources. This results from the essence of economic events and their connection to economic resources.

  6. International business transactions

    OpenAIRE

    Buczkowski, Bogdan

    2016-01-01

    Running a business on an international scale requires not only a substantial body of knowledge but also the ability to apply it in practice. That is why our textbook, with a vast collection of practical examples, discusses a wide variety of pertinent issues connected with business operations in international markets, from international market analysis, drafting business plans, concluding business transactions and the insurance of goods through to customs clearance procedures and professional ...

  7. Wyoming CV Pilot Traveler Information Message Sample

    Data.gov (United States)

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  8. Is self-assessment of medical abortion using a low-sensitivity pregnancy test combined with a checklist and phone text messages feasible in South African primary healthcare settings? A randomized trial.

    Directory of Open Access Journals (Sweden)

    Deborah Constant

    Full Text Available To evaluate feasibility of self-assessment of medical abortion outcome using a low-sensitivity urine pregnancy test, checklist and text messages. The study assessed whether accurate self-assessment required a demonstration of the low-sensitivity urine pregnancy test or if verbal instructions suffice.This non-inferiority trial enrolled 525 adult women from six public sector abortion clinics. Eligible women were undergoing medical abortion at gestations within 63 days. Consenting women completed a baseline interview, received standard care with mifepristone and home-administration of misoprostol. All were given a low-sensitivity urine pregnancy test and checklist for use 14 days later, sent text reminders, and asked to attend in-clinic follow-up after two weeks. Women were randomly assigned 1:1 to an instruction-only group (n = 262; issued with pre-scripted instructions on the low-sensitivity pregnancy test, or a demonstration group (n = 263; performed practice tests guided by lay health workers. The primary outcome was accurate self-assessment of incomplete abortion, defined as needing additional misoprostol or vacuum aspiration. Analysis was by intention to treat and a non-inferiority margin was set to six percentage points. Women's acceptability of their abortion procedure and preferences for follow-up were also assessed.Follow-up was 81% for abortion outcome, confirmed in-clinic at two weeks or self-reported within six months. Non-inferiority of instruction-only to a demonstration was inconclusive for accurate self-assessment (risk difference for instruction-only -demonstration: -2.5%; 95%CI: -9% to 4%. Comparing instruction-only to demonstration groups, 99% and 100% found the pregnancy test easy to do; and 91% and 93% respectively chose the pregnancy test, checklist and text messages for abortion outcome assessment in the future.Routine self-assessment using a low-sensitivity pregnancy test, checklist and text messages is feasible and

  9. Is self-assessment of medical abortion using a low-sensitivity pregnancy test combined with a checklist and phone text messages feasible in South African primary healthcare settings? A randomized trial.

    Science.gov (United States)

    Constant, Deborah; Harries, Jane; Daskilewicz, Kristen; Myer, Landon; Gemzell-Danielsson, Kristina

    2017-01-01

    To evaluate feasibility of self-assessment of medical abortion outcome using a low-sensitivity urine pregnancy test, checklist and text messages. The study assessed whether accurate self-assessment required a demonstration of the low-sensitivity urine pregnancy test or if verbal instructions suffice. This non-inferiority trial enrolled 525 adult women from six public sector abortion clinics. Eligible women were undergoing medical abortion at gestations within 63 days. Consenting women completed a baseline interview, received standard care with mifepristone and home-administration of misoprostol. All were given a low-sensitivity urine pregnancy test and checklist for use 14 days later, sent text reminders, and asked to attend in-clinic follow-up after two weeks. Women were randomly assigned 1:1 to an instruction-only group (n = 262; issued with pre-scripted instructions on the low-sensitivity pregnancy test), or a demonstration group (n = 263; performed practice tests guided by lay health workers). The primary outcome was accurate self-assessment of incomplete abortion, defined as needing additional misoprostol or vacuum aspiration. Analysis was by intention to treat and a non-inferiority margin was set to six percentage points. Women's acceptability of their abortion procedure and preferences for follow-up were also assessed. Follow-up was 81% for abortion outcome, confirmed in-clinic at two weeks or self-reported within six months. Non-inferiority of instruction-only to a demonstration was inconclusive for accurate self-assessment (risk difference for instruction-only -demonstration: -2.5%; 95%CI: -9% to 4%). Comparing instruction-only to demonstration groups, 99% and 100% found the pregnancy test easy to do; and 91% and 93% respectively chose the pregnancy test, checklist and text messages for abortion outcome assessment in the future. Routine self-assessment using a low-sensitivity pregnancy test, checklist and text messages is feasible and preferred by women

  10. Transactional Infrastructure of the Economy: the Evolution of Concepts and Synthesis of Definitions

    Directory of Open Access Journals (Sweden)

    Maruschak Irina Valeryevna

    2017-03-01

    Full Text Available The overview of evolution of market infrastructure concepts is provided, the first concepts of institutional infrastructure are revealed in the paper. Evolutionarily developed narrowing of essence of infrastructure in connection with the priority analysis of its physical (material and technological components is proved. It ignores the fact that transactional resources, being drivers (driving forces of economic systems evolution, in turn evolve, becoming harder and harder, combining increase in efficiency of the elements and strengthening of heterogeneity and discrepancy of their structure. Transactional evolution of economy in general and evolution of separate transactional resources of production are the perspective directions of the special analysis. Transactional infrastructure is considered as the integrated complex of institutional, organizational (relational and information infrastructures. The problems of the first concepts of transactional infrastructure connected with difficulties of differentiation of its subsystems always operating jointly are revealed. Prospect of transition from the isolated analysis of separate resources of transactional type (institutes, organizations, information, social capital, trust, etc. to studying corresponding specific software infrastructures and to the system analysis of integrated transactional infrastructure of economy are argued. The transactional sector (as set of the specialized industries and the appropriate collective and individual subjects providing with resources market transaction is offered to be considered as transactional structure of economy. Transactional infrastructure is treated as critically significant factor of economic evolution which in the conditions of post-industrial type of economy gradually purchases transactional nature.

  11. Using the Medical Research Council framework for development and evaluation of complex interventions in a low resource setting to develop a theory-based treatment support intervention delivered via SMS text message to improve blood pressure control.

    Science.gov (United States)

    Bobrow, Kirsten; Farmer, Andrew; Cishe, Nomazizi; Nwagi, Ntobeko; Namane, Mosedi; Brennan, Thomas P; Springer, David; Tarassenko, Lionel; Levitt, Naomi

    2018-01-23

    Several frameworks now exist to guide intervention development but there remains only limited evidence of their application to health interventions based around use of mobile phones or devices, particularly in a low-resource setting. We aimed to describe our experience of using the Medical Research Council (MRC) Framework on complex interventions to develop and evaluate an adherence support intervention for high blood pressure delivered by SMS text message. We further aimed to describe the developed intervention in line with reporting guidelines for a structured and systematic description. We used a non-sequential and flexible approach guided by the 2008 MRC Framework for the development and evaluation of complex interventions. We reviewed published literature and established a multi-disciplinary expert group to guide the development process. We selected health psychology theory and behaviour change techniques that have been shown to be important in adherence and persistence with chronic medications. Semi-structured interviews and focus groups with various stakeholders identified ways in which treatment adherence could be supported and also identified key features of well-regarded messages: polite tone, credible information, contextualised, and endorsed by identifiable member of primary care facility staff. Direct and indirect user testing enabled us to refine the intervention including refining use of language and testing of interactive components. Our experience shows that using a formal intervention development process is feasible in a low-resource multi-lingual setting. The process enabled us to pre-test assumptions about the intervention and the evaluation process, allowing the improvement of both. Describing how a multi-component intervention was developed including standardised descriptions of content aimed to support behaviour change will enable comparison with other similar interventions and support development of new interventions. Even in low

  12. Transaction Costs in Housing Markets

    OpenAIRE

    Ommeren, van, Jos

    2008-01-01

    According to economic theory, there are no strong reasons to tax (or to subsidise) residential moves, although low levels of taxation may be potentially justified to deal with the presence of externalities and economic stability. This is in contrast to practise in most countries where governments have created strong barriers to moving (transaction taxes, rent control) which induces substantial transaction costs. Likely, the welfare losses due to these government-induced transaction costs are ...

  13. Transaction Costs For Innovations Diffusion

    Directory of Open Access Journals (Sweden)

    Ilya A. Romanov

    2012-10-01

    Full Text Available The article deals with the analysis of transaction costs of the innovations distribution. The factors, affecting the innovations diffusion in accordance with the clusters, relations, dynamics of the distribution are disclosed. Transaction costs as a result of bounded rationality of economic entities are detected. The inevitability of transaction costs as an objective phenomenon is shown. Their dependence on the quality of economic information and information uncertainty is indicated. Correlative approach for the analysis of these costs is applied. The article justifies that the reduction of transaction costs increases the efficiency of innovations.

  14. Fluid dynamics transactions

    CERN Document Server

    Fiszdon, W

    1965-01-01

    Fluid Dynamics Transactions, Volume 2 compiles 46 papers on fluid dynamics, a subdiscipline of fluid mechanics that deals with fluid flow. The topics discussed in this book include developments in interference theory for aeronautical applications; diffusion from sources in a turbulent boundary layer; unsteady motion of a finite wing span in a compressible medium; and wall pressure covariance and comparison with experiment. The certain classes of non-stationary axially symmetric flows in magneto-gas-dynamics; description of the phenomenon of secondary flows in curved channels by means of co

  15. Preserving Transactional Data

    OpenAIRE

    Sara Day Thomson

    2017-01-01

    This paper is an adaptation of a longer report commissioned by the UK Data Service. The longer report contributes to on-going support for the Big Data Network – a programme funded by the Economic and Social Research Council (ESRC). The longer report can be found at doi:10.7207/twr16-02. This paper discusses requirements for preserving transactional data and the accompanying challenges facing the companies and institutions who aim to re-use these data for analysis or research. It present...

  16. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  17. THE SPECIFICITY OF INTRACOMMUNITY TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    PALIU-POPA LUCIA

    2011-09-01

    Full Text Available Considered from the perspective of Romania's accession to the European Union, we can say that starting with 1 January 2007, foreign trade transactions were delimited in relation to the customs borders in intra-Community transactions and international transactions. In this context, the way of conducting these operations is influenced by both the economic and financial features specific to both categories of transactions, that relate to the economic character of the activity, the diversity and specificity of the foreign trade activity, transport of goods, the complexity and regulation of intra-Community and international commercial transactions, and by the specific features of each category of transaction. Starting from the consideration that the economic and financial characteristics of foreign trade activity, specific to intra-Community commercial transactions, have a significant influence in the organization and management of accounting of the entities involved in such transactions, determining in a greater or lesser extent, the way of capitalization of the financial and accounting information in the processes of analysis, decision and control, in this paper we proposed to address the features of intra-Community trade.

  18. Decision, Transaction, Law and Contract

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    Copy from ”Preface to Post Doctoral Dissertation” ”Decision, transaction, law and contract” The period since 1970 has witnessed an explosion in contributions to what is now often referred to as the new institutional economics. One of the most influential (but also most atypical) of these approaches...... and Hierarchies” from 1975. Since then Williamson has, almost singlehandedly, erected an impressive research program which aims at explaining the institutional structures at the micro-level under which economic transactions take place. A number of different phenomena that were very hard to rationalize given...... further. Compared to earlier contributions, the mode of analysis employed differs in at least three ways. Firstly, the analysis is made in terms of the decision premises for entering a transactional relationship. This is in opposition to traditional transaction cost economics, where the transaction...

  19. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  20. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    . Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...... and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model...... and compare different parametric, semiparametric, and nonparametric model specifications. Our results generally support our hypothesis. Especially, large trading networks and dense household networks have a positive influence on a farm’s productivity. Furthermore, our results indicate that transaction costs...

  1. FINANCING OF INTERNATIONAL TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    RADU NICOLAE BĂLUNĂ

    2013-02-01

    Full Text Available Financing (funding is essentially the purchase of funds necessary for a business. This can be done from internal sources (company’s own funds or external (borrowed funds. The high value of goods traded in international trade makes revenues generated from internal resources not sufficient to settle the value of the goods. Thus, it is frequent to resort to borrowed funds. In International Business Transactions, external financing is done both by classical techniques of credit (credit supplier and buyer credit and modern techniques of financing (factoring, forfeiting, leasing all trade tailored. In terms of the length of financing, accounting funding is short-term (1-12 months and long-term financing (over a year. In principle, export and import operations prevailing short-term financing techniques, while international investment and industrial cooperation actions are specific long-term funding

  2. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  3. Users of Virtual Reference Are More Satisfied with the Service They Receive than the Providers of that Service Think They Are. A Review of: Hansen, D., Johnson, M., Norton, E., & McDonough, A. (2009. Virtual provider pessimism: Analysing instant messaging reference encounters with the pair perception comparison method. Information Research, 14(4. Retrieved from http://informationr.net/ir/14-4/ paper416.html

    Directory of Open Access Journals (Sweden)

    Carol D. Howe

    2011-06-01

    Full Text Available Objective – To examine provider pessimism by comparing user and provider perception of the same instant messaging reference transaction.Design – Instant messaging users and providers completed post-reference transaction surveys which were analyzed using the pair perception comparison method.Setting – A large research university in the United States.Subjects – Two hundred undergraduate journalism students (users of the instant messaging service and 51 Master of Library Science (MLS students enrolled in a reference services class (providers of the instant messaging service.Methods – The authors created a research help webpage from which users could access the instant messaging service. Prior to service availability, providers received reference instruction and demonstrated reference aptitude through in-class activities. The authors briefed providers on the project and provided a wiki containing resources they might need during reference transactions. Providers worked in two-hour shifts, and two providers were available during each shift. The service was available for one week while potential users completed a journalism assignment. The authors asked both users and providers of the service to complete an online survey at the conclusion of the reference transaction. Users and providers completed different surveys, but both types included the following four elements: questions to aid in matching a user to a provider; questions about satisfaction with the service based on guidelines put forth by the Reference and User Services Association (RUSA; open-ended questions about the reference transaction; and questions regarding demographics, prior reference service usage, and knowledge of instant messaging. There were 55 valid reference transactions, and from those, the authors matched 26 pairs of user and provider surveys. The authors analyzed paired surveys to (a compare the user’s perception of the reference transaction with the provider

  4. Principles of Transactional Memory The Theory

    CERN Document Server

    Guerraoui, Rachid

    2010-01-01

    Transactional memory (TM) is an appealing paradigm for concurrent programming on shared memory architectures. With a TM, threads of an application communicate, and synchronize their actions, via in-memory transactions. Each transaction can perform any number of operations on shared data, and then either commit or abort. When the transaction commits, the effects of all its operations become immediately visible to other transactions; when it aborts, however, those effects are entirely discarded. Transactions are atomic: programmers get the illusion that every transaction executes all its operati

  5. Transaction hubs: can tame energy market communications

    Energy Technology Data Exchange (ETDEWEB)

    Hamilos, C.

    2002-07-01

    The nature and function of transaction hubs is described in view of their growing usefulness as electric industry deregulation takes hold and with it the urgent requirement for trading partners to exchange information quickly and efficiently. The paper stresses the many difficulties involved in communications between trading partners since each partner operates under a different set of business rules, with the result that there are 'language differences' to overcome, not to mention the sheer volume of data that must be handled. To make it all work, companies turn increasingly to products like communication hubs. They are able to overcome the fact that different companies have different systems, different data formats and different business rules, and are able to help companies to package, transmit, receive and process information. The principal advantage of a hub is that no one has to learn anyone else's interface. Everyone can continue to use their own data format and transaction models. The hub supplies the protocols and processing rules needed to work with any of the partners connected to the hub. In order to achieve the level of efficiency and reliability required in a hub, certain design principles must be satisfied. These are : scalability, facilities for load balancing, availability of standard routine services, ability to recognize a process as consisting of various transactions, and a transaction as belonging to a specific process, ability to allow the user to configure expiration times around the business processes according to market rules, facility to easily configure validation rules, ability to handle exceptions, ability to interoperate with many middle-ware products, and to manage work flow in a manner that is transparent to operating personnel.

  6. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  7. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  8. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typically up to the database designer and application programmer to enforce integrity via triggers or tests at the application level....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  9. Micro-transactions for concurrent data structures

    DEFF Research Database (Denmark)

    Meawad, Fadi; Iyer, Karthik; Schoeberl, Martin

    2013-01-01

    implementation of transactional memory that we call micro-transactions. In particular, we argue that hardware support for micro-transactions allows us to efficiently implement certain data structures. Those data structures are difficult to realize with the atomic operations provided by stock hardware and provide......, atomic instructions, and micro-transactions. Our results suggest that transactional memory is an interesting alternative to traditional concurrency control mechanisms....

  10. Organizational Economics: Notes on the Use of Transaction-Cost Theory in the Study of Organizations.

    Science.gov (United States)

    Robins, James A.

    1987-01-01

    Reviews transaction-cost approaches to organizational analysis, examines their use in microeconomic theory, and identifies some important flaws in the study. Advocates transaction-cost theory as a powerful tool for organizational and strategic analysis when set within the famework of more general organizational theory. Includes 61 references. (MLH)

  11. Managerial responses to transaction cost disequilibrium in food supply chains and networks

    NARCIS (Netherlands)

    Bremmers, H.J.; Meulen, van der B.M.J.; Poppe, K.J.; Wijnands, J.H.M.

    2010-01-01

    Differences in transaction costs (i.e. costs of information processing, monitoring and control) between firms in local supply chains as well as in an international setting may have a negative impact on competitiveness and on creation of value added. Transaction cost disequilibrium is defined as a

  12. Transformational and transactional leadership skills for mental health teams.

    Science.gov (United States)

    Corrigan, P W; Garman, A N

    1999-08-01

    Many treatments for persons with severe mental illness are provided by mental health teams. Team members work better when led by effective leaders. Research conducted by organizational psychologists, and validated on mental health teams, have identified a variety of skills that are useful for these leaders. Bass (1990, 1997) identified two sets of especially important skills related to transformational and transactional leadership. Leaders using transformational skills help team members to view their work from more elevated perspectives and develop innovative ways to deal with work-related problems. Skills related to transformational leadership promote inspiration, intellectual stimulation, individual consideration, participative decision making, and elective delegation. Mental health and rehabilitation teams must not only develop creative and innovative programs, they must maintain them over time as a series of leader-team member transactions. Transactional leadership skills include goal-setting, feedback, and reinforcement strategies which help team members maintain effective programs.

  13. How to Use EMTS to Report Transactions for Fuel Programs

    Science.gov (United States)

    Reporting instructions for parties who transact Renewable Identification Numbers (RINs) and must enter transaction information in the EPA Moderated Transaction System (EMTS) within five (5) business days.

  14. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  15. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  16. Remedial transactions curtailment via optimization

    Directory of Open Access Journals (Sweden)

    Maksimović Viktor

    2009-01-01

    Full Text Available The new method developed in this paper is aiming at transmission congestion management (CM. The new, Optimal Transactions Management method (OTM, is based on linear programming (LP, DC load flow (DCLF and linear security constraints. The OTM method is embedded in Available Transfer Capabilities (ATCs and Power Transfer Distribution Factors (PTDFs definitions' environment. Well-suited for both preventive and corrective modes of operation, the OTM method aids transmission system operator in running a congested power system network, where congestions are due to transactions. Potential congestion threat is solved by finding the 'culprit' transaction and its optimal reduction. Besides the proposed downsizing of scheduled and/or committed transactions, controls of the OTM method also include redispatching of generation and load levels. The task is to establish a system state without constraint violations. To ensure the feasible network solution, both DC and AC power flows are used. The common 5 nodes/7 lines Ward&Hale sample power system is used to clarify the OTM method. Besides, six other power system networks including the real-life power system network of Serbia, Macedonia and Montenegro (part of the South East Europe - SEE grid are used to test remedial potentials and CPU-time performances of the method. The 24-hour daily demand diagram is used with all test networks to study the effects of transactions as they are being superimposed to the regional grid. The remedial, transactions-curtailing OTM method is found well suited for market-related analyses precluding the hour-ahead, the day-ahead dispatch, as well as the real-time generation dispatch. It could also suit for the novel, Day Ahead Congestion Forecast (DACF procedure used in power markets. .

  17. The religious message in action - a case study

    Directory of Open Access Journals (Sweden)

    René Gothóni

    1975-01-01

    Full Text Available We understand a religious message to be the product of a religious movement. In studying such a message, it is very much to the purpose to place it in the context in which it operates. The cultural and social context of a religious message is some religious movement. Hence, the message should be examined against that framework. Each message has a certain structure, and its detection is of prime importance. Messages are not only part of the tradition, but themselves unique in their respective communicative situations. Thus, in our view, structural analysis does not have analytical use-value unless the message's symbols are set into their communicative context. The aim of this paper is dual: On the one hand, we intend to analyze and clarify the structure of a religious message of the Laestadian movement, how the message operates, also how the members of that movement respond to the codes of the message, and what kind of functions it fulfills; on the other, to develop and test an analytical model which would combine structural and interactional analysis.

  18. Preferred breast cancer message sources and frames amongst ...

    African Journals Online (AJOL)

    This descriptive study set out to verify the Kenyan women's knowledge of the various risk factors associated with breast cancer, their preferred framing of the breast cancer messages and their preferred channels for receiving those messages. Three hundred and ninety-three (393) women aged 20-64 years from the Kisumu ...

  19. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  20. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  1. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  2. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  3. Financial and Cost Aspects of Other Transactions

    National Research Council Canada - National Science Library

    1998-01-01

    ...." This report discusses the DoD administration of "other transactions." The second audit report will discuss the review of costs charged to the agreements by the "other transaction" participant...

  4. 76 FR 40779 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-07-12

    ... transaction are offset when: (i) The customer maintains separate accounts managed by different advisors; (ii... could nominate a deposit account as containing margin for its retail forex transactions. Nothing in this...

  5. Transactions Concurrency Control in Web Service Environment

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Nejdl, Wolfgang

    2006-01-01

    an engineering point of view as it does not change the way consumers or clients of web services have to be programmed. Furthermore, it avoids direct communication between transaction coordinators which preserves security by keeping the information about business transactions restricted to the coordinators which......Business transactions in web service environments run with relaxed isolation and atomicity property. In such environments, transactions can commit and roll back independently on each other. Transaction management has to reflect this issue and address the problems which result for example from...... concurrent access to web service resources and data. In this paper we propose an extension to the WS-Transaction Protocol which ensures the consistency of the data when independent business transactions access the data concurrently under the relaxed transaction properties. Our extension is based...

  6. Transactions in domain-specific information systems

    Science.gov (United States)

    Zacek, Jaroslav

    2017-07-01

    Substantial number of the current information system (IS) implementations is based on transaction approach. In addition, most of the implementations are domain-specific (e.g. accounting IS, resource planning IS). Therefore, we have to have a generic transaction model to build and verify domain-specific IS. The paper proposes a new transaction model for domain-specific ontologies. This model is based on value oriented business process modelling technique. The transaction model is formalized by the Petri Net theory. First part of the paper presents common business processes and analyses related to business process modeling. Second part defines the transactional model delimited by REA enterprise ontology paradigm and introduces states of the generic transaction model. The generic model proposal is defined and visualized by the Petri Net modelling tool. Third part shows application of the generic transaction model. Last part of the paper concludes results and discusses a practical usability of the generic transaction model.

  7. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  8. 31 CFR 543.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 543.406 Section 543.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... Interpretations § 543.406 Offshore transactions. The prohibitions in § 543.201 on transactions or dealings...

  9. 31 CFR 547.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 547.406 Section 547.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... REGULATIONS Interpretations § 547.406 Offshore transactions. The prohibitions in § 547.201 on transactions or...

  10. 31 CFR 541.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 541.406 Section 541.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 541.406 Offshore transactions. The prohibitions in § 541.201 on transactions involving blocked...

  11. 31 CFR 548.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 548.406 Section 548.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 548.406 Offshore transactions. The prohibitions in § 548.201 on transactions or dealings involving...

  12. 31 CFR 537.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 537.406 Section 537.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 537.406 Offshore transactions. The prohibitions in § 537.201 on transactions involving blocked...

  13. 31 CFR 546.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 546.406 Section 546.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 546.406 Offshore transactions. The prohibitions in § 546.201 on transactions or dealings involving...

  14. 31 CFR 542.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 542.406 Section 542.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 542.406 Offshore transactions. The prohibitions in § 542.201 on transactions involving blocked...

  15. 31 CFR 588.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 588.406 Section 588.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... Interpretations § 588.406 Offshore transactions. The prohibitions in § 588.201 on transactions involving blocked...

  16. Rethinking Ethiopian Secured Transactions Law through ...

    African Journals Online (AJOL)

    Various countries have reformed their secured transaction laws recognizing the significance of modern secured transactions law in enhancing access to credit and economic development. Ethiopia has not undertaken comprehensive secured transactions law reform, despite the demonstrable mismatch between the legal ...

  17. From Transactional to Transformational Accounting.

    Science.gov (United States)

    Cooper, Bruce S.; Randall, E. Vance

    1998-01-01

    Accurate transactional financial data are necessary for governmental compliance; transformational information is crucial for measuring and improving school performance. Some districts are shifting from a systems to a service, focus, from partial to full-cost accounting, from centralized to decentralized reporting procedures and facilities, and…

  18. Fostering multidisciplinary learning through computer-supported collaboration script: The role of a transactive memory script

    NARCIS (Netherlands)

    Noroozi, O.; Weinberger, A.; Biemans, H.J.A.; Teasley, S.D.; Mulder, M.

