WorldWideScience

Sample records for methods allocation concealment

  1. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  2. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  3. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  4. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  5. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    Science.gov (United States)

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  6. Railway Track Allocation: Models and Methods

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Larsen, Jesper; Ehrgott, Matthias

    2011-01-01

    Efficiently coordinating the movement of trains on a railway network is a central part of the planning process for a railway company. This paper reviews models and methods that have been proposed in the literature to assist planners in finding train routes. Since the problem of routing trains......, and train routing problems, group them by railway network type, and discuss track allocation from a strategic, tactical, and operational level....... on a railway network entails allocating the track capacity of the network (or part thereof) over time in a conflict-free manner, all studies that model railway track allocation in some capacity are considered relevant. We hence survey work on the train timetabling, train dispatching, train platforming...

  7. Railway Track Allocation: Models and Methods

    DEFF Research Database (Denmark)

    Lusby, Richard Martin; Larsen, Jesper; Ehrgott, Matthias

    Eciently coordinating the movement of trains on a railway network is a central part of the planning process for a railway company. This paper reviews models and methods that have been proposed in the literature to assist planners in nding train routes. Since the problem of routing trains......, and train routing problems, group them by railway network type, and discuss track allocation from a strategic, tactical, and operational level....... on a railway network entails allocating the track capacity of the network (or part thereof) over time in a con ict-free manner, all studies that model railway track allocation in some capacity are considered relevant. We hence survey work on the train timetabling, train dispatching, train platforming...

  8. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  9. 17 CFR 256.01-11 - Methods of allocation.

    Science.gov (United States)

    2010-04-01

    ... applicable and currently effective methods of allocation filed with the Commission. Both direct and allocated... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Methods of allocation. 256.01... HOLDING COMPANY ACT OF 1935 General Instructions § 256.01-11 Methods of allocation. Indirect costs and...

  10. A unified transmission loss allocation method

    International Nuclear Information System (INIS)

    Ding, Qifeng; Abur, Ali

    2007-01-01

    A new unified method which allocates transmission losses either to buses in a pool market or to individual transactions in a bilateral contract market is presented in this paper. A detailed derivation of the method is given. A bus-loss matrix and a transaction-loss matrix are developed to show the interactions between bus injections and transactions. It is further demonstrated that the ''Physical-power-flow-based'' method can be obtained as an approximation of this unified approach under certain simplifying assumptions. Test systems are used to illustrate how the proposed method behaves under different possible scenarios. (author)

  11. 18 CFR 367.28 - Methods of allocation.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Methods of allocation... Instructions § 367.28 Methods of allocation. Indirect costs and compensation for use of capital must be... allocation. Both direct and allocated indirect costs on projects must be assigned among those companies in...

  12. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  13. Optimal treatment cost allocation methods in pollution control

    International Nuclear Information System (INIS)

    Chen Wenying; Fang Dong; Xue Dazhi

    1999-01-01

    Total emission control is an effective pollution control strategy. However, Chinese application of total emission control lacks reasonable and fair methods for optimal treatment cost allocation, a critical issue in total emission control. The author considers four approaches to allocate treatment costs. The first approach is to set up a multiple-objective planning model and to solve the model using the shortest distance ideal point method. The second approach is to define degree of satisfaction for cost allocation results for each polluter and to establish a method based on this concept. The third is to apply bargaining and arbitration theory to develop a model. The fourth is to establish a cooperative N-person game model which can be solved using the Shapley value method, the core method, the Cost Gap Allocation method or the Minimum Costs-Remaining Savings method. These approaches are compared using a practicable case study

  14. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  15. A transaction assessment method for allocation of transmission services

    Science.gov (United States)

    Banunarayanan, Venkatasubramaniam

    The purpose of this research is to develop transaction assessment methods for allocating transmission services that are provided by an area/utility to power transactions. Transmission services are the services needed to deliver, or provide the capacity to deliver, real and reactive power from one or more supply points to one or more delivery points. As the number of transactions increase rapidly in the emerging deregulated environment, accurate quantification of the transmission services an area/utility provides to accommodate a transaction is becoming important, because then appropriate pricing schemes can be developed to compensate for the parties that provide these services. The Allocation methods developed are based on the "Fair Resource Allocation Principle" and they determine for each transaction the following: the flowpath of the transaction (both real and reactive power components), generator reactive power support from each area/utility, real power loss support from each area/utility. Further, allocation methods for distributing the cost of relieving congestion on transmission lines caused by transactions are also developed. The main feature of the proposed methods is representation of actual usage of the transmission services by the transactions. The proposed method is tested extensively on a variety of systems. The allocation methods developed in this thesis for allocation of transmission services to transactions is not only useful in studying the impact of transactions on a transmission system in a multi-transaction case, but they are indeed necessary to meet the criteria set forth by FERC with regard to pricing based on actual usage. The "consistency" of the proposed allocation methods has also been investigated and tested.

  16. Properties and solution methods for large location-allocation problems

    DEFF Research Database (Denmark)

    Juel, Henrik; Love, Robert F.

    1982-01-01

    Location-allocation with l$ _p$ distances is studied. It is shown that this structure can be expressed as a concave minimization programming problem. Since concave minimization algorithms are not yet well developed, five solution methods are developed which utilize the special properties of the l......Location-allocation with l$ _p$ distances is studied. It is shown that this structure can be expressed as a concave minimization programming problem. Since concave minimization algorithms are not yet well developed, five solution methods are developed which utilize the special properties...... of the location-allocation problem. Using the rectilinear distance measure, two of these algorithms achieved optimal solutions in all 102 test problems for which solutions were known. The algorithms can be applied to much larger problems than any existing exact methods....

  17. 77 FR 54482 - Allocation of Costs Under the Simplified Methods

    Science.gov (United States)

    2012-09-05

    ... cost of goods sold cash or trade discounts that taxpayers do not capitalize for book purposes (and... to adjust additional section 263A costs for cash or trade discounts described in Sec. 1.471-3(b... Allocation of Costs Under the Simplified Methods AGENCY: Internal Revenue Service (IRS), Treasury. ACTION...

  18. Factors of Selection of the Stock Allocation Method

    Directory of Open Access Journals (Sweden)

    Rohov Heorhii K.

    2014-03-01

    Full Text Available The article describes results of the author’s study of factors of making strategic decisions on selection of methods of stock allocation by public joint stock companies in Ukraine. The author used the Random forest mathematical apparatus of classification trees building and also informal methods. The article analyses the reasons that restrain public allocation of stock. It shows significant influence upon selection of a method of stock allocation of such factors as capital concentration, balance rate of corporate rights, sector of economy and significant participation of the institutes of common investment or the state in the authorised capital. The built hierarchical model of classification of factors of the issuing policy of joint stock companies finds logical justification in specific features of the institutional environment, however, it does not fit into the framework of the classical concept of the market economy. The model could be used both for formation of goals of corporate financial strategies and in the process of improvement of state regulation of activity of securities issuers. The prospect of further studies in this direction is identification of transformation of factors of selection of the stock allocation method under conditions of revival of the stock market.

  19. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Methods of allocating funds to State Offices. 761.204... Funds to State Offices § 761.204 Methods of allocating funds to State Offices. FO and OL loan funds are... allocation, if the Agency cannot adequately meet program objectives with a formula allocation. The National...

  20. Congestion cost allocation method in a pool model

    International Nuclear Information System (INIS)

    Jung, H.S.; Hur, D.; Park, J.K.

    2003-01-01

    The congestion cost caused by transmission capacities and voltage limit is an important issue in a competitive electricity market. To allocate the congestion cost equitably, the active constraints in a constrained dispatch and the sequence of these constraints should be considered. A multi-stage method is proposed which reflects the effects of both the active constraints and the sequence. In a multi-stage method, the types of congestion are analysed in order to consider the sequence, and the relationship between congestion and the active constraints is derived in a mathematical way. The case study shows that the proposed method can give more accurate and equitable signals to customers. (Author)

  1. Impact of Different Creatinine Measurement Methods on Liver Transplant Allocation

    Science.gov (United States)

    Kaiser, Thorsten; Kinny-Köster, Benedict; Bartels, Michael; Parthaune, Tanja; Schmidt, Michael; Thiery, Joachim

    2014-01-01

    Introduction The model for end-stage liver disease (MELD) score is used in many countries to prioritize organ allocation for the majority of patients who require orthotopic liver transplantation. This score is calculated based on the following laboratory parameters: creatinine, bilirubin and the international normalized ratio (INR). Consequently, high measurement accuracy is essential for equitable and fair organ allocation. For serum creatinine measurements, the Jaffé method and enzymatic detection are well-established routine diagnostic tests. Methods A total of 1,013 samples from 445 patients on the waiting list or in evaluation for liver transplantation were measured using both creatinine methods from November 2012 to September 2013 at the university hospital Leipzig, Germany. The measurements were performed in parallel according to the manufacturer’s instructions after the samples arrived at the institute of laboratory medicine. Patients who had required renal replacement therapy twice in the previous week were excluded from analyses. Results Despite the good correlation between the results of both creatinine quantification methods, relevant differences were observed, which led to different MELD scores. The Jaffé measurement led to greater MELD score in 163/1,013 (16.1%) samples with differences of up to 4 points in one patient, whereas differences of up to 2 points were identified in 15/1,013 (1.5%) samples using the enzymatic assay. Overall, 50/152 (32.9%) patients with MELD scores >20 had higher scores when the Jaffé method was used. Discussion Using the Jaffé method to measure creatinine levels in samples from patients who require liver transplantation may lead to a systematic preference in organ allocation. In this study, the differences were particularly pronounced in samples with MELD scores >20, which has clinical relevance in the context of urgency of transplantation. These data suggest that official recommendations are needed to determine which

  2. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  3. A Probabilistic Recommendation Method Inspired by Latent Dirichlet Allocation Model

    Directory of Open Access Journals (Sweden)

    WenBo Xie

    2014-01-01

    Full Text Available The recent decade has witnessed an increasing popularity of recommendation systems, which help users acquire relevant knowledge, commodities, and services from an overwhelming information ocean on the Internet. Latent Dirichlet Allocation (LDA, originally presented as a graphical model for text topic discovery, now has found its application in many other disciplines. In this paper, we propose an LDA-inspired probabilistic recommendation method by taking the user-item collecting behavior as a two-step process: every user first becomes a member of one latent user-group at a certain probability and each user-group will then collect various items with different probabilities. Gibbs sampling is employed to approximate all the probabilities in the two-step process. The experiment results on three real-world data sets MovieLens, Netflix, and Last.fm show that our method exhibits a competitive performance on precision, coverage, and diversity in comparison with the other four typical recommendation methods. Moreover, we present an approximate strategy to reduce the computing complexity of our method with a slight degradation of the performance.

  4. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  5. Supplier Portfolio Selection and Optimum Volume Allocation: A Knowledge Based Method

    NARCIS (Netherlands)

    Aziz, Romana; Aziz, R.; van Hillegersberg, Jos; Kersten, W.; Blecker, T.; Luthje, C.

    2010-01-01

    Selection of suppliers and allocation of optimum volumes to suppliers is a strategic business decision. This paper presents a decision support method for supplier selection and the optimal allocation of volumes in a supplier portfolio. The requirements for the method were gathered during a case

  6. Analytical method of waste allocation in waste management systems: Concept, method and case study

    International Nuclear Information System (INIS)

    Bergeron, Francis C.

    2017-01-01

    Waste is not a rejected item to dispose anymore but increasingly a secondary resource to exploit, influencing waste allocation among treatment operations in a waste management (WM) system. The aim of this methodological paper is to present a new method for the assessment of the WM system, the “analytical method of the waste allocation process” (AMWAP), based on the concept of the “waste allocation process” defined as the aggregation of all processes of apportioning waste among alternative waste treatment operations inside or outside the spatial borders of a WM system. AMWAP contains a conceptual framework and an analytical approach. The conceptual framework includes, firstly, a descriptive model that focuses on the description and classification of the WM system. It includes, secondly, an explanatory model that serves to explain and to predict the operation of the WM system. The analytical approach consists of a step-by-step analysis for the empirical implementation of the conceptual framework. With its multiple purposes, AMWAP provides an innovative and objective modular method to analyse a WM system which may be integrated in the framework of impact assessment methods and environmental systems analysis tools. Its originality comes from the interdisciplinary analysis of the WAP and to develop the conceptual framework. AMWAP is applied in the framework of an illustrative case study on the household WM system of Geneva (Switzerland). It demonstrates that this method provides an in-depth and contextual knowledge of WM. - Highlights: • The study presents a new analytical method based on the waste allocation process. • The method provides an in-depth and contextual knowledge of the waste management system. • The paper provides a reproducible procedure for professionals, experts and academics. • It may be integrated into impact assessment or environmental system analysis tools. • An illustrative case study is provided based on household waste

  7. Analytical method of waste allocation in waste management systems: Concept, method and case study

    Energy Technology Data Exchange (ETDEWEB)

    Bergeron, Francis C., E-mail: francis.b.c@videotron.ca

    2017-01-15

    Waste is not a rejected item to dispose anymore but increasingly a secondary resource to exploit, influencing waste allocation among treatment operations in a waste management (WM) system. The aim of this methodological paper is to present a new method for the assessment of the WM system, the “analytical method of the waste allocation process” (AMWAP), based on the concept of the “waste allocation process” defined as the aggregation of all processes of apportioning waste among alternative waste treatment operations inside or outside the spatial borders of a WM system. AMWAP contains a conceptual framework and an analytical approach. The conceptual framework includes, firstly, a descriptive model that focuses on the description and classification of the WM system. It includes, secondly, an explanatory model that serves to explain and to predict the operation of the WM system. The analytical approach consists of a step-by-step analysis for the empirical implementation of the conceptual framework. With its multiple purposes, AMWAP provides an innovative and objective modular method to analyse a WM system which may be integrated in the framework of impact assessment methods and environmental systems analysis tools. Its originality comes from the interdisciplinary analysis of the WAP and to develop the conceptual framework. AMWAP is applied in the framework of an illustrative case study on the household WM system of Geneva (Switzerland). It demonstrates that this method provides an in-depth and contextual knowledge of WM. - Highlights: • The study presents a new analytical method based on the waste allocation process. • The method provides an in-depth and contextual knowledge of the waste management system. • The paper provides a reproducible procedure for professionals, experts and academics. • It may be integrated into impact assessment or environmental system analysis tools. • An illustrative case study is provided based on household waste

  8. Allocation Methods for Use in the Accrual of Manpower Costs.

    Science.gov (United States)

    1983-06-01

    planners more frugal in their use of military manpower (OB1, 1973). Generally Accepted Accounting Principles ( GAAP ) recognize accrual basis accounting...time. Examples of this type of allocation are depreciation or amortization of long term assets (Fremgen and Liao, 1981). It is this second concept of...financing is that the relatively "soft dollars" of the future will make it easier to contribute. A "soft dollar" is the depreciated value of the dollar

  9. Impacts of alternative allowance allocation methods under a cap-and-trade program in power sector

    International Nuclear Information System (INIS)

    Liu Beibei; He Pan; Zhang Bing; Bi Jun

    2012-01-01

    Emission trading is considered to be a cost-effective environmental economic instrument for pollution control. However, the policy design of an emission trading program has a decisive impact on its performance. Allowance allocation is one of the most important policy design issues in emission trading, not only for equity but also for policy performance. In this research, an artificial market for sulfur dioxide (SO 2 ) emission trading was constructed by applying an agent-based model. The performance of the Jiangsu SO 2 emission trading market was examined under different allowance allocation methods and transaction costs. The results showed that the market efficiency of emission trading would be affected by the allocation methods when the transaction costs are positive. The auction allowance allocation method was more efficient and had the lowest total emission control costs than the other three allocation methods examined. However, the use of this method will require that power plants pay for all of their allowance, and doing so will increase the production costs of power plants. On the other hand, output-based allowance allocation is the second best method. - Highlights: ► The impact of allowance allocation methods is examined for a cap-and-trade program. ► The market efficiency would be distinct when the transaction costs are positive. ► The auction method would have lowest total emission control costs.

  10. Frontiers in economic research on petroleum allocation using mathematical programming methods

    International Nuclear Information System (INIS)

    Rowse, J.

    1991-01-01

    This paper presents a state of the art of operations research techniques applied in petroleum allocation, namely mathematical programming methods, with principal attention directed toward linear programming and nonlinear programming (including quadratic programming). Contributions to the economics of petroleum allocation are discussed for international trade, industrial organization, regional/macro economics, public finance and natural resource/environmental economics

  11. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  12. Method of reliability allocation based on fault tree analysis and fuzzy math in nuclear power plants

    International Nuclear Information System (INIS)

    Chen Zhaobing; Deng Jian; Cao Xuewu

    2005-01-01

    Reliability allocation is a kind of a difficult multi-objective optimization problem. It can not only be applied to determine the reliability characteristic of reactor systems, subsystem and main components but also be performed to improve the design, operation and maintenance of nuclear plants. The fuzzy math known as one of the powerful tools for fuzzy optimization and the fault analysis deemed to be one of the effective methods of reliability analysis can be applied to the reliability allocation model so as to work out the problems of fuzzy characteristic of some factors and subsystem's choice respectively in this paper. Thus we develop a failure rate allocation model on the basis of the fault tree analysis and fuzzy math. For the choice of the reliability constraint factors, we choose the six important ones according to practical need for conducting the reliability allocation. The subsystem selected by the top-level fault tree analysis is to avoid allocating reliability for all the equipment and components including the unnecessary parts. During the reliability process, some factors can be calculated or measured quantitatively while others only can be assessed qualitatively by the expert rating method. So we adopt fuzzy decision and dualistic contrast to realize the reliability allocation with the help of fault tree analysis. Finally the example of the emergency diesel generator's reliability allocation is used to illustrate reliability allocation model and improve this model simple and applicable. (authors)

  13. Allocation of Transaction Cost to Market Participants Using an Analytical Method in Deregulated Market

    Science.gov (United States)

    Jeyasankari, S.; Jeslin Drusila Nesamalar, J.; Charles Raja, S.; Venkatesh, P.

    2014-04-01

    Transmission cost allocation is one of the major challenges in transmission open access faced by the electric power sector. The purpose of this work is to provide an analytical method for allocating transmission transaction cost in deregulated market. This research work provides a usage based transaction cost allocation method based on line-flow impact factor (LIF) which relates the power flow in each line with respect to transacted power for the given transaction. This method provides the impact of line flows without running iterative power flow solution and is well suited for real time applications. The proposed method is compared with the Newton-Raphson (NR) method of cost allocation on sample six bus and practical Indian utility 69 bus systems by considering multilateral transaction.