    2012-01-01

    For solving many of today's complex problems, professionals need to collaborate in multidisciplinary teams. Facilitation of knowledge awareness and coordination among group members, that is through a Transactive Memory System (TMS), is vital in multidisciplinary collaborative settings. Online

  19. The impact of cultural exposure and message framing on oral health behavior: Exploring the role of message memory

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N.; Updegraff, John A.; Ehret, Phillip J.; Areguin, Maira A.; Sherman, David K.

    2015-01-01

    Background Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically decide on message features to promote adherence to recommended behaviors. We present exposure to United States (U.S.) culture as a moderator of the impact of gain- vs. loss-frame messages. Since U.S. culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to U.S. culture would show these advantages for loss-framed messages. Methods 223 participants viewed a written oral health message in one of three randomized conditions: gain-frame, loss-frame, or no-message control, and were given ten flosses. Cultural exposure was measured with the proportions of life spent and parents born in the U.S. At baseline and one week later, participants completed recall tests and reported recent flossing behavior. Results Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over one week. E.g., those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Limitations Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. Conclusions In healthcare settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. PMID:25654986

  20. Impact of Cultural Exposure and Message Framing on Oral Health Behavior: Exploring the Role of Message Memory.

    Science.gov (United States)

    Brick, Cameron; McCully, Scout N; Updegraff, John A; Ehret, Phillip J; Areguin, Maira A; Sherman, David K

    2016-10-01

    Health messages are more effective when framed to be congruent with recipient characteristics, and health practitioners can strategically choose message features to promote adherence to recommended behaviors. We present exposure to US culture as a moderator of the impact of gain-frame versus loss-frame messages. Since US culture emphasizes individualism and approach orientation, greater cultural exposure was expected to predict improved patient choices and memory for gain-framed messages, whereas individuals with less exposure to US culture would show these advantages for loss-framed messages. 223 participants viewed a written oral health message in 1 of 3 randomized conditions-gain-frame, loss-frame, or no-message control-and were given 10 flosses. Cultural exposure was measured with the proportions of life spent and parents born in the US. At baseline and 1 week later, participants completed recall tests and reported recent flossing behavior. Message frame and cultural exposure interacted to predict improved patient decisions (increased flossing) and memory maintenance for the health message over 1 week; for example, those with low cultural exposure who saw a loss-frame message flossed more. Incongruent messages led to the same flossing rates as no message. Memory retention did not explain the effect of message congruency on flossing. Flossing behavior was self-reported. Cultural exposure may only have practical application in either highly individualistic or collectivistic countries. In health care settings where patients are urged to follow a behavior, asking basic demographic questions could allow medical practitioners to intentionally communicate in terms of gains or losses to improve patient decision making and treatment adherence. © The Author(s) 2015.

  1. Supervising simulations with the Prodiguer Messaging Platform

    Science.gov (United States)

    Greenslade, Mark; Carenton, Nicolas; Denvil, Sebastien

    2015-04-01

    At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of High Performance Computing (HPC) environments spread throughout France. The IPSL's simulation execution runtime is called libIGCM (library for IPSL Global Climate Modeling group). libIGCM has recently been enhanced so as to support realtime operational use cases. Such use cases include simulation monitoring, data publication, environment metrics collection, automated simulation control … etc. At the core of this enhancement is the Prodiguer messaging platform. libIGCM now emits information, in the form of messages, for remote processing at IPSL servers in Paris. The remote message processing takes several forms, for example: 1. Persisting message content to database(s); 2. Notifying an operator of changes in a simulation's execution status; 3. Launching rollback jobs upon simulation failure; 4. Dynamically updating controlled vocabularies; 5. Notifying downstream applications such as the Prodiguer web portal; We will describe how the messaging platform has been implemented from a technical perspective and demonstrate the Prodiguer web portal receiving realtime notifications.

  2. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  3. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  4. Environmental taxes and transaction costs

    International Nuclear Information System (INIS)

    Vollebergh, Herman R.J.

    1994-06-01

    A well-known tax policy principle in the case of environmental bads holds that optimality would apply to a special class of environmental taxes, the so called Pigovian or effluent taxes (or fees or charges). However, an interesting paradox arises here for effluent taxes are seldom chosen in practical policies by governments. An explanation for this discrepancy is that effluent taxes are generally supposed to bring about the highest amount of transaction costs in order to enforce this kind of tax. This would be caused by the fact that usually large numbers of agents are involved if effluents are taken as the principal tax base. Unfortunately this explanation seems to boomerang for it brings about an impossibility result: effluent taxes can never be first best taxes if transaction costs are allowed. Up till now theoretical economics has not paid much attention to this problem. In contrast this essay offers an explanation for the discrepancy and it shows why the impossibility theorem is a paradox. As soon as one allows for transaction costs in welfare analysis, one not only has to acknowledge that such costs are attached to the internalization device but also to the initial status quo. Moreover, the amount of transaction costs is not independent of the tax contracts themselves, neither are the benefits of regulation through taxation. Accordingly a more general welfare assessment of questions where it is optimal to levy environmental taxes shows that first best Pigovian taxes need not be effluent taxes (even if abatement is possible), although in some cases effluent taxes might still be the best policy option from an economic perspective. 31 refs

  5. Environmental taxes and transaction costs

    Energy Technology Data Exchange (ETDEWEB)

    Vollebergh, Herman R.J. [Centre for Economic Policy OCFEB, Erasmus University Rotterdam (Netherlands)

    1994-06-01

    A well-known tax policy principle in the case of environmental bads holds that optimality would apply to a special class of environmental taxes, the so called Pigovian or effluent taxes (or fees or charges). However, an interesting paradox arises here for effluent taxes are seldom chosen in practical policies by governments. An explanation for this discrepancy is that effluent taxes are generally supposed to bring about the highest amount of transaction costs in order to enforce this kind of tax. This would be caused by the fact that usually large numbers of agents are involved if effluents are taken as the principal tax base. Unfortunately this explanation seems to boomerang for it brings about an impossibility result: effluent taxes can never be first best taxes if transaction costs are allowed. Up till now theoretical economics has not paid much attention to this problem. In contrast this essay offers an explanation for the discrepancy and it shows why the impossibility theorem is a paradox. As soon as one allows for transaction costs in welfare analysis, one not only has to acknowledge that such costs are attached to the internalization device but also to the initial status quo. Moreover, the amount of transaction costs is not independent of the tax contracts themselves, neither are the benefits of regulation through taxation. Accordingly a more general welfare assessment of questions where it is optimal to levy environmental taxes shows that first best Pigovian taxes need not be effluent taxes (even if abatement is possible), although in some cases effluent taxes might still be the best policy option from an economic perspective. 31 refs.

  6. Visualizing Dynamic Bitcoin Transaction Patterns

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J.

    2016-01-01

    Abstract This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network. PMID:27441715

  7. Visualizing Dynamic Bitcoin Transaction Patterns.

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J

    2016-06-01

    This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network.

  8. Identifying Bitcoin users by transaction behavior

    Science.gov (United States)

    Monaco, John V.

    2015-05-01

    Digital currencies, such as Bitcoin, offer convenience and security to criminals operating in the black marketplace. Some Bitcoin marketplaces, such as Silk Road, even claim anonymity. This claim contradicts the findings in this work, where long term transactional behavior is used to identify and verify account holders. Transaction timestamps and network properties observed over time contribute to this finding. The timestamp of each transaction is the result of many factors: the desire purchase an item, daily schedule and activities, as well as hardware and network latency. Dynamic network properties of the transaction, such as coin flow and the number of edge outputs and inputs, contribute further to reveal account identity. In this paper, we propose a novel methodology for identifying and verifying Bitcoin users based on the observation of Bitcoin transactions over time. The behavior we attempt to quantify roughly occurs in the social band of Newell's time scale. A subset of the Blockchain 230686 is taken, selecting users that initiated between 100 and 1000 unique transactions per month for at least 6 different months. This dataset shows evidence of being nonrandom and nonlinear, thus a dynamical systems approach is taken. Classification and authentication accuracies are obtained under various representations of the monthly Bitcoin samples: outgoing transactions, as well as both outgoing and incoming transactions are considered, along with the timing and dynamic network properties of transaction sequences. The most appropriate representations of monthly Bitcoin samples are proposed. Results show an inherent lack of anonymity by exploiting patterns in long-term transactional behavior.

  9. Transaction Costs, the Phenomenon of the Trading House and Economic Organization

    Directory of Open Access Journals (Sweden)

    Kiryanov Igor, V.

    2015-12-01

    Full Text Available The present paper contains a study of the phenomenon of company’s specific internal divisions called “trading house”. The analysis of different approaches (based on results obtained by R. Coase and O. Williamson towards the problem of impact of transaction cost on company size leads to the following conclusion: the company size mostly depends on its institutional architecture which includes specific divisions that ensure outsourcing of intergroup transaction cost. I propose to call these divisions centers of transaction cost. I suppose that the wide popularity of trading houses among companies belonging to different branches can be explained by the fact that a trading house is mostly used not as selling and purchasing division, but as a center of transaction cost that concentrates the biggest transaction cost (by its share within company’s general expenses. This reasoning leads to possibility of existence of a set of methodological principles that allow to build up an a priori model of expanding company. The process of expansion represents a series of inclusion of centers of transactions cost by the company after institutional advantages of an earlier institutional architecture disappear. This methodology allows to set up a classification between a classical company as a structure with low level of integration and frozen institutional architecture and an economic organization that represents an explicitly constructed composition including centers of transaction cost that help to extend the transformational space of an expanding company.

  10. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.

  11. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  12. How vulnerable is the emissions market to transaction costs?: An ABMS Approach

    International Nuclear Information System (INIS)

    Lee, Kangil; Han, Taek-Whan

    2016-01-01

    The impact of transaction costs on the early emissions trading market is examined by applying an agent-based model and simulation (ABMS) approach. For a realistic model set up, bounded rationality, stochastic characteristics, and learning-by-doing are considered in our search processes. Marginal abatement cost parameters are obtained from Yoo et al. (2010), which is an experimental study on the emissions trading in the Korean power sector. Sensitivity analyses are performed on market performance indices with regard to transaction cost parameters, which represent scales and the learning elasticities of transaction costs. A total of 960 simulations were run in this sensitivity analysis. Sensitivity analysis results consistently show that higher transaction costs worsen market performance. The most remarkable finding in these results is that welfare performance of all the transactions decreases by up to 50% as the scale parameters of transaction costs increase, implying that welfare gain from introducing emissions trading disappears significantly. However, with learning curve effect, welfare performance could be regained by up to 26%. In sum, although transaction costs significantly encroach upon trade gains at the early stage, based on our simulation results, the welfare loss by way of transaction costs is lessened as the knowledge of market participants progresses. - Highlights: • Impact of transaction costs on small and early, primitive emissions trading market • Bounded Rationality (BR) and Zero Intelligence Plus (ZIP) agents concept • Marginal Abatement Cost (MAC) parameters delineate Korean power companies • With transaction costs, welfare gain from trade found to be shrunken • As learning proceeds, welfare loss is reduced

  13. A Complex Estimation Function based on Community Reputation for On-line Transaction Systems

    Directory of Open Access Journals (Sweden)

    Yu Yang

    2012-09-01

    Full Text Available A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios encountered in online transaction nowadays. We analyze and verify tolerance of this reputation function against various socio-communal reputation attacks. We find the function to be dynamic, customizable and tolerant against different attacks. As such it can serve well in many online transaction systems such as e-commerce websites, online group activities, and P2P systems.

  14. How consumers evaluate eWOM (electronic word-of-mouth) messages.

    Science.gov (United States)

    Doh, Sun-Jae; Hwang, Jang-Sun

    2009-04-01

    This experiment explored how consumers evaluate electronic word-of-mouth (eWOM) messages about products. Each participant was exposed a 10-message set in a single board. Five groups were manipulated in terms of their ratios of positive and negative messages. The result showed significant differences across various sets of eWOM messages. Although more positive sets showed higher scores in many cases, this was not true in all situations, especially for the case of credibility. Involvement and prior knowledge partially moderated the relationship between the ratio of messages and the eWOM effect. The credibility of Web sites and eWOM messages can be damaged in the long run if all of the eWOM messages are positive.

  15. Nonblocking Scheduling for Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Balke, Wolf-Tilo; Dolog, Peter

    2007-01-01

    . In this paper, we propose a novel nonblocking scheduling mechanism that is used prior to the actual service invocations. Its aim is to reach an agreement between the client and all participating providers on what transaction processing times have to be expected, accepted, and guaranteed. This enables service......For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness of the concurrent execution then has to be ensured by commit order-preserving transaction schedulers. However, local...... schedulers of service providers typically do take into account neither time constraints for committing the whole transaction, nor the individual services' constraints when scheduling decisions are made. This often leads to an unnecessary blocking of transactions by (possibly long-running) others...

  16. Private benefits in corporate control transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in corporate control transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer is a more efficient monitor...... with high security benefits, or because the buyer has high private benefits from the control rights that come with the shares? Using voting rights as the vehicle for private benefits, I find that the selling shareholders in block transactions attach more value to private benefits than the buyers. In tender...... offer transactions, the answer is that private benefits are insignificant to both sides of the transaction. As an alternative measure of the transaction premium, I calculate the abnormal return premium. This represents the stock market's valuation of the transaction. I find that the stock market puts...

  17. Möbius: Trustless Tumbling for Transaction Privacy

    Directory of Open Access Journals (Sweden)

    Meiklejohn Sarah

    2018-04-01

    Full Text Available Cryptocurrencies allow users to securely transfer money without relying on a trusted intermediary, and the transparency of their underlying ledgers also enables public verifiability. This openness, however, comes at a cost to privacy, as even though the pseudonyms users go by are not linked to their real-world identities, all movement of money among these pseudonyms is traceable. In this paper, we present Möbius, an Ethereum-based tumbler or mixing service. Möbius achieves strong notions of anonymity, as even malicious senders cannot identify which pseudonyms belong to the recipients to whom they sent money, and is able to resist denial-of-service attacks. It also achieves a much lower off-chain communication complexity than all existing tumblers, with senders and recipients needing to send only two initial messages in order to engage in an arbitrary number of transactions.

  18. The affective dimension of alliance in transactional analysis psychotherapy

    Directory of Open Access Journals (Sweden)

    Roland Johnsson

    2010-07-01

    Full Text Available The study describes an investigation of the significance of the affective dimension of the therapeutic alliance (Bordin 1979, in a psychodynamic form of transactional analysis therapy after the style of “Redecision therapy” (Goulding & Goulding, 1979. We explored the client’s pattern of affective relationships by use of CCRT (the Core Conflictual Relationship method, Luborsky & Crits-Christoph, 1990, 1998 and examined how the therapist responds to the client’s affective messages (“tests” by use of the Plan Diagnosis method (Weiss & Sampson, 1986. We found that “emotional” aspects play a more decisive role than has been envisioned in the TA redecision method and similar approaches of TA psychotherapy that emphasise contracts, tasks of therapy and a rational approach.

  19. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  20. Disintermediation of Inter-Blockchain Transactions

    OpenAIRE

    English, S. Matthew; Orlandi, Fabrizio; Auer, Soeren

    2016-01-01

    Different versions of peer-to-peer electronic cash exist as data represented by separate blockchains. Payments between such systems cannot be sent directly from one party to another without going through a financial institution. Bitcoin provided part of the solution but its utility is limited to intra-blockchain transactions. The benefits are lost if a trusted third party is required to execute inter-blockchain transactions. We propose a solution to the inter-blockchain transaction problem us...

  1. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  3. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  4. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  5. Transformational and Transactional Leadership Styles as They Predict Constructive Culture and Defensive Culture

    OpenAIRE

    Eppard, Randy G.

    2004-01-01

    The purpose of this study was to test a predictive model of several components of organizational and leadership Culture in a large sample of municipal employees using three sets of predictors: demographic/employment status of employees, measures of employeesâ judgments of their supervisorâ s transactional leadership styles, and measures of employeesâ judgments of their supervisorâ s transformational leadership style. To what extent does transformational and transactional leadership (bot...

  6. 17 CFR 37.8 - Information relating to transactions on derivatives transaction execution facilities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Information relating to transactions on derivatives transaction execution facilities. 37.8 Section 37.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.8...

  7. Managing transaction risks in interdependent supply chains: an extended transaction cost economics perspective

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    The present study examines the management of transaction risks in supply chains. Risk management studies often ignore the wider supply chain context in which individual transactions take place. However, risk management strategies which are suitable to use when only a single transaction is considered

  8. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  9. Source Similarity and Social Media Health Messages: Extending Construal Level Theory to Message Sources.

    Science.gov (United States)

    Young, Rachel

    2015-09-01

    Social media users post messages about health goals and behaviors to online social networks. Compared with more traditional sources of health communication such as physicians or health journalists, peer sources are likely to be perceived as more socially close or similar, which influences how messages are processed. This experimental study uses construal level theory of psychological distance to predict how mediated health messages from peers influence health-related cognition and behavioral intention. Participants were exposed to source cues that identified peer sources as being either highly attitudinally and demographically similar to or different from participants. As predicted by construal level theory, participants who perceived sources of social media health messages as highly similar listed a greater proportion of beliefs about the feasibility of health behaviors and a greater proportion of negative beliefs, while participants who perceived sources as more dissimilar listed a greater proportion of positive beliefs about the health behaviors. Results of the study could be useful in determining how health messages from peers could encourage individuals to set realistic health goals.

  10. Concurrency Control for Transactional Drago

    OpenAIRE

    Patiño-Martinez, Marta; Jiménez-Peris, Ricardo; Kienzle, Jörg; Arévalo, Sergio

    2002-01-01

    The granularity of concurrency control has a big impact on the performance of transactional systems. Concurrency control granu- larity and data granularity (data size) are usually the same. The e ect of this coupling is that if a coarse granularity is used, the overhead of data access (number of disk accesses) is reduced, but also the degree of concurrency. On the other hand, if a ne granularity is chosen to achieve a higher degree of concurrency (there are less con icts), the cost of data ac...

  11. Banknotes and unattended cash transactions

    Science.gov (United States)

    Bernardini, Ronald R.

    2000-04-01

    There is a 64 billion dollar annual unattended cash transaction business in the US with 10 to 20 million daily transactions. Even small problems with the machine readability of banknotes can quickly become a major problem to the machine manufacturer and consumer. Traditional note designs incorporate overt security features for visual validation by the public. Many of these features such as fine line engraving, microprinting and watermarks are unsuitable as machine readable features in low cost note acceptors. Current machine readable features, mostly covert, were designed and implemented with the central banks in mind. These features are only usable by the banks large, high speed currency sorting and validation equipment. New note designs should consider and provide for low cost not acceptors, implementing features developed for inexpensive sensing technologies. Machine readable features are only as good as their consistency. Quality of security features as well as that of the overall printing process must be maintained to ensure reliable and secure operation of note readers. Variations in printing and of the components used to make the note are one of the major causes of poor performance in low cost note acceptors. The involvement of machine manufacturers in new currency designs will aid note producers in the design of a note that is machine friendly, helping to secure the acceptance of the note by the public as well as acting asa deterrent to fraud.

  12. A transactional framework for pediatric rehabilitation: shifting the focus to situated contexts, transactional processes, and adaptive developmental outcomes.

    Science.gov (United States)

    King, Gillian; Imms, Christine; Stewart, Debra; Freeman, Matt; Nguyen, Tram

    2018-07-01

    A paradigm shift is taking place in pediatric rehabilitation research, practice, and policy - a shift towards the real-life contexts of clients rather than requiring clients to navigate the world of pediatric rehabilitation. This article proposes a conceptual framework to bring about a broader awareness of clients' lives and transactional processes of change over the life course. The framework draws attention to transactional processes by which individuals, situated in life contexts, change and adapt over the life course and, in turn, influence their contextual settings and broader environments. This framework is based on (a) basic tenets derived from foundational theories taking a life course perspective to change, and (b) transactional processes identified from relevant pediatric rehabilitation models that bring these foundational theories into the pediatric rehabilitation sphere. The framework identifies three types of transactional processes relevant to pediatric rehabilitation: facilitative, resiliency, and socialization processes. These processes describe how contexts and people mutually influence each other via opportunities and situated experiences, thus facilitating capacity, adaptation to adversity, and socialization to new roles and life transitions. The utility of the framework is considered for research, practice, service organizations, and policy. Implications for Rehabilitation The framework supports practitioners going beyond person and environment as separate entities, to provide services to the "situated person" in real-life contexts The framework shifts the focus from "body structures/functions" and "person in activity" to "person in changing and challenging life contexts" Working from a transactional perspective, practitioner-client conversations will change; practitioners will view client situations through a lens of opportunities and experiences, assess client experiences in real-life contexts, and strive to create context-based therapy

  13. 31 CFR 515.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... credit issued by a Cuban bank and confirmed by an American bank. These are permissible transactions under... enhancements. (b) Donation of food. The prohibitions contained in this part do not apply to transactions incident to the donation of food to nongovernmental organizations or individuals in Cuba. [54 FR 5233, Feb...

  14. 31 CFR 597.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 597.406 Section 597.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... REGULATIONS Interpretations § 597.406 Offshore transactions. The prohibitions contained in § 597.201 apply to...

  15. 31 CFR 544.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 544.406 Section 544.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... SANCTIONS REGULATIONS Interpretations § 544.406 Offshore transactions. The prohibitions in § 544.201 on...

  16. 31 CFR 593.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 593.406 Section 593.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... SANCTIONS REGULATIONS Interpretations § 593.406 Offshore transactions. The prohibitions in § 593.201 on...

  17. 31 CFR 587.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 587.406 Section 587.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... MONTENEGRO) MILOSEVIC SANCTIONS REGULATIONS Interpretations § 587.406 Offshore transactions. The prohibitions...

  18. 31 CFR 357.28 - Transaction requests.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Transaction requests. 357.28 Section 357.28 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... System (Legacy Treasury Direct) § 357.28 Transaction requests. (a) General. Unless otherwise authorized...

  19. The transactional approach in company boundaries

    Directory of Open Access Journals (Sweden)

    Bruno Chaihuaque Dueñas

    2009-12-01

    Full Text Available This article shows the relationship between market and firms through the theory of transactional cost and the relationsthat determine the structure and boundaries of the firm. Using the assumptions from the transactional cost approach,this article proposes some variables that determine optimal organizational structures and their boundaries.

  20. Related Party Transactions and Firms Financial Performance

    African Journals Online (AJOL)

    Prof

    Chien and Hsu (2010) found a positive moderating effect of corporate governance on the related transactions-firm performance relationship and deduce that presence of corporate governance could 'transfer' related party transactions 'conflict- of-interest' to be efficient. Past studies on the impact of RPT on financial reporting ...

  1. 31 CFR 103.63 - Structured transactions.

    Science.gov (United States)

    2010-07-01

    ... Section 103.63 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.63 Structured transactions. No person shall for the purpose of evading the reporting requirements of § 103.22 with respect to...

  2. 31 CFR 596.304 - Financial transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Financial transaction. 596.304 Section 596.304 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... term includes: (a) A transaction which in any way or degree affects interstate or foreign commerce; (1...

  3. Reactions to Corporate Insider’s Transactions

    DEFF Research Database (Denmark)

    Rose, Caspar; Søpstad, Nicolai

    2015-01-01

    We test the impact on security prices of top manager’s requirement’s to disclose their own share transactions in the firm. Specifically we study whether buy or sales transactions convey relevant information for market participants thereby studying the effects of legal stock market disclosure rules...

  4. The consequences of hospital autonomization in Colombia: a transaction cost economics analysis.

    Science.gov (United States)

    Castano, Ramon; Mills, Anne

    2013-03-01

    Granting autonomy to public hospitals in developing countries has been common over recent decades, and implies a shift from hierarchical to contract-based relationships with health authorities. Theory on transactions costs in contractual relationships suggests they stem from relationship-specific investments and contract incompleteness. Transaction cost economics argues that the parties involved in exchanges seek to reduce transaction costs. The objective of this research was to analyse the relationships observed between purchasers and the 22 public hospitals of the city of Bogota, Colombia, in order to understand the role of relationship-specific investments and contract incompleteness as sources of transaction costs, through a largely qualitative study. We found that contract-based relationships showed relevant transaction costs associated mainly with contract incompleteness, not with relationship-specific investments. Regarding relationships between insurers and local hospitals for primary care services, compulsory contracting regulations locked-in the parties to the contracts. For high-complexity services (e.g. inpatient care), no restrictions applied and relationships suggested transaction-cost minimizing behaviour. Contract incompleteness was found to be a source of transaction costs on its own. We conclude that transaction costs seemed to play a key role in contract-based relationships, and contract incompleteness by itself appeared to be a source of transaction costs. The same findings are likely in other contexts because of difficulties in defining, observing and verifying the contracted products and the underlying information asymmetries. The role of compulsory contracting might be context-specific, although it is likely to emerge in other settings due to the safety-net role of public hospitals.

  5. Distributed Management of Concurrent Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Balke, Wolf-Tilo

    2009-01-01

    Business processes involve dynamic compositions of interleaved tasks. Therefore, ensuring reliable transactional processing of Web services is crucial for the success of Web service-based B2B and B2C applications. But the inherent autonomy and heterogeneity of Web services render the applicability...... of conventional ACID transaction models for Web services far from being straightforward. Current Web service transaction models relax the isolation property and rely on compensation mechanisms to ensure atomicity of business transactions in the presence of service failures. However, ensuring consistency...... in the open and dynamic environment of Web services, where interleaving business transactions enter and exit the system independently, remains an open issue. In this paper, we address this problem and propose an architecture that supports concurrency control on the Web services level. An extension...

  6. Development Credit Authority (DCA) Data Set: Loan Transactions

    Data.gov (United States)

    US Agency for International Development — USAID's Development Credit Authority (DCA) works with investors, local financial institutions, and development organizations to design and deliver investment...

  7. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  8. Evidence of Premeditation in Skin Messages in Suicide.

    Science.gov (United States)

    Byard, Roger W

    2016-03-01

    A 34-year-old man with manic-depressive disorder was found dead sitting in a vehicle with a hose running from the exhaust pipe to the cabin. Numerous suicide notes were found inside his house. At autopsy, the decedent was wearing jeans and a long-sleeved windcheater. Upon removal of his clothes, a series of messages were also found written on the legs and forearm. Death was due to carbon monoxide toxicity with a blood level of carboxyhemoglobin of 84%. Skin messages represent a rare form of suicide note that may suggest that a suicide has not been planned, as the decedent may have used the nearest surface to write on. This case demonstrates, however, that skin messages may be more organized, being written prior to dressing and setting up the fatal episode. They also may compliment other notes and messages. © 2015 American Academy of Forensic Sciences.

  9. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  10. Military Message Experiment. Volume II.

    Science.gov (United States)

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  11. Blind sensor calibration using approximate message passing

    International Nuclear Information System (INIS)

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  12. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  13. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    Science.gov (United States)

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  14. Security of M-Commerce transactions

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-07-01

    Full Text Available In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here's how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into account the organization of M-Commerce applications, software used, hardware used and other important issues in the development of these applications.

  15. Accounting costs of transactions in real estate

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2005-01-01

    in relating theoretical conceptualizations of transaction costs to national accounting and further to the identification and quantification of actions on units of real estate. The notion of satellite accounting of the System of National Accounts is applied to the segment of society concerned with changes......The costs of transactions in real estate is of importance for households, for investors, for statistical services, for governmental and international bodies concerned with the efficient delivery of basic state functions, as well as for research. The paper takes a multi-disciplinary approach...... in real estate. The paper ends up with an estimate of the cost of a major real property transaction in Denmark....

  16. 21 CFR 1404.200 - What is a covered transaction?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false What is a covered transaction? 1404.200 Section 1404.200 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Covered Transactions § 1404.200 What is a covered transaction? A covered transaction is a...

  17. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  18. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  19. The Influence of an External Transaction on a BPEL Scope

    Science.gov (United States)

    Kopp, Oliver; Mietzner, Ralph; Leymann, Frank

    Business processes constitute an integral part of today's IT applications. They contain transactions as essential building blocks to ensure integrity and all-or-nothing behavior. The Business Process Execution Language is the dominant standard for modeling and execution of business processes in a Web service environment. BPEL itself contains a transaction model based on compensation, that describes the (local) transactions in a business process. The WS-Coordination framework deals with (external) transactions between Web services and is used to define the transaction behavior between a BPEL process and its partners. In this paper, we investigate how external transactions between Web services interrelate with local transactions of BPEL.

  20. Trans-acting translational regulatory RNA binding proteins.

    Science.gov (United States)

    Harvey, Robert F; Smith, Tom S; Mulroney, Thomas; Queiroz, Rayner M L; Pizzinga, Mariavittoria; Dezi, Veronica; Villenueva, Eneko; Ramakrishna, Manasa; Lilley, Kathryn S; Willis, Anne E

    2018-05-01

    The canonical molecular machinery required for global mRNA translation and its control has been well defined, with distinct sets of proteins involved in the processes of translation initiation, elongation and termination. Additionally, noncanonical, trans-acting regulatory RNA-binding proteins (RBPs) are necessary to provide mRNA-specific translation, and these interact with 5' and 3' untranslated regions and coding regions of mRNA to regulate ribosome recruitment and transit. Recently it has also been demonstrated that trans-acting ribosomal proteins direct the translation of specific mRNAs. Importantly, it has been shown that subsets of RBPs often work in concert, forming distinct regulatory complexes upon different cellular perturbation, creating an RBP combinatorial code, which through the translation of specific subsets of mRNAs, dictate cell fate. With the development of new methodologies, a plethora of novel RNA binding proteins have recently been identified, although the function of many of these proteins within mRNA translation is unknown. In this review we will discuss these methodologies and their shortcomings when applied to the study of translation, which need to be addressed to enable a better understanding of trans-acting translational regulatory proteins. Moreover, we discuss the protein domains that are responsible for RNA binding as well as the RNA motifs to which they bind, and the role of trans-acting ribosomal proteins in directing the translation of specific mRNAs. This article is categorized under: RNA Interactions with Proteins and Other Molecules > RNA-Protein Complexes Translation > Translation Regulation Translation > Translation Mechanisms. © 2018 Medical Research Council and University of Cambridge. WIREs RNA published by Wiley Periodicals, Inc.

  1. 25 CFR 141.41 - Refinancing transaction.

    Science.gov (United States)

    2010-04-01

    ... keeping requirements of this part and requires the issuance of a new ticket or receipt. (c) The rate of... as extended. (e) The default and sale procedures of this part apply to a refinanced pawn transaction...

  2. Transaction charges allocation using sensitivity factor methodology

    Indian Academy of Sciences (India)

    Under this framework, the transmission tariff charged for the customers becomes ... Ni et al (2000) applied graph theory to solve the problem of power flow .... The coefficient of linear relationship between the amount of transaction and flow on.

  3. Conceptualizing and Measuring Transformational and Transactional Leadership

    DEFF Research Database (Denmark)

    Jensen, Ulrich Thy; Andersen, Lotte Bøgh; Ladegaard, Louise

    2016-01-01

    . Many public administration scholars apply the concepts, emphasizing the need to ensure that the concepts are applicable in both public and private organizations. The article reconceptualizes transformational and transactional leadership and develops and tests revised measures that can be employed...

  4. The transactional interpretation of quantum mechanics

    Science.gov (United States)

    Cramer, John G.

    2001-06-01

    The transactional interpretation of quantum mechanics [1] was originally published in 1986 and is now about 14 years old. It is an explicitly nonlocal and Lorentz invariant alternative to the Copenhagen interpretation. It interprets the formalism for a quantum interaction as describing a "handshake" between retarded waves (ψ) and advanced waves (ψ*) for each quantum event or "transaction" in which energy, momentum, angular momentum, and other conserved quantities are transferred. The transactional interpretation offers the advantages that (1) it is actually "visible" in the formalism of quantum mechanics, (2) it is economical, involving fewer independent assumptions than its rivals, (3) it is paradox-free, resolving all of the paradoxes of standard quantum theory including nonlocality and wave function collapse, (4) it does not give a privileged role to observers or measurements, and (5) it permits the visualization of quantum events. We will review the transactional interpretation and some of its applications to "quantum paradoxes."

  5. Guarding against Collateral Damage during Chromatin Transactions

    DEFF Research Database (Denmark)

    Altmeyer, Matthias; Lukas, Jiri

    2013-01-01

    Signal amplifications are vital for chromatin function, yet they also bear the risk of transforming into unrestrained, self-escalating, and potentially harmful responses. Examples of inbuilt limitations are emerging, revealing how chromatin transactions are confined within physiological boundaries....

  6. Text messaging intervention for teens and young adults with diabetes.

    Science.gov (United States)

    Markowitz, Jessica T; Cousineau, Tara; Franko, Debra L; Schultz, Alan T; Trant, Meredith; Rodgers, Rachel; Laffel, Lori M B

    2014-09-01

    Adolescents and young adults use text messaging as their primary mode of communication, thus providing an opportunity to use this mode of communication for mobile health (mHealth) interventions. Youth with diabetes are an important group for these mHealth initiatives, as diabetes management requires an enormous amount of daily effort and this population has difficulty achieving optimal diabetes management. Goal setting and self-efficacy are 2 factors in the management of diabetes. We examined the feasibility of a healthy lifestyle text messaging program targeting self-efficacy and goal setting among adolescents and young adults with diabetes. Participants, ages 16-21, were assigned to either a text messaging group, which received daily motivational messages about nutrition and physical activity, or a control group, which received paper-based information about healthy lifestyle. Both groups set goals for nutrition and physical activity and completed a measure of self-efficacy. Participants' mean age was 18.7 ± 1.6 years old, with diabetes duration of 10.0 ± 4.6 years, and A1c of 8.7 ± 1.7%. The text messaging intervention was rated highly and proved to be acceptable to participants. Self-efficacy, glycemic control, and body mass index did not change over the course of the short, 1-month pilot study. Positive, daily, motivational text messages may be effective in increasing motivation for small goal changes in the areas of nutrition and physical activity. These interventions may be used in the future in youth with diabetes to improve diabetes care. Utilizing more targeted text messages is an area for future research. © 2014 Diabetes Technology Society.

  7. Stress Testing of Transactional Database Systems

    OpenAIRE

    Meira , Jorge Augusto; Cunha De Almeida , Eduardo; Sunyé , Gerson; Le Traon , Yves; Valduriez , Patrick

    2013-01-01

    International audience; Transactional database management systems (DBMS) have been successful at supporting traditional transaction processing workloads. However, web-based applications that tend to generate huge numbers of concurrent business operations are pushing DBMS performance over their limits, thus threatening overall system availability. Then, a crucial question is how to test DBMS performance under heavy workload conditions. Answering this question requires a testing methodology to ...

  8. Disclosure requirements for merger and acquisition transactions

    International Nuclear Information System (INIS)

    Holm, D.I.

    1998-01-01

    The legal disclosure requirements for merger and acquisition transactions involving Canadian public companies are described. The focus is on issues regarding merger and acquisition related disclosure, including the potential consequences of failing to provide proper information, Ontario Securities Commission Policy 9.1 considerations regarding valuation, review, and approval, cross border considerations and financing a merger and acquisition transaction. Legal and practical consequences for failing to provide proper disclosure, including the steps involved in establishing the due diligence defence, are also discussed

  9. Combating Corruption in International Business Transactions

    OpenAIRE

    Celentani, Marco; Ganuza, Juan-José; Peydró, José-Luis

    2004-01-01

    International business transactions pose the problem of deterring bribing of public officials by foreign firms. We first analyse a convention styled after the OECD's 'Convention on Combating Bribery of Foreign Public Officials in International Business Transactions', which requires signatory countries to proceed against firms that have bribed public officials of any foreign country. We then study the case in which the convention requires signatory countries to proceed against firms that have ...

  10. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  11. Instant collaboration: Using context-aware instant messaging for session management in distributed collaboration tools

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Damm, Christian Heide

    2002-01-01

    Distributed collaboration has become increasingly important, and instant messaging has become widely used for distributed communication. We present findings from an investigation of instant messaging use for work-related activities in a commercial setting. Based on these findings, we propose...... a lightweight session management design for distributed collaboration tools based on context-aware instant messaging. An implementation of this design is presented and an ongoing evaluation is discussed....

  12. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  13. Extracting messages masked by chaos

    International Nuclear Information System (INIS)

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  14. Sending the wrong message?

    International Nuclear Information System (INIS)

    2000-01-01

    The choice of climate policy instruments affects the price signals to invest in transmission capacity, and the question is whether the resulting price signals are socially optimal. A first-best policy consisting of an optimal carbon tax obviously yields the correct investment signals, but other climate policy choices may also succeed under certain assumptions. However, some sort of policy coordination between countries with a common power market is needed for the investment signals to be correct regardless of the historically given transmission capacity. The set of available generation technologies is also crucial. In the absence of coordinated climate policies, government intervention in transmission investment decisions seems unavoidable.(author)

  15. Approach to transaction management for Space Station Freedom

    Science.gov (United States)

    Easton, C. R.; Cressy, Phil; Ohnesorge, T. E.; Hector, Garland

    1990-01-01

    The Space Station Freedom Manned Base (SSFMB) will support the operation of the many payloads that may be located within the pressurized modules or on external attachment points. The transaction management (TM) approach presented provides a set of overlapping features that will assure the effective and safe operation of the SSFMB and provide a schedule that makes potentially hazardous operations safe, allocates resources within the capability of the resource providers, and maintains an environment conducive to the operations planned. This approach provides for targets of opportunity and schedule adjustments that give the operators the flexibility to conduct a vast majority of their operations with no conscious involvement with the TM function.

  16. Management Control of Market Transactions: The Relation Between Transaction Characteristics, Incomplete Contract Design and Subsequent Performance

    NARCIS (Netherlands)

    Anderson, S.W.; Dekker, H.C.

    2005-01-01

    Using an unusually comprehensive database on 858 transactions for information technology products and accompanying services, we study how close partners who are exposed to opportunistic hazards structure and control a significant transaction. We analyze data on the terms of contracting to determine

  17. Extending Software Transactional Memory in Clojure with Side-Effects and Transaction Control

    DEFF Research Database (Denmark)

    Jensen, Søren Kejser; Thomsen, Lone Leth

    2016-01-01

    In conjunction with the increase of multi-core processors the use of functional programming languages has increased in recent years. The functional language Clojure has concurrency as a core feature, and provides Software Transactional Memory (STM) as a substitute for locks. Transactions in Cloju...

  18. ACCOUNTING TREATMENTS SPECIFIC TO COUNTERPART COMMERCIAL TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    Lucia PALIU - POPA

    2010-12-01

    Full Text Available Given the lack of availability of funds in foreign currency, felt in many countries, especially in the developing and developed countries and the economic or financial crisis in the global foreign exchange, counterpart commercial transactions were imposed as a “disarming” condition of the international trade. In the counterpart a purchase transaction is combined with a sale transaction, an import with an export in order to ensure balanced trade between the partners, trade that involves eliminating or reducing the currency as a payment source and its replacement with trade of goods and services. Thus, in the context of an acute need to export of greatly industrialized countries, where the overproduction phenomenon tends to have a chronic character, the counterpart has become a highly complex and sustainable phenomenon, which has seen a steady increase in the volume of amounts, with a geographical area and large variety of forms and mechanisms of implementation. Based on the characteristics and structure of counterpart transactions, we shall describe in this paper the accounting models specific to international trade, as part of the combined foreign trade transactions without neglecting the tax treatments that influence the entry in the accounts

  19. Characteristics of electronic patient-provider messaging system utilisation in an urban health care organisation

    Directory of Open Access Journals (Sweden)

    Sean Patrick Mikles

    2014-12-01

    Full Text Available Introduction Research suggests that electronic messaging can improve patient engagement. Studies indicate that a ‘digital divide’ may exist, where certain patient populations may be using electronic messaging less frequently. This study aims to determine which patient characteristics are associated with different levels of usage of an electronic patient-provider messaging system in a diverse urban population.Methods Cross-sectional electronic health record data were extracted for patients 10 years of age or older who live in New York City and who visited a set of clinics between 1 July 2011 and 30 June 2012. Regression analyses determined which participant characteristics were associated with the sending of electronic messages.Results Older, female, English-speaking participants of white race who received more messages, had any diagnoses, more office visits and a provider who sent messages were more likely to send more messages. Non-Millennial, non-white participants who received fewer messages, had more office visits, any diagnoses, a provider who saw fewer patients with patient portal accounts, lived in a low socioeconomic status neighbourhood, and did not have private insurance were more likely to send zero messages.Conclusion This study found significant differences in electronic messaging usage based on demographic, socioeconomic and health-related patient characteristics. Future studies are needed to support these results and determine the causes of observed associations.

  20. Developing and Testing Rational Models of Message Design.

    Science.gov (United States)

    O'Keefe, Barbara J.

    1992-01-01

    Responds to an article in the same issue regarding research methods for conversational cognition. Argues for a noncognitive view of rational models in communication research. Sets out an analysis of the kinds of claims made by rational models of message design. Discusses the implications of this analysis for studies of the cognitive processes…

  1. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  2. Re: Design Changing the Message

    Science.gov (United States)

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  3. Instant Apache Camel message routing

    CERN Document Server

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  4. The Media and the Message.

    Science.gov (United States)

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  5. Spatial variation in messaging effects

    Science.gov (United States)

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  6. Getting the message across

    International Nuclear Information System (INIS)

    Simcock, A.

    1997-01-01

    This is an abridged version of an address by the chairman of the Oslo and Paris (Ospar) commission to the SPE/UKOOA/E and P Forum European Environmental Conference and Exhibition held in Aberdeen in April 1997. The Ospar Commission arose out of the Oslo and Paris Conventions on marine pollution in the 1970s. The petroleum industry is now effectively working under the revised and consolidated Oslo Convention of 1992. Three main elements which arise from the provisions of the Convention and set the framework within which the Commission works are discussed. The first of these is a general obligation to take all possible steps to prevent and eliminate pollution, to protect the marine ecosystem and to restore the main adversely affected areas when practicable. Secondly, there are two guiding principles to be observed, the ''polluter pays'' principle and the ''precautionary principle''. The third main element is that the Commission is to take measures which ensure the application of the best available technology and the best environmental practice. Current issues being addressed by the Commission within this framework include: the oil content of discharges from platforms; cuttings produced by drilling; discharge of chemicals offshore; disposal of offshore installations no longer in use. Finally, the problems associated with effective communication on these issues, particularly with regard to risk are considered. (UK)

  7. Automated Classification of Consumer Health Information Needs in Patient Portal Messages

    Science.gov (United States)

    Cronin, Robert M.; Fabbri, Daniel; Denny, Joshua C.; Jackson, Gretchen Purcell

    2015-01-01

    Patients have diverse health information needs, and secure messaging through patient portals is an emerging means by which such needs are expressed and met. As patient portal adoption increases, growing volumes of secure messages may burden healthcare providers. Automated classification could expedite portal message triage and answering. We created four automated classifiers based on word content and natural language processing techniques to identify health information needs in 1000 patient-generated portal messages. Logistic regression and random forest classifiers detected single information needs well, with area under the curves of 0.804–0.914. A logistic regression classifier accurately found the set of needs within a message, with a Jaccard index of 0.859 (95% Confidence Interval: (0.847, 0.871)). Automated classification of consumer health information needs expressed in patient portal messages is feasible and may allow direct linking to relevant resources or creation of institutional resources for commonly expressed needs. PMID:26958285

  8. Automated Classification of Consumer Health Information Needs in Patient Portal Messages.

    Science.gov (United States)

    Cronin, Robert M; Fabbri, Daniel; Denny, Joshua C; Jackson, Gretchen Purcell

    2015-01-01

    Patients have diverse health information needs, and secure messaging through patient portals is an emerging means by which such needs are expressed and met. As patient portal adoption increases, growing volumes of secure messages may burden healthcare providers. Automated classification could expedite portal message triage and answering. We created four automated classifiers based on word content and natural language processing techniques to identify health information needs in 1000 patient-generated portal messages. Logistic regression and random forest classifiers detected single information needs well, with area under the curves of 0.804-0.914. A logistic regression classifier accurately found the set of needs within a message, with a Jaccard index of 0.859 (95% Confidence Interval: (0.847, 0.871)). Automated classification of consumer health information needs expressed in patient portal messages is feasible and may allow direct linking to relevant resources or creation of institutional resources for commonly expressed needs.

  9. Youth audience segmentation strategies for smoking-prevention mass media campaigns based on message appeal.

    Science.gov (United States)

    Flynn, Brian S; Worden, John K; Bunn, Janice Yanushka; Dorwaldt, Anne L; Connolly, Scott W; Ashikaga, Takamaru

    2007-08-01

    Mass media interventions are among the strategies recommended for youth cigarette smoking prevention, but little is known about optimal methods for reaching diverse youth audiences. Grades 4 through 12 samples of youth from four states (n = 1,230) rated smoking-prevention messages in classroom settings. Similar proportions of African American, Hispanic, and White youth participated. Impact of audience characteristics on message appeal ratings was assessed to provide guidance for audience segmentation strategies. Age had a strong effect on individual message appeal. The effect of gender also was significant. Message ratings were similar among the younger racial/ethnic groups, but differences were found for older African American youth. Lower academic achievement was associated with lower appeal scores for some messages. Age should be a primary consideration in developing and delivering smoking-prevention messages to youth audiences. The unique needs of boys and girls and older African American adolescents should also be considered.

  10. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  11. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  12. Pricing European option with transaction costs under the fractional long memory stochastic volatility model

    Science.gov (United States)

    Wang, Xiao-Tian; Wu, Min; Zhou, Ze-Min; Jing, Wei-Shu

    2012-02-01

    This paper deals with the problem of discrete time option pricing using the fractional long memory stochastic volatility model with transaction costs. Through the 'anchoring and adjustment' argument in a discrete time setting, a European call option pricing formula is obtained.

  13. Transactional Distance among Open University Students: How Does it Affect the Learning Process?

    Science.gov (United States)

    Kassandrinou, Amanda; Angelaki, Christina; Mavroidis, Ilias

    2014-01-01

    This study examines the presence of transactional distance among students, the factors affecting it, as well as the way it influences the learning process of students in a blended distance learning setting in Greece. The present study involved 12 postgraduate students of the Hellenic Open University (HOU). A qualitative research was conducted,…

  14. Optimizing Concurrent M3-Transactions: A Fuzzy Constraint Satisfaction Approach

    Directory of Open Access Journals (Sweden)

    Peng LI

    2004-10-01

    Full Text Available Due to the high connectivity and great convenience, many E-commerce application systems have a high transaction volume. Consequently, the system state changes rapidly and it is likely that customers issue transactions based on out-of-date state information. Thus, the potential of transaction abortion increases greatly. To address this problem, we proposed an M3-transaction model. An M3-transaction is a generalized transaction where users can issue their preferences in a request by specifying multiple criteria and optional data resources simultaneously within one transaction. In this paper, we introduce the transaction grouping and group evaluation techniques. We consider evaluating a group of M3-transactions arrived to the system within a short duration together. The system makes optimal decisions in allocating data to transactions to achieve better customer satisfaction and lower transaction failure rate. We apply the fuzzy constraint satisfaction approach for decision-making. We also conduct experimental studies to evaluate the performance of our approach. The results show that the M3-transaction with group evaluation is more resilient to failure and yields much better performance than the traditional transaction model.

  15. Short message service or disService: issues with text messaging in a complex medical environment.

    Science.gov (United States)

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. Social capital and transaction costs in millet markets.

    Science.gov (United States)

    Jacques, Damien Christophe; Marinho, Eduardo; d'Andrimont, Raphaël; Waldner, François; Radoux, Julien; Gaspart, Frédéric; Defourny, Pierre

    2018-01-01

    In sub-Saharan Africa, transaction costs are believed to be the most significant barrier that prevents smallholders and farmers from gaining access to markets and productive assets. In this study, we explore the impact of social capital on millet prices for three contrasted years in Senegal. Social capital is approximated using a unique data set on mobile phone communications between 9 million people allowing to simulate the business network between economic agents. Our approach is a spatial equilibrium model that integrates a diversified set of data. Local supply and demand were respectively derived from remotely sensed imagery and population density maps. The road network was used to establish market catchment areas, and transportation costs were derived from distances between markets. Results demonstrate that accounting for the social capital in the transaction costs explained 1-9% of the price variance depending on the year. The year-specific effect remains challenging to assess but could be related to a strengthening of risk aversion following a poor harvest.

  17. Social capital and transaction costs in millet markets

    Directory of Open Access Journals (Sweden)

    Damien Christophe Jacques

    2018-01-01

    Full Text Available In sub-Saharan Africa, transaction costs are believed to be the most significant barrier that prevents smallholders and farmers from gaining access to markets and productive assets. In this study, we explore the impact of social capital on millet prices for three contrasted years in Senegal. Social capital is approximated using a unique data set on mobile phone communications between 9 million people allowing to simulate the business network between economic agents. Our approach is a spatial equilibrium model that integrates a diversified set of data. Local supply and demand were respectively derived from remotely sensed imagery and population density maps. The road network was used to establish market catchment areas, and transportation costs were derived from distances between markets. Results demonstrate that accounting for the social capital in the transaction costs explained 1–9% of the price variance depending on the year. The year-specific effect remains challenging to assess but could be related to a strengthening of risk aversion following a poor harvest.

  18. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  19. Challenges facing transactional e-government systems

    OpenAIRE

    AI-Sebie, Madi M

    2005-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 17/10/2005. A review of normative literature, in the field of e-government, indicates that the transactional stage of e-government is one of the most important to the implementation of an e-government system as it represents the highest level of interaction within organisations and between customers and government organisations. Due to the importance of the transactional stage of the e-govern...

  20. Plural Governance: A Modified Transaction Cost Model

    DEFF Research Database (Denmark)

    Mols, Niels Peter; Menard, Claude

    2014-01-01

    Plural governance is a form of governance where a firm both makes and buys similar goods or services. Despite a widespread use of plural governance there are no transaction cost models of how plural governance affects performance. This paper reviews the literature about plural forms and proposes...... a model relating transaction cost and resource-based variables to the cost of the plural form. The model is then used to analyze when the plural form is efficient compared to alternative governance structures. We also use the model to discuss the strength of three plural form synergies....

  1. Improving Type Error Messages in OCaml

    OpenAIRE

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  2. HIV Prevention Messages Targeting Young Latino Immigrant MSM

    Directory of Open Access Journals (Sweden)

    Rosa Solorio

    2014-01-01

    Full Text Available Young Latino immigrant men who have sex with men (MSM are at risk for HIV and for delayed diagnosis. A need exists to raise awareness about HIV prevention in this population, including the benefits of timely HIV testing. This project was developed through collaboration between University of WA researchers and Entre Hermanos, a community-based organization serving Latinos. Building from a community-based participatory research approach, the researchers developed a campaign that was executed by Activate Brands, based in Denver, Colorado. The authors (a describe the development of HIV prevention messages through the integration of previously collected formative data; (b describe the process of translating these messages into PSAs, including the application of a marketing strategy; (c describe testing the PSAs within the Latino MSM community; and (c determine a set of important factors to consider when developing HIV prevention messages for young Latino MSM who do not identify as gay.