  14. Development of a new loss allocation method for a hybrid electricity market using graph theory

    International Nuclear Information System (INIS)

    Lim, Valerie S.C.; McDonald, John D.F.; Saha, Tapan K.

    2009-01-01

    This paper introduces a new method for allocating losses in a power system using a loop-based representation of system behaviour. Using the new method, network behaviour is formulated as a series of presumed power transfers directly between market participants. In contrast to many existing loss allocation methods, this makes it easier to justify the resulting loss distribution. In addition to circumventing the problems of non-unique loss allocations, a formalised process of loop identification, using graph theory concepts, is introduced. The proposed method is applied to both the IEEE 14-bus system and a modified CIGRE Nordic 32-bus system. The results provide a demonstration of the capability of the proposed method to allocate losses in the hybrid market, and demonstrate the approach's capacity to link the technical performance of the network to market instruments. (author)

  15. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  16. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  17. Analysis of standard and innovative methods for allocating upstream and refinery GHG emissions to oil products

    International Nuclear Information System (INIS)

    Moretti, Christian; Moro, Alberto; Edwards, Robert; Rocco, Matteo Vincenzo; Colombo, Emanuela

    2017-01-01

    Highlights: •Traditional and innovative methods for allocating emissions at refinery level are reviewed. •Added value has been introduced as a novel allocation method. •Hydrogen-based consistency test has been introduced to validate the allocation methods. •Consistent allocation methods assign negative refinery emissions to heavy products. -- Abstract: Alternative fuel policies need accurate and transparent methods to find the embedded carbon intensity of individual refinery products. This study investigates different ways of allocating greenhouse gases emissions deriving from refining and upstream crude oil supply. Allocation methods based on mass, energy content, economic value and, innovatively, added-value, are compared with the marginal refining emissions calculated by CONCAWE’s linear-programming model to the average EU refinery, which has been adopted as reference in EU legislation. Beside the most important transportation fuels (gasoline, diesel, kerosene/jet fuel and heavy fuel oil), the analysis extends to petroleum coke and refinery hydrogen. Moreover, novel criteria, based on the implications due to hydrogen usage by each fuel pathway, have been introduced to test the consistency of the analyzed approaches. It is found that only two economic-based allocation methods are consistent with the introduced criteria. These two methods also give negative refinery emissions for heavy products, which is coherent with the marginal emissions calculated through the CONCAWE refinery model. The recommended allocation methods are transparent and use only publicly available statistical data, so they may be useful not only for future EU legislation, but also in jurisdictions where a representative refinery model is not available.

  18. Method for wiring allocation and switch configuration in a multiprocessor environment

    Science.gov (United States)

    Aridor, Yariv [Zichron Ya'akov, IL; Domany, Tamar [Kiryat Tivon, IL; Frachtenberg, Eitan [Jerusalem, IL; Gal, Yoav [Haifa, IL; Shmueli, Edi [Haifa, IL; Stockmeyer, legal representative, Robert E.; Stockmeyer, Larry Joseph [San Jose, CA

    2008-07-15

    A method for wiring allocation and switch configuration in a multiprocessor computer, the method including employing depth-first tree traversal to determine a plurality of paths among a plurality of processing elements allocated to a job along a plurality of switches and wires in a plurality of D-lines, and selecting one of the paths in accordance with at least one selection criterion.

  19. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  20. Fairness of seat allocation methods in proportional representation

    African Journals Online (AJOL)

    disadvantage by using any of these methods. The topics of .... as in the case of solving classical matrix games in game theory. The linear ..... [15] Wikipedia, the free encyclopedia, 2005, De Hondt method, [Online], [Cited: 4. August 2005] ...

  1. A novel evaluation of heat-electricity cost allocation in cogenerations based on entropy change method

    International Nuclear Information System (INIS)

    Ye, Xuemin; Li, Chunxi

    2013-01-01

    As one of the most significant measures to improve energy utilization efficiency and save energy, cogeneration or combined heat and power (CHP) has been widely applied and promoted with positive motivations in many countries. A rational cost allocation model should indicate the performance of cogenerations and balance the benefits between electricity generation and heat production. Based on the second law of thermodynamics, the present paper proposes an entropy change method for cost allocation by choosing exhaust steam entropy as a datum point, and the new model works in conjunction with entropy change and irreversibility during energy conversion processes. The allocation ratios of heat cost with the present and existing methods are compared for different types of cogenerations. Results show that the allocation ratios with the entropy change method are more rational and the cost allocation model can make up some limitations involved in other approaches. The future energy policies and innovational directions for cogenerations and heat consumers should be developed. - Highlights: • A rational model of cogeneration cost allocation is established. • Entropy change method integrates the relation of entropy change and exergy losses. • The unity of measuring energy quality and quantity is materialized. • The benefits between electricity generation and heat production are balanced

  2. Regional allocation of carbon emission quotas in China: Evidence from the Shapley value method

    International Nuclear Information System (INIS)

    Zhang, Yue-Jun; Wang, Ao-Dong; Da, Ya-Bin

    2014-01-01

    It is an important task for China to allocate carbon emission quotas among regions so as to realize its carbon reduction targets and establish the national cap-and-trade carbon market. Meanwhile, it is supposed to be cost-effective to jointly reduce China's carbon emissions through some collaborative activities among regions. Then a natural question is how to allocate the quotas among regions in light of the collaboration. For this purpose, the Shapley value method is adopted and the results show that, first, the regions with higher GDP, higher carbon outflow and higher carbon reduction connection should be allocated more carbon quotas. Moreover, when the collaboration is considered, the optimal allocation of carbon quotas among regions will change significantly compared to the basic quotas by the entropy method; and the Central region is allocated the largest proportion of carbon quota among regions, which indicates its largest radiation effect. Besides, the collaboration between the Central region and Northern coast region, and that between the Central region and the Eastern region should be paid close attention. These results may provide insightful support for decision makers to promote collaborative carbon reduction and allocate carbon quotas in China. - Highlights: • The paper allocates carbon quotas given the collaboration among regions in China. • The Shapley value method coupled with the entropy and gravity models is adopted. • The regions with higher GDP, carbon outflow and reduction connection allocate more. • The Central region has the largest radiation effect on others among all regions. • The collaboration of the Central and Northern coast regions should have priority

  3. Bandwidth Allocation Method by Service for WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Yongseok; Chang; Changgyu; Choi; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A WDM(Wavelength Division Multiplexing) EPON(Ethernet Passive Optical Network) is an economical and efficient access network that has attracted significant research attention in recent years. A MAC(Media Access Control) Protocol of PON is based on TDMA(Time Division Multiple Access) basically, we can classify this protocol into a fixed length slot assignment method suitable for leased line supporting Qos(Quality of Service) and a variable length slot assignment method suitable for LAN/MAN with the best ...

  4. A novel power and offset allocation method for spatial multiplexing MIMO Systems in optical wireless channels

    KAUST Repository

    Park, Kihong

    2011-12-01

    We consider optical wireless communication which can be utilized for illumination and communication by relying on lighting devices. Due to the limited bandwidth of optical sources, it is challenging to achieve high data rate in optical wireless systems. In order to obtain a multiplexing gain and high spectral efficiency, we design an optical multi-input multi-output (MIMO) system utilizing a singular value decomposition-based spatial multiplexing and adaptive modulation. We note that the conventional allocation method in radio frequency MIMO channels cannot be applied directly to the optical intensity channels. In this paper, we generalize the result of power allocation method in [1] for arbitrary number of transmit and receive antennas in optical wireless MIMO systems. Based on three constraints, namely, the nonnegativity, the aggregate optical power, and the bit error rate requirement, we propose a novel method to allocate the optical power, the offset value, and the modulation size for maximum sum rate. From some selected simulation results, we show that our proposed allocation method gives a better spectral efficiency than the method that allocates the optical power equally for each data stream. © 2011 IEEE.

  5. CO2 emissions accounting: Whether, how, and when different allocation methods should be used

    International Nuclear Information System (INIS)

    Levihn, Fabian

    2014-01-01

    CO 2 abatement and the transition to sustainable energy systems are of great concern, calling for investments in both old and new technologies. There are many perspectives on how to account for these emissions, not least when it comes to how the roles of different alternative energy production options should be emphasized. Confusion and conflicting interests regarding the appropriate accounting methods for allocating CO 2 emissions interfere with effective energy policy and the efficient use of corporate and national resources. Possible investments in the Stockholm district heating network and how they interact with the electric power grid illustrate the influence of different accounting methods on alternative energy production options. The results indicate that, for several abatement options, performance in terms of reduced CO 2 emissions might be either improved or degraded depending on whether or how alternative electricity production is accounted for. The results provide guidelines for whether, how, and when different allocation methods are appropriate, guidelines relevant to academia, industrial leaders, and policymakers in multiple areas related to power production and consumption. - Highlights: • Involvement in the discussion of CO 2 emission allocation is needed from academia. • Abatement options for the district heating in Stockholm were analyzed in relation to power production and the EU ETS. • Implications of different allocation methods are discussed in relation to different analytical purposes and boundaries. • Conclusions are made on when the different allocation methods are appropriate

  6. Intelligent Continuous Double Auction method For Service Allocation in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Nima Farajian

    2013-10-01

    Full Text Available Market-oriented approach is an effective method for resource management because of its regulation of supply and demand and is suitable for cloud environment where the computing resources, either software or hardware, are virtualized and allocated as services from providers to users. In this paper a continuous double auction method for efficient cloud service allocation is presented in which i enables consumers to order various resources (services for workflows and coallocation, ii consumers and providers make bid and request prices based on deadline and workload time and in addition providers can tradeoff between utilization time and price of bids, iii auctioneers can intelligently find optimum matching by sharing and merging resources which result more trades. Experimental results show that proposed method is efficient in terms of successful allocation rate and resource utilization.

  7. Correction to the count-rate detection limit and sample/blank time-allocation methods

    International Nuclear Information System (INIS)

    Alvarez, Joseph L.

    2013-01-01

    A common form of count-rate detection limits contains a propagation of uncertainty error. This error originated in methods to minimize uncertainty in the subtraction of the blank counts from the gross sample counts by allocation of blank and sample counting times. Correct uncertainty propagation showed that the time allocation equations have no solution. This publication presents the correct form of count-rate detection limits. -- Highlights: •The paper demonstrated a proper method of propagating uncertainty of count rate differences. •The standard count-rate detection limits were in error. •Count-time allocation methods for minimum uncertainty were in error. •The paper presented the correct form of the count-rate detection limit. •The paper discussed the confusion between count-rate uncertainty and count uncertainty

  8. Provincial Water Resource Allocation in Agricultural Sector Using Conflict Resolution Methods in Atrak Basin

    Directory of Open Access Journals (Sweden)

    Parvaneh KazemiMeresht

    2017-03-01

    Full Text Available Introduction: In spite of improving the water productivity due to development in water infrastructure systems, population increasing causing the water withdrawal is triple in the last fifty years. In this situation competition on water consumption especially in the agricultural sector which is the biggest consumer in the world and also in Iran is a severe problem. Water allocation has been assessed widely in the recent past. Additionally, several studies have explored methods to incorporate conflict resolution methods in water allocation. In a general classification, there are two types of methods. One is the method based on game theory, graph theory and general models based oncooperative game into a category that has the ability to consider the stakeholder preferences and assess the several scenarios under specified policy. Although this type of methods iseligible to cooperate the stakeholder in modeling but due to their weakness on considering the information on details and their limitations in adoption with changes caused from uncertainty, they are not popular in practical cases. Another type of conflict resolution method which is eligible to considering more detailed information of systems has the optimization approach basically, has the most interests between researchers. There is namely the Nash bargaining solution, the Kalai-Smorodinesky solution, the Equal loss solution and the area monotonic solution. There are several studies which areapplied these methods to investigate about groundwater (5, 6 and10. There are a few applications of water resource allocation models which is incorporated with conflict resolution methods in Transboundary Rivers nowadays and restricted to game theory related methods (1 and 2. The aim of this study is the assessment of the application of conflict resolution methods such as symmetric and non symmetric Nash solution, non symmetricKalai-Smorodinesky, non symmetric equal loss solution and finally the area

  9. Comprehensive reliability allocation method for CNC lathes based on cubic transformed functions of failure mode and effects analysis

    Science.gov (United States)

    Yang, Zhou; Zhu, Yunpeng; Ren, Hongrui; Zhang, Yimin

    2015-03-01

    Reliability allocation of computerized numerical controlled(CNC) lathes is very important in industry. Traditional allocation methods only focus on high-failure rate components rather than moderate failure rate components, which is not applicable in some conditions. Aiming at solving the problem of CNC lathes reliability allocating, a comprehensive reliability allocation method based on cubic transformed functions of failure modes and effects analysis(FMEA) is presented. Firstly, conventional reliability allocation methods are introduced. Then the limitations of direct combination of comprehensive allocation method with the exponential transformed FMEA method are investigated. Subsequently, a cubic transformed function is established in order to overcome these limitations. Properties of the new transformed functions are discussed by considering the failure severity and the failure occurrence. Designers can choose appropriate transform amplitudes according to their requirements. Finally, a CNC lathe and a spindle system are used as an example to verify the new allocation method. Seven criteria are considered to compare the results of the new method with traditional methods. The allocation results indicate that the new method is more flexible than traditional methods. By employing the new cubic transformed function, the method covers a wider range of problems in CNC reliability allocation without losing the advantages of traditional methods.

  10. Patient preferences for the allocation of deceased donor kidneys for transplantation: a mixed methods study

    Directory of Open Access Journals (Sweden)

    Tong Allison

    2012-04-01

    Full Text Available Abstract Background Deceased donor kidneys are a scarce health resource, yet patient preferences for organ allocation are largely unknown. The aim of this study was to determine patient preferences for how kidneys should be allocated for transplantation. Methods Patients on dialysis and kidney transplant recipients were purposively selected from two centres in Australia to participate in nominal/focus groups in March 2011. Participants identified and ranked criteria they considered important for deceased donor kidney allocation. Transcripts were thematically analysed to identify reasons for their rankings. Results From six groups involving 37 participants, 23 criteria emerged. Most agreed that matching, wait-list time, medical urgency, likelihood of surviving surgery, age, comorbidities, duration of illness, quality of life, number of organs needed and impact on the recipient's life circumstances were important considerations. Underpinning their rankings were four main themes: enhancing life, medical priority, recipient valuation, and deservingness. These were predominantly expressed as achieving equity for all patients, or priority for specific sub-groups of potential recipients regarded as more "deserving". Conclusions Patients believed any wait-listed individual who would gain life expectancy and quality of life compared with dialysis should have access to transplantation. Equity of access to transplantation for all patients and justice for those who would look after their transplant were considered important. A utilitarian rationale based on maximizing health gains from the allocation of a scarce resource to avoid "wastage," were rarely expressed. Organ allocation organisations need to seek input from patients who can articulate preferences for allocation and advocate for equity and justice in organ allocation.

  11. Two Reconfigurable Flight-Control Design Methods: Robust Servomechanism and Control Allocation

    Science.gov (United States)

    Burken, John J.; Lu, Ping; Wu, Zheng-Lu; Bahm, Cathy

    2001-01-01

    Two methods for control system reconfiguration have been investigated. The first method is a robust servomechanism control approach (optimal tracking problem) that is a generalization of the classical proportional-plus-integral control to multiple input-multiple output systems. The second method is a control-allocation approach based on a quadratic programming formulation. A globally convergent fixed-point iteration algorithm has been developed to make onboard implementation of this method feasible. These methods have been applied to reconfigurable entry flight control design for the X-33 vehicle. Examples presented demonstrate simultaneous tracking of angle-of-attack and roll angle commands during failures of the fight body flap actuator. Although simulations demonstrate success of the first method in most cases, the control-allocation method appears to provide uniformly better performance in all cases.

  12. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  13. Resource Allocation for Downlink Multi-Cell OFDMA Cognitive Radio Network Using Hungarian Method

    Directory of Open Access Journals (Sweden)

    N. Forouzan

    2013-12-01

    Full Text Available This paper considers the problem of resource allocation for downlink part of an OFDM-based multi-cell cognitive radio network which consists of multiple secondary transmitters and receivers communicating simultaneously in the presence of multiple primary users. We present a new framework to maximize the total data throughput of secondary users by means of subchannel assignment, while ensuring interference leakage to PUs is below a threshold. In this framework, we first formulate the resource allocation problem as a nonlinear and non-convex optimization problem. Then we represent the problem as a maximum weighted matching in a bipartite graph and propose an iterative algorithm based on Hungarian method to solve it. The present contribution develops an efficient subchannel allocation algorithm that assigns subchannels to the secondary users without the perfect knowledge of fading channel gain between cognitive radio transmitter and primary receivers. The performance of the proposed subcarrier allocation algorithm is compared with a blind subchannel allocation as well as another scheme with the perfect knowledge of channel-state information. Simulation results reveal that a significant performance advantage can still be realized, even if the optimization at the secondary network is based on imperfect network information.

  14. A Multi-Objective Method to Align Human Resource Allocation with University Strategy

    Science.gov (United States)

    Bouillard, Philippe

    2016-01-01

    Universities are currently under considerable pressure to reach their stakeholders' expectations. Management tools that use strategic plans, key performance indicators and quality assurance methods are increasingly deployed. This paper aims to demonstrate how resource allocation can be aligned with institutional strategic plans with a very simple…

  15. Decomposing biodiversity data using the Latent Dirichlet Allocation model, a probabilistic multivariate statistical method

    Science.gov (United States)

    Denis Valle; Benjamin Baiser; Christopher W. Woodall; Robin Chazdon; Jerome. Chave

    2014-01-01

    We propose a novel multivariate method to analyse biodiversity data based on the Latent Dirichlet Allocation (LDA) model. LDA, a probabilistic model, reduces assemblages to sets of distinct component communities. It produces easily interpretable results, can represent abrupt and gradual changes in composition, accommodates missing data and allows for coherent estimates...

  16. A pollutant load hierarchical allocation method integrated in an environmental capacity management system for Zhushan Bay, Taihu Lake.

    Science.gov (United States)

    Liang, Shidong; Jia, Haifeng; Yang, Cong; Melching, Charles; Yuan, Yongping

    2015-11-15

    An environmental capacity management (ECM) system was developed to help practically implement a Total Maximum Daily Load (TMDL) for a key bay in a highly eutrophic lake in China. The ECM system consists of a simulation platform for pollutant load calculation and a pollutant load hierarchical allocation (PLHA) system. The simulation platform was developed by linking the Environmental Fluid Dynamics Code (EFDC) and Water Quality Analysis Simulation Program (WASP). In the PLHA, pollutant loads were allocated top-down in several levels based on characteristics of the pollutant sources. Different allocation methods could be used for the different levels with the advantages of each method combined over the entire allocation. Zhushan Bay of Taihu Lake, one of the most eutrophic lakes in China, was selected as a case study. The allowable loads of total nitrogen, total phosphorus, ammonia, and chemical oxygen demand were found to be 2122.2, 94.9, 1230.4, and 5260.0 t·yr(-1), respectively. The PLHA for the case study consists of 5 levels. At level 0, loads are allocated to those from the lakeshore direct drainage, atmospheric deposition, internal release, and tributary inflows. At level 1 the loads allocated to tributary inflows are allocated to the 3 tributaries. At level 2, the loads allocated to one inflow tributary are allocated to upstream areas and local sources along the tributary. At level 3, the loads allocated to local sources are allocated to the point and non-point sources from different towns. At level 4, the loads allocated to non-point sources in each town are allocated to different villages. Compared with traditional forms of pollutant load allocation methods, PLHA can combine the advantages of different methods which put different priority weights on equity and efficiency, and the PLHA is easy to understand for stakeholders and more flexible to adjust when applied in practical cases. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  18. A Grooming Nodes Optimal Allocation Method for Multicast in WDM Networks

    Directory of Open Access Journals (Sweden)

    Chengying Wei

    2016-01-01

    Full Text Available The grooming node has the capability of grooming multicast traffic with the small granularity into established light at high cost of complexity and node architecture. In the paper, a grooming nodes optimal allocation (GNOA method is proposed to optimize the allocation of the grooming nodes constraint by the blocking probability for multicast traffic in sparse WDM networks. In the proposed GNOA method, the location of each grooming node is determined by the SCLD strategy. The improved smallest cost largest degree (SCLD strategy is designed to select the nongrooming nodes in the proposed GNOA method. The simulation results show that the proposed GNOA method can reduce the required number of grooming nodes and decrease the cost of constructing a network to guarantee a certain request blocking probability when the wavelengths per fiber and transmitter/receiver ports per node are sufficient for the optical multicast in WDM networks.

  19. A heuristic and hybrid method for the tank allocation problem in maritime bulk shipping

    DEFF Research Database (Denmark)

    Vilhelmsen, Charlotte; Larsen, Jesper; Lusby, Richard Martin

    2016-01-01

    In bulk shipping, ships often have multiple tanks and carry multiple inhomogeneous products at a time. When operating such ships it is therefore a major challenge to decide how to best allocate cargoes to available tanks while taking into account tank capacity, safety restrictions, ship stability...... finding a feasible solution. We have developed a heuristic that can efficiently find feasible cargo allocations. Computational results show that it can solve 99 % of the considered instances within 0.4 s and all of them if allowed longer time. We have also modified an optimality based method from...... the literature. The heuristic is much faster than this modified method on the vast majority of considered instances. However, the heuristic struggles on two instances which are relatively quickly solved by the modified optimality based method. These two methods therefore complement each other nicely and so, we...

  20. A Heuristic and Hybrid Method for the Tank Allocation Problem in Maritime Bulk Shipping

    DEFF Research Database (Denmark)

    Vilhelmsen, Charlotte; Larsen, Jesper; Lusby, Richard Martin

    In bulk shipping, ships often have multiple tanks and carry multiple inhomogeneous products at a time. When operating such ships it is therefore a major challenge to decide how to best allocate cargoes to available tanks while taking into account tank capacity, safety restrictions, ship stability...... finding a feasible solution. We have developed a heuristic that can efficiently find feasible cargo allocations. Computational results show that it can solve 99% of the considered instances within 0.4 seconds and all of them if allowed longer time. We have also modified an optimality based method from...... the literature. The heuristic is much faster than this modified method on the vast majority of considered instances. However, the heuristic struggles on two instances which are relatively quickly solved by the modified optimality based method. These two methods therefore complement each other nicely and so, we...

  1. The Halden Reactor Project workshop meeting on human centred automation and function allocation methods

    International Nuclear Information System (INIS)

    Sebok, Angelia; Green, Marit; Larsen, Marit; Miberg, Ann Britt; Morisseau, Dolores

    1998-02-01

    A workshop on Human Centred Automation (HCA) and Function Allocation Methods was organised in Halden, September 29-30, 1997. The purpose of the workshop was to discuss and make recommendations on requirements for the Halden Project research agenda. The workshop meeting began with several presentations summarising current issues in HCA, Function Allocation Methods and Functional Modelling. Invited speakers presented their research or modelling efforts. Following the presentations, the workshop was divided into three working groups, all tasked with answering the same four questions: (1) What are the most important issues in Human Centred Automation? (2) Which strengths could be achieved by integrating Functional Modelling Methods into experimental Human Centred Automation research? (3) How should analytical and experimental methods be balanced? (4) What are the most important aspects in automation design methodology? Each group discussed the questions and produced specific recommendations that were summarised by the group's facilitator in a joint session of the workshop. (author)

  2. Experimental Analysis of a Heat Cost Allocation Method for Apartment Buildings

    Directory of Open Access Journals (Sweden)

    Fabio Saba

    2017-03-01

    Full Text Available The correct estimate of individual thermal energy consumptions, and consequently, a fair heat cost allocation among the residents of apartment buildings with centralized heating systems, represents an important driving force towards energy saving, energy efficiency and the reduction of pollutant emissions. Nowadays, in those contexts where direct heat meters cannot be used because of the layout of the hot water distribution system, electronic Heat Cost Allocators (HCAs have the highest market share for the assessment of individual thermal energy consumptions. The uncertainty associated with the parameterization of heat cost allocation devices and the installation effects arising in real applications can negatively affect the accuracy of these devices, as far as the estimation of the individual fractions of thermal energy consumption is concerned. This work deals with the experimental analysis of a novel heat cost allocation method for apartment buildings and its comparison with conventional HCAs. The method allows the indirect estimation of the thermal energy exchanged by water radiators without the need for surface temperature measurements, reducing some of the drawbacks associated with the on-site installation. The experimental analysis was carried out in a full-scale central heating system test facility available at the Italian National Metrology Institute (INRIM and characterized by SI-traceable direct heat meters installed on each water radiator.

  3. Optimal Control of Micro Grid Operation Mode Seamless Switching Based on Radau Allocation Method

    Science.gov (United States)

    Chen, Xiaomin; Wang, Gang

    2017-05-01

    The seamless switching process of micro grid operation mode directly affects the safety and stability of its operation. According to the switching process from island mode to grid-connected mode of micro grid, we establish a dynamic optimization model based on two grid-connected inverters. We use Radau allocation method to discretize the model, and use Newton iteration method to obtain the optimal solution. Finally, we implement the optimization mode in MATLAB and get the optimal control trajectory of the inverters.

  4. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  5. Encouraging energy conservation in multifamily housing: RUBS and other methods of allocating energy costs to residents

    Energy Technology Data Exchange (ETDEWEB)

    McClelland, L

    1980-10-01

    Methods of encouraging energy conservation in multifamily housing by allocating energy costs to residents are discussed; specifically, methods appropriate for use in master metered buildings without equipment to monitor energy consumption in individual apartments are examined. Several devices available for monitoring individual energy consumption are also discussed plus methods of comparing the energy savings and cost effectiveness of monitoring devices with those of other means of promoting conservation. Specific information in Volume I includes a comparison study on energy use in master and individually metered buildings; types of appropriate conservation programs for master metered buildings; a description of the Resident Utility Billing System (RUBS); energy savings associated with RUBS; Resident reactions to RUBS; cost effectiveness of RUBS for property owners; potential abuses, factors limiting widespread use, and legal status of RUBS. Part I of Volume II contains a cost allocation decision guide and Part II in Volume II presents the RUBS Operations Manual. Pertinent appendices to some chapters are attached. (MCW)

  6. A Heuristic and Hybrid Method for the Tank Allocation Problem in Maritime Bulk Shipping

    DEFF Research Database (Denmark)

    Vilhelmsen, Charlotte; Larsen, Jesper; Lusby, Richard Martin

    Many bulk ships have multiple tanks and can thereby carry multiple inhomogeneous products at a time. A major challenge when operating such ships is how to best allocate cargoes to available tanks while taking tank capacity, safety restrictions, ship stability and strength as well as other...... ship route. We have developed a randomised heuristic for eciently nding feasible allocations and computational results show that it can solve 99% of the considered instances within 0.5 seconds and all of them if allowed longer time. The heuristic is designed to work as an ecient subproblem solver...... and in such a setting with running times below e.g. 5 seconds, the heuristic clearly outperforms an earlier method by consistently solving more instances and eectively cutting 84% of the average running time. Furthermore, we have combined our heuristic with a modied version of the earlier method to derive a hybrid...

  7. Methods of Thrust Allocation in a DP Simulation System of Maritime University of Szczecin

    Directory of Open Access Journals (Sweden)

    Zalewski Paweł

    2016-12-01

    Full Text Available Vessels conducting dynamic positioning (DP operations are usually equipped with thruster configurations that enable generation of resultant force and moment in any direction. These configurations are deliberately redundant in order to reduce the consequences of thruster failures and increase the safety. On such vessels a thrust allocation system must be used to distribute the control actions determined by the DP controller among the thrusters. The optimal allocation of thrusters′ settings in DP systems is a problem that can be solved by several convex optimization methods depending on criteria and constraints used. The paper presents linear programming (LP and quadratic programming (QP methods adopted in DP control model which is being developed in Maritime University of Szczecin for ship simulation purposes.

  8. Provincial Water Resource Allocation in Agricultural Sector Using Conflict Resolution Methods in Atrak Basin

    OpenAIRE

    Parvaneh KazemiMeresht; Shahab Araghinejad

    2017-01-01

    Introduction: In spite of improving the water productivity due to development in water infrastructure systems, population increasing causing the water withdrawal is triple in the last fifty years. In this situation competition on water consumption especially in the agricultural sector which is the biggest consumer in the world and also in Iran is a severe problem. Water allocation has been assessed widely in the recent past. Additionally, several studies have explored methods to incorporate c...

  9. The need for an established allocation method when assessing absolute sustainability on a product level

    DEFF Research Database (Denmark)

    Ryberg, Morten; Owsianiak, Mikolaj; Hauschild, Michael Zwicky

    2015-01-01

    Assessment of absolute sustainability within life cycle assessment (LCA) framework is operational on the country scale. However, it is difficult to apply the existing approaches to products, which are typically the scope of LCAs. How should we assess whether a chair is (absolutely) sustainable? I...... allocation keys specific to each product group, e.g. mass for furniture, or economic revenue for IT. The proposed method facilitates assessment of absolute sustainability of products within the LCA framework....

  10. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  11. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  12. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  13. A Thrust Allocation Method for Efficient Dynamic Positioning of a Semisubmersible Drilling Rig Based on the Hybrid Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Luman Zhao

    2015-01-01

    Full Text Available A thrust allocation method was proposed based on a hybrid optimization algorithm to efficiently and dynamically position a semisubmersible drilling rig. That is, the thrust allocation was optimized to produce the generalized forces and moment required while at the same time minimizing the total power consumption under the premise that forbidden zones should be taken into account. An optimization problem was mathematically formulated to provide the optimal thrust allocation by introducing the corresponding design variables, objective function, and constraints. A hybrid optimization algorithm consisting of a genetic algorithm and a sequential quadratic programming (SQP algorithm was selected and used to solve this problem. The proposed method was evaluated by applying it to a thrust allocation problem for a semisubmersible drilling rig. The results indicate that the proposed method can be used as part of a cost-effective strategy for thrust allocation of the rig.

  14. An evaluation of possible EU air transport emissions trading scheme allocation methods

    International Nuclear Information System (INIS)

    Morrell, Peter

    2007-01-01

    The European Commission has been requested by member states to study the incorporation of air transport into their existing emissions trading scheme (ETS). Only CO 2 is to be included, at least initially. This paper focuses on the method of allocation of emissions permits in the EU context. It has been assumed here that the EU ETS will be applied only to intra-EU flights and that airlines will be the entities selected for implementation. Three UK airlines were selected to evaluate three main types of allocation: grandfathering, auctioning and benchmarking. The airlines were representative of the three major airline business models: network, low-cost carrier and charter/leisure. Based on 2003/2004 aircraft/engine type and operating data, the per passenger impact of each allocation option was analysed for each airline. A new benchmarking approach is proposed that takes into account both the landing and take-off (LTO) cycle and per kilometre emissions: this avoids penalising shorter sector operators and focuses on the damage caused by aircraft and their engines and not on passengers. (author)

  15. Using Computer Simulation Method to Improve Throughput of Production Systems by Buffers and Workers Allocation

    Directory of Open Access Journals (Sweden)

    Kłos Sławomir

    2015-12-01

    Full Text Available This paper proposes the application of computer simulation methods to support decision making regarding intermediate buffer allocations in a series-parallel production line. The simulation model of the production system is based on a real example of a manufacturing company working in the automotive industry. Simulation experiments were conducted for different allocations of buffer capacities and different numbers of employees. The production system consists of three technological operations with intermediate buffers between each operation. The technological operations are carried out using machines and every machine can be operated by one worker. Multi-work in the production system is available (one operator operates several machines. On the basis of the simulation experiments, the relationship between system throughput, buffer allocation and the number of employees is analyzed. Increasing the buffer capacity results in an increase in the average product lifespan. Therefore, in the article a new index is proposed that includes the throughput of the manufacturing system and product life span. Simulation experiments were performed for different configurations of technological operations.

  16. Sustainability in health care by allocating resources effectively (SHARE) 4: exploring opportunities and methods for consumer engagement in resource allocation in a local healthcare setting.

    Science.gov (United States)

    Harris, Claire; Ko, Henry; Waller, Cara; Sloss, Pamela; Williams, Pamela

    2017-05-05

    This is the fourth in a series of papers reporting a program of Sustainability in Health care by Allocating Resources Effectively (SHARE) in a local healthcare setting. Healthcare decision-makers have sought to improve the effectiveness and efficiency of services through removal or restriction of practices that are unsafe or of little benefit, often referred to as 'disinvestment'. A systematic, integrated, evidence-based program for disinvestment was being established within a large Australian health service network. Consumer engagement was acknowledged as integral to this process. This paper reports the process of developing a model to integrate consumer views and preferences into an organisation-wide approach to resource allocation. A literature search was conducted and interviews and workshops were undertaken with health service consumers and staff. Findings were drafted into a model for consumer engagement in resource allocation which was workshopped and refined. Although consumer engagement is increasingly becoming a requirement of publicly-funded health services and documented in standards and policies, participation in organisational decision-making is not widespread. Several consistent messages for consumer engagement in this context emerged from the literature and consumer responses. Opportunities, settings and activities for consumer engagement through communication, consultation and participation were identified within the resource allocation process. Sources of information regarding consumer values and perspectives in publications and locally-collected data, and methods to use them in health service decision-making, were identified. A model bringing these elements together was developed. The proposed model presents potential opportunities and activities for consumer engagement in the context of resource allocation.

  17. A hybrid method for provincial scale energy-related carbon emission allocation in China.

    Science.gov (United States)

    Bai, Hongtao; Zhang, Yingxuan; Wang, Huizhi; Huang, Yanying; Xu, He

    2014-01-01

    Achievement of carbon emission reduction targets proposed by national governments relies on provincial/state allocations. In this study, a hybrid method for provincial energy-related carbon emissions allocation in China was developed to provide a good balance between production- and consumption-based approaches. In this method, provincial energy-related carbon emissions are decomposed into direct emissions of local activities other than thermal power generation and indirect emissions as a result of electricity consumption. Based on the carbon reduction efficiency principle, the responsibility for embodied emissions of provincial product transactions is assigned entirely to the production area. The responsibility for carbon generation during the production of thermal power is borne by the electricity consumption area, which ensures that different regions with resource endowments have rational development space. Empirical studies were conducted to examine the hybrid method and three indices, per capita GDP, resource endowment index and the proportion of energy-intensive industries, were screened to preliminarily interpret the differences among China's regional carbon emissions. Uncertainty analysis and a discussion of this method are also provided herein.

  18. Initial Provincial Allocation and Equity Evaluation of China’s Carbon Emission Rights—Based on the Improved TOPSIS Method

    Directory of Open Access Journals (Sweden)

    Yong Wang

    2018-03-01

    Full Text Available As the world’s largest carbon emitter, China considers carbon emissions trading to be an important measure in its national strategy for energy conservation and emissions reduction. The initial allocation of China’s carbon emissions rights at the provincial level is a core issue of carbon emissions trading. A scientific and reasonable distinction between the carbon emission rights of provinces is crucial for China to achieve emissions reduction targets. Based on the idea of multi-objective decision-making, this paper uses the improved Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS method to allocate China’s initial carbon emission rights to the provinces and uses the Gini coefficient sub-group decomposition method to evaluate the fairness of the allocation results. First, the results of a theoretical distribution show that in the initial allocation of carbon emission rights, a large proportion of China’s provinces have large populations and high energy use, such as Shandong Province, Jiangsu Province, Hebei Province and Henan Province; the provinces with a small proportion of the initial allocation of carbon emissions consist of two municipalities, Beijing and Shanghai, as well as Hainan Province, which is dominated by tourism. Overall, the initial allocation of carbon emission rights in the northern and eastern regions constituted the largest proportion, with the south-central region and the northwest region being the second largest and the southwest region being the smallest. Second, the difference between the theoretical allocation and the actual allocation of carbon emission rights in China was clear. The energy consumption of large provinces and provinces dominated by industry generally had a negative difference (the theoretical allocation of carbon emissions was less than the actual value, while Qinghai, dominated by agriculture and animal husbandry, showed a positive balance (the theoretical allocation of

  19. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  20. Emergency material allocation with time-varying supply-demand based on dynamic optimization method for river chemical spills.

    Science.gov (United States)

    Liu, Jie; Guo, Liang; Jiang, Jiping; Jiang, Dexun; Wang, Peng

    2018-04-13

    Aiming to minimize the damage caused by river chemical spills, efficient emergency material allocation is critical for an actual emergency rescue decision-making in a quick response. In this study, an emergency material allocation framework based on time-varying supply-demand constraint is developed to allocate emergency material, minimize the emergency response time, and satisfy the dynamic emergency material requirements in post-accident phases dealing with river chemical spills. In this study, the theoretically critical emergency response time is firstly obtained for the emergency material allocation system to select a series of appropriate emergency material warehouses as potential supportive centers. Then, an enumeration method is applied to identify the practically critical emergency response time, the optimum emergency material allocation and replenishment scheme. Finally, the developed framework is applied to a computational experiment based on south-to-north water transfer project in China. The results illustrate that the proposed methodology is a simple and flexible tool for appropriately allocating emergency material to satisfy time-dynamic demands during emergency decision-making. Therefore, the decision-makers can identify an appropriate emergency material allocation scheme in a balance between time-effective and cost-effective objectives under the different emergency pollution conditions.