  3. Human factors assessment of SC-214 message set

    Science.gov (United States)

    2010-08-18

    This is a presentation that was given at the Communication Navigation and Surveillance (CNS) Task Force Meeting. It discusses a review of current literature, analysis of Pilot Deviations and ASRS reports involving data link communications, and discus...

  4. 2008 Annual Report of SGCC on Electricity Market Transactions

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    On April 14,2009,the State Grid Corporation of China (SGCC) held the press conference in Beijing on electricity market transactions and then released the "2008 Annual Report of SGCC on Electricity Market Transactions".

  5. 78 FR 52166 - Quantitative Messaging Research

    Science.gov (United States)

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  6. Effects of Text Messaging on Academic Performance

    OpenAIRE

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  7. Message exchange in the building industry

    NARCIS (Netherlands)

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  8. Framing of health information messages.

    Science.gov (United States)

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  9. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  10. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  11. Instant Messaging in Dental Education.

    Science.gov (United States)

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  12. A Modular Instant Messaging System

    OpenAIRE

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  13. Electronic Business Transaction Infrastructure Analysis Using Petri Nets and Simulation

    Science.gov (United States)

    Feller, Andrew Lee

    2010-01-01

    Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…

  14. Transaction Costs for Design-Build-Finance-Maintain Contracts

    NARCIS (Netherlands)

    Favie, R.; Beelen, W.A.; Maas, G.J.; Ceric, A.; Radujkovic, M.

    2009-01-01

    This paper gives insight in how transaction costs arise and how in theory transaction costs can be reduced. A comparison between theory and practice has been made. A study of a case in the Netherlands, the Second Coentunnel showed how transaction costs in practice appear, in which stage of the

  15. Aid Effectiveness, Transaction Costs and Conditionality in the Education Sector

    Science.gov (United States)

    Ashford, Richard; Biswas, Shampa

    2010-01-01

    The reduction of transaction costs is a commonly mentioned yet rarely elaborated goal for aid effectiveness in educational development. The casual use of the concept of transaction costs conceals which costs may be reduced, which costs are required and, indeed, what transaction costs actually are. Examining issues related to harmonizing the…

  16. A selective logging mechanism for hardware transactional memory systems

    OpenAIRE

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María

    2011-01-01

    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  17. 45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...

  18. Real estate transaction radon test tampering

    International Nuclear Information System (INIS)

    Ritter, D.L.

    1990-01-01

    A thousand-house study, over the past two years showed 35% of the houses were tampered with. This paper offers statistical charts representing the different methods of tampering; A slide presentation showing houses and the non-tamper controls used to monitor EPA closed-house conditions, movement of detectors and covering of detectors. A strong message must be conveyed now, that tampering will not be tolerated by radon technicians, when performing radon tests in the field. A message that incorporates non-tamper controls that are cost effective and provide for reasonably priced testing; A message that will lend credibility to our Radon industry by means of separating the professional test from a do-it-yourself homeowner test. This paper will address that message and offer a program for the prevention of tampering in a house during a PROFESSIONALLY done Radon test

  19. 31 CFR 337.7 - Servicing transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Servicing transactions. 337.7 Section 337.7 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE...-entry debenture system, to be announced in advance by separate public notice, any transfer or...

  20. Towards Online and Transactional Relational Schema Transformations

    NARCIS (Netherlands)

    Wevers, L.; Hofstra, Matthijs; Tammens, Menno; Huisman, Marieke; van Keulen, Maurice

    2014-01-01

    In this paper, we want to draw the attention of the database community to the problem of online schema changes: changing the schema of a database without blocking concurrent transactions. We have identified important classes of relational schema transformations that we want to perform online, and we

  1. Culture and subculture in transactional letter writing

    DEFF Research Database (Denmark)

    Shaw, Philip; Okamura, Akiko

    2000-01-01

    This study examines the relative contributions of subculture membership and mother-tongue status/target culture membership in writing transactional letters. We examined the letters accompanying articles initially submitted for publication by 26 NSE and 23 NNSE academics, and compared them with ef...

  2. Accounting for Exchange Transactions: An Alternative Perspective

    Science.gov (United States)

    Holland, Rodger G.; Kaminski, Kathleen A.

    2007-01-01

    In general, the two basic methods for recording exchange transactions are to record them at gross, and then account for the discounts that are taken, or record them at net, and adjust for discounts that are not taken (are lost). Most principles texts cover only the gross method, and some do not even deal with the discount issue at all. Others may…

  3. Scheduling support for transactional memory contention management

    DEFF Research Database (Denmark)

    Maldonado, Walther; Marler, Patrick; Felber, Pascal

    2010-01-01

    Transactional Memory (TM) is considered as one of the most promising paradigms for developing concurrent applications. TM has been shown to scale well on >multiple cores when the data access pattern behaves "well," i.e., when few conflicts are induced. In contrast, data patterns with frequent wri...

  4. Related party transactions and firms financial performance ...

    African Journals Online (AJOL)

    Related party transactions and firms financial performance. ... African Research Review ... financial performance using Secondary data obtained from Nigeria stock ... on Asset, Return on Equity and Earnings per share of manufacturing firms. ... Result showed RPT has no significant effects on ROA and EPS and not used to ...

  5. 31 CFR 595.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS Prohibitions § 595.206 Exempt transactions. (a) Personal communications. The prohibitions contained in this part do not apply to any postal, telegraphic, telephonic, or other personal communication, which does not involve the...

  6. 21 CFR 1310.08 - Excluded transactions.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Excluded transactions. 1310.08 Section 1310.08 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE RECORDS AND REPORTS OF LISTED...) Colombia (6) Ecuador (7) French Guiana (8) Guyana (9) Panama (10) Paraguay (11) Peru (12) Suriname (13...

  7. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...

  8. Private benefits in corporate control transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in corporate control transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer is a more efficient monitor...

  9. Private Benefits in Corporate Control Transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    2011-01-01

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in block transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer has high security benefits, or because the b...

  10. 31 CFR 800.303 - Lending transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Lending transactions. 800.303 Section 800.303 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... the creation in the foreign person of a secured interest in securities or other assets of the U.S...

  11. 31 CFR 588.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 588.206 Section 588.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  12. 31 CFR 560.210 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 560.210 Section 560.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... services to market, produce or co-produce, create or assist in the creation of information and...

  13. 31 CFR 545.208 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 545.208 Section 545.208 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  14. 31 CFR 542.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 542.206 Section 542.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  15. 31 CFR 587.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 587.206 Section 587.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF...-produce, create, or assist in the creation of information or informational materials; and, with respect to...

  16. 31 CFR 539.204 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 539.204 Section 539.204 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... of services to market, produce or co-produce, create, or assist in the creation of information or...

  17. 31 CFR 586.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 586.206 Section 586.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... or assist in the creation of information and informational materials, and payment of royalties to...

  18. 31 CFR 536.205 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 536.205 Section 536.205 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... creation of information and informational materials, and payment of royalties to a specially designated...

  19. 31 CFR 537.210 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 537.210 Section 537.210 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  20. 31 CFR 538.212 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 538.212 Section 538.212 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... services to market, produce or co-produce, create or assist in the creation of information and...

  1. 31 CFR 548.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 548.206 Section 548.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  2. 31 CFR 544.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 544.206 Section 544.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF...-produce, create, or assist in the creation of information or informational materials; and, with respect to...

  3. 31 CFR 541.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Exempt transactions. 541.206 Section 541.206 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF... assist in the creation of information or informational materials; and, with respect to information or...

  4. 76 FR 41676 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-07-15

    ... with persons who are not ``eligible contract participants'' (commonly referred to as ``retail forex... temporary Rule 15b12-1T to allow a registered broker-dealer to engage in a retail forex business until July... forex transactions. DATES: Effective Date: Rule 15b12-1T is effective on July 15, 2011 and will remain...

  5. 77 FR 62177 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2012-10-12

    ... \\5\\ (a retail foreign exchange (forex) rule). Transactions described in section 2(c)(2)(B)(i)(I...'s retail forex rule must treat similarly all such futures and options and all agreements, contracts... forex rules must prescribe appropriate requirements with respect to disclosure, recordkeeping, capital...

  6. 78 FR 42439 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2013-07-16

    ... a retail forex business, provided that the broker-dealer complies with the Securities Exchange Act...) of which the broker-dealer is a member insofar as they are applicable to retail forex transactions... Exchange Act, to permit a registered broker or dealer (``broker-dealer'') to engage in retail forex...

  7. 76 FR 56094 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-09-12

    ... currency with retail customers, subject to the requirements enumerated in the OCC's retail forex rule. The... shall prescribe \\5\\ (a retail forex rule). A transaction described in section 2(c)(2)(B)(i)(I) includes... associations are depository institutions. See 12 U.S.C. 1813(c)(1). \\3\\ For purposes of the retail forex rules...

  8. 19 CFR 152.103 - Transaction value.

    Science.gov (United States)

    2010-04-01

    ... merchandise in the United States will not be added to the price actually paid or payable. The right to... value. (a) Price actually paid or payable—(1) General. In determining transaction value, the price..., such as the price in effect on the date of export in the London Commodity Market. The word “payable...

  9. Transformational and transactional leadership styles among leaders ...

    African Journals Online (AJOL)

    In contrast to transformational leadership where the leader works with employees to identify the needed change, creating a vision to guide the change through inspiration, and executing the change in tandem with committed members of the group, transactional leadership styles focus on the use of rewards and punishments ...

  10. 31 CFR 800.207 - Covered transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Covered transaction. 800.207 Section 800.207 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF..., which could result in control of a U.S. business by a foreign person. ...

  11. Transactions of the Zimbabwe Scientific Association

    African Journals Online (AJOL)

    The Zimbabwe Scientific Association was founded in Bulawayo in 1899 (called the Rhodesia Scientific Assocation at the time) to promote the study and advancement of science in Zimbabwe and to facilitate the acquisition and dissemination of scientific knowledge. Its journal, Transactions of the Zimbabwe Scientific ...

  12. Gestion des transactions en environnement mobile | Nouali ...

    African Journals Online (AJOL)

    Management of Transactions In Mobile Computing Environment Increasingly diverse applications have made computers an ubiquitous part of our daily lives. As their range of applications widens, demand is growing for computers that can perform outside the home or office. Accordingly, mobile computing is attracting ...

  13. Governance structures for real estate transactions: Markets ...

    African Journals Online (AJOL)

    networks in the governance of real-estate transactions under three property rights regimes in .... empirical results of case study research exploring the relationship between .... collaboration (Entwistle, Bristow, Hines, Donaldson & Martin, 2007: 63-79). .... self-help group development (City of Windhoek, 2005). Of these,.

  14. 31 CFR 515.309 - Transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions. 515.309 Section 515.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... national thereof, has any interest of any nature whatsoever, direct or indirect, includes, but not by way...

  15. 31 CFR 500.309 - Transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions. 500.309 Section 500.309 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN..., but not by way of limitation: (a) Any payment or transfer to any such designated foreign country or...

  16. 16 CFR 802.30 - Intraperson transactions.

    Science.gov (United States)

    2010-01-01

    ... partnership, however, the manufacturing plant it is contributing to the formation is exempt under § 802.30(c... transactions. (a) An acquisition (other than the formation of a corporation or unincorporated entity under... the profits of partnership X. A also holds 100% of the voting securities of corporation Y. A pays B in...

  17. Foreign experience of regulating international trade transactions

    Directory of Open Access Journals (Sweden)

    Klymenko L. V.

    2015-05-01

    Full Text Available The article deals with the international experience of state regulating international trade transactions; nature, directions and contradictions of contemporary processes of globalization are defined; components of regulatory and incentive means in system of state supporting foreign trade activity of commodity producers are considered; general provisions for the improvement of state regulation mechanisms of export-import activities in Ukraine are determined.

  18. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  19. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  20. Entity-based Classification of Twitter Messages

    OpenAIRE

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  1. The role of short messaging service in supporting the delivery of healthcare: An umbrella systematic review.

    Science.gov (United States)

    Househ, Mowafa

    2016-06-01

    Short messaging service (SMS) messages may present a convenient and cost-effective method to support healthcare interventions. This work assesses the effects of short messaging service on various healthcare interventions found in systematic reviews. The search strategy was based on two key concepts: short messaging service and healthcare delivery. The initial search was conducted in December 2012 and was updated in June 2013. Of the 550 identified references, 13 systematic reviews met the inclusion criteria, of which 8 were published in peer-reviewed journals and 5 were retrieved from the Cochrane library. Data analysis shows that low to moderate research evidence exists on the benefits of short messaging service interventions for appointment reminders, promoting health in developing countries and preventive healthcare. In many interventions, however, there were a few studies that were of high quality, and most of the studies were rated from low to moderate quality or had no rating at all. Healthcare organizations, policy makers, or clinicians using short messaging service messages to support healthcare interventions should (1) implement interventions that have been found to work in healthcare settings, (2) continue evaluating short messaging service interventions that have not been adequately assessed, and (3) improve collaboration between various healthcare entities to develop studies targeted at specific populations to evaluate the long-term impact of short messaging service on healthcare outcomes. © The Author(s) 2014.

  2. Asynchronous Message Service Reference Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  3. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    Science.gov (United States)

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  4. Transactive Campus Energy Systems: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Haack, Jereme N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hao, He [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kim, Woohyun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, Donna J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Allwardt, Craig H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carpenter, Brandon J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Sen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Guopeng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lutes, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ngo, Hung [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Underhill, Ronald M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-09-26

    Transactive energy refers to the combination of economic and control techniques to improve grid reliability and efficiency. The fundamental purpose of transactive energy management is to seamlessly coordinate the operation of large numbers of new intelligent assets—such as distributed solar, energy storage and responsive building loads—to provide the flexibility needed to operate the power grid reliably and at minimum cost, particularly one filled with intermittent renewable generation such as the Pacific Northwest. It addresses the key challenge of providing smooth, stable, and predictable “control” of these assets, despite the fact that most are neither owned nor directly controlled by the power grid. The Clean Energy and Transactive Campus (CETC) work described in this report was done as part of a Cooperative Research and Development Agreement (CRADA) between the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) and the Washington State Department of Commerce (Commerce) through the Clean Energy Fund (CEF). The project team consisted of PNNL, the University of Washington (UW) and Washington State University (WSU), to connect the PNNL, UW, and WSU campuses to form a multi-campus testbed for transaction-based energy management—transactive—solutions. Building on the foundational transactive system established by the Pacific Northwest Smart Grid Demonstration (PNWSGD), the purpose of the project was to construct the testbed as both a regional flexibility resource and as a platform for research and development (R&D) on buildings/grid integration and information-based energy efficiency. This report provides a summary of the various tasks performed under the CRADA.

  5. Guidelines for designing messages in risk communication

    International Nuclear Information System (INIS)

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  6. Intrusion Detection and Marking Transactions in a Cloud of Databases Environment

    OpenAIRE

    Syrine Chatti; Habib Ounelli

    2016-01-01

    The cloud computing is a paradigm for large scale distributed computing that includes several existing technologies. A database management is a collection of programs that enables you to store, modify and extract information from a database. Now, the database has moved to cloud computing, but it introduces at the same time a set of threats that target a cloud of database system. The unification of transaction based application in these environments present also a set of vulnerabilities and th...

  7. Automated Text Messaging as an Adjunct to Cognitive Behavioral Therapy for Depression: A Clinical Trial

    OpenAIRE

    Aguilera, Adrian; Bruehlman-Senecal, Emma; Demasi, Orianna; Avila, Patricia

    2017-01-01

    Background: Cognitive Behavioral Therapy (CBT) for depression is efficacious, but effectiveness is limited when implemented in low-income settings due to engagement difficulties including nonadherence with skill-building homework and early discontinuation of treatment. Automated messaging can be used in clinical settings to increase dosage of depression treatment and encourage sustained engagement with psychotherapy. Objectives: The aim of this study was to test whether a text messag...

  8. Optimal Investment Under Transaction Costs: A Threshold Rebalanced Portfolio Approach

    Science.gov (United States)

    Tunc, Sait; Donmez, Mehmet Ali; Kozat, Suleyman Serdar

    2013-06-01

    We study optimal investment in a financial market having a finite number of assets from a signal processing perspective. We investigate how an investor should distribute capital over these assets and when he should reallocate the distribution of the funds over these assets to maximize the cumulative wealth over any investment period. In particular, we introduce a portfolio selection algorithm that maximizes the expected cumulative wealth in i.i.d. two-asset discrete-time markets where the market levies proportional transaction costs in buying and selling stocks. We achieve this using "threshold rebalanced portfolios", where trading occurs only if the portfolio breaches certain thresholds. Under the assumption that the relative price sequences have log-normal distribution from the Black-Scholes model, we evaluate the expected wealth under proportional transaction costs and find the threshold rebalanced portfolio that achieves the maximal expected cumulative wealth over any investment period. Our derivations can be readily extended to markets having more than two stocks, where these extensions are pointed out in the paper. As predicted from our derivations, we significantly improve the achieved wealth over portfolio selection algorithms from the literature on historical data sets.

  9. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  10. Transaction-Based Building Controls Framework, Volume 1: Reference Guide

    Energy Technology Data Exchange (ETDEWEB)

    Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Foster, Nikolas AF [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steckley, Andrew C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Zachary T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-12-01

    This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

  11. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    NARCIS (Netherlands)

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  12. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  13. Constructing activity–mobility trajectories of college students based on smart card transaction data

    Directory of Open Access Journals (Sweden)

    Negin Ebadi

    2017-12-01

    Full Text Available In this research, we use UB card as a convenient source of combined smart transaction data in order to define a campus-wide model for constructing students’ activity–mobility trajectories in time–space dimension. UB Card is a student’s official ID at the University at Buffalo and is used across campus for various activities including Stampedes and Shuttles (on-campus bus system, facilities access, library services, dining, shopping, and etc. Two activity–mobility trajectory construction algorithms are developed. The base algorithm constructs students’ activity–mobility patterns in space–time dimension using a set of smart card transaction data points as the only inputs. The modified individualized algorithm constructs activity–mobility patterns with prior knowledge of students’ previous patterns as they have similar patterns for certain days of the week. A database of 37 students’ travel survey and UB card transactions that contains a period of 5 days have been used to illustrate the results of the study. Three measures of errors have been proposed to capture the time allocation, location deviation, and activity sequences. These errors present an acceptable accuracy (12–25% error ranges for activity types and average 0.04–0.16 miles of error for location predictions and show the potential of inferring activity–mobility behaviors based on smart card transaction type data sets.

  14. Influencing Health Behaviors via Short Message Service (SMS): Evidence for Best Practices From Dar Es Salaam, Tanzania and Xi’an China

    OpenAIRE

    Heitner, Jesse

    2016-01-01

    Text messaging, also known as short message services (SMS), is a burgeoning innovation area showing promise in eliciting health behavior changes. This dissertation details two intervention trials that each comparatively tests the efficacy of different text message sets intended to improve behaviors. In light of pervasive road traffic injuries amongst young men in Tanzania, the first intervention tested messaging strategies aimed at increasing helmet wearing amongst commercial motorcycle t...

  15. Effects of Text Messaging on Academic Performance

    Directory of Open Access Journals (Sweden)

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  16. Terms of transactions monitoring on the French wholesale electricity and gas markets. Public consultation. Synthesis of contributions

    International Nuclear Information System (INIS)

    2008-01-01

    In its communication dated 16 April 2008, CRE published its practical methods used to monitor transactions concluded on the French electricity and gas markets. CRE invited any companies to comment on the practical arrangements of such monitoring activities. The monitoring system described by CRE is divided into two steps. In the first step, CRE wants to be able to request any information concerning transactions for physical delivery concluded after 1 January 2007. CRE will make an initial request that will focus on: - for electricity: transactions concluded in 2007 on yearly products for delivery in 2008 and 2009, base-load and peak-load; - for gas: transactions concluded in 2007 on seasonal and yearly products for delivery in 2008 and 2009, base-load and peak-load. The second step, based on feedback received, will see CRE liaise with market players and consider the possibility of setting up systematic procedures to gather transactions data. A final decision will be made by the end of 2008. 17 contributors responded to the public consultation. The remarks made on the practical methods used to gather data can be summarized along the following themes: Preamble: the monitoring principle; Theme 1: scope of transactions monitoring; Theme 2: content and format of requested data; Theme 3: procedures, transmission deadlines and confidentiality issues; Theme 4: stage II of systematic data gathering

  17. Validation of King's transaction process for healthcare provider-patient communication in pharmaceutical context: One cross-sectional study.

    Science.gov (United States)

    Wang, Dan; Liu, Chenxi; Zhang, Zinan; Ye, Liping; Zhang, Xinping

    2018-03-27

    With the impressive advantages of patient-pharmacist communication being advocated and poor pharmacist-patient communication in different settings, it is of great significance and urgency to explore the mechanism of the pharmacist-patient communicative relationship. The King's theory of goal attainment is proposed as one of the most promising models to be applied, because it takes into consideration both improving the patient-pharmacist relationship and attaining patients' health outcomes. This study aimed to validate the King's transaction process and build the linkage between the transaction process and patient satisfaction in a pharmaceutical context. A cross-sectional study was conducted in four tertiary hospitals in two provincial cities (Wuhan and Shanghai) in central and east China in July 2017. Patients over 18 were investigated in the pharmacies of the hospitals. The instrument for the transaction process was revised and tested. Path analysis was conducted for the King's transaction process and its relationship with patient satisfaction. Five hundred eighty-nine participants were investigated for main study. Prior to the addition of covariates, the hypothesised model of the King's transaction process was validated, in which all paths of the transaction process were statistically significant (p process had direct effects on patient satisfaction (p process was established as one valid theoretical framework of healthcare provider-patient communication in a pharmaceutical context. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Transactional distance in a blended learning environment

    Directory of Open Access Journals (Sweden)

    Jon Dron

    2004-12-01

    Full Text Available This paper presents a case study that describes and discusses the problems encountered during the design and implementation of a blended learning course, largely taught online through a web-based learning environment. Based on Moore's theory of transactional distance, the course was explicitly designed to have dialogue at its heart. However, the reality of systemic behaviours caused by delivering such a course within a group of conventional further and higher educational institutions has led to an entirely unanticipated reversion to structure, with unpleasant consequences for both quality and quantity of dialogue. The paper looks at some of the reasons for this drift, and suggests that some of the disappointing results (in particular in terms of the quality of the students' experience and associated poor retention can be attributed to the lack of dialogue, and consequent increase in transactional distance. It concludes with a description and evaluation of steps currently being taken to correct this behaviour.

  19. Accounting mortgage transactions: directions of improvement

    Directory of Open Access Journals (Sweden)

    I.M. Vygivska

    2016-12-01

    Full Text Available Fragmentation methods of accounting of contractual obligations secured by mortgage, discussion questions evaluating the object of mortgage at the stage of conclusion of loan agreements (credit and the probability of default and foreclosure with the mortgagor necessitated a comprehensive research and development of methodical maintenance of accounting mortgage transactions in subjects of its implementation (the mortgagor and mortgagee, including the improvement of the order of accounting reflection operations with a mortgage of property rights, hypothec, «solid mortgage», mortgage securities, the mortgage of goods in circulation or processing. The article also provides the procedure of evaluating the object of mortgage at default of the mortgagor conditions of the contract taking into account its depreciation (physical and moral deterioration during the loan repayment period; the author specifies the procedure for recording of transactions related to the sale of such objects as the basis for providing contractual management process obligations of the debtor with relevant information.

  20. Innovative approaches to structuring the transaction agreement

    International Nuclear Information System (INIS)

    Droppo, D.L.

    1999-01-01

    Several issues regarding the negotiation and structuring of oil and gas property transactions are reviewed. They include: (1) areas of mutual exclusion covenants, (2) use of the short-form term sheet or letter agreement or the longer, more comprehensive formal offer or letter agreement, (3) coping with standard form purchase and sale agreements and property bid packages, (4) allocations of purchase price and their effect on ROFRs, (5) interim operations covenants, including maintaining insurance, contractual relationships and operational integrity, (6) structuring the transaction to facilitate unique financing requirements, (7) making effective use of adjustment clauses, (8) dealing with the cyclicity of commodity prices in the purchase and sale agreement, and (9) using escrow and trust arrangements to meet closure deadlines

  1. Personality-Relationship transaction in young adulthood.

    Science.gov (United States)

    Neyer, F J; Asendorpf, J B

    2001-12-01

    Personality and social relationships were assessed twice across a 4-year period in a general population sample of 489 German young adults. Two kinds of personality-relationship transaction were observed. First, mean-level change in personality toward maturity (e.g., increase in Conscientiousness and decrease in Neuroticism) was moderated by the transition to partnership but was independent of other developmental transitions. Second, individual differences in personality traits predicted social relationships much better than vice versa. Specifically, once initial correlations were controlled for, Extraversion, Shyness, Neuroticism, self-esteem, and Agreeableness predicted change in various qualities of relationships (especially with friends and colleagues), whereas only quality of relationships with preschool children predicted later Extraversion and Neuroticism. Consequences for the transactional view of personality in young adulthood are discussed.

  2. Efficient Mobile Client Caching Supporting Transaction Semantics

    Directory of Open Access Journals (Sweden)

    IlYoung Chung

    2000-05-01

    Full Text Available In mobile client-server database systems, caching of frequently accessed data is an important technique that will reduce the contention on the narrow bandwidth wireless channel. As the server in mobile environments may not have any information about the state of its clients' cache(stateless server, using broadcasting approach to transmit the updated data lists to numerous concurrent mobile clients is an attractive approach. In this paper, a caching policy is proposed to maintain cache consistency for mobile computers. The proposed protocol adopts asynchronous(non-periodic broadcasting as the cache invalidation scheme, and supports transaction semantics in mobile environments. With the asynchronous broadcasting approach, the proposed protocol can improve the throughput by reducing the abortion of transactions with low communication costs. We study the performance of the protocol by means of simulation experiments.