  1. The Impact of Short-Sale Constraints on Asset Allocation Strategies via the Backward Markov Chain Approximation Method

    OpenAIRE

    Carl Chiarella; Chih-Ying Hsiao

    2005-01-01

    This paper considers an asset allocation strategy over a finite period under investment uncertainty and short-sale constraints as a continuous time stochastic control problem. Investment uncertainty is characterised by a stochastic interest rate and inflation risk. If there are no short-sale constraints, the optimal asset allocation strategy can be solved analytically. We consider several kinds of short-sale constraints and employ the backward Markov chain approximation method to explore the ...

  2. Maintainability allocation

    International Nuclear Information System (INIS)

    Guyot, Christian.

    1980-06-01

    The author gives the general lines of a method for the allocation and for the evaluation of maintainability of complex systems which is to be developed during the conference. The maintainability objective is supposed to be formulated under the form of a mean time to repair (M.T.T.R.) [fr

  3. Reciprocal Allocation Method in Service Departments. The Case of a Production Enterprise

    Science.gov (United States)

    Papaj, Ewelina

    2017-12-01

    The main aim of this article is to indicate the role of reciprocal allocation method in the process of costs calculation. In the environment of nowadays companies, often taking very complex organisational forms, the existence of service departments becomes of great importance. Although, as far as management accounting processes are concerned, which lead to identifying the product cost, the service departments' costs come out to be of minor importance. This article means to prove that the service departments' costs and their reliable settlement are a desirable source of information about the products. This work consists of two parts. First of them features theoretical considerations and a critical analysis of subject literature. In the latter part, the service departments' costs calculation will be presented, basing on reciprocal services in a production enterprise from chemical industry.

  4. Evaluation of risk prioritization and budget allocation methods for pollution prevention activities

    International Nuclear Information System (INIS)

    Daniels, J.; Jones, E.; Lmont, A.; Ladmn, T.; Watz, J.

    1997-01-01

    This study reviews the structure of two main risk prioritization budget allocation methods developed by the DOE Risk-Based Priority Mode (RPM) and Management Evaluation Matrix (MEM). It identifies potential augmentations to the process that will address both risk reduction and cost-effective investments of finite resources for future Environmental Management activities. The evaluation was performed in accordance with the EM ten-year vision and principles for site cleanup. The evaluation and recommendations in this report strive to reflect four key principles, namely to eliminate the most urgent risks, reduce mortgage and support costs to make funds available for further risk reduction, protect worker health and safety, and reduce the generation of wastes

  5. Method for optimizing resource allocation in a government organization. Ph.D. Thesis

    Science.gov (United States)

    Afarin, James

    1994-01-01

    The managers in Federal agencies are challenged to control the extensive activities in government and still provide high-quality products and services to the American taxpayers. Considering today's complex social and economic environment and the $3.8 billion daily cost of operating the Federal Government, it is evident that there is a need to develop decision-making tools for accurate resource allocation and total quality management. The goal of this thesis is to provide a methodical process that will aid managers in Federal Government to make budgetary decisions based on the cost of services, the agency's objectives, and the customers' perception of the agency's product. A general resource allocation procedure was developed in this study that can be applied to any government organization. A government organization, hereafter the 'organization,' is assumed to be a multidivision enterprise. This procedure was applied to a small organization for the proof of the concept. This organization is the Technical Services Directorate (TSD) at the NASA Lewis Research Center in Cleveland, Ohio. As part of the procedure, a nonlinear programming model was developed to account for the resources of the organization, the outputs produced by the organization, the decision-maker's views, and the customers' satisfaction with the organization. The information on the resources of the organization was acquired from current budget levels of the organization and the human resources assigned to the divisions. The outputs of the organization were defined and measured by identifying metrics that assess the outputs, the most challenging task in this study. The decision-maker's views are represented in the model as weights assigned to the various outputs and were quantified by using the analytic hierarchy process. The customer's opinions regarding the outputs of the organization were collected through questionnaires that were designed for each division individually. Following the philosophy of

  6. A method for systematic resource allocation for improved nuclear power plant performance

    International Nuclear Information System (INIS)

    Doboe, L.; Golay, M.; Todreas, N.; Li, F.

    2000-01-01

    An investigation was made on plant improvement investments in terms of the methods and criteria used in cooperation with the staffs of a group of nuclear power plants, aiming to understand better the methods used within US nuclear power plants for allocating investments. Cost analyses were being used the authors translated the process into a mathematical format. A spectrum of practices, ranging from use of informal power relationship-based processes to format benefit was found among different organizations. Cost-based processes structured to take into account a broad range of decision factors. Factors such as cost results, risk aversion and required uncertainty premiums were included in the treatment. Ultimately, competing investments can be ranked using the method presented in order of their return upon investment at an equivalent level of uncertainty. A method for ranking the attractiveness of nuclear power plant investments is presented which takes into account consistently factors of return upon investment, uncertainty and decision-maker risk aversion. Hopefully its use will result in improved decisions. (M.N.)

  7. Real power transfer allocation method with the application of artificial neural network

    Energy Technology Data Exchange (ETDEWEB)

    Mustafa, M.W.; Khalid, S.N.; Shareef, H.; Khairuddin, A. [Technological Univ. of Malaysia, Skudai, Johor Bahru (Malaysia). Dept. of Electrical Power Enginering

    2008-07-01

    This paper presented a newly modified nodal equations method for identifying the real power transfer between generators and load. The objective was to represent each load current as a function of the generator's current and load voltages. The modified admittance matrix of a circuit was used to decompose the load voltage dependent term into components of generator dependent terms. By using these two decompositions of current and voltage terms, the real power transfer between loads and generators was obtained. The robustness of the proposed method was demonstrated on the modified IEEE 30-bus system. An appropriate Artificial Neural Network (ANN) was also created to solve the same problem in a simpler and faster manner with very good accuracy. For this purpose, supervised learning paradigm and feedforward architecture were chosen for the proposed ANN power transfer allocation technique. The method could be adapted to other larger systems by modifying the neural network structure. This technique can be used to solve some of the difficult real power pricing and costing issues and to ensure fairness and transparency in the deregulated environment of power system operation. 22 refs., 5 tabs., 8 figs.

  8. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  9. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  10. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  11. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  14. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  15. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  16. A Novel Optimal Joint Resource Allocation Method in Cooperative Multicarrier Networks: Theory and Practice

    Directory of Open Access Journals (Sweden)

    Yuan Gao

    2016-04-01

    Full Text Available With the increasing demands for better transmission speed and robust quality of service (QoS, the capacity constrained backhaul gradually becomes a bottleneck in cooperative wireless networks, e.g., in the Internet of Things (IoT scenario in joint processing mode of LTE-Advanced Pro. This paper focuses on resource allocation within capacity constrained backhaul in uplink cooperative wireless networks, where two base stations (BSs equipped with single antennae serve multiple single-antennae users via multi-carrier transmission mode. In this work, we propose a novel cooperative transmission scheme based on compress-and-forward with user pairing to solve the joint mixed integer programming problem. To maximize the system capacity under the limited backhaul, we formulate the joint optimization problem of user sorting, subcarrier mapping and backhaul resource sharing among different pairs (subcarriers for users. A novel robust and efficient centralized algorithm based on alternating optimization strategy and perfect mapping is proposed. Simulations show that our novel method can improve the system capacity significantly under the constraint of the backhaul resource compared with the blind alternatives.

  17. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  18. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  19. [Strategic decisions in public psychiatric institutions: a proposed method for resource analysis and allocation].

    Science.gov (United States)

    Micheletti, Pierre; Chierici, Piero; Durang, Xavier; Salvador, Nathalie; Lopez, Nathalie

    2011-01-01

    Because of its sector-based organization and extra-hospital care, public psychiatry has a unique position in healthcare. This paper describes the tools and procedures used to analyze and allocate the resources of the "Centre Hospitalier Alpes-Isère", a hospital serving a catchment population of 530,000 adults. A consensus-based approach was used to validate the selected indicators and included the participation of a geographer. Five levels of resource allocation were identified and classified using a decision tree. At each level, the relevant authorities and criteria were identified as key components of the decision-making process. This paper describes the first three levels of care provision. Focusing on adult care, a comparative assessment of the resources allocated to general psychiatric care and specialist care was conducted, in addition to a comparative assessment of the resources allocated to each of the hospital's four local centers. Geographical accessibility to extramural facilities was also assessed. A study of the characteristics of each general psychiatry clinic revealed significant disparities. The paper highlights several issues: the poor knowledge of psychiatric epidemiological data relating to the population within the catchment area, the difficulty of assessing non-consolidated data or indicators from multiple sources, and the limited and partial nature of geographical data for characterizing and evaluating health care in the hospital's peripheral clinics. Several studies are currently underway to assess the operational effectiveness of the tools and procedures used to analyze and allocate resources.

  20. Male-female differences in households' resource allocation and decision to seek healthcare in south-eastern Nigeria: Results from a mixed methods study.

    Science.gov (United States)

    Onah, Michael Nnachebe; Horton, Susan

    2018-05-01

    Ability to influence household decision-making has been shown to increase with improved social capital and power and is linked to better access to household financial resources and other services outside the household including healthcare. To examine the male-female differences in household custody of financial resources, decision-making, and type of healthcare utilised, we used a mixed methods approach of cross-sectional household surveys and focus-group discussions (FGDs). Data was collected between 10 January-28 February 2011. We analyzed a sample of 411 households and a sub-sample of 223 households with a currently married head. We conducted six single-sex FGDs in 3 communities (1 urban, 2 rural) among a random sub-sample of participants in the survey. We performed univariate, bivariate, and logistic regression analyses with a 95% confidence interval. For the qualitative data, we performed thematic analysis where broad themes relevant to the research objective were abstracted. In all households and in those with a married head, sick male members were less likely to forgo healthcare (aOR all 0.87, 95% CI 0.80-0.90; aOR married 0.52, 95% CI 0.18-0.83) and more likely to utilise formal healthcare relative to female sick members (aOR all 3.36, 95% CI 3.20-3.87; aOR married 19.50, 95% CI 9.62-39.52). Formal healthcare providers are medically trained while informal providers are untrained vendors that dispense medications for profit. There were more reports of sole custody of household resources among men within households with married heads. Joint decision-making on healthcare expenditure improved women's access to healthcare but is not reflective of unhindered access to household financial resources. Qualitatively, women spoke of seeking permission from male household head before expenditure was incurred, while male heads spoke of concealing household financial resources from their spouse. Gender constructs and male-female differences have important effects on

  1. Solving the multifunctionality dilemma in biorefineries with a novel hybrid mass–energy allocation method

    DEFF Research Database (Denmark)

    Djomo, Sylvestre Njakou; Knudsen, Marie Trydeman; Parajuli, Ranjan

    2017-01-01

    . The reductions in energy use and GHG emissions from using the biorefinery’s biofuels were also quantified. HMEN fairly distributed impacts among biorefinery products and did not change the order of the products in terms of the level of the pollution caused. The allocation factors for HMEN fell between mass...

  2. Determining an appropriate method for the purpose of land allocation for ecotourism development (case study: Taleghan County, Iran).

    Science.gov (United States)

    Aliani, H; Kafaky, S Babaie; Saffari, A; Monavari, S M

    2016-11-01

    Appropriate management and planning of suitable areas for the development of ecotourism activities can play an important role in ensuring proper use of the environment. Due to the complexity of nature, applying different tools and models-particularly multi-criteria methods-can be useful in order to achieve these goals. In this study, to indicate suitable areas (land allocation) for ecotourism activities in Taleghan county, weighted linear combination (WLC) using geographical information system (GIS), fuzzy logic, and analytical network process (ANP) were used. To compare the applicability of each of these methods in achieving the goal, the results were compared with the previous model presented by Makhdoum. The results showed that the WLC and ANP methods are more efficient than the Makhdoum model in allocating lands for recreational areas and ecotourism purposes since concomitant use of fuzzy logic and ANP for ranking and weighing the criteria provides us with more flexible and logical conditions. Furthermore, the mentioned method makes it possible to involve ecological, economic, and social criteria simultaneously in the evaluation process in order to allocate land for ecotourism purposes.

  3. A method for allocating renewable energy source subsidies among final energy consumers

    International Nuclear Information System (INIS)

    Batlle, Carlos

    2011-01-01

    In a new context of growing need for renewable energy sources (RES), tariff design has become a critical component of energy system regulation. A methodology for allocating the cost of RES subsidies that ensures an optimal balance between compliance with the main regulatory principles of tariff design and each state's specific policy is of cardinal importance in the current context. This paper presents and discusses a novel methodology to allocate the RES subsidy costs, which consists of distributing them among final energy consumers, in proportion to their consumption, regardless of the type of final energy consumed (liquid fuels, gas, electricity or coal). First, the different designs of RES subsidies are categorized and a review of a good number of the RES burden sharing mechanisms implemented in the EU is presented. Then, the proposed methodology is developed on the basis of the basic regulatory principles underlying the tariff design and the current regulatory context in force in the EU. Finally, to illustrate its actual impact in a real case example, the proposed methodology is applied to the Spanish system, in which the burden of extra costs incurred for RES amounts to a very large proportion of the overall energy system costs. - Research highlights: → This paper develops a novel methodology to allocate RES subsidy costs among final energy consumers. → The methodology is built upon the basic tariff design principles and the 3rd package regulations. → It consists of distributing them in proportion to liquid fuels, gas, electricity or coal consumption. → The 20% RES target affects all energy sectors and justifies allocating the extra costs accordingly. → The methodology is applied to the Spanish energy system, where the RES burden is a very significant.

  4. Virtual Routing Function Allocation Method for Minimizing Total Network Power Consumption

    OpenAIRE

    Kenichiro Hida; Shin-Ichi Kuribayashi

    2016-01-01

    In a conventional network, most network devices, such as routers, are dedicated devices that do not have much variation in capacity. In recent years, a new concept of network functions virtualisation (NFV) has come into use. The intention is to implement a variety of network functions with software on general-purpose servers and this allows the network operator to select their capacities and locations without any constraints. This paper focuses on the allocation of NFV-based routing functions...

  5. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  6. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  7. A Novel Eye-Tracking Method to Assess Attention Allocation in Individuals with and without Aphasia Using a Dual-Task Paradigm

    Science.gov (United States)

    Heuer, Sabine; Hallowell, Brooke

    2015-01-01

    Numerous authors report that people with aphasia have greater difficulty allocating attention than people without neurological disorders. Studying how attention deficits contribute to language deficits is important. However, existing methods for indexing attention allocation in people with aphasia pose serious methodological challenges. Eye-tracking methods have great potential to address such challenges. We developed and assessed the validity of a new dual-task method incorporating eye tracking to assess attention allocation. Twenty-six adults with aphasia and 33 control participants completed auditory sentence comprehension and visual search tasks. To test whether the new method validly indexes well-documented patterns in attention allocation, demands were manipulated by varying task complexity in single- and dual-task conditions. Differences in attention allocation were indexed via eye-tracking measures. For all participants significant increases in attention allocation demands were observed from single- to dual-task conditions and from simple to complex stimuli. Individuals with aphasia had greater difficulty allocating attention with greater task demands. Relationships between eye-tracking indices of comprehension during single and dual tasks and standardized testing were examined. Results support the validity of the novel eye-tracking method for assessing attention allocation in people with and without aphasia. Clinical and research implications are discussed. PMID:25913549

  8. Management of electricity network cross border capacity: allocation procedures between France and Belgium; Gestion des capacites d'echange d'electricite: methodes d'allocation entre la France et la Belgique

    Energy Technology Data Exchange (ETDEWEB)

    Raytchev, D. [Bordeaux-4 Univ. Montesquieu, LAREefi, 33 (France)

    2003-11-01

    This paper tries to identify a method of allocation of the Interconnector capacity for the transport of electricity which complies best with the (conflicting) interests of users, system operators and regulators in the context of a common European market of electricity. The first part combines a historical approach with a comparative study of existing allocation procedures to show that the new joint mechanism of auctioning and market splitting, applied to the whole northern zone of UCTE is vastly superior to the existing allocation arrangement on the Franco-Belgian border. The second part discusses some problems related to the implementation of the new allocation mechanism. Here we examine some difficulties concerning ca achy auctioning (like auction methods and organisation, profit distribution and derivative markets) as well as the market splitting method (neutrality, markets without power exchanges, etc). The main obstacle facing the new method remains however the lack of willingness to address the urgent issue of reforming the present allocation procedures- a remnant from the period of centrally planned electricity systems where neighbouring monopoly companies negotiated agreements of mutual assistance. These agreements are currently kept in place by tacit inaction despite their heterogeneity and arbitrariness which slow down the emergence of a real competition capable of contesting the positions of historic operators. (authors)

  9. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  10. Optimal Allocation of Thermal-Electric Decoupling Systems Based on the National Economy by an Improved Conjugate Gradient Method

    Directory of Open Access Journals (Sweden)

    Shuang Rong

    2015-12-01

    Full Text Available Aiming to relieve the large amount of wind power curtailment during the heating period in the North China region, a thermal-electric decoupling (TED approach is proposed to both bring down the constraint of forced power output of combined heat and power plants and increase the electric load level during valley load times that assist the power grid in consuming more wind power. The operating principles of the thermal-electric decoupling approach is described, the mathematical model of its profits is developed, the constraint conditions of its operation are listed, also, an improved parallel conjugate gradient is utilized to bypass the saddle problem and accelerate the optimal speed. Numerical simulations are implemented and reveal an optimal allocation of TED which with a rated power of 280 MW and 185 MWh heat storage capacity are possible. This allocation of TED could bring approximately 16.9 billion Yuan of economic profit and consume more than 80% of the surplus wind energy which would be curtailed without the participation of TED. The results in this article verify the effectiveness of this method that could provide a referential guidance for thermal-electric decoupling system allocation in practice.

  11. A Method for Optimal Allocation between Instream and Offstream Uses in the Maipo River in Central Chile

    Science.gov (United States)

    Génova, P. P.; Olivares, M. A.