  3. Development of Souvenir Production Transaction Processing System

    Science.gov (United States)

    Rumambi, H.; Kaparang, R.; Lintong, J.

    2018-01-01

    This research aims to design a souvenir production transaction processing system for the craftsmen in North Sulawesi. The craftsmen make very simple recordings about souvenir production transactions and use documents that are not in accordance with the generally accepted accounting practices. This research uses qualitative method. The data is collected through interviews, observations, documents and literatures studies. The research stages are conducted in preliminary studies, data collection, data analyzed and system design. The design of system is built from chart of account, accounting cycle and documents as input and get processed in accounting recording. The outputs are financial statements. The system design provides benefits for the craftsmen in assessing the financial performance and getting financing from bank.

  4. The quantum handshake entanglement, nonlocality and transactions

    CERN Document Server

    Cramer, John G

    2016-01-01

    This book shines bright light into the dim recesses of quantum theory, where the mysteries of entanglement, nonlocality, and wave collapse have motivated some to conjure up multiple universes, and others to adopt a "shut up and calculate" mentality. After an extensive and accessible introduction to quantum mechanics and its history, the author turns attention to his transactional model. Using a quantum handshake between normal and time-reversed waves, this model provides a clear visual picture explaining the baffling experimental results that flow daily from the quantum physics laboratories of the world. To demonstrate its powerful simplicity, the transactional model is applied to a collection of counter-intuitive experiments and conceptual problems.

  5. Transactive Control of Commercial Building HVAC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Sen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Guopeng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ngo, Hung [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-12-30

    This document details the development and testing of market-based transactive controls for building heating, ventilating and air conditioning (HVAC) systems. These controls are intended to serve the purposes of reducing electricity use through conservation, reducing peak building electric demand, and providing demand flexibility to assist with power system operations. This report is the summary of the first year of work conducted under Phase 1 of the Clean Energy and Transactive Campus Project. The methods and techniques described here were first investigated in simulation, and then subsequently deployed to a physical testbed on the Pacific Northwest National Laboratory (PNNL) campus for validation. In this report, we describe the models and control algorithms we have developed, testing of the control algorithms in simulation, and deployment to a physical testbed. Results from physical experiments support previous simulation findings, and provide insights for further improvement.

  6. Text Messaging Interventions on Cancer Screening Rates: A Systematic Review.

    Science.gov (United States)

    Uy, Catherine; Lopez, Jennifer; Trinh-Shevrin, Chau; Kwon, Simona C; Sherman, Scott E; Liang, Peter S

    2017-08-24

    Despite high-quality evidence demonstrating that screening reduces mortality from breast, cervical, colorectal, and lung cancers, a substantial portion of the population remains inadequately screened. There is a critical need to identify interventions that increase the uptake and adoption of evidence-based screening guidelines for preventable cancers at the community practice level. Text messaging (short message service, SMS) has been effective in promoting behavioral change in various clinical settings, but the overall impact and reach of text messaging interventions on cancer screening are unknown. The objective of this systematic review was to assess the effect of text messaging interventions on screening for breast, cervical, colorectal, and lung cancers. We searched multiple databases for studies published between the years 2000 and 2017, including PubMed, EMBASE, and the Cochrane Library, to identify controlled trials that measured the effect of text messaging on screening for breast, cervical, colorectal, or lung cancers. Study quality was evaluated using the Cochrane risk of bias tool. Our search yielded 2238 citations, of which 31 underwent full review and 9 met inclusion criteria. Five studies examined screening for breast cancer, one for cervical cancer, and three for colorectal cancer. No studies were found for lung cancer screening. Absolute screening rates for individuals who received text message interventions were 0.6% to 15.0% higher than for controls. Unadjusted relative screening rates for text message recipients were 4% to 63% higher compared with controls. Text messaging interventions appear to moderately increase screening rates for breast and cervical cancer and may have a small effect on colorectal cancer screening. Benefit was observed in various countries, including resource-poor and non-English-speaking populations. Given the paucity of data, additional research is needed to better quantify the effectiveness of this promising intervention

  7. Maintaining relevance: an evaluation of health message sponsorship at Australian community sport and arts events.

    Science.gov (United States)

    Rosenberg, Michael; Ferguson, Renee

    2014-12-04

    Health message sponsorship at community sport and arts events is an established component of a health promotion settings approach. Recent increases in commercial sponsorship of sport and community events has swelled competition for consumer attention and potentially reduced the impact of health message sponsorship. The purpose of this study was to evaluate awareness, understandings and behavioural intentions of health messages promoted at sponsored community sport and arts events. Interview and self-administered surveys were completed by 2259 adults attending one of 29 sport and arts events held in Western Australia between 2008 and 2013. The surveys measured participant awareness of the health message promoted at the event, as well as comprehension, acceptance and behavioural intention as a result of exposure to health messages. Awareness of the sponsored health message was 58% across all sponsored events, with high levels of comprehension (74%) and acceptance (92%) among those aware of the health message. Forming behavioural intentions was significantly related to the type of sponsored message promoted at the event, being female and over 40 years of age. Messages about sun protection and promoting mental health were the most likely to result in behavioural intention. Health message sponsorship, at least within a comprehensive sponsorship program, appears to remain an effective health promotion strategy for generating awareness and behavioural intention among people attending sport and arts events. Remaining relevant within a modern sponsorship environment appears closely aligned to selecting health messages that promote behavioural action relevant to the sponsored event that are also supported by broader health promotion campaigns.

  8. Improving Transactional Memory Performance for Irregular Applications

    OpenAIRE

    Pedrero, Manuel; Gutiérrez, Eladio; Romero, Sergio; Plata, Óscar

    2015-01-01

    Transactional memory (TM) offers optimistic concurrency support in modern multicore archi- tectures, helping the programmers to extract parallelism in irregular applications when data dependence information is not available before runtime. In fact, recent research focus on ex- ploiting thread-level parallelism using TM approaches. However, the proposed techniques are of general use, valid for any type of application. This work presents ReduxSTM, a software TM system specially d...

  9. Impact of transaction costs on healthcare outcomes.

    Science.gov (United States)

    Stiles, Renée A; So, Stephanie A

    2003-06-01

    This article reviews transaction cost economics to frame a discussion of how inefficiencies in healthcare delivery processes affect clinical outcomes and differentiate between inefficiencies that are tractable from those that are transitional or intractable. Recognizing and quantifying these effects improves the ability of organizations to calculate returns on investment in quality improvement, research and development and related value enhancing, but it is subject to high-risk undertakings.

  10. The WLCG Messaging Service and its Future

    International Nuclear Information System (INIS)

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  11. Hand hygiene posters: motivators or mixed messages?

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  12. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  13. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  14. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  15. Message Scheduling and Forwarding in Congested DTNs

    KAUST Repository

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  16. Transactive System: Part II: Analysis of Two Pilot Transactive Systems using Foundational Theory and Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sun, Y. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wu, Di [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ren, Huiying [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2018-01-24

    This document is the second of a two-part report. Part 1 reviewed several demonstrations of transactive control and compared them in terms of their payoff functions, control decisions, information privacy, and mathematical solution concepts. It was suggested in Part 1 that these four listed components should be adopted for meaningful comparison and design of future transactive systems. Part 2 proposes qualitative and quantitative metrics that will be needed to compare alternative transactive systems. It then uses the analysis and design principles from Part 1 while conducting more in-depth analysis of two transactive demonstrations: the American Electric Power (AEP) gridSMART Demonstration, which used a double –auction market mechanism, and a consensus method like that used in the Pacific Northwest Smart Grid Demonstration. Ultimately, metrics must be devised and used to meaningfully compare alternative transactive systems. One significant contribution of this report is an observation that the decision function used for thermostat control in the AEP gridSMART Demonstration has superior performance if its decision function is recast to more accurately reflect the power that will be used under for thermostatic control under alternative market outcomes.

  17. Transaction costs of raising energy efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Ostertag, K.

    2003-07-01

    Part of the debate evolves around the existence and importance of energy saving potentials to reduce CO{sub 2} emissions that may be available at negative net costs, implying that the energy cost savings of one specific technology can actually more than offset the costs of investing into this technology and of using it. This so called ''no-regret'' potential would comprise measures that from a pure economic efficiency point of view would be ''worth undertaking whether or not there are climate-related reasons for doing so''. The existence of the no-regret potential is often denied by arguing, that the economic evaluation of the energy saving potentials did not take into account transaction costs. This paper will re-examine in more detail the concept of transaction costs as it is used in the current debate on no-regret potentials (section 1). Four practical examples are presented to illustrate how transaction costs and their determinants can be identified, measured and possibly influenced (section 2). In order to link the presented cases to modelling based evaluation approaches the implications for cost evaluations of energy saving measures, especially in the context of energy system modelling, will be shown (section 3). (author)

  18. Simulating water markets with transaction costs

    Science.gov (United States)

    Erfani, Tohid; Binions, Olga; Harou, Julien J.

    2014-06-01

    This paper presents an optimization model to simulate short-term pair-wise spot-market trading of surface water abstraction licenses (water rights). The approach uses a node-arc multicommodity formulation that tracks individual supplier-receiver transactions in a water resource network. This enables accounting for transaction costs between individual buyer-seller pairs and abstractor-specific rules and behaviors using constraints. Trades are driven by economic demand curves that represent each abstractor's time-varying water demand. The purpose of the proposed model is to assess potential hydrologic and economic outcomes of water markets and aid policy makers in designing water market regulations. The model is applied to the Great Ouse River basin in Eastern England. The model assesses the potential weekly water trades and abstractions that could occur in a normal and a dry year. Four sectors (public water supply, energy, agriculture, and industrial) are included in the 94 active licensed water diversions. Each license's unique environmental restrictions are represented and weekly economic water demand curves are estimated. Rules encoded as constraints represent current water management realities and plausible stakeholder-informed water market behaviors. Results show buyers favor sellers who can supply large volumes to minimize transactions. The energy plant cooling and agricultural licenses, often restricted from obtaining water at times when it generates benefits, benefit most from trades. Assumptions and model limitations are discussed. This article was corrected on 13 JUN 2014. See the end of the full text for details.

  19. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Science.gov (United States)

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  20. Message Received: Virtual Ethnography in Online Message Boards

    Directory of Open Access Journals (Sweden)

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  1. The View from the Top of the Mountain: Building a Community of Practice with the GridWise Transactive Energy Framework

    Energy Technology Data Exchange (ETDEWEB)

    Forfia, David; Knight, Mark; Melton, Ron

    2016-05-01

    transactive energy discussions on the agenda for many conferences there are also group activities relating to transactive energy being coordinated by both NIST and SGIP with which GWAC is also involved. The NIST work aims to develop and enhance modeling and simulation tools and integration into modeling and simulation platforms for Transactive Energy evaluation, as well as demonstrate how different transactive approaches may be used to improve reliability and efficiency of the electric grid. This will be accomplished through development of a set of scenarios that can serve as ongoing reference points for modeling and simulation. It is also an example of helping to develop a Transactive Energy community. The ongoing Transactive Energy Coordination Group formed by SGIP reviews the progress and directions of transactive energy activities in related parts of the SGIP and collaborating organizations such as GWAC. One of its activities is assembling a core set of transactive energy use cases as representative of the transactive energy interface requirements. This will enable assessment of interoperability requirements for transactive energy applications and an analysis of standards coverage, gaps, and future needs.

  2. A Transactional Asynchronous Replication Scheme for Mobile Database Systems

    Institute of Scientific and Technical Information of China (English)

    丁治明; 孟小峰; 王珊

    2002-01-01

    In mobile database systems, mobility of users has a significant impact on data replication. As a result, the various replica control protocols that exist today in traditional distributed and multidatabase environments are no longer suitable. To solve this problem, a new mobile database replication scheme, the Transaction-Level Result-Set Propagation (TLRSP)model, is put forward in this paper. The conflict detection and resolution strategy based on TLRSP is discussed in detail, and the implementation algorithm is proposed. In order to compare the performance of the TLRSP model with that of other mobile replication schemes, we have developed a detailed simulation model. Experimental results show that the TLRSP model provides an efficient support for replicated mobile database systems by reducing reprocessing overhead and maintaining database consistency.

  3. Transaction cost of micro and small enterprises financing

    Directory of Open Access Journals (Sweden)

    Ghana Atma Sulistya

    2016-10-01

    Full Text Available High transaction costs become one of the obstacles for the micro and small enterprises (MSEs to access financial loans to the bank. In order to minimize the transaction costs, group lending scheme become  alternative, so that both sides are pay lower transaction costs, and MSEs are able to improve their welfare. This study aims to analyze the credit process and transaction costs incurred on the model of individuals and groups lending and to compare the magnitude of transaction costs on both models. Mixed Method Analysis is used to analyze the component of transaction costs and the magnitude of the transaction cost on both models.These results indicate there are differences in transaction costs incurred on both schemes. In the amount of the transaction costs, the overall group scheme still allows for greater compared to individual schemes and dominated by the cost of the disbursement. Even so, the transaction cost per member group is much smaller than the individual schemes.

  4. Transactive Energy Trajectories of the European and Croatian Energy Policy

    International Nuclear Information System (INIS)

    Toljan, I.

    2014-01-01

    The concept of transactive energy requires harmonized operation of all entities involved in the electrical power system on market-oriented bases. Each country creates independently its direction of the development (trajectory) of its power sector, but within the framework of basic trajectories laid down by the acquits communautaire, some of which are mandatory and some of which are only recommended. Transactive energy uses economic signals or incentives for using all available new technologies in the energy sector, from production to consumption, in a way that is definitely more efficient than the previous one. The trajectories are determined by the implementation policy whose principal characteristic is non-acceptance of delay in making decisions. The benchmarking system has been introduced. After setting the goals for 2020, the acquits communautaire additionally set very ambitious goals for 2030, which will also be reflected on the costs of energy generation, and consequently on the input costs of the European economy. The intention is to reduce CO2 emission from the energy sector by 80 percent until 2050. The development of exploitation of gas deposits and the introduction of new technologies places the USA on the global level in a completely different position than before. Coal is being gradually substituted by gas, which has so far been the dominating energy source for generation of electrical energy. The results of analyses indicate that gas supply in the USA will be three times cheaper than in Europe in the next 100 years. Taking into consideration the intended application of the current drilling technology also in Europe, it is to be expected that a significant change in the European energy policy will occur. There are also forecasts in the Republic of Croatia that might significantly change the picture of the Croatian energy industry. It should be kept in mind that finding new energy sources does not imply abandoning the concept of liberalized market

  5. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  6. Learning experiences in population education: proposed guidelines and core messages.

    Science.gov (United States)

    1984-01-01

    As a result of the 1984 Regional Workshop for the Development of Packages of Adequate Learning Requirements in Population Education, the participants tackled the problem of non-institutionalization of population education into the formal and non-formal educational curricula in their countries. Based on their deliberations, several sets of guidelines and core messages were formulated to provide countries with a more definite direction that will hopefully ensure the functional and effective integration of population education in their respective national school and out-of-school curriculum system. Useful packages of learning materials in population education should help realize the country's population policy and goals within the broader framework of socioeconomic development, and the content of the package should comprehensively cover the core messages of the country's Population Information, Education and Communication (IEC) Program. The population knowledge base of the package should be accurate and relevant; the package should provide for graphic and visual presentation and for assessment of effects on the target groups. Proposed core messages in population education discuss the advantages of small family size and delayed marriage, and aspects of responsible parenthood. Other messages discuss population resource development and population-related beliefs and values.

  7. Running a reliable messaging infrastructure for CERN's control system

    International Nuclear Information System (INIS)

    Ehm, F.

    2012-01-01

    The current middle-ware for CERN's Control System is based on 2 implementations: CORBA-based Controls Middle-Ware (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a 2 node cluster providing fail-over and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an up-time of 99.998% and an average data serving rate of 1.6 G-Byte per minute represented by around 150 messages per second. Deploying, running, maintaining and protecting such messaging infrastructure is not trivial and includes setting up of careful monitoring and failure pre-recognition. Naturally, lessons have been learnt and their outcome is very important for the current and future operation of such service. (author)

  8. Message framing in social networking sites.

    Science.gov (United States)

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  9. Evaluation of Sexual Communication Message Strategies

    Science.gov (United States)

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  10. Calculation and application of energy transaction allocation factors in electric power transmission systems

    Science.gov (United States)

    Fradi, Aniss

    The ability to allocate the active power (MW) loading on transmission lines and transformers, is the basis of the "flow based" transmission allocation system developed by the North American Electric Reliability Council. In such a system, the active power flows must be allocated to each line or transformer in proportion to the active power being transmitted by each transaction imposed on the system. Currently, this is accomplished through the use of the linear Power Transfer Distribution Factors (PTDFs). Unfortunately, no linear allocation models exist for other energy transmission quantities, such as MW and MVAR losses, MVAR and MVA flows, etc. Early allocation schemes were developed to allocate MW losses due to transactions to branches in a transmission system, however they exhibited diminished accuracy, since most of them are based on linear power flow modeling of the transmission system. This thesis presents a new methodology to calculate Energy Transaction Allocation factors (ETA factors, or eta factors), using the well-known process of integration of a first derivative function, as well as consistent and well-established mathematical and AC power flow models. The factors give a highly accurate allocation of any non-linear system quantity to transactions placed on the transmission system. The thesis also extends the new ETA factors calculation procedure to restructure a new economic dispatch scheme where multiple sets of generators are economically dispatched to meet their corresponding load and their share of the losses.

  11. Diagramming Transactive Building Business Cases: Using Principles of e3 Value to Document Valuation Studies

    Energy Technology Data Exchange (ETDEWEB)

    Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Marinovici, Maria C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-12-30

    Energy management in buildings is becoming more transactive. Pacific Northwest National Laboratory and the U.S. Department of Energy Building Technologies Office recently defined innovative use cases wherein market-like mechanisms are used to manage energy within buildings, between buildings, and between buildings and third-party entities, such as power utilities. A next step toward defining a set of transactive use cases in the buildings domain is to carefully diagram the corresponding business cases to capture details of transactions among all stakeholders and their economic value propositions. The principles of e3-value diagramming are applied in this report toward creating business value diagrams. These principles are extended to be consistent with Universal Modeling Language use-case diagrams. Example diagrams are presented for a subset of buildings-domain use cases that were introduced in an earlier Pacific Northwest National Laboratory report. The diagrams are intended to clearly represent an understanding of the transactions through which individual entities accumulate value in their respective use cases, and the diagrams should therefore support economic valuation studies. The report reviews some of the foundational principles of e3 value and includes authors’ insights concerning the formulation of these diagrams using Universal Modeling Language as a more systematic modeling approach.

  12. (NotGood Parents’ Advices? The Value of Parental Permissions, Drivers and Injunctions in the Life of Modern Youth. The Research Educational Transactional Analyst’s Perspective [(Niedobre rady rodziców? Obecność rodzicielskich, przyzwoleń, nakazów i zakazów w życiu współczesnej młodzieży. Badawcza perspektywa edukacjnego analityka transakcyjnego

    Directory of Open Access Journals (Sweden)

    Adrianna SARNAT-CIASTKO

    2017-11-01

    Full Text Available The main purpose of this paper is to determine the relevance of advices that are given to children by their parents on their development. The author assumed that these types of messages might have a diagnostic value, because it may not only show the direction in which – according to the mothers or fathers – their child should follow, but also contain a set of practical tips which help achieve this goal. The parental advices may also be a source of knowledge about the quality of family relations and upbringing style that is used in a particular household. They can also indicate a lack of mutual contact. Making such an insight into the parental advices can be done by means of the tools provided by the transactional analysis which will also be presented in this text by the analysis of collected research material.

  13. Commercial agencies and surrogate motherhood: a transaction cost approach.

    Science.gov (United States)

    Galbraith, Mhairi; McLachlan, Hugh V; Swales, J Kim

    2005-03-01

    In this paper we investigate the legal arrangements involved in UK surrogate motherhood from a transaction-cost perspective. We outline the specific forms the transaction costs take and critically comment on the way in which the UK institutional and organisational arrangements at present adversely influence transaction costs. We then focus specifically on the potential role of surrogacy agencies and look at UK and US evidence on commercial and voluntary agencies. Policy implications follow.

  14. An Initial Examination of Facebook as a Source of Memorable Messages for First-Year College Students

    Science.gov (United States)

    Russell, Jessica; Nazione, Samantha; Smith, Sandi

    2012-01-01

    This study investigated a set of messages on a university group's Facebook page intended as advice for first-year college students. Investigators coded 108 different units of advice into three overarching categories focused on academics, the transition to college life, and comprehension of the college campus. Messages transmitted were similar in…

  15. Presentation of dynamically overlapping auditory messages in user interfaces

    Energy Technology Data Exchange (ETDEWEB)

    Papp, III, Albert Louis [Univ. of California, Davis, CA (United States)

    1997-09-01

    This dissertation describes a methodology and example implementation for the dynamic regulation of temporally overlapping auditory messages in computer-user interfaces. The regulation mechanism exists to schedule numerous overlapping auditory messages in such a way that each individual message remains perceptually distinct from all others. The method is based on the research conducted in the area of auditory scene analysis. While numerous applications have been engineered to present the user with temporally overlapped auditory output, they have generally been designed without any structured method of controlling the perceptual aspects of the sound. The method of scheduling temporally overlapping sounds has been extended to function in an environment where numerous applications can present sound independently of each other. The Centralized Audio Presentation System is a global regulation mechanism that controls all audio output requests made from all currently running applications. The notion of multimodal objects is explored in this system as well. Each audio request that represents a particular message can include numerous auditory representations, such as musical motives and voice. The Presentation System scheduling algorithm selects the best representation according to the current global auditory system state, and presents it to the user within the request constraints of priority and maximum acceptable latency. The perceptual conflicts between temporally overlapping audio messages are examined in depth through the Computational Auditory Scene Synthesizer. At the heart of this system is a heuristic-based auditory scene synthesis scheduling method. Different schedules of overlapped sounds are evaluated and assigned penalty scores. High scores represent presentations that include perceptual conflicts between over-lapping sounds. Low scores indicate fewer and less serious conflicts. A user study was conducted to validate that the perceptual difficulties predicted by

  16. Expectancy Theory in Media and Message Selection.

    Science.gov (United States)

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  17. 78 FR 64202 - Quantitative Messaging Research

    Science.gov (United States)

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  18. Undergraduates' Text Messaging Language and Literacy Skills

    Science.gov (United States)

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  19. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  20. Messages about Sexuality: An Ecological Perspective

    Science.gov (United States)

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  1. Suspecting Neurological Dysfunction From E Mail Messages ...

    African Journals Online (AJOL)

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  2. On Transaction-Cost Models in Continuous-Time Markets

    Directory of Open Access Journals (Sweden)

    Thomas Poufinas

    2015-04-01

    Full Text Available Transaction-cost models in continuous-time markets are considered. Given that investors decide to buy or sell at certain time instants, we study the existence of trading strategies that reach a certain final wealth level in continuous-time markets, under the assumption that transaction costs, built in certain recommended ways, have to be paid. Markets prove to behave in manners that resemble those of complete ones for a wide variety of transaction-cost types. The results are important, but not exclusively, for the pricing of options with transaction costs.

  3. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  4. Scaling and long-range dependence in option pricing V: Multiscaling hedging and implied volatility smiles under the fractional Black-Scholes model with transaction costs

    Science.gov (United States)

    Wang, Xiao-Tian

    2011-05-01

    This paper deals with the problem of discrete time option pricing using the fractional Black-Scholes model with transaction costs. Through the ‘anchoring and adjustment’ argument in a discrete time setting, a European call option pricing formula is obtained. The minimal price of an option under transaction costs is obtained. In addition, the relation between scaling and implied volatility smiles is discussed.

  5. A memory aid for reduced cognitive load in manually entered online bank transactions

    OpenAIRE

    Sandnes, Frode Eika

    2012-01-01

    Paper based invoices are still commonly used in Norway where users manually copy large amounts of digits in order to set up transactions. Such digit copying tasks are cognitively and visually demanding, errors are easily introduced and the process is often perceived as laborious. This study proposes an alternative scheme based on dictionary coding that reduces the cognitive load on the user by a factor of five. The strategy has improved error detection characteristics and th...

  6. The WLCG Messaging Service and its Future

    CERN Document Server

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  7. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  8. Factors influencing message dissemination through social media

    Science.gov (United States)

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  9. Hand hygiene posters: selling the message.

    Science.gov (United States)

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  10. Behind the Mechanics : the Conveyance of Political Messages Through Video Games

    OpenAIRE

    Haglund, Vira

    2011-01-01

    This study is a response to the growing demand for more critical examinations of the video game as a communicative as well as interactive medium of mass culture. It reflects the game in regard to its potentials and abilities conveying a message to its audience and sets it into a broader discourse of mass communication. The analysis focuses on opinion forming games and their agendas whilst scrutinizing the methods through which certain messages are delivered to the player. The study is primari...

  11. A survey on the history of transaction management: from flat to grid transactions

    NARCIS (Netherlands)

    Wang, T.; Vonk, J.; Kratz, B.; Grefen, P.W.P.J.

    2008-01-01

    Transactions have been around since the Seventies to provide reliable information processing in automated information systems. Originally developed for simple ‘debit-credit’ style database operations in centralized systems, they have moved into much more complex application domains including aspects

  12. From Intra-transaction to Generalized Inter-transaction: Landscaping Multidimensional Contexts in Association Rule Mining

    NARCIS (Netherlands)

    Li, Q; Feng, L.; Wong, A.K.Y.

    The problem of mining multidimensional inter-transactional association rules was recently introduced in [ACM Trans. Inform. Syst. 18(4) (2000) 423; Proc. of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Seattle, Washington, June 1998, p. 12:1]. It extends the

  13. 31 CFR 800.302 - Transactions that are not covered transactions.

    Science.gov (United States)

    2010-07-01

    ... A also negotiates contractual rights that give it the power to control important matters of... Example 2, except that Corporation X, a U.S. business, has developed important technology in connection... Corporation X, including production facilities, customer lists, technology, and staff. This transaction is a...

  14. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Science.gov (United States)

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  15. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Science.gov (United States)

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  16. "We Might Get Some Free Beers": Experience and Motivation for Transactional Sex Among Behaviorally Bisexual Men in Vientiane, Laos.

    Science.gov (United States)

    Bowring, Anna L; Pasomsouk, Nakhornphet; Hughes, Chad; van Gemert, Caroline; Higgs, Peter; Sychareun, Vanphanom; Hellard, Margaret; Power, Robert

    2017-05-01

    People engaging in transactional sex are considered a key population for HIV prevention. Prior quantitative surveys demonstrated that behaviorally bisexual men in Vientiane, Laos commonly transact sex. In 2013, we conducted a qualitative study to explore behaviorally bisexual men's experience, motivations, and perceptions related to transactional sex in Vientiane. Behaviorally bisexual men were recruited from bars, nightclubs, and dormitories for five focus group discussions (FGDs) and 11 in-depth interviews (n = 31). Additionally, young women were recruited from a university, garment factory, and nightclub for four FGDs (n = 22). Transcripts were translated and thematically coded. Bisexual male participants most commonly described being paid for sex by male-to-female transgender people and buying sex from women. Both male and female participants reported that older, single women pay younger men for sex. Negotiation and direction of sexual transactions are influenced by age, attraction, and wealth. Common motivations for selling sex included the need for money to support family or fund school fees, material gain, or physical pleasure. Transactional sex was often opportunistic. Some behaviorally bisexual men reported selling sex in order to pay another more desirable sex partner or to buy gifts for their regular sex partner. Participants perceived high risk associated with intercourse with female sex workers but not with other transactional sex partners. Health interventions are needed to improve knowledge, risk perception, and health behaviors, but must recognize the diversity of transactional sex in Vientiane. Both physical and virtual settings may be appropriate for reaching behaviorally bisexual men and their partners.

  17. One Message, Many Voices: Mobile Audio Counselling in Health Education.

    Science.gov (United States)

    Pimmer, Christoph; Mbvundula, Francis

    2018-01-01

    Health workers' use of counselling information on their mobile phones for health education is a central but little understood phenomenon in numerous mobile health (mHealth) projects in Sub-Saharan Africa. Drawing on empirical data from an interpretive case study in the setting of the Millennium Villages Project in rural Malawi, this research investigates the ways in which community health workers (CHWs) perceive that audio-counselling messages support their health education practice. Three main themes emerged from the analysis: phone-aided audio counselling (1) legitimises the CHWs' use of mobile phones during household visits; (2) helps CHWs to deliver a comprehensive counselling message; (3) supports CHWs in persuading communities to change their health practices. The findings show the complexity and interplay of the multi-faceted, sociocultural, political, and socioemotional meanings associated with audio-counselling use. Practical implications and the demand for further research are discussed.

  18. Effects of traditional land transactions on soil erosion and land degradation

    OpenAIRE

    Leduka, R.C.

    1998-01-01

    A research report on the effects of traditional land transactions on soil erosion and land degradation in Lesotho. This report focuses on the land transactions in Lesotho and how these transaction affect the growing erosion rates of the soil.

  19. Text messages as a learning tool for midwives | Woods | South ...

    African Journals Online (AJOL)

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  20. A Message Without a Code?

    Directory of Open Access Journals (Sweden)

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  1. Message Passing Framework for Globally Interconnected Clusters

    International Nuclear Information System (INIS)

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  2. Accountable Care Organizations and Transaction Cost Economics.

    Science.gov (United States)

    Mick, Stephen S Farnsworth; Shay, Patrick D

    2016-12-01

    Using a Transaction Cost Economics (TCE) approach, this paper explores which organizational forms Accountable Care Organizations (ACOs) may take. A critical question about form is the amount of vertical integration that an ACO may have, a topic central to TCE. We posit that contextual factors outside and inside an ACO will produce variable transaction costs (the non-production costs of care) such that the decision to integrate vertically will derive from a comparison of these external versus internal costs, assuming reasonably rational management abilities. External costs include those arising from environmental uncertainty and complexity, small numbers bargaining, asset specificity, frequency of exchanges, and information "impactedness." Internal costs include those arising from human resource activities including hiring and staffing, training, evaluating (i.e., disciplining, appraising, or promoting), and otherwise administering programs. At the extreme, these different costs may produce either total vertical integration or little to no vertical integration with most ACOs falling in between. This essay demonstrates how TCE can be applied to the ACO organization form issue, explains TCE, considers ACO activity from the TCE perspective, and reflects on research directions that may inform TCE and facilitate ACO development. © The Author(s) 2016.

  3. The use of messages in altering risky gambling behavior in experienced gamblers.

    Science.gov (United States)

    Jardin, Bianca F; Wulfert, Edelgard

    2012-03-01

    The present study was an experimental analogue that examined the relationship between gambling-related irrational beliefs and risky gambling behavior. Eighty high-frequency gamblers were randomly assigned to four conditions and played a chance-based computer game in a laboratory setting. Depending on the condition, during the game a pop-up screen repeatedly displayed either accurate or inaccurate messages concerning the game, neutral messages, or no messages. Consistent with a cognitive-behavioral model of gambling, accurate messages that correctly described the random contingencies governing the game decreased risky gambling behavior. Contrary to predictions, inaccurate messages designed to mimic gamblers' irrational beliefs about their abilities to influence chance events did not lead to more risky gambling behavior than exposure to neutral or no messages. Participants in the latter three conditions did not differ significantly from one another and all showed riskier gambling behavior than participants in the accurate message condition. The results suggest that harm minimization strategies that help individuals maintain a rational perspective while gambling may protect them from unreasonable risk-taking. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  4. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  5. Evaluation of Sexual Communication Message Strategies

    Directory of Open Access Journals (Sweden)

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  6. 17 CFR 33.3 - Unlawful commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Unlawful commodity option... REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.3 Unlawful commodity option... of, or maintain a position in, any commodity option transaction subject to the provisions of this...

  7. 17 CFR 32.11 - Suspension of commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Suspension of commodity option... REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.11 Suspension of commodity option transactions. (a... accept money, securities or property in connection with, the purchase or sale of any commodity option, or...

  8. 17 CFR 32.3 - Unlawful commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Unlawful commodity option... REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.3 Unlawful commodity option transactions. (a) On and after... extend credit in lieu thereof) from an option customer as payment of the purchase price in connection...

  9. Enhancing reliable online transaction with intelligent rule-based ...

    African Journals Online (AJOL)

    Enhancing reliable online transaction with intelligent rule-based fraud detection technique. ... These are with a bid to reducing amongst other things the cost of production and also dissuade the poor handling of Nigeria currency. The CBN pronouncement has necessitated the upsurge in transactions completed with credit ...

  10. Transaction Costs, Property Rights, and Organizational Culture: An Exchange Perspective.

    Science.gov (United States)

    Jones, Gareth R.

    1983-01-01

    Applying the language of exchange theory, this paper analyses how organizational culture emerges out of the institutional arrangements developed to regulate the transactions between members. Transaction costs of social exchange, the characteristics and etiology of those institutional arrangements, and three ideal-typical cultural forms are…

  11. Leveraged Public to Private Transactions in the UK

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Simons, T.; Wright, M.

    2005-01-01

    This paper examines the magnitude and the sources of the expected shareholder gains in UK public to private transactions (PTPs) in the second wave from 1997-2003.Pre-transaction shareholders on average receive a premium of 40% and the share price reaction to the PTP announcement is about 30%.The

  12. 27 CFR 555.127 - Daily summary of magazine transactions.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Daily summary of magazine....127 Daily summary of magazine transactions. In taking the inventory required by §§ 555.122, 555.123... transactions to be kept at each magazine of an approved storage facility; however, these records may be kept at...

  13. Father Knows Best: Using Adam Smith to Teach Transactions Costs

    Science.gov (United States)

    Dupont, Brandon

    2014-01-01

    Adam Smith's moral philosophy can be used to introduce economics students to the important idea of transactions costs. The author provides a brief background in this article to Smith's moral philosophy and connects it to the costs of transacting in a way that fits easily into the standard principles of microeconomics classroom. By doing…

  14. 31 CFR 575.533 - Certain new transactions.

    Science.gov (United States)

    2010-07-01

    ..., Authorizations, and Statements of Licensing Policy § 575.533 Certain new transactions. (a) New transactions..., including any aviation, financial, or trade requirements of agencies other than the Department of the... subsequent permanent Iraqi government: Agricultural Cooperative Bank Al-Rafidain Shipping Company Industrial...

  15. Two-Layer Transaction Management for Workflow Management Applications

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Vonk, J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management applications require advanced transaction management that is not offered by traditional database systems. For this reason, a number of extended transaction models has been proposed in the past. None of these models seems completely adequate, though, because workflow management

  16. 49 CFR 1180.2 - Types of transactions.

    Science.gov (United States)

    2010-10-01

    .... Transactions proposed under 49 U.S.C. 11323 involving more than one common carrier by railroad are of four... review and approval of these transactions is not necessary to carry out the rail transportation policy of... renewal of trackage rights by a rail carrier over lines owned or operated by any other rail carrier or...

  17. 31 CFR 585.513 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 585.513 Section 585.513 Money and Finance: Treasury Regulations Relating to Money and... Transactions related to telecommunications authorized. (a) All transactions of U.S. common carriers with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized...

  18. 31 CFR 586.510 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 586.510 Section 586.510 Money and Finance: Treasury Regulations Relating to Money and... Licensing Policy § 586.510 Transactions related to telecommunications authorized. All transactions with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized. This...

  19. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  20. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    2002-01-01

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  1. A Template Model for Multidimensional Inter-Transactional Association Rules

    NARCIS (Netherlands)

    Feng, L.; Yu, J.X.; Lu, H.J.; Han, J.W.

    2002-01-01

    Multidimensional inter-transactional association rules extend the traditional association rules to describe more general associations among items with multiple properties across transactions. “After McDonald and Burger King open branches, KFC will open a branch two months later and one mile away��?

  2. 12 CFR 370.4 - Transaction Account Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.4 Transaction Account Guarantee Program. (a) In addition to the coverage afforded to depositors under 12 CFR Part 330, a depositor's funds in a noninterest... determining whether funds are in a noninterest-bearing transaction account for purposes of this section, the...

  3. Distributed Global Transaction Support for Workflow Management Applications

    NARCIS (Netherlands)

    Vonk, J.; Grefen, P.W.P.J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management systems require advanced transaction support to cope with their inherently long-running processes. The recent trend to distribute workflow executions requires an even more advanced transaction support system that is able to handle distribution. This paper presents a model as well

  4. 31 CFR 515.511 - Transactions by certain business enterprises.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions by certain business enterprises. 515.511 Section 515.511 Money and Finance: Treasury Regulations Relating to Money and Finance... Licenses, Authorizations, and Statements of Licensing Policy § 515.511 Transactions by certain business...

  5. 31 CFR 500.511 - Transactions by certain business enterprises.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions by certain business enterprises. 500.511 Section 500.511 Money and Finance: Treasury Regulations Relating to Money and Finance... Licenses, Authorizations and Statements of Licensing Policy § 500.511 Transactions by certain business...

  6. Parallel transaction processing in functional languages, towards practical functional databases

    NARCIS (Netherlands)

    Wevers, L.; Huisman, Marieke; de Keijzer, Ander

    2013-01-01

    This paper shows how functional languages can be adapted for transaction processing, and discusses the implementation of a parallel runtime system for such functional transaction processing languages. We extend functional languages with current state variables and result state variables to allow the

  7. 16 CFR 802.53 - Certain foreign banking transactions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Certain foreign banking transactions. 802.53 Section 802.53 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... foreign banking transactions. An acquisition which requires the consent or approval of the Board of...

  8. The price impact of block transactions in the Netherlands

    NARCIS (Netherlands)

    de Jong, Abe; Marra, Teye; van Beusichem, Herman Clasinus

    2016-01-01

    In this paper, the authors analyse the stock price effects of block transactions and the disclosure thereof for Dutch firms. The authors measure a significant positive price effect for block purchases directly around the transaction date, but not for block sales. The authors do not measure a

  9. 31 CFR 515.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 515.404 Section 515.404 Money and Finance: Treasury Regulations Relating to Money and Finance... transaction were in no way affiliated or associated with each other. ...

  10. 31 CFR 500.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 500.404 Section 500.404 Money and Finance: Treasury Regulations Relating to Money and Finance... transaction were in no way affiliated or associated with each other. ...

  11. 25 CFR 117.23 - Transactions between guardian and ward.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Transactions between guardian and ward. 117.23 Section... COMPETENCY § 117.23 Transactions between guardian and ward. Business dealings between the guardian and his ward involving the sale or purchase of any property, real or personal, by the guardian to or from the...

  12. Crystallization and preliminary X-ray analysis of the bacillaene synthase trans-acting acyltransferase PksC

    International Nuclear Information System (INIS)

    Cuskin, Fiona; Solovyova, Alexandra S.; Lewis, Richard J.; Race, Paul R.

    2011-01-01

    The expression, purification and crystallization of the trans-acting acyltransferase PksC from the bacillaene hybrid polyketide synthase/nonribosomal peptide synthetase is described. The crystals belonged to the orthorhombic space group P2 1 2 1 2 1 and diffracted to 1.44 Å resolution. The antibiotic bacillaene is biosynthesized in Bacillus subtilis by a hybrid type 1 modular polyketide synthase/nonribosomal peptide synthetase of the trans-acyltransferase (trans-AT) class. Within this system, the essential acyl-group loading activity is provided by the action of three free-standing trans-acting acyltransferases. Here, the recombinant expression, purification and crystallization of the bacillaene synthase trans-acting acyltransferase PksC are reported. A diffraction data set has been collected from a single PksC crystal to 1.44 Å resolution and the crystal was found to belong to the orthorhombic space group P2 1 2 1 2 1

  13. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Science.gov (United States)

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  14. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    National Research Council Canada - National Science Library

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  15. Automated Text Messaging as an Adjunct to Cognitive Behavioral Therapy for Depression: A Clinical Trial.

    Science.gov (United States)

    Aguilera, Adrian; Bruehlman-Senecal, Emma; Demasi, Orianna; Avila, Patricia

    2017-05-08

    Cognitive Behavioral Therapy (CBT) for depression is efficacious, but effectiveness is limited when implemented in low-income settings due to engagement difficulties including nonadherence with skill-building homework and early discontinuation of treatment. Automated messaging can be used in clinical settings to increase dosage of depression treatment and encourage sustained engagement with psychotherapy. The aim of this study was to test whether a text messaging adjunct (mood monitoring text messages, treatment-related text messages, and a clinician dashboard to display patient data) increases engagement and improves clinical outcomes in a group CBT treatment for depression. Specifically, we aim to assess whether the text messaging adjunct led to an increase in group therapy sessions attended, an increase in duration of therapy attended, and reductions in Patient Health Questionnaire-9 item (PHQ-9) symptoms compared with the control condition of standard group CBT in a sample of low-income Spanish speaking Latino patients. Patients in an outpatient behavioral health clinic were assigned to standard group CBT for depression (control condition; n=40) or the same treatment with the addition of a text messaging adjunct (n=45). The adjunct consisted of a daily mood monitoring message, a daily message reiterating the theme of that week's content, and medication and appointment reminders. Mood data and qualitative responses were sent to a Web-based platform (HealthySMS) for review by the therapist and displayed in session as a tool for teaching CBT skills. Intent-to-treat analyses on therapy attendance during 16 sessions of weekly therapy found that patients assigned to the text messaging adjunct stayed in therapy significantly longer (median of 13.5 weeks before dropping out) than patients assigned to the control condition (median of 3 weeks before dropping out; Wilcoxon-Mann-Whitney z=-2.21, P=.03). Patients assigned to the text messaging adjunct also generally

  16. Transactive Systems Simulation and Valuation Platform Trial Analysis

    International Nuclear Information System (INIS)

    Widergren, Steven E.; Hammerstrom, Donald J.; Huang, Qiuhua; Kalsi, Karanjit; Lian, Jianming; Makhmalbaf, Atefe; McDermott, Thomas E.; Sivaraman, Deepak; Tang, Yingying; Veeramany, Arun; Woodward, James C.

    2017-01-01

    Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvements to the time-simulation environment that is being used to evaluate transactive scenarios.

  17. Transactive Systems Simulation and Valuation Platform Trial Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Qiuhua [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McDermott, Thomas E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sivaraman, Deepak [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Tang, Yingying [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Veeramany, Arun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodward, James C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-04-01

    Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvements to the time-simulation environment that is being used to evaluate transactive scenarios.

  18. Transactional price of an expected child and its application in birth control.

    Science.gov (United States)

    Li, X

    1993-01-01

    The theoretical presentation of the impact of the transactional price of an expected child (TPEC) on birth control led to the conclusion that successful birth control was a combination of birth utility theory and TPEC theory. In a hypothetical market, the assumption can be made that an expected price can be attached to a desired child or a transactional price can be attached for giving up the reproductive right to have an excess child. A consumer equilibrium model can characterize the changes in financial resources necessary in deciding on an appropriate number of children. In a general equilibrium model, couples would have to be compensated a certain amount as an inducement to forgo the right to have a second child. Prices of children can be determined by a distributional curve of this transactional price of expected excess children and the estimated marginal price for couples with two children. Under circumstances of limited resources, it would be cheaper to buy some couple's rights to forgo a child, and this price would vary with parity. The exact transactional price of each child by parity by each couple could be theoretically determined, if all couples told the truth about desired number of children. However, the complication is that this condition may not be possible, and couples may charge more for forgoing the right to a subsequent child that what they would actually accept. Also, the seller could ask one price and then charge more. A compromise would be to set prices only for lower parities and to set prices subject to the total funds available to the buyer. Very low prices would also decrease the effectiveness of birth control. The government could be a buyer or seller. Taxing couples for additional children would make the government a seller. When the government is the buyer, couples would be compensated for not having an additional child. Another possibility is a reward for having only a certain number of children and a tax for excess children, which

  19. 17 CFR 155.6 - Trading standards for the transaction of business on registered derivatives transaction execution...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...

  20. Supply Chain-Wide Consequences of Transaction Risks and Their Contractual Solutions: Towards an Extended Transaction Cost Economics Framework

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    How supply chain actors manage their exposure to both supply- and demand-side risks is a topic that has been insufficiently examined within the transaction cost economics (TCE) literature. TCE studies often only examine transaction risks in the context of bilateral exchanges. This study aims to

  1. Game Theoretic Analysis of Cooperative Message Forwarding in Opportunistic Mobile Networks.

    Science.gov (United States)

    Pal, Sujata; Saha, Barun Kumar; Misra, Sudip

    2017-12-01

    In cooperative communication, a set of players forming a coalition ensures communal behavior among themselves by helping one another in message forwarding. Opportunistic mobile networks (OMNs) require multihop communications for transferring messages from the source to the destination nodes. However, noncooperative nodes only forward their own messages to others, and drop others' messages upon receiving them. So, the message delivery overhead increases in OMN. For minimizing the overhead and maximizing the delivery rate, we propose two coalition-based cooperative schemes: 1) simple coalition formation (SCF) and 2) overlapping coalition formation (OCF) game. In SCF, we consider the presence of a central information center, whereas OCF is a fully distributed scheme. In SCF, coalitions are disjoint, whereas in OCF, a node may be the member of multiple coalitions at the same time. All nodes in a coalition help each other cooperatively by forwarding group messages to the intermediate or destination nodes. The goal of the nodes is to achieve high success rate in delivering messages. The proposed SCF scheme is cohesive, in which disjoint coalitions always combine to form grand coalition. In OCF, a node reaches a stable grand coalition when all the nodes of the OMN are members of overlapping coalition of the node. No node gains by deviating from the grand coalition in SCF and OCF. Simulation results based on synthetic mobility model and real-life traces show that the message delivery ratio of OMNs increase by up to 67%, as compared to the noncooperative scenario. Moreover, the message overhead ratio using the proposed coalition-based schemes reduces by up to about (1/3)rd of that of the noncooperative communication scheme.

  2. Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction

    Directory of Open Access Journals (Sweden)

    Doryaneh Hossien Afshari

    2017-03-01

    Full Text Available The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.

  3. MODELING OF ADS-B MESSAGES TRANSMISSION THROUGH SATELLITE TELECOMMUNICATION CHANNEL IRIDIUM USING NETCRACKER PROFESSIONAL 4.1

    Directory of Open Access Journals (Sweden)

    В. Харченко

    2012-04-01

    Full Text Available The model for the traffic analysis in a communication channel "aircraft - satellite - ground station" wasbuilt and used for modeling of transfer ADS-B messages with the help low-orbit satellite complex Іrіdіum.Dependences of factor BER on channel average working load and average utilization time were obtained.Dependences of package failure probabilities on average working load, average utilization time and signaltraveling time were analyzed. The developed model was applied for determination of traffic characteristics ina communication channel "aircraft - satellite - ground station": the dependence of average working load,average channel utilization time and message traveling time on the size of transaction, the dependence oftravelling time on channel delay time were built.

  4. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  5. Anxiety, Construct Differentiation, and Message Production.

    Science.gov (United States)

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  6. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  7. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  8. Photometric requirements for portable changeable message signs.

    Science.gov (United States)

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  9. Getting the message across: age differences in the positive and negative framing of health care messages.

    Science.gov (United States)

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  10. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  11. Message-driven factors influencing opening and forwarding of mobile advertising messages

    OpenAIRE

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  12. When message-frame fits salient cultural-frame, messages feel more persuasive

    OpenAIRE

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  13. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Science.gov (United States)

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  14. Improving Type Error Messages in OCaml

    Directory of Open Access Journals (Sweden)

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  15. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  16. Gender messages in contemporary popular Malay songs

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  17. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  18. Tokenless Biometric Electronic Transactions Using an Audio Signature to Identify the Transaction Processor

    Science.gov (United States)

    2002-05-28

    28, 2002 Inventors: Hoffman; Ned (Sebastopol, CA); Pare, Jr.; David Ferrin (Berkeley, CA); Lee; Jonathan Alexander (Oakland, CA); Lapsley; Philip...Transaction Processor 5. FUNDING NUMBERS 6. AUTHOR(S) Hoffman, Ned; Pare Jr, David Ferrin; Lee, Jonathan Alexander; Lapsley, Philip Dean 7...408. 4845636 Jul., 1989 Walker 705/39. 4926480 May., 1990 Chaum 380/23. 4947028 Aug., 1990 Gorog 235/380. 4961142 Oct., 1990 Elliott et al. 364/408

  19. Economic transactions, opportunistic behavior and protective mechanisms

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    Whenever actors participate in transactions they expose themselves to risks of various kinds. Some of these risks are attributable to events outside the control of the participants and are unavoidable. Others originate in, or are aggrevated by, opportunistic actions undertaken by contract partners...... and other co-operators. This paper is concerned with the latter type of risk and the protection against it. Six protective mechanisms, which may serve as safeguards against opportunistic behavior, are presented and discussed. Special attention is paid to reputation effects. It is noted that such effects may...... account for the lack of opportunistic behavior with which networks are often credited. No protective mechanism is, however, effective under all circumstances....

  20. Midstream purchases and other transaction structures

    International Nuclear Information System (INIS)

    Woodward, S.M.

    1999-01-01

    The value of midstream companies in the Western Canadian Sedimentary Basin was discussed. Midstream business in Canada was created about a decade ago with the deregulation of the natural gas industry. Some of the unique values that a midstream company offers, besides a financing arrangement, are described. A midstream company allows producers to do what they do best, explore and develop the natural resources through drilling of wells, while a midstream company provides the full marketing services for the natural gas including transportation and distribution. Some midstream transaction structure options such as direct cash sale, cash sale with incentive, facility/capacity lease, operating cost guarantee, 'earn in' arrangement are described, with brief summaries of the pros and cons to both producer and midstreamer company

  1. Instant messaging and nursing students' clinical learning experience.

    Science.gov (United States)

    Pimmer, Christoph; Brühlmann, Florian; Odetola, Titilayo Dorothy; Dipeolu, Oluwafemi; Gröhbiel, Urs; Ajuwon, Ademola J

    2018-05-01

    Although learning in clinical settings is a key element of nursing education, for many learners these are challenging developmental contexts often marked by isolation and a lack of belongingness. Despite the massive appropriation of mobile instant messaging (MIM) platforms and the connective properties attendant to them, very little is known about their role in and impact on nursing students' clinical learning experiences. To address this gap, the study, which was part of a multinational research project on the use of mobile social media in health professions education in developing countries, examined the use of the instant messaging platform WhatsApp by nursing students during placements and potential associations with socio-professional indicators. The survey involved a total number of 196 nursing students from 5 schools in Oyo State, Nigeria. The findings suggest that students used WhatsApp relatively frequently and they perceived that this platform strongly enhanced their communication with other students and nurses. WhatsApp use during placements was positively associated with students' maintained social capital with peer students, the development of a professional identity, placement satisfaction and with reduced feelings of isolation from professional communities. The determinants that influenced WhatsApp use during placements were perceived usefulness and perceived ease of use. No associations were found between WhatsApp use during placement and age, attitude, subjective norms and placement duration. This study is one of the first of its kind that points to the relevance of mobile instant messaging as part of nursing students' (inter)personal learning environments in clinical settings and, particularly, in the development setting under investigation. Further research is needed to corroborate these findings, to enhance the understanding of the impact mechanisms, and to evaluate a more systematic use of MIM in clinical learning contexts. Copyright © 2018

  2. Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?