    2016-12-01

    Minimum instream flows (MIF) have been established in Chile with the aim of protecting aquatic ecosystems. In practice, since current water law only allocates water rights to offstream water uses, MIF becomes the only instrument for instream water allocation. However, MIF do not necessarily maintain an adequate flow for instream uses. Moreover, an efficient allocation of water for instream uses requires the quantification of the benefits obtained from those uses, so that tradeoffs between instream and offstream water uses are properly considered. A model of optimal allocation between instream and offstream uses is elaborated. The proposed method combines two pieces of information. On one hand, benefits of instream use are represented by qualitative recreational benefit curves as a function of instream flow. On the other hand, the opportunity cost given by lost benefits of offstream uses is employed to develop a supply curve for instream flows. We applied this method to the case of the Maipo River, where the main water uses are recreation, hydropower production and drinking water. Based on available information we obtained the qualitative benefits of various recreational activities as a function of flow attributes. Then we developed flow attributes curves as a function of instream flow for a representative number of sections in the river. As a result we obtained the qualitative recreational benefit curve for each section. The marginal cost curve for instream flows was developed from the benefit functions of hydropower production interfering with recreation in the Maipo River. The purpose of this supply curve is to find a range of instream flow that will provide a better quality condition for recreation experience at a lower opportunity cost. Results indicate that offstream uses adversely influence recreational activities in the Maipo River in certain months of the year, significantly decreasing the quality of these in instream uses. As expected, the impact depends

  12. Comparative study of various methods for allocating electricity transmission capacity at the France-Belgium interconnection; Etude comparative de differentes methodes d'allocation de capacites de transport d'electricite a l'interconnexion France-Belgique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    The French and Belgian regulators, CRE and CREG, organised in October 2002 a public consultation concerning the allocation methods applied by the network operators at the border between Belgium and France. In July 2002, the Belgian and French transmission system operators, Elia and RTE, had forwarded a joint study to the regulators relative to the methods for allocation at the border between the two countries, in accordance with the stipulations set out in the action plan drawn up in March by the transmission system operators and the regulators. This document presents a French and English summary of this study and a complete version in French of it. It analyses the specific features of the networks and markets concerned, then summarizes the characteristics, advantages and drawbacks of the various allocation mechanisms known at this day, either because they are already in use somewhere in the world or because they are at the design stage with academic researchers or industry. On the basis of this study, ELIA and RTE propose considering the replacement of current local mechanisms with the coordinated management of interconnections in the area comprising France, Germany, Belgium and the Netherlands. Given the time required for implementation, the system that would facilitate reaching this target in the medium term in an economically efficient manner consists in a system of coordinated auctioning. It would establish economic competition, ensuring the exchange of correct signals between market actors and network operators. This mechanism must have a sufficiently large scope to avoid 'pancaking' and represent in a sufficiently precise manner the 'edge effects' of contiguous control areas that would not be part of the mechanism.

  13. Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading

    Directory of Open Access Journals (Sweden)

    Piotr Sieńko

    2015-12-01

    Full Text Available Critical Infrastructure (CI plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.

  14. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  15. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  16. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  17. A principal-component and least-squares method for allocating polycyclic aromatic hydrocarbons in sediment to multiple sources

    International Nuclear Information System (INIS)

    Burns, W.A.; Mankiewicz, P.J.; Bence, A.E.; Page, D.S.; Parker, K.R.

    1997-01-01

    A method was developed to allocate polycyclic aromatic hydrocarbons (PAHs) in sediment samples to the PAH sources from which they came. The method uses principal-component analysis to identify possible sources and a least-squares model to find the source mix that gives the best fit of 36 PAH analytes in each sample. The method identified 18 possible PAH sources in a large set of field data collected in Prince William Sound, Alaska, USA, after the 1989 Exxon Valdez oil spill, including diesel oil, diesel soot, spilled crude oil in various weathering states, natural background, creosote, and combustion products from human activities and forest fires. Spill oil was generally found to be a small increment of the natural background in subtidal sediments, whereas combustion products were often the predominant sources for subtidal PAHs near sites of past or present human activity. The method appears to be applicable to other situations, including other spills

  18. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  19. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  20. ESG Allocations

    Data.gov (United States)

    Department of Housing and Urban Development — This report displays the Emergency Solutions Grants (ESG), formerly Emergency Shelter Grants, allocation by jurisdiction. The website allows users to look at...

  1. A pseudo-statistical approach to treat choice uncertainty: the example of partitioning allocation methods

    NARCIS (Netherlands)

    Mendoza Beltran, A.; Heijungs, R.; Guinée, J.; Tukker, A.

    2016-01-01

    Purpose: Despite efforts to treat uncertainty due to methodological choices in life cycle assessment (LCA) such as standardization, one-at-a-time (OAT) sensitivity analysis, and analytical and statistical methods, no method exists that propagate this source of uncertainty for all relevant processes

  2. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    Science.gov (United States)

    2015-12-01

    Research Methods: An Applied Orientation (New York: Springer, 2014), 31, ( eBook ), http://www.springer.com/us/book/9783319005386. 5 Exploratory and...1060003375. Sreejesh, S., Sanjay Mohapatra, and M. R. Anusree. Business Research Methods: An Applied Orientation. New York: Springer, 2014. eBook . http

  3. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  4. The IFIEC method for the allocation of CO2 allowances in the EU Emissions Trading Scheme. A review applied to the electricity sector

    International Nuclear Information System (INIS)

    Bart Wesselink; Sebastian Klaus Alyssa; Gilbert Kornelis Blok

    2008-03-01

    Recently the European Commission has published a proposal to improve the function of the EU-ETS by amending the Directive which establishes the EU-ETS. The main changes proposed are the establishment of one EU-wide cap and the use of auctioning for a much greater share of allowances than is currently the case, replacing most of the allocation free of charge. Auctioning of allowances will eliminate the so-called windfall profits that occur under the current allocation free of charge that is based on historic production and emission levels; a grandfathering approach. IFIEC EUROPE, the international federation of industrial energy consumers, asked Ecofys to review the method that IFIEC has developed in recent years to allocate CO2 allowances in the EU emissions trading scheme (EU-ETS). According to IFIEC, their allocation method guarantees the same environmental outcome as other methods, without causing windfall profits and with lower risks of competitiveness loss for so-called exposed industrial users of electricity. It was decided to focus this study on the European electricity sector. This was done for several reasons: CO2 emissions from electricity generation cover a large part of the overall emission under EU-ETS, the electricity sector has a single well defined output (electricity) that can be used to illustrate the potential impact of the IFIEC benchmark based allocation approach, and electricity is a substantial cost factor for IFIEC members. This evaluation covers many aspects of IFIEC's method and compares these with two other allocation methods: auctioning and historic grandfathering. Within the IFIEC method two example approaches are evaluated: a single benchmark for electricity production and fuel-specific benchmarks for coal and gas fired electricity production. In the evaluation, we cover the following aspects: What is the IFIEC method; how does it differ from other allocation methods in character (chapter 2); What is the impact of different allocation

  5. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Comparison of direct and indirect methods of estimating health state utilities for resource allocation: review and empirical analysis.

    Science.gov (United States)

    Arnold, David; Girling, Alan; Stevens, Andrew; Lilford, Richard

    2009-07-22

    Utilities (values representing preferences) for healthcare priority setting are typically obtained indirectly by asking patients to fill in a quality of life questionnaire and then converting the results to a utility using population values. We compared such utilities with those obtained directly from patients or the public. Review of studies providing both a direct and indirect utility estimate. Papers reporting comparisons of utilities obtained directly (standard gamble or time tradeoff) or indirectly (European quality of life 5D [EQ-5D], short form 6D [SF-6D], or health utilities index [HUI]) from the same patient. PubMed and Tufts database of utilities. Sign test for paired comparisons between direct and indirect utilities; least squares regression to describe average relations between the different methods. Mean utility scores (or median if means unavailable) for each method, and differences in mean (median) scores between direct and indirect methods. We found 32 studies yielding 83 instances where direct and indirect methods could be compared for health states experienced by adults. The direct methods used were standard gamble in 57 cases and time trade off in 60(34 used both); the indirect methods were EQ-5D (67 cases), SF-6D (13), HUI-2 (5), and HUI-3 (37). Mean utility values were 0.81 (standard gamble) and 0.77 (time tradeoff) for the direct methods; for the indirect methods: 0.59(EQ-5D), 0.63 (SF-6D), 0.75 (HUI-2) and 0.68 (HUI-3). Direct methods of estimating utilities tend to result in higher health ratings than the more widely used indirect methods, and the difference can be substantial.Use of indirect methods could have important implications for decisions about resource allocation: for example, non-lifesaving treatments are relatively more favoured in comparison with lifesaving interventions than when using direct methods.

  7. Developing a new method for modifying over-allocated multi-mode resource constraint schedules in the presence of preemptive resources

    Directory of Open Access Journals (Sweden)

    Aidin Delgoshaei

    2016-09-01

    Full Text Available The issue of resource over-allocating is a big concern for project engineers in the process of scheduling project activities. Resource over-allocating is frequently seen after initial scheduling of a project in practice and causes significant amount of efforts to modify the initial schedules. In this research, a new method is developed for modifying over-allocated schedules in a multi-mode resource constrained project scheduling problems (MRCPSPs with positive cash flows (MRCPSP-PCF. The aim is to maximize profit of the MRCPSPs or logically minimizing costs. The proposed method can be used as a macro in Microsoft Office Project® Software to modify resource over-allocated days after scheduling a project. This research considers progress payment method and preemptive resources. The proposed approach maximizes profit by scheduling activities through the resource calendar respecting to the available level of preemptive resources and activity numbers. To examine the performance of the proposed method a number of experiments derived from the literature are solved. The results are then compared with the circumstances where resource constraints are relaxed. The outcomes show that in all studied cases, the proposed algorithm can provide modified schedules with no over-allocated days. Afterward the method is applied to modify a manufacturing project in practice.

  8. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  9. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  10. An integrated model of water resources optimization allocation based on projection pursuit model - Grey wolf optimization method in a transboundary river basin

    Science.gov (United States)

    Yu, Sen; Lu, Hongwei

    2018-04-01

    Under the effects of global change, water crisis ranks as the top global risk in the future decade, and water conflict in transboundary river basins as well as the geostrategic competition led by it is most concerned. This study presents an innovative integrated PPMGWO model of water resources optimization allocation in a transboundary river basin, which is integrated through the projection pursuit model (PPM) and Grey wolf optimization (GWO) method. This study uses the Songhua River basin and 25 control units as examples, adopting the PPMGWO model proposed in this study to allocate the water quantity. Using water consumption in all control units in the Songhua River basin in 2015 as reference to compare with optimization allocation results of firefly algorithm (FA) and Particle Swarm Optimization (PSO) algorithms as well as the PPMGWO model, results indicate that the average difference between corresponding allocation results and reference values are 0.195 bil m3, 0.151 bil m3, and 0.085 bil m3, respectively. Obviously, the average difference of the PPMGWO model is the lowest and its optimization allocation result is closer to reality, which further confirms the reasonability, feasibility, and accuracy of the PPMGWO model. And then the PPMGWO model is adopted to simulate allocation of available water quantity in Songhua River basin in 2018, 2020, and 2030. The simulation results show water quantity which could be allocated in all controls demonstrates an overall increasing trend with reasonable and equal exploitation and utilization of water resources in the Songhua River basin in future. In addition, this study has a certain reference value and application meaning to comprehensive management and water resources allocation in other transboundary river basins.

  11. Risk capital allocation

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Smilgins, Aleksandrs

    Risk capital allocation problems have been widely discussed in the academic literature. We consider a company with multiple subunits having individual portfolios. Hence, when portfolios of subunits are merged, a diversification benefit arises: the risk of the company as a whole is smaller than...... the sum of the risks of the individual sub-units. The question is how to allocate the risk capital of the company among the subunits in a fair way. In this paper we propose to use the Lorenz set as an allocation method. We show that the Lorenz set is operational and coherent. Moreover, we propose a set...... of new axioms related directly to the problem of risk capital allocation and show that the Lorenz set satisfies these new axioms in contrast to other well-known coherent methods. Finally, we discuss how to deal with non-uniqueness of the Lorenz set....

  12. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  13. New casemix classification as an alternative method for budget allocation in thai oral healthcare service: a pilot study.

    Science.gov (United States)

    Wisaijohn, Thunthita; Pimkhaokham, Atiphan; Lapying, Phenkhae; Itthichaisri, Chumpot; Pannarunothai, Supasit; Igarashi, Isao; Kawabuchi, Koichi

    2010-01-01

    This study aimed to develop a new casemix classification system as an alternative method for the budget allocation of oral healthcare service (OHCS). Initially, the International Statistical of Diseases and Related Health Problem, 10th revision, Thai Modification (ICD-10-TM) related to OHCS was used for developing the software "Grouper". This model was designed to allow the translation of dental procedures into eight-digit codes. Multiple regression analysis was used to analyze the relationship between the factors used for developing the model and the resource consumption. Furthermore, the coefficient of variance, reduction in variance, and relative weight (RW) were applied to test the validity. The results demonstrated that 1,624 OHCS classifications, according to the diagnoses and the procedures performed, showed high homogeneity within groups and heterogeneity between groups. Moreover, the RW of the OHCS could be used to predict and control the production costs. In conclusion, this new OHCS casemix classification has a potential use in a global decision making.

  14. New Casemix Classification as an Alternative Method for Budget Allocation in Thai Oral Healthcare Service: A Pilot Study

    Directory of Open Access Journals (Sweden)

    Thunthita Wisaijohn

    2010-01-01

    Full Text Available This study aimed to develop a new casemix classification system as an alternative method for the budget allocation of oral healthcare service (OHCS. Initially, the International Statistical of Diseases and Related Health Problem, 10th revision, Thai Modification (ICD-10-TM related to OHCS was used for developing the software “Grouper”. This model was designed to allow the translation of dental procedures into eight-digit codes. Multiple regression analysis was used to analyze the relationship between the factors used for developing the model and the resource consumption. Furthermore, the coefficient of variance, reduction in variance, and relative weight (RW were applied to test the validity. The results demonstrated that 1,624 OHCS classifications, according to the diagnoses and the procedures performed, showed high homogeneity within groups and heterogeneity between groups. Moreover, the RW of the OHCS could be used to predict and control the production costs. In conclusion, this new OHCS casemix classification has a potential use in a global decision making.

  15. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  16. Balancing treatment allocations by clinician or center in randomized trials allows unacceptable levels of treatment prediction.

    Science.gov (United States)

    Hills, Robert K; Gray, Richard; Wheatley, Keith

    2009-08-01

    Randomized controlled trials are the standard method for comparing treatments because they avoid the selection bias that might arise if clinicians were free to choose which treatment a patient would receive. In practice, allocation of treatments in randomized controlled trials is often not wholly random with various 'pseudo-randomization' methods, such as minimization or balanced blocks, used to ensure good balance between treatments within potentially important prognostic or predictive subgroups. These methods avoid selection bias so long as full concealment of the next treatment allocation is maintained. There is concern, however, that pseudo-random methods may allow clinicians to predict future treatment allocations from previous allocation history, particularly if allocations are balanced by clinician or center. We investigate here to what extent treatment prediction is possible. Using computer simulations of minimization and balanced block randomizations, the success rates of various prediction strategies were investigated for varying numbers of stratification variables, including the patient's clinician. Prediction rates for minimization and balanced block randomization typically exceed 60% when clinician is included as a stratification variable and, under certain circumstances, can exceed 80%. Increasing the number of clinicians and other stratification variables did not greatly reduce the prediction rates. Without clinician as a stratification variable, prediction rates are poor unless few clinicians participate. Prediction rates are unacceptably high when allocations are balanced by clinician or by center. This could easily lead to selection bias that might suggest spurious, or mask real, treatment effects. Unless treatment is blinded, randomization should not be balanced by clinician (or by center), and clinician-center effects should be allowed for instead by retrospectively stratified analyses. © 2009 Blackwell Publishing Asia Pty Ltd and Chinese

  17. The IFIEC method for the allocation of CO2 allowances in the EU emissions trading scheme : a review applied to the electricity sector

    NARCIS (Netherlands)

    Wesselink, B.; Klaus, S.; Gilbert, A.; Blok, K.

    2008-01-01

    IFIEC Europe has developed an alternative allocation methodology for EU-ETS which aims at achieving the ETS climate targets while minimizing the adverse effects on EU industry’s competitive position. The current study reviews an application of this method to the EU-ETS electricity sector. We show

  18. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  19. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  20. Evaluation of Selected Resource Allocation and Scheduling Methods in Heterogeneous Many-Core Processors and Graphics Processing Units

    Directory of Open Access Journals (Sweden)

    Ciznicki Milosz

    2014-12-01

    Full Text Available Heterogeneous many-core computing resources are increasingly popular among users due to their improved performance over homogeneous systems. Many developers have realized that heterogeneous systems, e.g. a combination of a shared memory multi-core CPU machine with massively parallel Graphics Processing Units (GPUs, can provide significant performance opportunities to a wide range of applications. However, the best overall performance can only be achieved if application tasks are efficiently assigned to different types of processor units in time taking into account their specific resource requirements. Additionally, one should note that available heterogeneous resources have been designed as general purpose units, however, with many built-in features accelerating specific application operations. In other words, the same algorithm or application functionality can be implemented as a different task for CPU or GPU. Nevertheless, from the perspective of various evaluation criteria, e.g. the total execution time or energy consumption, we may observe completely different results. Therefore, as tasks can be scheduled and managed in many alternative ways on both many-core CPUs or GPUs and consequently have a huge impact on the overall computing resources performance, there are needs for new and improved resource management techniques. In this paper we discuss results achieved during experimental performance studies of selected task scheduling methods in heterogeneous computing systems. Additionally, we present a new architecture for resource allocation and task scheduling library which provides a generic application programming interface at the operating system level for improving scheduling polices taking into account a diversity of tasks and heterogeneous computing resources characteristics.

  1. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  2. Method and allocation device for allocating pending requests for data packet transmission at a number of inputs to a number of outputs of a packet switching device in successive time slots

    Science.gov (United States)

    Abel, Francois [Rueschlikon, CH; Iliadis, Ilias [Rueschlikon, CH; Minkenberg, Cyriel J. A. [Adliswil, CH

    2009-02-03

    A method for allocating pending requests for data packet transmission at a number of inputs to a number of outputs of a switching system in successive time slots, including a matching method including the steps of providing a first request information in a first time slot indicating data packets at the inputs requesting transmission to the outputs of the switching system, performing a first step in the first time slot depending on the first request information to obtain a first matching information, providing a last request information in a last time slot successive to the first time slot, performing a last step in the last time slot depending on the last request information and depending on the first matching information to obtain a final matching information, and assigning the pending data packets at the number of inputs to the number of outputs based on the final matching information.

  3. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  4. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  5. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  6. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  7. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  8. Research on strategy and optimization method of PRT empty vehicles resource allocation based on traffic demand forecast

    Science.gov (United States)

    Xiang, Yu; Tao, Cheng

    2018-05-01

    During the operation of the personal rapid transit system(PRT), the empty vehicle resources is distributed unevenly because of different passenger demand. In order to maintain the balance between supply and demand, and to meet the passenger needs of the ride, PRT empty vehicle resource allocation model is constructed based on the future demand forecasted by historical demand in this paper. The improved genetic algorithm is implied in distribution of the empty vehicle which can reduce the customers waiting time and improve the operation efficiency of the PRT system so that all passengers can take the PRT vehicles in the shortest time. The experimental result shows that the improved genetic algorithm can allocate the empty vehicle from the system level optimally, and realize the distribution of the empty vehicle resources reasonably in the system.

  9. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  10. Research on allocation efficiency of the daisy chain allocation algorithm

    Science.gov (United States)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  11. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  12. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  13. Application of an allocation methodology

    International Nuclear Information System (INIS)

    Youngblood, R.

    1989-01-01

    This paper presents a method for allocating resources to elements of a system for the purpose of achieving prescribed levels of defense-in-depth at minimal cost. The method makes extensive use of logic modelling. An analysis of a simplified high-level waste repository is used as an illustrative application of the method. It is shown that it is possible to allocate quality control costs (or demonstrate performance) in an optimal way over elements of a conceptual design

  14. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  15. Emissions trading and competitive positions. The European Proposal for a Directive establishing a Framework for Greenhouse Gas Emissions Trading and Methods for the initial Allocation of Pollution Rights

    International Nuclear Information System (INIS)

    Grimeaud, D.; Peeters, M.

    2002-10-01

    The study on the intention to introduce emissions trading on a European Union level was conducted on the basis of the following three questions: Which methods can be used (by the Member States) to distribute the tradable emissions rights en which legal preconditions should be observed considering the EU-Treaty and the relevant directive proposal? Whenever necessary and possible international agreements on climate change and international trade law will be mentioned. Which safeguards are available for fair competition and which system of emissions trading is advisable in this perspective? How should the PSR (performance standard rate) system, which is preferred by industry, be valued? The structure of this study is as follows: in chapter 2 insight is given into the various methods that can be used to start an emissions trading system, i.e. the way tradable pollution rights are distributed (initial allocation). Chapter 3 will further examine the system of the initial allocation of pollution rights as it has been chosen in the proposal for the European directive. The aim is to give an exact qualification of the method of emissions trading, especially the method of initial allocation, that is used in the directive proposal. Chapter 4 examines whether safeguards are available to prevent competition distortions between firms that fall under the scope of the emissions trading scheme. Special attention will be given to conditions that result from the EU-Treaty in this context, such as the prohibition of state aid. In this chapter the international trade law will be dealt with as well. Chapter 5 will present an executive summary and the specific question whether the PSR-system is legally acceptable or maybe even recommendable, will be answered

  16. Residency Allocation Database

    Data.gov (United States)

    Department of Veterans Affairs — The Residency Allocation Database is used to determine allocation of funds for residency programs offered by Veterans Affairs Medical Centers (VAMCs). Information...

  17. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  18. LMDI Decomposition of Energy-Related CO2 Emissions Based on Energy and CO2 Allocation Sankey Diagrams: The Method and an Application to China

    Directory of Open Access Journals (Sweden)

    Linwei Ma

    2018-01-01

    Full Text Available This manuscript develops a logarithmic mean Divisia index I (LMDI decomposition method based on energy and CO2 allocation Sankey diagrams to analyze the contributions of various influencing factors to the growth of energy-related CO2 emissions on a national level. Compared with previous methods, we can further consider the influences of energy supply efficiency. Two key parameters, the primary energy quantity converted factor (KPEQ and the primary carbon dioxide emission factor (KC, were introduced to calculate the equilibrium data for the whole process of energy unitization and related CO2 emissions. The data were used to map energy and CO2 allocation Sankey diagrams. Based on these parameters, we built an LMDI method with a higher technical resolution and applied it to decompose the growth of energy-related CO2 emissions in China from 2004 to 2014. The results indicate that GDP growth per capita is the main factor driving the growth of CO2 emissions while the reduction of energy intensity, the improvement of energy supply efficiency, and the introduction of non-fossil fuels in heat and electricity generation slowed the growth of CO2 emissions.

  19. Forming of the regional core transport network taking into account the allocation of alternative energy sources based on artificial intelligence methods

    Directory of Open Access Journals (Sweden)

    Marina ZHURAVSKAYA

    2014-12-01

    Full Text Available In the modern world the alternative energy sources, which considerably depend on a region, play more and more significant role. However, the transition of regions to new energy sources lead to the change of transport and logistic network configuration. The formation of optimal core transport network today is a guarantee of the successful economic development of a region tomorrow. The present article studies the issue of advanced core transport network development in a region based on the experience of European and Asian countries and the opportunity to adapt the best foreign experience to Russian conditions. On the basis of artificial intelligence methods for forest industry complex of Sverdlovskaya Oblast the algorithm of problem solution of an optimal logistic infrastructure allocation is offered and some results of a regional transport network are presented. These methods allowed to solve the set task in the conditions of information uncertainty. There are suggestions on the improvement of transport and logistic network in the territory of Sverdlovskaya Oblast. Traditionally the logistics of mineral fuel plays main role in regions development. Actually it is required to develop logistic strategic plans to be able to provide different possibilities of power-supply, flexible enough to change with the population density, transport infrastructure and demographics of different regions. The problem of logistic centers allocation was studied by many authors. The approach, offered by the authors of this paper is to solve the set of tasks by applying artificial intelligence methods, such as fuzzy set theory and genetic algorithms.

  20. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  1. Transport Infrastructure Slot Allocation

    NARCIS (Netherlands)

    Koolstra, K.

    2005-01-01

    In this thesis, transport infrastructure slot allocation has been studied, focusing on selection slot allocation, i.e. on longer-term slot allocation decisions determining the traffic patterns served by infrastructure bottlenecks, rather than timetable-related slot allocation problems. The

  2. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  3. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  4. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  5. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  6. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  7. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  8. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  9. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  10. Zinc allocation and re-allocation in rice

    Science.gov (United States)

    Stomph, Tjeerd Jan; Jiang, Wen; Van Der Putten, Peter E. L.; Struik, Paul C.

    2014-01-01

    Aims: Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation and re-allocation in rice. Methods: Two solution culture experiments using 70Zn applications at different times during crop development and an experiment on within-grain distribution of Zn are reported. In addition, results from two earlier published experiments are re-analyzed and re-interpreted. Results: A budget analysis showed that plant zinc accumulation during grain filling was larger than zinc allocation to the grains. Isotope data showed that zinc taken up during grain filling was only partly transported directly to the grains and partly allocated to the leaves. Zinc taken up during grain filling and allocated to the leaves replaced zinc re-allocated from leaves to grains. Within the grains, no major transport barrier was observed between vascular tissue and endosperm. At low tissue Zn concentrations, rice plants maintained concentrations of about 20 mg Zn kg−1 dry matter in leaf blades and reproductive tissues, but let Zn concentrations in stems, sheath, and roots drop below this level. When plant zinc concentrations increased, Zn levels in leaf blades and reproductive tissues only showed a moderate increase while Zn levels in stems, roots, and sheaths increased much more and in that order. Conclusions: In rice, the major barrier to enhanced zinc allocation towards grains is between stem and reproductive tissues. Enhancing root to shoot transfer will not contribute proportionally to grain zinc enhancement. PMID:24478788

  11. Knowledge Reuse Method to Improve the Learning of Interference-Preventive Allocation Policies in Multi-Car Elevators

    Science.gov (United States)

    Valdivielso Chian, Alex; Miyamoto, Toshiyuki

    In this letter, we introduce a knowledge reuse method to improve the performance of a learning algorithm developed to prevent interference in multi-car elevators. This method enables the algorithm to use its previously acquired experience in new learning processes. The simulation results confirm the improvement achieved in the algorithm's performance.

  12. Application of an allocation methodology

    International Nuclear Information System (INIS)

    Youngblood, R.; de Oliveira, L.F.S.

    1989-01-01

    This paper presents a method for allocating resources to elements of a system for the purpose of achieving prescribed levels of defense-in-depth at minimal cost. The method makes extensive use of logic modelling. An analysis of a simplified high-level waste repository is used as an illustrative application of the method. It is shown that it is possible to allocate quality control costs (or demonstrated performance) in an optimal way over elements of a conceptual design. 6 refs., 3 figs., 2 tabs

  13. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  14. Cost allocation review : staff discussion paper

    International Nuclear Information System (INIS)

    2005-09-01

    This report addressed the need for updated cost allocation studies filed by local electricity distribution companies because they ensure that distribution rates for each customer class remain just and reasonable. According to the 2001 Electricity Distribution Rate Handbook, the Ontario Energy Board requires new cost allocation studies before implementing any future incentive regulation plans. A review of cost allocations allows the Board to consider the need for adjustments to the current share of distribution costs paid by different classes of ratepayers. This report included 14 sections to facilitate consultations with stakeholders on financial information requirements for cost allocation; directly assignable costs; functionalization; categorization; allocation methods; allocation of other costs; load data requirements; cost allocation implementation issues; addition of new rate class and rate design for scattered unmetered loads; addition of new rate class for larger users; rates to charge embedded distributors; treatment of the rate sub-classification identified as time-of-use; and, rate design implementation issues. 1 fig., 7 appendices

  15. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  16. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  17. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  18. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  19. Optimal Allocation of Power-Electronic Interfaced Wind Turbines Using a Genetic Algorithm - Monte Carlo Hybrid Optimization Method

    DEFF Research Database (Denmark)

    Chen, Peiyuan; Siano, Pierluigi; Chen, Zhe

    2010-01-01

    determined by the wind resource and geographic conditions, the location of wind turbines in a power system network may significantly affect the distribution of power flow, power losses, etc. Furthermore, modern WTs with power-electronic interface have the capability of controlling reactive power output...... limit requirements. The method combines the Genetic Algorithm (GA), gradient-based constrained nonlinear optimization algorithm and sequential Monte Carlo simulation (MCS). The GA searches for the optimal locations and capacities of WTs. The gradient-based optimization finds the optimal power factor...... setting of WTs. The sequential MCS takes into account the stochastic behaviour of wind power generation and load. The proposed hybrid optimization method is demonstrated on an 11 kV 69-bus distribution system....

  20. Allocation of ESS by interval optimization method considering impact of ship swinging on hybrid PV/diesel ship power system

    International Nuclear Information System (INIS)

    Wen, Shuli; Lan, Hai; Hong, Ying-Yi; Yu, David C.; Zhang, Lijun; Cheng, Peng

    2016-01-01

    Highlights: • An uncertainty model of PV generation on board is developed based on the experiments. • The moving and swinging of the ship are considered in the optimal ESS sizing problem. • Optimal sizing of ESS in a hybrid PV/diesel/ESS ship power system is gained by the interval optimization method. • Different cases were studied to show the significance of the proposed method considering the swinging effects on the cost. - Abstract: Owing to low efficiency of traditional ships and the serious environmental pollution that they cause, the use of solar energy and an energy storage system (ESS) in a ship’s power system is increasingly attracting attention. However, the swinging of a ship raises crucial challenges in designing an optimal system for a large oil tanker ship, which are associated with uncertainties in solar energy. In this study, a series of experiments are performed to investigate the characteristics of a photovoltaic (PV) system on a moving ship. Based on the experimental results, an interval uncertainty model of on-board PV generation is established, which considers the effect of the swinging of the ship. Due to the power balance equations, the outputs of the diesel generator and the ESS on a large oil tanker are also modeled using interval variables. An interval optimization method is developed to determine the optimal size of the ESS in this hybrid ship power system to reduce the fuel cost, capital cost of the ESS, and emissions of greenhouse gases. Variations of the ship load are analyzed using a new method, taking five operating conditions into account. Several cases are compared in detail to demonstrate the effectiveness of the proposed algorithm.

  1. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  2. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  3. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  4. Estimating the right allocation of resources on weekends and public holidays in Green Zone using hybrid methods

    Science.gov (United States)

    Yusoff, Nazhatul Sahima Mohd; Liong, Choong-Yeun; Ismail, Wan Rosmanira; Noh, Abu Yazid Md; Noor, Nur Amalina Mohd

    2018-04-01

    Long patient waiting time and congestion is a major problem faced by Green Zone in Emergency Department at Hospital Universiti Sains Malaysia (EDHUSM) especially during weekends and public holidays. Even though the Green Zone is servicing only the non-critical patients, patient waiting time, causing the department fails to achieve its Key Performance Indicator (KPI). The long waiting time is due to the insufficient resources provided during the weekends and public holidays versus the large number of patients. Currently, only two doctors supported by two nurses are scheduled for every shift during weekends and public holidays. The numbers of patients are higher during weekends and public holidays as compared to weekdays, but the scheduled number of doctors and nurses are the same as weekdays. Therefore, this study presents a hybrid method to estimate the right number of doctors and nurses for improving the services of the Green Zone during weekends and public holidays. Fifty scenarios based on current and proposed schedules of doctors and nurses are simulated and analysed using the hybrid method of Discrete Event Simulation (DES) and Data Envelopment Analysis (DEA). Banker, Charnes and Cooper (BCC) input-oriented model and Super-Efficiency models of DEA were used to analyse the efficiency of the scenarios. The results show that the best schedule is a combination of four doctors supported by four nurses in every shift during weekends and public holidays for the Green Zone. The findings show that such schedule will not only help the department to achieve its KPI but also enable a more optimal utilization of the resources.

  5. Evolution of poor reporting and inadequate methods over time in 20 920 randomised controlled trials included in Cochrane reviews: research on research study.

    Science.gov (United States)

    Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe

    2017-06-08

    Objective  To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design  Mapping of trials included in Cochrane reviews. Data sources  Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction  For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures  We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results  We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions  Poor reporting and inadequate methods have decreased over time, especially for sequence generation

  6. Comparative study of various methods for allocating electricity transmission capacity at the France-Belgium interconnection; Etude comparative de differentes methodes d'allocation de capacites de transport d'electricite a l'interconnexion France-Belgique

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    The French and Belgian regulators, CRE and CREG, organised in October 2002 a public consultation concerning the allocation methods applied by the network operators at the border between Belgium and France. In July 2002, the Belgian and French transmission system operators, Elia and RTE, had forwarded a joint study to the regulators relative to the methods for allocation at the border between the two countries, in accordance with the stipulations set out in the action plan drawn up in March by the transmission system operators and the regulators. This document presents a French and English summary of this study and a complete version in French of it. It analyses the specific features of the networks and markets concerned, then summarizes the characteristics, advantages and drawbacks of the various allocation mechanisms known at this day, either because they are already in use somewhere in the world or because they are at the design stage with academic researchers or industry. On the basis of this study, ELIA and RTE propose considering the replacement of current local mechanisms with the coordinated management of interconnections in the area comprising France, Germany, Belgium and the Netherlands. Given the time required for implementation, the system that would facilitate reaching this target in the medium term in an economically efficient manner consists in a system of coordinated auctioning. It would establish economic competition, ensuring the exchange of correct signals between market actors and network operators. This mechanism must have a sufficiently large scope to avoid 'pancaking' and represent in a sufficiently precise manner the 'edge effects' of contiguous control areas that would not be part of the mechanism.

  7. FUN-LDA: A Latent Dirichlet Allocation Model for Predicting Tissue-Specific Functional Effects of Noncoding Variation: Methods and Applications.

    Science.gov (United States)

    Backenroth, Daniel; He, Zihuai; Kiryluk, Krzysztof; Boeva, Valentina; Pethukova, Lynn; Khurana, Ekta; Christiano, Angela; Buxbaum, Joseph D; Ionita-Laza, Iuliana

    2018-05-03

    We describe a method based on a latent Dirichlet allocation model for predicting functional effects of noncoding genetic variants in a cell-type- and/or tissue-specific way (FUN-LDA). Using this unsupervised approach, we predict tissue-specific functional effects for every position in the human genome in 127 different tissues and cell types. We demonstrate the usefulness of our predictions by using several validation experiments. Using eQTL data from several sources, including the GTEx project, Geuvadis project, and TwinsUK cohort, we show that eQTLs in specific tissues tend to be most enriched among the predicted functional variants in relevant tissues in Roadmap. We further show how these integrated functional scores can be used for (1) deriving the most likely cell or tissue type causally implicated for a complex trait by using summary statistics from genome-wide association studies and (2) estimating a tissue-based correlation matrix of various complex traits. We found large enrichment of heritability in functional components of relevant tissues for various complex traits, and FUN-LDA yielded higher enrichment estimates than existing methods. Finally, using experimentally validated functional variants from the literature and variants possibly implicated in disease by previous studies, we rigorously compare FUN-LDA with state-of-the-art functional annotation methods and show that FUN-LDA has better prediction accuracy and higher resolution than these methods. In particular, our results suggest that tissue- and cell-type-specific functional prediction methods tend to have substantially better prediction accuracy than organism-level prediction methods. Scores for each position in the human genome and for each ENCODE and Roadmap tissue are available online (see Web Resources). Copyright © 2018 American Society of Human Genetics. Published by Elsevier Inc. All rights reserved.

  8. Cost allocation in distribution planning

    Energy Technology Data Exchange (ETDEWEB)

    Engevall, S

    1997-12-31

    This thesis concerns cost allocation problems in distribution planning. The cost allocation problems we study are illustrated using the distribution planning situation at the Logistics department of Norsk Hydro Olje AB. The planning situation is modeled as a Traveling Salesman Problem and a Vehicle Routing Problem with an inhomogeneous fleet. The cost allocation problems are the problems of how to divide the transportation costs among the customers served in each problem. The cost allocation problems are formulated as cooperative games, in characteristic function form, where the customers are defined to be the players. The games contain five and 21 players respectively. Game theoretical solution concepts such as the core, the nucleolus, the Shapley value and the {tau}-value are discussed. From the empirical results we can, among other things, conclude that the core of the Traveling Salesman Game is large, and that the core of the Vehicle Routing Game is empty. In the accounting of Norsk Hydro the cost per m{sup 3} can be found for each tour. We conclude that for a certain definition of the characteristic function, a cost allocation according to this principle will not be included in the core of the Traveling Salesman Game. The models and methods presented in this thesis can be applied to transportation problems similar to that of Norsk Hydro, independent of the type of products that are delivered. 96 refs, 11 figs, 26 tabs

  9. Cost allocation in distribution planning

    Energy Technology Data Exchange (ETDEWEB)

    Engevall, S.