    Science.gov (United States)

    Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M

    2015-11-26

    convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.

  3. Using personas to tailor educational messages to the preferences of coronary heart disease patients.

    Science.gov (United States)

    Vosbergen, S; Mulder-Wiggers, J M R; Lacroix, J P; Kemps, H M C; Kraaijenhagen, R A; Jaspers, M W M; Peek, N

    2015-02-01

    persona more positively than, or in the same way as, the messages that matched their least preferred persona. The persona-based method developed in this study can be used to create a manageable set of patient-centered tailored messages, while additionally using the developed personas to assess patients' preferences. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Foreign exchange transaction exposure of enterprises in Serbia

    Directory of Open Access Journals (Sweden)

    Bogićević Jasmina

    2016-01-01

    Full Text Available Enterprises involved in international business face transaction exposure to foreign exchange risk. This type of exposure occurs when an enterprise trades, borrows, or lеnds in foreign currency. Transaction exposure has a direct effect on an enterprise’s financial position and profitability. It is one of the three forms of exposure to exchange rate fluctuations, the other two being translation exposure and operating exposure. The aim of this paper is to assess the transaction exposure of enterprises in Serbia operating internationally. In addition to identifying and measuring transaction exposure, this paper explores the practical importance that enterprises in Serbia attach to management of this type of foreign exchange risk. We do not find significant differences between domestic and foreign enterprises in their choice of the type of foreign exchange risk exposure to manage. Although transaction exposure is the most managed type of foreign exchange risk, research has shown that, compared to foreign businesses, Serbian enterprises do not use sufficient protective measures to minimize the negative impact of this type of exposure on their cash flows and profitability. We expected that there would be a statistically significant dependence between the volume of enterprises’ foreign currency transactions and the level of applied transaction exposure management practices. However, the results of our research, based on a sample of enterprises in Serbia operating internationally, show that transaction exposure management practices can be influenced by factors other than the level of an enterprise’s foreign currency transactions, such as the enterprise’s country of origin.

  5. Comparing tailored and untailored text messages for smoking cessation

    DEFF Research Database (Denmark)

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  6. S-AMP: Approximate Message Passing for General Matrix Ensembles

    DEFF Research Database (Denmark)

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    the approximate message-passing (AMP) algorithm to general matrix ensembles with a well-defined large system size limit. The generalization is based on the S-transform (in free probability) of the spectrum of the measurement matrix. Furthermore, we show that the optimality of S-AMP follows directly from its......We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...

  7. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  8. Medium-term load forecasting and wholesale transaction profitability

    International Nuclear Information System (INIS)

    Selker, F.K.; Wroblewski, W.R.

    1996-01-01

    The volume of wholesale transactions quoted at firm prices is increasing. The cost, and thus profitability, of serving these contracts strongly depends upon native load during the time of delivery. However, transactions extend beyond load forecasts based on weather information, and long-term resource planning forecasts of load peaks and energy provide inadequate detail. To address this need, Decision Focus Inc. (DFI) and Commonwealth Edison (ComEd) developed a probabilistic, medium-term load forecasting capability. In this paper the authors use a hypothetical utility to explore the impact of uncertain medium-term loads on transaction profitability

  9. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2018-01-01

    A central construct in competitive strategy research is market power, the ability to raise price above marginal cost. Positioning research focuses on attempts to build, protect, and exercise market power. However, this approach contains hidden assumptions about transaction costs. Parties made worse...... off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  10. Art messaging to engage homeless young adults.

    Science.gov (United States)

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  11. Socio-economic vulnerabilities and HIV: Drivers of transactional sex among female bar workers in Yaoundé, Cameroon.

    Science.gov (United States)

    Akoku, Derick Akompab; Tihnje, Mbah Abena; Vukugah, Thomas Achombwom; Tarkang, Elvis Enowbeyang; Mbu, Robinson Enow

    2018-01-01

    The purpose of this study was to examine the relationship between socio-demographic characteristics, risky sexual behaviour, alcohol use and transactional sex among female bar workers in Yaounde, Cameroon. A cross-sectional survey was conducted among a representative sample of 410 female bar workers, recruited through a modified version of venue-based cluster sampling technique from May to June 2017. Transactional sex was defined as having received money/gifts in exchange for sex with any sexual partner in the past 12 months. Logistic regression models were performed to identify the factors associated with transactional sex. The level of statistical significance was set at panalysis showed that those who engaged in transactional sex were more likely to have had sex with a male customer in the past 6 months (aOR = 7.34; 95% CI, 3.63-16.98), had sex under the influence of alcohol in the past 6 months (aOR = 2.42; 95% CI, 1.18-4.96) and frequent alcohol consumers (aOR = 2.06; 95%CI, 1.04-4.10). Respondents who had their last sexual intercourse 4 weeks or more prior to the study (aOR = 0.26; 95% CI, 0.08-0.84) were less likely to have engaged in transactional sex. Our study concludes that female bar workers are exposed to male customers and engage in risky sexual practices including transaction sex. Most of them also consume alcohol which increases their risk of HIV and STI acquisition. They are a high-risk group that need to be targeted with HIV prevention interventions.

  12. A Qualitative Evaluation of Contact Centre Dietitian Support and Electronic Motivational Messaging for eaTracker My Goals Users.

    Science.gov (United States)

    Lieffers, Jessica R L; Haresign, Helen; Mehling, Christine; Arocha, Jose F; Hanning, Rhona M

    2018-06-01

    To conduct a qualitative evaluation of adjunct supports (brief motivational messaging regarding goals delivered by email/website, contact centre dietitian assistance) offered by EatRight Ontario (ERO) for users of a website-based nutrition/activity goal setting/tracking feature (eaTracker "My Goals"). One-on-one semi-structured interviews were conducted with My Goals users in Ontario (n = 18) and Alberta (n = 5) recruited via the eaTracker website and ERO contact centre dietitians (n = 5). Interview transcripts were analyzed using content analysis. Participants had mixed experiences and perspectives with ERO motivational messaging. Messages targeted towards specific goals (e.g., tips, recipes) were generally well-liked, and generic messages (e.g., eaTracker login reminders) were less useful. No interviewed users had contacted ERO dietitians regarding goals, and dietitians reported encountering few callers asking for assistance while using My Goals. Limited user knowledge was one explanation for this finding. Participants provided suggestions to enhance these supports. Electronic motivational messaging and contact centre dietitian assistance have the potential to support achievement of goals set with website-based features. When considering using electronic messaging, researchers and practitioners should consider message content and delivery tailoring. Marketing that focuses on how contact centre dietitians can assist website users with their goals is needed when services are used in naturalistic settings.

  13. The development by the German Transactional Analysis Association of a scientifically-based online evaluation system of transactional analysis training

    Directory of Open Access Journals (Sweden)

    Norbert Nagel

    2017-07-01

    Full Text Available The authors present the development and statistical analysis, conducted under the auspices of the German Transactional Analysis Association (DGTA, of an online evaluation system of transactional analysis training.  The understanding of evaluation research is clarified, and the data-entry form and its grounding in the theory of transactional analysis are presented. Emphasis is placed on the development of the competence concept, the definition of competence categories, and the representation of the foundations of a transactional-analytic educational theory.  The scientific examination of the validity and reliability of the scales, the research process with pre-test and re-test, and the evaluation of the data in the system of online evaluation are extensively documented.  In conclusion, it is claimed that this online-based DGTA evaluation is one of the few result-oriented teaching evaluation instruments in the German-speaking countries which meets scientific control criteria and is published. Citation - APA format: Nagel, N., König, J., Ottmann, S., & Hahnle, A. (2017. The development by the German Transactional Analysis Association of a scientifically-based online evaluation system of transactional analysis training. International Journal of Transactional Analysis Research & Practice, 8(2, 3-23.

  14. 26 CFR 157.5891-1 - Imposition of excise tax on structured settlement factoring transactions.

    Science.gov (United States)

    2010-04-01

    ... settlement factoring transactions. 157.5891-1 Section 157.5891-1 Internal Revenue INTERNAL REVENUE SERVICE... SETTLEMENT FACTORING TRANSACTIONS Tax on Structured Settlement Factoring Transactions § 157.5891-1 Imposition of excise tax on structured settlement factoring transactions. (a) In general. Section 5891 imposes...

  15. Distribution factors for reactive power in the presence of bilateral transactions

    International Nuclear Information System (INIS)

    De Tuglie, E.; Torelli, F.

    2004-01-01

    The twin factors of limited investment in electric transmission systems and the overexploitation of electrical resources results in an increase in the need for reactive power to support system voltage profile and to supply loads. It is reasonable to expect that generators and compensators, heavily involved in reactive support on a voluntary basis, will be remunerated for their service by market transactions. This remuneration will depend on the network topology, i.e. of buyers, sellers and reactive injection locations, on the active power exchanged and the reactive power required by loads. All these aspects are taken into account in developing a methodology based on circuit considerations. Using this approach, at a given system operating point characterised by a predefined set of transactions, reactive responsibilities can be formulated as the sum of two terms: one strictly related to transactions and the other dependent on electric network parameters. Test results demonstrate the efficacy of the proposed methodology in sharing reactive power responsibilities in a fair way among market participants. (author)

  16. Patient perceptions of text-messages, email, and video in dermatologic surgery patients.

    Science.gov (United States)

    Hawkins, Spencer D; Barilla, Steven; Williford, Phillip Williford M; Feldman, Steven R; Pearce, Daniel J

    2017-04-14

    We developed dermatology patient education videos and a post-operative text message service that could be accessed universally via web based applications. A secondary outcome of the study was to assess patient opinions of text-messages, email, and video in the health care setting which is reported here. An investigator-blinded, randomized, controlled intervention was evaluated in 90 nonmelanoma MMS patients at Wake Forest Baptist Dermatology. Patients were randomized 1:1:1:1 for exposure to: 1) videos with text messages, 2) videos only, 3) text messages-only, or 4) standard of care. Assessment measures were obtained by the use of REDCap survey questions during the follow up visit. 1) 67% would like to receive an email with information about the procedure beforehand 2) 98% of patients reported they would like other doctors to use educational videos as a form of patient education 3) 88% of our patients think it is appropriate for physicians to communicate to patients via text message in certain situations. Nearly all patients desired physicians to use text-messages and video in their practice and the majority of patients preferred to receive an email with information about their procedure beforehand.

  17. A secure transmission scheme of streaming media based on the encrypted control message

    Science.gov (United States)

    Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li

    2007-09-01

    As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.

  18. [Physical activity guidelines for Canadians: strategies for dissemination of the message, expectations for change and evaluation].

    Science.gov (United States)

    Brawley, Lawrence R; Latimer, Amy E

    2007-01-01

    Physical activity guidelines offer evidence-based behavioural benchmarks that relate to reduced risk of morbidity and mortality if people adhere to them. Essentially, the guidelines tell people what to do, but not why and how they should do it. Thus, to motivate adherence, messages that translate guidelines should convey not only how much physical activity one should attempt and why it is recommended, but also how to achieve such a recommendation. Canada's physical activity guides exemplify how guidelines can be translated. This paper (i) provides a brief overview of the challenges encountered in creating the existing guides and (ii) highlights important practical issues and empirical evidence that should be considered in the future when translating guidelines into messages and disseminating these messages. We draw on the successes of past efforts to translate the goals of physical activity guidelines and on recent literature on messages and media campaigns to make recommendations. Information to motivate people to move toward the goals in physical activity guidelines should be translated into a set of messages that are informative, thought provoking, and persuasive. These messages should be disseminated to the public via a multi-phase social-marketing campaign that is carefully planned and thoroughly evaluated.

  19. Physical activity guides for Canadians: messaging strategies, realistic expectations for change, and evaluation.

    Science.gov (United States)

    Brawley, Lawrence R; Latimer, Amy E

    2007-01-01

    Physical activity guidelines offer evidence-based behavioural benchmarks that relate to reduced risk of morbidity and mortality if people adhere to them. Essentially, the guidelines tell people what to do, but not why and how they should do it. Thus, to motivate adherence, messages that translate guidelines should convey not only how much physical activity one should attempt and why it is recommended, but also how to achieve such a recommendation. Canada's physical activity guides exemplify how guidelines can be translated. This paper (i) provides a brief overview of the challenges encountered in creating the existing guides and (ii) highlights important practical issues and empirical evidence that should be considered in the future when translating guidelines into messages and disseminating these messages. We draw on the successes of past efforts to translate the goals of physical activity guidelines and on recent literature on messages and media campaigns to make recommendations. Information to motivate people to move toward the goals in physical activity guidelines should be translated into a set of messages that are informative, thought provoking, and persuasive. These messages should be disseminated to the public via a multi-phase social-marketing campaign that is carefully planned and thoroughly evaluated.

  20. The role of material deprivation and consumerism in the decisions to engage in transactional sex among young people in the urban slums of Blantyre, Malawi.

    Science.gov (United States)

    Kamndaya, Mphatso; Vearey, Jo; Thomas, Liz; Kabiru, Caroline W; Kazembe, Lawrence N

    2015-03-05

    Transactional sex has been associated with a high risk of HIV acquisition and unintended pregnancy among young women in urban slums in sub-Saharan Africa. However, few studies have explored the structural drivers of transactional sex from the perspective of both genders in these settings. This paper explores how young men and women understand the factors that lead to transactional sex among their peers, and how deprivation of material resources (housing, food and health care access) and consumerism (a desire for fashionable goods) may instigate transactional sex in the urban slums of Blantyre, Malawi. Data from 5 focus group discussions and 12 in-depth interviews undertaken with a total of 60 young men and women aged 18-23 years old, conducted between December 2012 and May 2013, were analysed using anticipated and grounded codes. Housing and food deprivation influenced decisions to engage in transactional sex for both young men and women. Poor health care access and a desire for fashionable goods (such as the latest hair or clothing styles and cellular phones) influenced the decisions of young women that led to transactional sex. Interventions that engage with deprivations and consumerism are essential to reducing sexual and reproductive health risks in urban slums.

  1. Emotional flow in persuasive health messages.

    Science.gov (United States)

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  2. Effects of Electronic Word - of - Mouth Messages

    Directory of Open Access Journals (Sweden)

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.

  3. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  4. Positive messaging promotes walking in older adults.

    Science.gov (United States)

    Notthoff, Nanna; Carstensen, Laura L

    2014-06-01

    Walking is among the most cost-effective and accessible means of exercise. Mounting evidence suggests that walking may help to maintain physical and cognitive independence in old age by preventing a variety of health problems. However, older Americans fall far short of meeting the daily recommendations for walking. In 2 studies, we examined whether considering older adults' preferential attention to positive information may effectively enhance interventions aimed at promoting walking. In Study 1, we compared the effectiveness of positive, negative, and neutral messages to encourage walking (as measured with pedometers). Older adults who were informed about the benefits of walking walked more than those who were informed about the negative consequences of failing to walk, whereas younger adults were unaffected by framing valence. In Study 2, we examined within-person change in walking in older adults in response to positively- or negatively-framed messages over a 28-day period. Once again, positively-framed messages more effectively promoted walking than negatively-framed messages, and the effect was sustained across the intervention period. Together, these studies suggest that consideration of age-related changes in preferences for positive and negative information may inform the design of effective interventions to promote healthy lifestyles. Future research is needed to examine the mechanisms underlying the greater effectiveness of positively- as opposed to negatively-framed messages and the generalizability of findings to other intervention targets and other subpopulations of older adults. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  5. Exploitation of Clustering Techniques in Transactional Healthcare Data

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad Mahoto

    2014-03-01

    Full Text Available Healthcare service centres equipped with electronic health systems have improved their resources as well as treatment processes. The dynamic nature of healthcare data of each individual makes it complex and difficult for physicians to manually mediate them; therefore, automatic techniques are essential to manage the quality and standardization of treatment procedures. Exploratory data analysis, patternanalysis and grouping of data is managed using clustering techniques, which work as an unsupervised classification. A number of healthcare applications are developed that use several data mining techniques for classification, clustering and extracting useful information from healthcare data. The challenging issue in this domain is to select adequate data mining algorithm for optimal results. This paper exploits three different clustering algorithms: DBSCAN (Density-Based Clustering, agglomerative hierarchical and k-means in real transactional healthcare data of diabetic patients (taken as case study to analyse their performance in large and dispersed healthcare data. The best solution of cluster sets among the exploited algorithms is evaluated using clustering quality indexes and is selected to identify the possible subgroups of patients having similar treatment patterns

  6. The message development tool: a case for effective operationalization of messaging in social marketing practice.

    Science.gov (United States)

    Mattson, Marifran; Basu, Ambar

    2010-07-01

    That messages are essential, if not the most critical component of any communicative process, seems like an obvious claim. More so when the communication is about health--one of the most vital and elemental of human experiences (Babrow & Mattson, 2003). Any communication campaign that aims to change a target audience's health behaviors needs to centralize messages. Even though messaging strategies are an essential component of social marketing and are a widely used campaign model, health campaigns based on this framework have not always been able to effectively operationalize this key component, leading to cases where initiating and sustaining prescribed health behavior has been difficult (MacStravic, 2000). Based on an examination of the VERB campaign and an Australian breastfeeding promotion campaign, we propose a message development tool within the ambit of the social marketing framework that aims to extend the framework and ensure that the messaging component of the model is contextualized at the core of planning, implementation, and evaluation efforts.

  7. Transactive memory in organizational groups: the effects of content, consensus, specialization, and accuracy on group performance.

    Science.gov (United States)

    Austin, John R

    2003-10-01

    Previous research on transactive memory has found a positive relationship between transactive memory system development and group performance in single project laboratory and ad hoc groups. Closely related research on shared mental models and expertise recognition supports these findings. In this study, the author examined the relationship between transactive memory systems and performance in mature, continuing groups. A group's transactive memory system, measured as a combination of knowledge stock, knowledge specialization, transactive memory consensus, and transactive memory accuracy, is positively related to group goal performance, external group evaluations, and internal group evaluations. The positive relationship with group performance was found to hold for both task and external relationship transactive memory systems.

  8. Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin

    Science.gov (United States)

    Rizky Fauzi, Muhammad Reza; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of today’s emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.

  9. Transactive Control and Coordination of Distributed Assets for Ancillary Services

    Energy Technology Data Exchange (ETDEWEB)

    Subbarao, Krishnappa [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Chassin, David P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-09-18

    The need to diversify energy supplies, the need to mitigate energy-related environmental impact, and the entry of electric vehicles in large numbers present challenges and opportunities to power system professionals. Wind and solar power provide many benefits, and to reap the benefits the resulting increased variability—forecasted as well as unforecasted—should be addressed. A majority of states and the District of Columbia, representing over half of the total load, have passed renewable portfolio standards. California’s plans call for 33% renewable energy by 2020. For grid balancing and for meeting reliability standards, ancillary services are needed. The needs for these services are poised to increase significantly. Demand resources are receiving increasing attention as one means of providing the ancillary services. Control and coordination of a large number (~millions) of distributed smart grid assets requires innovative approaches. One such approach is transactive control and coordination (TC2)—a distributed, hierarchical, agent-based incentive and control system. The TC2 paradigm is to create a market-like control system in which participation is voluntary and the participant sets the price for participation. For transactions that are frequent, automation of bids and responses is necessary. Such an approach has been developed and demonstrated at the Pacific Northwest National Laboratory. The devices, typically thermostatically controlled heating, ventilating, and air conditioning (HVAC) loads, send their bids—the quantity of energy they need and, based on the consumer preferences encoded in a simple user interface, the price they are willing to pay. The typical bid period is 5 minutes. By aggregating all the bids, a demand curve is generated by the aggregating entity, and matched with a supply curve or supply constraint. The aggregator transmits the clearing price to the devices. The winning devices proceed to consume the energy they bid for and won

  10. Fear appeals in HIV-prevention messages: young people's perceptions in northern Tanzania.

    Science.gov (United States)

    Bastien, Sheri

    2011-12-01

    The aims of the study were to elicit the perceptions of young people in Tanzania on the role of fear appeals in HIV-prevention messages and to identify important contextual factors that may influence young people's perceptions of HIV-prevention posters. A total of 10 focus groups were conducted to investigate the role of fear appeals using the extended parallel process model (EPPM) as a guide. Young people were shown a series of images (mostly posters) with alternating high and low-threat messages (fear appeals), and then asked questions about their overall beliefs about HIV and AIDS, as well as about their response in terms of perceived susceptibility to HIV infection, the severity of the message, and their perceptions of self-efficacy and response efficacy. The images and messages that specifically targeted young people were highest in inducing perceived susceptibility to HIV infection, while pictorial descriptions of the physical consequences of HIV infection and those messages related to the stigma and discrimination faced by HIV-infected or affected people induced greater perceptions of severity. The information-based posters rated high in inducing response efficacy, while none of the images seemed to convince young people that they had the self-efficacy to perform the recommended health behaviours. The young people expressed a preference for fear-based appeals and a belief that this could work well in HIV-prevention efforts, yet they also stated a desire for more information-based messages about how to protect themselves. Finally, the messages evoking the most emotional responses were those that had been locally conceived rather than ones developed by large-scale donor-funded campaigns. Finding the appropriate balance between fear and efficacy in HIV-prevention messages is imperative. Further research is needed to better understand how and when fear appeals work and do not work in African settings, especially among young people.

  11. Transactions of the nuclear societies of Israel joint meeting 1994

    International Nuclear Information System (INIS)

    1994-01-01

    The 18 th convention of the Israel nuclear societies transactions book contains presentations in the following topics: reactor physics, health physics, radiation protection, nuclear medicine and general reviews about the status of nuclear energy in Israel

  12. A TRANSACTION COST ANALYSIS OF MICROPAYMENTS IN MOBILE COMMERCE

    Directory of Open Access Journals (Sweden)

    Daniel Gille

    2012-07-01

    Full Text Available Personalised, location-related and differentiated services in the mobile digitaleconomy create a demand for suitable pricing models. In the case of disaggregated“microservices” (e.g., small digitalized information or service units, as well as for theacquisition of low-value physical goods, the deployment of micropayments seemsappropriate.This paper analyzes the economic efficiency of marginal transaction amounts in the mcommercearea by applying the theoretical approach of transaction cost economics. Forthis purpose, a separation of technical and cognitive transaction costs is applied. Theinfluence of selected determinants such as specifity, uncertainty and bounded rationality ontransaction costs in mobile commerce micropayments is analyzed. The result is a morelikely application of micropayments for physical goods such as beverages or parking ticketsthan for digital goods and services, given the theoretical assumptions of the model. Inaddition, indicators for a significant above-zero lower limit of transaction amounts inmobile commerce are presented.

  13. Strategic R&D transactions in personalized drug development.

    Science.gov (United States)

    Makino, Tomohiro; Lim, Yeongjoo; Kodama, Kota

    2018-03-21

    Although external collaboration capability influences the development of personalized medicine, key transactions in the pharmaceutical industry have not been addressed. To explore specific trends in interorganizational transactions and key players, we longitudinally surveyed strategic transactions, comparing them with other advanced medical developments, such as antibody therapy, as controls. We found that the financing deals of start-ups have surged over the past decade, accelerating intellectual property (IP) creation. Our correlation and regression analyses identified determinants of financing deals among alliance deals, acquisition deals, patents, research and development (R&D) licenses, market licenses, and scientific papers. They showed that patents positively correlated with transactions, and that the number of R&D licenses significantly predicted financing deals. This indicates, for the first time, that start-ups and investors lead progress in personalized medicine. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. 75 FR 53171 - Prohibited Transaction Exemption Procedures; Employee Benefit Plans

    Science.gov (United States)

    2010-08-30

    ... Department's standards concerning the independence, knowledge, and competence of third-party experts retained... transaction is in the interests of the plan and of its participants and beneficiaries, and for exercising its...

  15. A Case for Including Transactions in OpenMP

    Energy Technology Data Exchange (ETDEWEB)

    Wong, M; Bihari, B L; de Supinski, B R; Wu, P; Michael, M; Liu, Y; Chen, W

    2010-01-25

    Transactional Memory (TM) has received significant attention recently as a mechanism to reduce the complexity of shared memory programming. We explore the potential of TM to improve OpenMP applications. We combine a software TM (STM) system to support transactions with an OpenMP implementation to start thread teams and provide task and loop-level parallelization. We apply this system to two application scenarios that reflect realistic TM use cases. Our results with this system demonstrate that even with the relatively high overheads of STM, transactions can outperform OpenMP critical sections by 10%. Overall, our study demonstrates that extending OpenMP to include transactions would ease programming effort while allowing improved performance.

  16. Transaction-Based Controls for Building-Grid Integration: VOLTTRON™

    Energy Technology Data Exchange (ETDEWEB)

    Akyol, Bora A.; Haack, Jereme N.; Hernandez, George; Katipamula, Srinivas; Widergren, Steven E.

    2015-07-01

    The U.S. Department of Energy’s (DOE’s) Building Technologies Office (BTO) is supporting the development of a “transactional network” concept that supports energy, operational, and financial transactions between building systems (e.g., rooftop units -- RTUs), and the electric power grid using applications, or 'agents', that reside either on the equipment, on local building controllers, or in the Cloud. The transactional network vision is delivered using a real-time, scalable reference platform called VOLTTRON that supports the needs of the changing energy system. VOLTTRON is an agent execution and an innovative distributed control and sensing software platform that supports modern control strategies, including agent-based and transaction-based controls. It enables mobile and stationary software agents to perform information gathering, processing, and control actions.