    1996-12-31

    This thesis concerns cost allocation problems in distribution planning. The cost allocation problems we study are illustrated using the distribution planning situation at the Logistics department of Norsk Hydro Olje AB. The planning situation is modeled as a Traveling Salesman Problem and a Vehicle Routing Problem with an inhomogeneous fleet. The cost allocation problems are the problems of how to divide the transportation costs among the customers served in each problem. The cost allocation problems are formulated as cooperative games, in characteristic function form, where the customers are defined to be the players. The games contain five and 21 players respectively. Game theoretical solution concepts such as the core, the nucleolus, the Shapley value and the {tau}-value are discussed. From the empirical results we can, among other things, conclude that the core of the Traveling Salesman Game is large, and that the core of the Vehicle Routing Game is empty. In the accounting of Norsk Hydro the cost per m{sup 3} can be found for each tour. We conclude that for a certain definition of the characteristic function, a cost allocation according to this principle will not be included in the core of the Traveling Salesman Game. The models and methods presented in this thesis can be applied to transportation problems similar to that of Norsk Hydro, independent of the type of products that are delivered. 96 refs, 11 figs, 26 tabs

  10. Cost allocation in distribution planning

    International Nuclear Information System (INIS)

    Engevall, S.

    1996-01-01

    This thesis concerns cost allocation problems in distribution planning. The cost allocation problems we study are illustrated using the distribution planning situation at the Logistics department of Norsk Hydro Olje AB. The planning situation is modeled as a Traveling Salesman Problem and a Vehicle Routing Problem with an inhomogeneous fleet. The cost allocation problems are the problems of how to divide the transportation costs among the customers served in each problem. The cost allocation problems are formulated as cooperative games, in characteristic function form, where the customers are defined to be the players. The games contain five and 21 players respectively. Game theoretical solution concepts such as the core, the nucleolus, the Shapley value and the τ-value are discussed. From the empirical results we can, among other things, conclude that the core of the Traveling Salesman Game is large, and that the core of the Vehicle Routing Game is empty. In the accounting of Norsk Hydro the cost per m 3 can be found for each tour. We conclude that for a certain definition of the characteristic function, a cost allocation according to this principle will not be included in the core of the Traveling Salesman Game. The models and methods presented in this thesis can be applied to transportation problems similar to that of Norsk Hydro, independent of the type of products that are delivered. 96 refs, 11 figs, 26 tabs

  11. Regulating nutrient allocation in plants

    Science.gov (United States)

    Udvardi, Michael; Yang, Jiading; Worley, Eric

    2014-12-09

    The invention provides coding and promoter sequences for a VS-1 and AP-2 gene, which affects the developmental process of senescence in plants. Vectors, transgenic plants, seeds, and host cells comprising heterologous VS-1 and AP-2 genes are also provided. Additionally provided are methods of altering nutrient allocation and composition in a plant using the VS-1 and AP-2 genes.

  12. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    Science.gov (United States)

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  13. Allocation algorithm for athletes group to form tactical tasks in game team sports using the methods of multivariate analysis (illustrated women Ukrainian team basketball with hearing impairments

    Directory of Open Access Journals (Sweden)

    Zh.L. Kozina

    2014-12-01

    Full Text Available Purpose : develop and prove experimentally allocation algorithm athletes in groups to form a tactical tasks in team sports game using methods of multivariate analysis. Material : The study involved 12 basketball hearing impaired 20-25 years old - female players team of Ukraine on basketball. Analyzed the results of testing and competitive activity 12 basketball players with hearing impairments - Lithuanian team players. Results : An algorithm for distribution by groups of athletes for the formation of tactical tasks. The algorithm consists of the following steps: 1 - testing of athletes; 2 - A hierarchical cluster analysis performance testing; 3 - Distribution of sportsmen groups, analysis of the characteristics of athletes, the formation of tactical tasks. Found higher rates of reaction rate at the offensive players. We pivot revealed a higher level of absolute strength. The defenders found a higher frequency of movement and jumping. Conclusions : The algorithm is the basis for determining the best options mutual combination players in the development and implementation of tactical combinations, the selection of partners when working in pairs and triples in training.

  14. Bounds in the location-allocation problem

    DEFF Research Database (Denmark)

    Juel, Henrik

    1981-01-01

    Develops a family of stronger lower bounds on the objective function value of the location-allocation problem. Solution methods proposed to solve problems in location-allocation; Efforts to develop a more efficient bound solution procedure; Determination of the locations of the sources....

  15. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  16. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  17. Sustainability in Health care by Allocating Resources Effectively (SHARE) 6: investigating methods to identify, prioritise, implement and evaluate disinvestment projects in a local healthcare setting.

    Science.gov (United States)

    Harris, Claire; Allen, Kelly; Brooke, Vanessa; Dyer, Tim; Waller, Cara; King, Richard; Ramsey, Wayne; Mortimer, Duncan

    2017-05-25

    This is the sixth in a series of papers reporting Sustainability in Health care by Allocating Resources Effectively (SHARE) in a local healthcare setting. The SHARE program was established to investigate a systematic, integrated, evidence-based approach to disinvestment within a large Australian health service. This paper describes the methods employed in undertaking pilot disinvestment projects. It draws a number of lessons regarding the strengths and weaknesses of these methods; particularly regarding the crucial first step of identifying targets for disinvestment. Literature reviews, survey, interviews, consultation and workshops were used to capture and process the relevant information. A theoretical framework was adapted for evaluation and explication of disinvestment projects, including a taxonomy for the determinants of effectiveness, process of change and outcome measures. Implementation, evaluation and costing plans were developed. Four literature reviews were completed, surveys were received from 15 external experts, 65 interviews were conducted, 18 senior decision-makers attended a data gathering workshop, 22 experts and local informants were consulted, and four decision-making workshops were undertaken. Mechanisms to identify disinvestment targets and criteria for prioritisation and decision-making were investigated. A catalogue containing 184 evidence-based opportunities for disinvestment and an algorithm to identify disinvestment projects were developed. An Expression of Interest process identified two potential disinvestment projects. Seventeen additional projects were proposed through a non-systematic nomination process. Four of the 19 proposals were selected as pilot projects but only one reached the implementation stage. Factors with potential influence on the outcomes of disinvestment projects are discussed and barriers and enablers in the pilot projects are summarised. This study provides an in-depth insight into the experience of disinvestment

  18. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  19. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  20. CPD Allocations and Awards

    Data.gov (United States)

    Department of Housing and Urban Development — The CPD Allocation and Award database provides filterable on-screen and exportable reports on select programs, such as the Community Development Block Grant Program,...

  1. A interdependência entre sistemas de controle de produção e critérios de alocação de capacidades The relationship between production planning and control systems and methods of capacity allocation

    Directory of Open Access Journals (Sweden)

    Fernando Bernardi de Souza

    2002-08-01

    Full Text Available Há uma aparente carência de pesquisas sobre os inter-relacionamentos entre critérios de alocação de capacidades de recursos de manufatura e os métodos de controle de produção. Estudos sobre alocação de capacidades se baseiam geralmente em sistemas simplificados de empurrar a produção, desconsiderando sistemas mais atuais de gestão de produção. Por outro lado, pesquisas sobre a aplicabilidade de sistemas de gestão da produção não consideram apropriada a maneira como as capacidades produtivas dos recursos estão alocadas ao longo da linha. Analisar as interdependências entre esses dois grandes ramos de pesquisa é o objetivo deste artigo.There is a lack of researches on the relationship between methods of capacity allocation of manufacturing resources and production planning and control systems. Studies about capacity allocation are based on simplified push production systems not considering more current production management systems. By other side, studies about efficiency of production management systems don't consider the effect of different criteria of capacity allocation of manufacturing resources at the results. The purpose of this paper is to investigate how the different policies of capacity allocation and different production planning and control systems interrelate between each other.

  2. Resource Allocation for A Mobile Application Oriented Architecture

    NARCIS (Netherlands)

    Guo, Y.; Smit, Gerardus Johannes Maria; Lu, W.W.; Xie, X.

    2005-01-01

    A Montium is a coarse-grained reconfigurable architecture designed by the CADTES group of the University of Twente for mobile applications. This paper presents a resource allocation method to allocate variables to storage places and to schedule data movements for the Montium. The resource allocation

  3. Function Allocation in Complex Socio-Technical Systems: Procedure usage in nuclear power and the Context Analysis Method for Identifying Design Solutions (CAMIDS) Model

    Science.gov (United States)

    Schmitt, Kara Anne

    This research aims to prove that strict adherence to procedures and rigid compliance to process in the US Nuclear Industry may not prevent incidents or increase safety. According to the Institute of Nuclear Power Operations, the nuclear power industry has seen a recent rise in events, and this research claims that a contributing factor to this rise is organizational, cultural, and based on peoples overreliance on procedures and policy. Understanding the proper balance of function allocation, automation and human decision-making is imperative to creating a nuclear power plant that is safe, efficient, and reliable. This research claims that new generations of operators are less engaged and thinking because they have been instructed to follow procedures to a fault. According to operators, they were once to know the plant and its interrelations, but organizationally more importance is now put on following procedure and policy. Literature reviews were performed, experts were questioned, and a model for context analysis was developed. The Context Analysis Method for Identifying Design Solutions (CAMIDS) Model was created, verified and validated through both peer review and application in real world scenarios in active nuclear power plant simulators. These experiments supported the claim that strict adherence and rigid compliance to procedures may not increase safety by studying the industry's propensity for following incorrect procedures, and when it directly affects the outcome of safety or security of the plant. The findings of this research indicate that the younger generations of operators rely highly on procedures, and the organizational pressures of required compliance to procedures may lead to incidents within the plant because operators feel pressured into following the rules and policy above performing the correct actions in a timely manner. The findings support computer based procedures, efficient alarm systems, and skill of the craft matrices. The solution to

  4. Constrained control allocation for systems with redundant control effectors

    OpenAIRE

    Bordignon, Kenneth A

    1996-01-01

    Control allocation is examined for linear time-invariant problems that have more controls than degrees of freedom. The controls are part of a physical system and are subject to limits on their maximum positions. A control allocation scheme commands control deflections in response to some desired output. The ability of a control allocation scheme to produce the desired output without violating the physical position constraints is used to compare allocation schemes. Methods are develop...

  5. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  6. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials.

    Science.gov (United States)

    Devine, Eric G; Peebles, Kristina R; Martini, Valeria

    2017-03-01

    Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  7. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  8. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  9. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  10. An Analysis and Allocation System for Library Collections Budgets: The Comprehensive Allocation Process (CAP)

    Science.gov (United States)

    Lyons, Lucy Eleonore; Blosser, John

    2012-01-01

    The "Comprehensive Allocation Process" (CAP) is a reproducible decision-making structure for the allocation of new collections funds, for the reallocation of funds within stagnant budgets, and for budget cuts in the face of reduced funding levels. This system was designed to overcome common shortcomings of current methods. Its philosophical…

  11. The European Emission Trading System and competition. Anticompetitive measures beyond reach? An assessment of the grandfathering allocation method and the Performance Standard Rate system

    International Nuclear Information System (INIS)

    Weishaar, S.

    2006-10-01

    The center piece of the European Climate Change Program is the ambitious Greenhouse Gas Emissions Trading Scheme (EU ETS, Directive 2003/87/EC) which helps Member States to fulfill their Kyoto commitments. It particularly facilitates the old EU 15 Member States to make progress towards meeting their particular greenhouse gas emissions reduction goals committed under the Burden Sharing Agreement. EU Member States have developed national greenhouse gas allowances allocation plans and distributed these allowances to around 5000 operators with approximately 12.000 installations. Differences between allocations can give rise to severe anticompetitive effects. Undue interventions by Member States are largely contained through the application of the four freedoms, while EC Competition law (Articles 81 and 82) is geared to the containment of competitive distortions arising in particular from undue behavior of firms. State involvement in infringements is addressed through Articles 87 (State aid) and 86 (public undertakings) and the 'joint application doctrine' (Articles 10(2), 3(g), 81 and 82) which was developed by the ECJ upon recognition that State measures can undermine the effectiveness of the EC Treaty. The paper examines how anticompetitive distortions originating from Member State action under National Allocation Plans in general and by application of (historical) grandfathering and the (hypothetical) Performance Standard Rate (PSR) allocation format in particular are dealt with under European competition law rules. The PSR System is a relative benchmark system with an intended cap for all participants but without a cap for individual operators. This alternative approach has been developed and is actually in use for the Dutch NOx Emission Trading System. An interdisciplinary industrial economic and competition law framework is chosen to formulate an economic critique. After the introductory part the anticompetitive effects originating in State measures are examined

  12. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  13. Allocating multiple units

    DEFF Research Database (Denmark)

    Tranæs, Torben; Krishna, Kala

    2002-01-01

    This paper studies the allocation and rent distribution in multi-unit, combinatorial-bid auctions under complete information. We focus on the natural multi-unit analogue of the first-price auction, where buyers bid total payments, pay their bids, and where the seller allocates goods to maximize his...... auction, which is the multi unit analogue of a second-price auction. Furthermore, we characterize these equilibria when valuations take a number of different forms: diminishing marginal valuations, increasing average valuations, and marginal valuations with single turning points...

  14. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  15. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  16. Mechanisms and direction of allocation bias in randomised clinical trials

    DEFF Research Database (Denmark)

    Paludan-Müller, Asger; Teindl Laursen, David Ruben; Hróbjartsson, A.

    2016-01-01

    clinical trials. Methods: Two systematic reviews and a theoretical analysis. We conducted one systematic review of empirical studies of motives/methods for deciphering patient allocation sequences; and another review of methods publications commenting on allocation bias. We theoretically analysed...... the mechanisms of allocation bias and hypothesised which main factors predicts its direction. Results: Three empirical studies addressed motives/methods for deciphering allocation sequences. Main motives included ensuring best care for patients and ensuring best outcome for the trial. Main methods included...... various manipulations with randomisation envelopes. Out of 57 methods publications 11 (19 %) mentioned explicitly that allocation bias can go in either direction. We hypothesised that the direction of allocation bias is mainly decided by the interaction between the patient allocators’ motives...

  17. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  18. Financial Resources Allocation of Tabriz University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    Esmaeil Afiyan

    2015-08-01

    Full Text Available ​ Background and Objectives : According to complexity of resource allocation, issue about how to allocate health care resources in an accurate and fair manner has become the subject of discussions and decisions of related groups. Therefore, in this research we aim to study the methods of financial resource allocation of Tabriz University of Medical Sciences in order to identify its strengths and weaknesses for its promotion. Material and Methods : This study is a descriptive, qualitative sectional research and all comments have been collected by focus group discussions with experts and managers involved in the allocation of financial resources of Tabriz University of Medical Sciences. All factors affecting the process of allocation have been reviewd carefully. Results : Results suggested that except the health sector, none of the other sectors use the formulated  and scientific methods for allocating financial resources and despite the emphasize in the 4th development plan for operating funding, the final cost of the services, has no role in allocating financial resources. Conclusion : Regarding to judgmental and subjective method of financial resources allocation of Tabriz University of Medical Sciences and lack of documented and formulated methods, there is an essential need for developing an appropriate and formulated model for scientific allocation of financial resources in order to improve the efficiency and fairness of the allocation.

  19. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  20. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  1. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  2. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  3. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  4. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  5. Comparing methodologies for the allocation of overhead and capital costs to hospital services.

    Science.gov (United States)

    Tan, Siok Swan; van Ineveld, Bastianus Martinus; Redekop, William Ken; Hakkaart-van Roijen, Leona

    2009-06-01

    Typically, little consideration is given to the allocation of indirect costs (overheads and capital) to hospital services, compared to the allocation of direct costs. Weighted service allocation is believed to provide the most accurate indirect cost estimation, but the method is time consuming. To determine whether hourly rate, inpatient day, and marginal mark-up allocation are reliable alternatives for weighted service allocation. The cost approaches were compared independently for appendectomy, hip replacement, cataract, and stroke in representative general hospitals in The Netherlands for 2005. Hourly rate allocation and inpatient day allocation produce estimates that are not significantly different from weighted service allocation. Hourly rate allocation may be a strong alternative to weighted service allocation for hospital services with a relatively short inpatient stay. The use of inpatient day allocation would likely most closely reflect the indirect cost estimates obtained by the weighted service method.

  6. Applied cost allocation

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Hougaard, Jens Leth; Smilgins, Aleksandrs

    2016-01-01

    This paper deals with empirical computation of Aumann–Shapley cost shares for joint production. We show that if one uses a mathematical programing approach with its non-parametric estimation of the cost function there may be observations in the data set for which we have multiple Aumann–Shapley p...... of assumptions concerning firm behavior. These assumptions enable us to connect inefficient with efficient production and thereby provide consistent ways of allocating the costs arising from inefficiency....

  7. Emissions allocation in transportation routes

    NARCIS (Netherlands)

    Leenders, B.P.J.; Velázquez Martínez, J.; Fransoo, J.C.

    2017-01-01

    This article studies the allocation of CO2 emissions to a specific shipment in routing transportation. The authors show that this problem differs from a cost allocation problem specifically because the concavity condition does not hold necessarily in the CO2 allocation problem. This implies that a

  8. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  9. Spatial allocation of forest recreation value

    Science.gov (United States)

    Kenneth A. Baerenklau; Armando Gonzalez-Caban; Catrina Paez; Edgard Chavez

    2009-01-01

    Non-market valuation methods and geographic information systems are useful planning and management tools for public land managers. Recent attention has been given to investigation and demonstration of methods for combining these tools to provide spatially-explicit representations of non-market value. Most of these efforts have focused on spatial allocation of...

  10. Cost allocation with limited information

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tind, Jørgen

    This article investigates progressive development of Aumann-Shapley cost allocation in a multilevel organizational or production structure. In particular, we study a linear parametric programming setup utilizing the Dantzig-Wolfe decomposition procedure. Typically cost allocation takes place after...... all activities have been performed, for example by finishing all outputs. Here the allocation is made progressively with suggestions for activities. I other words cost allocation is performed in parallel for example with a production planning process. This development does not require detailed...... information about some technical constraints in order to make the cost allocation....

  11. Allocation of Decommissioning and Waste Liabilities

    International Nuclear Information System (INIS)

    Varley, Geoff

    2011-11-01

    The work demonstrates that there are a number of methods available for cost allocation, the pros and cons of which are examined. The study investigates potential proportional and incremental methods in some depth. A recommendation in principle to use the latter methodology is given. It is concluded that a 'fair assumption' is that the potential allocation of costs for 'the RMA Leaching Hall' probably is small, in relation to the total costs, and estimated to be not more than about 175 kSEK, plus any costs associated with decommissioning/ disposal of a number of small pieces of equipment added by the current operator

  12. 77 FR 2240 - Allocation and Apportionment of Interest Expense

    Science.gov (United States)

    2012-01-17

    ... allocation and apportionment of interest expense using the fair market value asset method. The temporary regulations also update the interest allocation regulations to conform to the changes made to the applicable... using the fair market value method. The text of those regulations also serves as the text of these...