  17. 77 FR 3037 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Science.gov (United States)

    2012-01-20

    ... Vol. 77 Friday, No. 13 January 20, 2012 Part II Department of Labor Employee Benefits Security... Employee Benefits Security Administration Proposed Exemptions From Certain Prohibited Transaction Restrictions AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of Proposed Exemptions...

  18. Marketable pollution permits with uncertainty and transaction costs

    International Nuclear Information System (INIS)

    Montero, Juan-Pablo

    1998-01-01

    Increasing interest in the use of marketable permits for pollution control has become evident in recent years. Concern regarding their performance still remains because empirical evidence has shown transaction costs and uncertainty to be significant in past and existing marketable permits programs. In this paper we develop theoretical and numerical models that include transaction costs and uncertainty (in trade approval) to show their effects on market performance (i.e., equilibrium price of permits and trading volume) and aggregate control costs. We also show that in the presence of transaction costs and uncertainty the initial allocation of permits may not be neutral in terms of efficiency. Furthermore, using a numerical model for a hypothetical NO x trading program in which participants have discrete control technology choices, we find that aggregate control costs and the equilibrium price of permits are sensitive to the initial allocation of permits, even for constant marginal transaction costs and certainty

  19. VOLTTRON Lite: Integration Platform for the Transactional Network

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  20. Map of important transactions and master data in SAP ERP

    OpenAIRE

    Schermann, Michael

    2015-01-01

    This image represents the most important transactions and master data in SAP ERP as a tube map. As such, it covers most of the content of Magal & Word (2012) Integrated Business Processes with ERP Systems. Wiley, Hoboken, NJ, USA.

  1. 31 CFR 538.512 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 538.512 Section 538.512 Money and Finance: Treasury Regulations Relating to Money and... telecommunications authorized. All transactions with respect to the receipt and transmission of telecommunications... a person in Sudan of telecommunications equipment or technology. ...

  2. Transactive Control of Commercial Buildings for Demand Response

    Energy Technology Data Exchange (ETDEWEB)

    Hao, He; Corbin, Charles D.; Kalsi, Karanjit; Pratt, Robert G.

    2017-01-01

    Transactive control is a type of distributed control strategy that uses market mechanism to engage self-interested responsive loads to achieve power balance in the electrical power grid. In this paper, we propose a transactive control approach of commercial building Heating, Ventilation, and Air- Conditioning (HVAC) systems for demand response. We first describe the system models, and identify their model parameters using data collected from Systems Engineering Building (SEB) located on our Pacific Northwest National Laboratory (PNNL) campus. We next present a transactive control market structure for commercial building HVAC system, and describe its agent bidding and market clearing strategies. Several case studies are performed in a simulation environment using Building Control Virtual Test Bed (BCVTB) and calibrated SEB EnergyPlus model. We show that the proposed transactive control approach is very effective at peak clipping, load shifting, and strategic conservation for commercial building HVAC systems.

  3. 76 FR 14083 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Science.gov (United States)

    2011-03-15

    ... firms that litigate securities fraud cases on a contingency fee basis. Finally, IFS stated that the... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Exemptions From Certain Prohibited Transaction Restrictions AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice...

  4. Cloud model construct for transaction-based cooperative systems ...

    African Journals Online (AJOL)

    Cloud model construct for transaction-based cooperative systems. ... procure cutting edge Information Technology infrastructure are some of the problems faced ... Results also reveal that credit cooperatives will benefit from the model by taking ...

  5. 49 CFR 534.6 - Reporting corporate transactions.

    Science.gov (United States)

    2010-10-01

    ... CONTEXT OF CHANGES IN CORPORATE RELATIONSHIPS § 534.6 Reporting corporate transactions. Manufacturers who... preparing the report; (iii) Identify the production year being reported on; (iv) Be written in the English...

  6. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  7. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  8. Uncertainty and stochasticity of business transactions: the issue of accounting

    OpenAIRE

    Mykhaylo Luchko

    2013-01-01

    This paper considers the questions referred to accounting as a management tool of the related to risk business transactions. Found that accounting as a management function is primarily people's knowledge about the status and behavior of assets, capital and liabilities under the influence of business operations at all levels of the company’s hierarchy. There are also business processes as objects of accounting. Found that all business transactions and business processes associated with the ris...

  9. IMPROVING STUDENT PERFORMANCE AND FACULTY EVALUATION: A TRANSACTIONAL RELATIONSHIP STRATEGY

    OpenAIRE

    Wade, Mark A.

    2000-01-01

    As in any relationship between buyer and seller, the educational transaction between learner and teacher requires that a level of receptivity be created so that features, advantages and benefits of the transaction can be examined. Student responses to instructor efforts to create a vested covenant in the classroom were evaluated. Teaching methods were altered in two of four course sessions taught by the instructor. When efforts were made to gain student ownership of the class, both student gr...

  10. Parallel-Architecture Simulator Development Using Hardware Transactional Memory

    OpenAIRE

    Armejach Sanosa, Adrià

    2009-01-01

    To address the need for a simpler parallel programming model, Transactional Memory (TM) has been developed and promises good parallel performance with easy-to-write parallel code. Unlike lock-based approaches, with TM, programmers do not need to explicitly specify and manage the synchronization among threads. However, programmers simply mark code segments as transactions, and the TM system manages the concurrency control for them. TM can be implemented either in software (STM) or hardware (HT...

  11. Transaction costs, externalities and information technology in health care.

    Science.gov (United States)

    Ferguson, B; Keen, J

    1996-01-01

    This paper discusses some of the economic issues which underpin the rationale for investment in information and communications technologies (ICTs). Information imperfections lead to significant transaction costs (search, negotiating and monitoring) which in turn confer a negative externality on parties involved in exchange. This divergence in private and social costs leads to a degree of resource misallocation (efficiency loss) which, uncorrected, results in a sub-optimal outcome. Traditional solutions to this problem are to rely upon direct government action to reduce the costs of transacting between market agents, or to employ tax/subsidy measures and other legislative action to achieve the desired market outcome. Three key policy questions are raised in the context of the NHS purchaser/provider relationship. Firstly, what is the optimum level of transaction costs; secondly, can ICTs assist in lowering the level of transaction costs to the optimum level; thirdly, who should bear the investment cost in reducing the level of transaction costs? The issue of property rights in different information systems is discussed and raises interesting policy questions about how much investment should be undertaken centrally rather than devolved to a more local level. In some ways this economic framework offers a post hoc justification of why different ICT systems have been introduced at various levels of the NHS. Essentially this reduces to the problem of externalities: providing good information confers a positive externality: not providing relevant, timely and accurate information confers a negative externality, by increasing further the level of transaction costs. The crucial role which ICT systems can play lies in attempting to reduce the level of transaction costs and driving the market towards what Dahlman has described as the transaction-cost-constrained equilibrium.

  12. A trusted cryptocurrency scheme for secure and verifiable digital transactions

    OpenAIRE

    Baldi, Marco; Chiaraluce, Franco

    2017-01-01

    Decentralized digital currency systems known as cryptocurrencies are a breakthrough in electronic payments: the absence of a central authority can avoid the risk that a not fully reliable government seizes assets or causes hyperinflation, very small transactions can be made without incurring high costs and transactions can be traced, thus providing a tool to counter laundering and tax evasion. Furthermore, decentralization provides robustness against many attacks. Despite these advantages, cr...

  13. A transaction cost analysis of micropayments in mobile commerce

    OpenAIRE

    Gille, Daniel

    2005-01-01

    Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated “microservices” (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of marginal transaction amounts in the m-commerce area by applying the theoretical approach of transact...

  14. Protecting Online Transactions with Unique Embedded Key Generators

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Zenner, Erik

    2007-01-01

    We present a novel approach for protecting transactions over networks. While we use the example of a netbank application, the proposal is relevant for many security-critical transactions. The approach is based on two major changes compared to current solutions. The first one is the use...... difficult. In combination, these techniques allow to build a secure channel between the client program and the server, while current solutions only build such a channel between the client computer and the server....

  15. EDITORIAL: Message from the Editor

    Science.gov (United States)

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  16. A theory-based video messaging mobile phone intervention for smoking cessation: randomized controlled trial.

    Science.gov (United States)

    Whittaker, Robyn; Dorey, Enid; Bramley, Dale; Bullen, Chris; Denny, Simon; Elley, C Raina; Maddison, Ralph; McRobbie, Hayden; Parag, Varsha; Rodgers, Anthony; Salmon, Penny

    2011-01-21

    Advances in technology allowed the development of a novel smoking cessation program delivered by video messages sent to mobile phones. This social cognitive theory-based intervention (called "STUB IT") used observational learning via short video diary messages from role models going through the quitting process to teach behavioral change techniques. The objective of our study was to assess the effectiveness of a multimedia mobile phone intervention for smoking cessation. A randomized controlled trial was conducted with 6-month follow-up. Participants had to be 16 years of age or over, be current daily smokers, be ready to quit, and have a video message-capable phone. Recruitment targeted younger adults predominantly through radio and online advertising. Registration and data collection were completed online, prompted by text messages. The intervention group received an automated package of video and text messages over 6 months that was tailored to self-selected quit date, role model, and timing of messages. Extra messages were available on demand to beat cravings and address lapses. The control group also set a quit date and received a general health video message sent to their phone every 2 weeks. The target sample size was not achieved due to difficulty recruiting young adult quitters. Of the 226 randomized participants, 47% (107/226) were female and 24% (54/226) were Maori (indigenous population of New Zealand). Their mean age was 27 years (SD 8.7), and there was a high level of nicotine addiction. Continuous abstinence at 6 months was 26.4% (29/110) in the intervention group and 27.6% (32/116) in the control group (P = .8). Feedback from participants indicated that the support provided by the video role models was important and appreciated. This study was not able to demonstrate a statistically significant effect of the complex video messaging mobile phone intervention compared with simple general health video messages via mobile phone. However, there was

  17. Dynamic Self-Healing Mechanism for Transactional Business Process

    Directory of Open Access Journals (Sweden)

    Yuhai Zhao

    2015-01-01

    Full Text Available It is clear that transactional behavior consistency is a prerequisite and basis for construction of a reliable services-based business application. However, in previous works, maintaining transactional consistency during exception handling was ignored. Maintaining transactional consistency requires functionality for rolling back some operations and revoking uploaded data. Replacing only the failed service will eventually lead to overall business application failure. In this study, we take fully into account the behavioral consistency of transactional services and propose two effective self-healing mechanisms for service-based applications. If a service enters into potential failure condition, a rescheduling mechanism is triggered to maintain consistent transactional behavior and to ensure reliable execution; if a service fails during execution, the compensation operation is triggered and the system will take action to ensure transactional behavior consistency. Meanwhile, cost-benefit analysis with compensation support is proposed to minimize the dynamic reselection cost. Finally, the experimental analysis shows that the proposed strategies can effectively guarantee the reliability of Web-based applications system.

  18. The transaction costs driving captive power generation: Evidence from India

    International Nuclear Information System (INIS)

    Ghosh, Ranjan; Kathuria, Vinish

    2014-01-01

    The 2003 Indian Electricity Act incentivizes captive power production through open access in an attempt to harness all sources of generation. Yet, we observe that only some firms self-generate while others do not. In this paper we give a transaction cost explanation for such divergent behavior. Using a primary survey of 107 firms from India, we construct a distinct variable to measure the transaction-specificity of electricity use. The ‘make or buy’ decision is then econometrically tested using probit model. Results are highly responsive to transaction-specificity and the likelihood of captive power generation is positively related to it. At the industrial level, this explains why food and chemical firms are more likely to make their own electricity. Since the burden of poor grid supply is highest on smaller sized and high transaction-specific firms, the grid access policies need to account for firm-level characteristics if government wants to incentivize captive power generation. - Highlights: • We analyze why some firms opt for captive power generation while others do not. • We examine the role of transaction costs in this decision making using probit model. • Unique data from a primary survey of manufacturing firms in Andhra Pradesh, India. • Transaction-specificity significantly determines who installs captive power plant (CPP). • Firm-level characteristics crucial in policies incentivizing captive generation

  19. Third sector organizations in rural development: a transaction cost perspective

    Directory of Open Access Journals (Sweden)

    V. VALENTINOV

    2008-12-01

    Full Text Available In many parts of the world, rural development is supported by third sector organizations, such as nongovernmental organizations, farmer associations, and cooperatives. This essay develops a transaction cost explanation of these organizations’ role in rural areas. Since the traditional transaction cost theory is concerned with the choice of governance mechanisms within the for-profit sector, this essay adopts an alternative conceptualization of the notion of transaction cost by building on the theory of the division of labor. This theory regards transaction cost as a constraint on the division of labor causing the replacement of exchange with self-sufficiency. The proposed transaction cost explanation of rural third sector organizations consists of two arguments: 1 third sector organizations embody partial reliance on self-sufficiency; and 2 rural areas exhibit rurality-specific transaction cost acting as a constraint on the division of labor and thus creating a niche for third sector organizations. The essay concludes with suggesting a research program on developing an economic theory of the rural third sector.;

  20. Absorbers in the Transactional Interpretation of Quantum Mechanics

    Science.gov (United States)

    Boisvert, Jean-Sébastien; Marchildon, Louis

    2013-03-01

    The transactional interpretation of quantum mechanics, following the time-symmetric formulation of electrodynamics, uses retarded and advanced solutions of the Schrödinger equation and its complex conjugate to understand quantum phenomena by means of transactions. A transaction occurs between an emitter and a specific absorber when the emitter has received advanced waves from all possible absorbers. Advanced causation always raises the specter of paradoxes, and it must be addressed carefully. In particular, different devices involving contingent absorbers or various types of interaction-free measurements have been proposed as threatening the original version of the transactional interpretation. These proposals will be analyzed by examining in each case the configuration of absorbers and, in the special case of the so-called quantum liar experiment, by carefully following the development of retarded and advanced waves through the Mach-Zehnder interferometer. We will show that there is no need to resort to the hierarchy of transactions that some have proposed, and will argue that the transactional interpretation is consistent with the block-universe picture of time.

  1. Robustness evaluation of transactional audio watermarking systems

    Science.gov (United States)

    Neubauer, Christian; Steinebach, Martin; Siebenhaar, Frank; Pickel, Joerg

    2003-06-01

    Distribution via Internet is of increasing importance. Easy access, transmission and consumption of digitally represented music is very attractive to the consumer but led also directly to an increasing problem of illegal copying. To cope with this problem watermarking is a promising concept since it provides a useful mechanism to track illicit copies by persistently attaching property rights information to the material. Especially for online music distribution the use of so-called transaction watermarking, also denoted with the term bitstream watermarking, is beneficial since it offers the opportunity to embed watermarks directly into perceptually encoded material without the need of full decompression/compression. Besides the concept of bitstream watermarking, former publications presented the complexity, the audio quality and the detection performance. These results are now extended by an assessment of the robustness of such schemes. The detection performance before and after applying selected attacks is presented for MPEG-1/2 Layer 3 (MP3) and MPEG-2/4 AAC bitstream watermarking, contrasted to the performance of PCM spread spectrum watermarking.

  2. Using Russian Ruble in International Transactions

    Directory of Open Access Journals (Sweden)

    Irina Z. Yarygina

    2014-01-01

    Full Text Available The article deals with topical issues in international relations of the Russian Federation on the basis of the increased use of the ruble as the currency contracts and payments. The work shows the coordinated support of economic actors, public institutions of countries-partners. Collaborate with international teams, according to the author of the article, the implementation of economic programs of mutual interest and reinforces the trend of creating a multipolar world. The analysis of problems of development cooperation partners countries in the monetary sphere and shows that the main causes hindering greater use of domestic currencies are: hard currency regulation; a rare use of letters of credit and guarantees, which increases the financial risk operations; significant transaction costs; asymmetrical measures, currency regulation, burdening the mutual interests of the parties. To expand the use of the ruble in international relations author offers take into account a number of factors, including the need for a priority international currency contracts to perform the basic functions of money abroad is a measure of the value, means of payment and means of hoarding. The author's position is presented about the prospects of State institutional policy. In particular, the conclusion: the experience of Bulgaria, Romania, Albania has shown that the main task of the departments responsible for implementing the monetary policy should be the containment of inflationary pressures associated, including overdue contributions to the budget. A key priority in such circumstances is to support solvent and transparent banking systems, which are the basis for international cooperation.

  3. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  4. Nuclear fuel cycle modelling using MESSAGE

    International Nuclear Information System (INIS)

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  5. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  6. Use of an Automated Mobile Phone Messaging Robot in Postoperative Patient Monitoring.

    Science.gov (United States)

    Anthony, Chris A; Lawler, Ericka A; Ward, Christina M; Lin, Ines C; Shah, Apurva S

    2018-01-01

    Mobile phone messaging software robots allow clinicians and healthcare systems to communicate with patients without the need for human intervention. The purpose of this study was to (1) describe a method for communicating with patients postoperatively outside of the traditional healthcare setting by utilizing an automated software and mobile phone messaging platform and to (2) evaluate the first week of postoperative pain and opioid use after common ambulatory hand surgery procedures. The investigation was a prospective, multicenter investigation of patient-reported pain and opioid usage after ambulatory hand surgery. Inclusion criteria included any adult with a mobile phone capable of text messaging, who was undergoing a common ambulatory hand surgical procedure at one of three tertiary care institutions. Participants received daily, automated text messages inquiring about their pain level and how many tablets of prescription pain medication they had taken in the past 24 h. Initial 1-week response rate was assessed and compared between different patient demographics. Patient-reported pain and opioid use were also quantified for the first postoperative week. Statistical significance was set as p tablets of prescription opioid pain medication. We find that a mobile phone messaging software robot allows for effective data collection of postoperative pain and pain medication use. Patients undergoing common ambulatory hand procedures utilized an average of 16 tablets of opioid medication in the first postoperative week.

  7. Developing effective messages about potable recycled water: The importance of message structure and content

    Science.gov (United States)

    Price, J.; Fielding, K. S.; Gardner, J.; Leviston, Z.; Green, M.

    2015-04-01

    Community opposition is a barrier to potable recycled water schemes. Effective communication strategies about such schemes are needed. Drawing on social psychological literature, two experimental studies are presented, which explore messages that improve public perceptions of potable recycled water. The Elaboration-Likelihood Model of information processing and attitude change is tested and supported. Study 1 (N = 415) premeasured support for recycled water, and trust in government information at Time 1. Messages varied in complexity and sidedness were presented at Time 2 (3 weeks later), and support and trust were remeasured. Support increased after receiving information, provided that participants received complex rather than simple information. Trust in government was also higher after receiving information. There was tentative evidence of this in response to two-sided messages rather than one-sided messages. Initial attitudes to recycled water moderated responses to information. Those initially neutral or ambivalent responded differently to simple and one-sided messages, compared to participants with positive or negative attitudes. Study 2 (N = 957) tested the effectiveness of information about the low relative risks, and/or benefits of potable recycled water, compared to control groups. Messages about the low risks resulted in higher support when the issue of recycled water was relevant. Messages about benefits resulted in higher perceived issue relevance, but did not translate into greater support. The results highlight the importance of understanding people's motivation to process information, and need to tailor communication to match attitudes and stage of recycled water schemes' development.

  8. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis; Mamoulis, Nikos; Kalnis, Panos

    2010-01-01

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all

  9. What's in a message? Delivering sexual health promotion to young people in Australia via text messaging

    Directory of Open Access Journals (Sweden)

    Hellard Margaret E

    2010-12-01

    Full Text Available Abstract Background Advances in communication technologies have dramatically changed how individuals access information and communicate. Recent studies have found that mobile phone text messages (SMS can be used successfully for short-term behaviour change. However there is no published information examining the acceptability, utility and efficacy of different characteristics of health promotion SMS. This paper presents the results of evaluation focus groups among participants who received twelve sexual health related SMS as part of a study examining the impact of text messaging for sexual health promotion to on young people in Victoria, Australia. Methods Eight gender-segregated focus groups were held with 21 males and 22 females in August 2008. Transcripts of audio recordings were analysed using thematic analysis. Data were coded under one or more themes. Results Text messages were viewed as an acceptable and 'personal' means of health promotion, with participants particularly valuing the informal language. There was a preference for messages that were positive, relevant and short and for messages to cover a variety of topics. Participants were more likely to remember and share messages that were funny, rhymed and/or tied into particular annual events. The message broadcasting, generally fortnightly on Friday afternoons, was viewed as appropriate. Participants said the messages provided new information, a reminder of existing information and reduced apprehension about testing for sexually transmitted infections. Conclusions Mobile phones, in particular SMS, offer health promoters an exciting opportunity to engage personally with a huge number of individuals for low cost. The key elements emerging from this evaluation, such as message style, language and broadcast schedule are directly relevant to future studies using SMS for health promotion, as well as for future health promotion interventions in other mediums that require short formats, such

  10. The effects of message framing and risk perceptions for HPV vaccine campaigns: focus on the role of regulatory fit.

    Science.gov (United States)

    Park, Sun-Young

    2012-01-01

    This study investigates the effects of framing and risk perception, and their interaction effects on human papillomavirus (HPV) vaccination. Based on a 2 (message frames) × 2 (perceived risk) experimental design, the interaction effects reveal the effectiveness of loss- (vs. gain-) framed messages would be maximized for high (vs. low) perceived risk condition. Based on regulatory fit principles the synergy effects are shown in terms of attitudes toward advertising and HPV vaccination, HPV vaccination intention, and ad-promoted behavioral intention. The findings indicate right message appeals should be selected for the right target audiences in the setting of HPV vaccine promotions.

  11. "This is what you need to be learning": an analysis of messages received by first-year mathematics students during their transition to university

    Science.gov (United States)

    Kouvela, Eirini; Hernandez-Martinez, Paul; Croft, Tony

    2017-10-01

    This paper explores the messages that first-year mathematics students receive in the context of their academic studies during their transition from school to university mathematics. Through observations of lectures and discussions with first-year mathematics undergraduates in an English university, we identified and analysed the messages that two of their lecturers transmitted to them during this transitional phase. The results suggest that strongly framed messages are more easily perceived by students and affect them during their transition. Additionally, messages that have been received in the school context continue to have control over students' thinking and on many occasions can impede adjustment to the new setting.

  12. "This is what you need to be learning": an analysis of messages received by first-year mathematics students during their transition to university

    Science.gov (United States)

    Kouvela, Eirini; Hernandez-Martinez, Paul; Croft, Tony

    2018-06-01

    This paper explores the messages that first-year mathematics students receive in the context of their academic studies during their transition from school to university mathematics. Through observations of lectures and discussions with first-year mathematics undergraduates in an English university, we identified and analysed the messages that two of their lecturers transmitted to them during this transitional phase. The results suggest that strongly framed messages are more easily perceived by students and affect them during their transition. Additionally, messages that have been received in the school context continue to have control over students' thinking and on many occasions can impede adjustment to the new setting.

  13. Students and instant messaging: a survey of current use and demands for higher education.

    NARCIS (Netherlands)

    Bakker, de G.M.; Sloep, P.B.; Jochems, W.M.G.

    2007-01-01

    Instant messaging (IM) is the term used to describe the technology through which 'users can set up a list of partners who will be able to receive notes that pop up on their screens the moment one of them writes and hits the send button'. While early use could be described as mainly for fun, IM today

  14. Positive mood can increase or decrease message scrutiny: the hedonic contingency view of mood and message processing.

    Science.gov (United States)

    Wegener, D T; Petty, R E; Smith, S M

    1995-07-01

    Currently dominant explanations of mood effects on persuasive message processing (i.e., cognitive capacity and feelings as information) predict that happy moods lead to less message scrutiny than neutral or sad moods. The hedonic contingency view (D. T. Wegener & R. E. Petty, 1994) predicts that happy moods can sometimes be associated with greater message processing activity because people in a happy mood are more attentive than neutral or sad people to the hedonic consequences of their actions. Consistent with this view, Experiment 1 finds that a happy mood can lead to greater message scrutiny than a neutral mood when the message is not mood threatening. Experiment 2 finds that a happy mood leads to greater message scrutiny than a sad mood when an uplifting message is encountered, but to less message scrutiny when a depressing message is encountered.

  15. University Advertising and Universality in Messaging

    Science.gov (United States)

    Diel, Stan R.; Katsinas, Stephen

    2018-01-01

    University and college institutional advertisements, which typically are broadcast as public service announcements during the halftime of football games, were the subject of a quantitative analysis focused on commonality in messaging and employment of the semiotic theory of brand advertising. Findings indicate advertisements focus on students'…

  16. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  17. Message passing with parallel queue traversal

    Science.gov (United States)

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  18. Message Integrity Model for Wireless Sensor Networks

    Science.gov (United States)

    Qleibo, Haider W.

    2009-01-01

    WSNs are susceptible to a variety of attacks. These attacks vary in the way they are performed and executed; they include but not limited to node capture, physical tampering, denial of service, and message alteration. It is of paramount importance to protect gathered data by WSNs and defend the network against illegal access and malicious…

  19. Picture Book Soldiers: Men and Messages.

    Science.gov (United States)

    Desai, Christina M.

    2001-01-01

    Examines children's picture books about soldiers and war, including fiction, folktales, and historical fiction, analyzing their implicit and explicit messages about war and the military, and evaluating them for gender stereotyping. Finds that the soldiers conform almost uniformly to an exaggerated male stereotype. Shows different value judgments…

  20. An approach for message exchange using archetypes.

    Science.gov (United States)

    Moraes, João L C; Souza, Wanderley L; Cavalini, Luciana T; Pires, Luís F; Prado, Antonio F

    2013-01-01

    The application of ICT on the whole range of health sector activities, known as e-health, can simplify the access to health care services and will only be acceptable for realistic scenarios if it supports efficient information exchange amongst the caregivers and their patients. The aim of this paper is present an approach for message exchange to realistic scenarios.