  13. 48 CFR 1631.203-70 - Allocation techniques.

    Science.gov (United States)

    2010-10-01

    ... shall consistently apply the methods and techniques established to classify direct and indirect costs... meant to be exhaustive, but rather are examples of allocation methods that may be acceptable under... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Allocation techniques. 1631...

  14. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  15. 29 CFR 4207.7 - Liability for subsequent complete withdrawals and related adjustments for allocating unfunded...

    Science.gov (United States)

    2010-07-01

    ... uses either the “presumptive” or the “direct attribution” method (section 4211(b) or (c)(4), respectively) for allocating unfunded vested benefits, the plan shall modify those allocation methods as... using “presumptive” method. In a plan using the “presumptive” allocation method under section 4211(b) of...

  16. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  17. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  18. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  19. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  1. Continuous integration congestion cost allocation based on sensitivity

    International Nuclear Information System (INIS)

    Wu, Z.Q.; Wang, Y.N.

    2004-01-01

    Congestion cost allocation is a very important topic in congestion management. Allocation methods based on the Aumann-Shapley value use the discrete numerical integration method, which needs to solve the incremented OPF solution many times, and as such it is not suitable for practical application to large-scale systems. The optimal solution and its sensitivity change tendency during congestion removal using a DC optimal power flow (OPF) process is analysed. A simple continuous integration method based on the sensitivity is proposed for the congestion cost allocation. The proposed sensitivity analysis method needs a smaller computation time than the method based on using the quadratic method and inner point iteration. The proposed congestion cost allocation method uses a continuous integration method rather than discrete numerical integration. The method does not need to solve the incremented OPF solutions; which allows it use in large-scale systems. The method can also be used for AC OPF congestion management. (author)

  2. Theory of stable allocations

    Directory of Open Access Journals (Sweden)

    Pantelić Svetlana

    2014-01-01

    Full Text Available The Swedish Royal Academy awarded the 2012 Nobel Prize in Economics to Lloyd Shapley and Alvin Roth, for the theory of stable allocations and the practice of market design. These two American researchers worked independently from each other, combining basic theory and empirical investigations. Through their experiments and practical design they generated a flourishing field of research and improved the performance of many markets. Born in 1923 in Cambridge, Massachusetts, Shapley defended his doctoral thesis at Princeton University in 1953. For many years he worked at RAND, and for more than thirty years he was a professor at UCLA University. He published numerous scientific papers, either by himself or in cooperation with other economists.

  3. SSC accelerator availability allocation

    International Nuclear Information System (INIS)

    Dixon, K.T.; Franciscovich, J.

    1991-03-01

    Superconducting Super Collider (SSC) operational availability is an area of major concern, judged by the Central Design Group to present such risk that use of modern engineering tools would be essential to program success. Experience has shown that as accelerator beam availability falls below about 80%, efficiency of physics experiments degrades rapidly due to inability to maintain adequate coincident accelerator and detector operation. For this reason, the SSC availability goal has been set at 80%, even though the Fermi National Accelerator Laboratory accelerator, with a fraction of the SSC's complexity, has only recently approached that level. This paper describes the allocation of the top-level goal to part-level reliability and maintainability requirements, and it gives the results of parameter sensitivity studies designed to help identify the best approach to achieve the needed system availability within funding and schedule constraints. 1 ref., 12 figs., 4 tabs

  4. Resource allocation using ANN in LTE

    Science.gov (United States)

    Yigit, Tuncay; Ersoy, Mevlut

    2017-07-01

    LTE is the 4th generation wireless network technology, which provides flexible bandwidth, higher data speeds and lower delay. Difficulties may be experienced upon an increase in the number of users in LTE. The objective of this study is to ensure a faster solution to any such resource allocation problems which might arise upon an increase in the number of users. A fast and effective solution has been obtained by making use of Artificial Neural Network. As a result, fast working artificial intelligence methods may be used in resource allocation problems during operation.

  5. The Design and Implementation of a GUI-Based Control Allocation Toolbox in the MATLAB Environment

    OpenAIRE

    Glaze, Michelle L.

    1998-01-01

    Control Allocation addresses the problem of the management of multiple, redundant control effectors. Generally speaking, control allocation is any method that is used to determine how the controls of a system should be positioned to achieve some desired effect. An infinite number of allocation methods exist, from the straight-forward direct allocation technique, to the daisy chaining approach, to the computationally simple generalized inverse method. Because different methods have advantag...

  6. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  7. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  8. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  9. Importance measures and resource allocation

    International Nuclear Information System (INIS)

    Guey, C.N.; Morgan, T.; Hughes, E.A.

    1987-01-01

    This paper discusses various importance measures and their practical relevance to allocating resources. The characteristics of importance measures are illustrated through simple examples. Important factors associated with effectively allocating resources to improve plant system performance or to prevent system degradation are discussed. It is concluded that importance measures are only indicative of and not equal to the risk significance of a component, system, or event. A decision framework is suggested to provide a comprehensive basis for resource allocation

  10. IPO Allocations: Discriminatory or Discretionary?

    OpenAIRE

    William Wilhelm; Alexander Ljungqvist

    2001-01-01

    We estimate the structural links between IPO allocations, pre-market information production, and initial underpricing returns, within the context of theories of bookbuilding. Using a sample of both US and international IPOs we find evidence of the following: ? IPO allocation policies favour institutional investors, both in the US and worldwide. ? Increasing institutional allocations results in offer prices that deviate more from the indicative price range established prior to bankers’ efforts...

  11. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  13. Comparative study of EBE (Equivalent Bilateral Exchanges) multi-area and Zbus multi-area methods to allocate costs by using the transmission system; Estudo comparativo dos metodos EBE multi-area e Zbus multi-area para alocacao de custos pelo uso do sistema de transmissao

    Energy Technology Data Exchange (ETDEWEB)

    Caparo, J.L.Ch.; Lima, D.A. [Pontificia Universidade Catolica do Rio de Janeiro (PUC-Rio), RJ (Brazil). Dept. de Engenharia Eletrica], Emails: jluis@ele.puc-rio.br, delberis@ele.puc-rio.br

    2009-07-01

    This work is dedicated to study and discuss two methods to solve the problem of cost allocation by the use of the transmission system in multi-areas for generators and loads. The EBE multi-area method (EBE MA), which is based on EBE, and the Zbus multi-area method (Zbus MA), which is based on Zbus method to allocate costs by using the transmission system, are presented and discussed. Results, analysis and conclusions were made with the 8-bar system, which allows a good interpretation of the behavior of methods.

  14. 26 CFR 1.199-4 - Costs allocable to domestic production gross receipts.

    Science.gov (United States)

    2010-04-01

    ... allocation method is reasonable is based on all of the facts and circumstances including whether the taxpayer... relationship between the adjustment and the allocation base chosen; the accuracy of the method chosen as... (ii) Y uses a standard cost method to allocate all direct and indirect costs (section 471 and...

  15. Zinc allocation and re-allocation in rice

    NARCIS (Netherlands)

    Stomph, T.J.; Jiang, W.; Putten, van der P.E.L.; Struik, P.C.

    2014-01-01

    Aims: Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation

  16. Investigating the efficacy of practical skill teaching: a pilot-study comparing three educational methods.

    Science.gov (United States)

    Maloney, Stephen; Storr, Michael; Paynter, Sophie; Morgan, Prue; Ilic, Dragan

    2013-03-01

    Effective education of practical skills can alter clinician behaviour, positively influence patient outcomes, and reduce the risk of patient harm. This study compares the efficacy of two innovative practical skill teaching methods, against a traditional teaching method. Year three pre-clinical physiotherapy students consented to participate in a randomised controlled trial, with concealed allocation and blinded participants and outcome assessment. Each of the three randomly allocated groups were exposed to a different practical skills teaching method (traditional, pre-recorded video tutorial or student self-video) for two specific practical skills during the semester. Clinical performance was assessed using an objective structured clinical examination (OSCE). The students were also administered a questionnaire to gain the participants level of satisfaction with the teaching method, and their perceptions of the teaching methods educational value. There were no significant differences in clinical performance between the three practical skill teaching methods as measured in the OSCE, or for student ratings of satisfaction. A significant difference existed between the methods for the student ratings of perceived educational value, with the teaching approaches of pre-recorded video tutorial and student self-video being rated higher than 'traditional' live tutoring. Alternative teaching methods to traditional live tutoring can produce equivalent learning outcomes when applied to the practical skill development of undergraduate health professional students. The use of alternative practical skill teaching methods may allow for greater flexibility for both staff and infrastructure resource allocation.

  17. Efficient Metropolitan Resource Allocation

    Directory of Open Access Journals (Sweden)

    Richard Arnott

    2016-05-01

    Full Text Available Over the past 30 years Calgary has doubled in size, from a population of 640,645 in 1985 to 1,230,915 in 2015. During that time the City has had five different mayors, hosted the Winter Olympics, and expanded the C-Train from 25 platforms to 45. Calgary’s Metropolitan Area has grown too, with Airdrie, Chestermere, Okotoks and Cochrane growing into full-fledged cities, ripe with inter-urban commuters.* And with changes to provincial legislation in the mid-’90s, rural Rocky View County and the Municipal District of Foothills are now real competitors for residential, commercial and industrial development that in the past would have been considered urban. In this metropolitan system, where people live, their household structure, and their place of work informs the services they need to conduct their daily lives, and directly impacts the spatial character of the City and the broader region. In sum, Metropolitan Calgary is increasingly complex. Calgary and the broader metropolitan area will continue to grow, even with the current economic slowdown. Frictions within Calgary, between the various municipalities in the metropolitan area, and the priorities of other local authorities (such as the School Boards and Alberta Health Services will continue to impact the agendas of local politicians and their ability to answer to the needs of their residents. How resources – whether it is hard infrastructure, affordable housing, classrooms, or hospital beds – are allocated over space and how these resources are funded, directly impacts these relationships. This technical paper provides my perspective as an urban economist on the efficient allocation of resources within a metropolitan system in general, with reference to Calgary where appropriate, and serves as a companion to the previously released “Reflections on Calgary’s Spatial Structure: An Urban Economists Critique of Municipal Planning in Calgary.” It is hoped that the concepts reviewed

  18. An assessment of Nigerias budgetary allocation to the education ...

    African Journals Online (AJOL)

    This study assessed Nigerias budgetary allocations to the Education sector from year 2000 to 2010. Simple percentage method was adopted in the empirical investigation. The study showed that Nigerias budgetary allocation was less than the 26 percent recommended by the United Nations Educational Scientifc and ...

  19. Endogeneously arising network allocation rules

    NARCIS (Netherlands)

    Slikker, M.

    2006-01-01

    In this paper we study endogenously arising network allocation rules. We focus on three allocation rules: the Myerson value, the position value and the component-wise egalitarian solution. For any of these three rules we provide a characterization based on component efficiency and some balanced

  20. Carbon allocation in forest ecosystems

    Science.gov (United States)

    Creighton M. Litton; James W. Raich; Michael G. Ryan

    2007-01-01

    Carbon allocation plays a critical role in forest ecosystem carbon cycling. We reviewed existing literature and compiled annual carbon budgets for forest ecosystems to test a series of hypotheses addressing the patterns, plasticity, and limits of three components of allocation: biomass, the amount of material present; flux, the flow of carbon to a component per unit...

  1. Risk allocation under liquidity constraints

    NARCIS (Netherlands)

    Csóka, P.; Herings, P.J.J.

    2013-01-01

    Risk allocation games are cooperative games that are used to attribute the risk of a financial entity to its divisions. In this paper, we extend the literature on risk allocation games by incorporating liquidity considerations. A liquidity policy specifies state-dependent liquidity requirements that

  2. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  3. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  4. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  5. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  7. Towards the harmonization between National Forest Inventory and Forest Condition Monitoring. Consistency of plot allocation and effect of tree selection methods on sample statistics in Italy.

    Science.gov (United States)

    Gasparini, Patrizia; Di Cosmo, Lucio; Cenni, Enrico; Pompei, Enrico; Ferretti, Marco

    2013-07-01

    In the frame of a process aiming at harmonizing National Forest Inventory (NFI) and ICP Forests Level I Forest Condition Monitoring (FCM) in Italy, we investigated (a) the long-term consistency between FCM sample points (a subsample of the first NFI, 1985, NFI_1) and recent forest area estimates (after the second NFI, 2005, NFI_2) and (b) the effect of tree selection method (tree-based or plot-based) on sample composition and defoliation statistics. The two investigations were carried out on 261 and 252 FCM sites, respectively. Results show that some individual forest categories (larch and stone pine, Norway spruce, other coniferous, beech, temperate oaks and cork oak forests) are over-represented and others (hornbeam and hophornbeam, other deciduous broadleaved and holm oak forests) are under-represented in the FCM sample. This is probably due to a change in forest cover, which has increased by 1,559,200 ha from 1985 to 2005. In case of shift from a tree-based to a plot-based selection method, 3,130 (46.7%) of the original 6,703 sample trees will be abandoned, and 1,473 new trees will be selected. The balance between exclusion of former sample trees and inclusion of new ones will be particularly unfavourable for conifers (with only 16.4% of excluded trees replaced by new ones) and less for deciduous broadleaves (with 63.5% of excluded trees replaced). The total number of tree species surveyed will not be impacted, while the number of trees per species will, and the resulting (plot-based) sample composition will have a much larger frequency of deciduous broadleaved trees. The newly selected trees have-in general-smaller diameter at breast height (DBH) and defoliation scores. Given the larger rate of turnover, the deciduous broadleaved part of the sample will be more impacted. Our results suggest that both a revision of FCM network to account for forest area change and a plot-based approach to permit statistical inference and avoid bias in the tree sample

  8. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  9. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  10. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  11. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  12. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  13. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  14. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  15. Studies on the detection of concealed objects using the neutron reflection method

    International Nuclear Information System (INIS)

    Papp, A.

    2013-01-01

    The increment of reflected thermal and 1.45 eV resonance neutrons vs. the thickness of the reflector has been measured and described by an analytical expression. Macroscopic, Σ β , and microscopic, σ β , reflection cross sections averaged over the bulk reflector substances were deduced for some elements and compounds. It was found that the σ β values are additive even for bulk samples and so the σ βmol could be given for some illicit drugs, explosives and hiding materials. - Highlights: ► The effect of reflector materials on the increment of neutrons were determined. ► Macroscopic and microscopic reflection cross sections averaged over bulk samples were determined. ► Simple analytical expression was given to describe the yield of reflected neutrons. ► The observed additive behavior in reflected neutrons rendered to characterize other materials

  16. Fund Allocation in Complex Rehabilitation Programs

    Directory of Open Access Journals (Sweden)

    Tarek Hegazy

    2013-12-01

    Full Text Available Civil Infrastructure assets require continuous renewal actions to sustain their operability and safety. Allocating limited renewal funds amongst numerous building components, however, represents a large-scale optimization problem and earlier efforts utilized genetic algorithms (GAs to optimize medium size problems yet exhibit steep performance degradation as problem size increases. In this research, after experimenting with various approaches of segmenting a large problem into multiple smaller sub-problems, clustered segmentation proved to be the most promising. The paper discusses the underlying life cycle analysis model, the various segmentation methods, and the optimization results using the improved GAs + clustered segmentation, which proved to be able to optimize asset renewals for 50,000 components with no noticeable performance degradation. The proposed method is simple and logical, and can be used on variety of asset types to improve infrastructure fund allocation. Future extension of this research is then highlighted.

  17. International Development Aid Allocation Determinants

    OpenAIRE

    Tapas Mishra; Bazoumana Ouattara; Mamata Parhi

    2012-01-01

    This paper investigates the factors explaining aid allocation by bilateral and multilateral donors. We use data for 146 aid recipient countries over the period 1990-2007 and employ Bayesian Averaging of Classical Estimates Approach (BACE) approach and find that both the recipient need and donor interest motives are `significant' determinants of bilateral and multilateral aid allocation process. Our results also indicate that the measures for recipient need and donor interests vary from bilate...

  18. How should INGOs allocate resources?

    Directory of Open Access Journals (Sweden)

    Scott Wisor

    2012-02-01

    Full Text Available International Non-governmental Organizations (INGOs face difficult choices when choosing to allocate resources. Given that the resources made available to INGOs fall far short of what is needed to reduce massive human rights deficits, any chosen scheme of resource allocation requires failing to reach other individuals in great need. Facing these moral opportunity costs, what moral reasons should guide INGO resource allocation? Two reasons that clearly matter, and are recognized by philosophers and development practitioners, are the consequences (or benefit or harm reduction of any given resource allocation and the need (or priority of individual beneficiaries. If accepted, these reasons should lead INGOs to allocate resources to a limited number of countries where the most prioritarian weighted harm reduction will be achieved. I make three critiques against this view. First, on grounds the consequentialist accepts, I argue that INGOs ought to maintain a reasonably wide distribution of resources. Second, I argue that even if one is a consequentialist, consequentialism ought not act as an action guiding principle for INGOs. Third, I argue that additional moral reasons should influence decision making about INGO resource allocation. Namely, INGO decision making should attend to relational reasons, desert, respect for agency, concern for equity, and the importance of expressing a view of moral wrongs.

  19. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  20. S4HARA: System for HIV/AIDS resource allocation

    Directory of Open Access Journals (Sweden)

    Carter Michael W

    2008-03-01

    Full Text Available Abstract Background HIV/AIDS resource allocation decisions are influenced by political, social, ethical and other factors that are difficult to quantify. Consequently, quantitative models of HIV/AIDS resource allocation have had limited impact on actual spending decisions. We propose a decision-support System for HIV/AIDS Resource Allocation (S4HARA that takes into consideration both principles of efficient resource allocation and the role of non-quantifiable influences on the decision-making process for resource allocation. Methods S4HARA is a four-step spreadsheet-based model. The first step serves to identify the factors currently influencing HIV/AIDS allocation decisions. The second step consists of prioritizing HIV/AIDS interventions. The third step involves allocating the budget to the HIV/AIDS interventions using a rational approach. Decision-makers can select from several rational models of resource allocation depending on availability of data and level of complexity. The last step combines the results of the first and third steps to highlight the influencing factors that act as barriers or facilitators to the results suggested by the rational resource allocation approach. Actionable recommendations are then made to improve the allocation. We illustrate S4HARA in the context of a primary healthcare clinic in South Africa. Results The clinic offers six types of HIV/AIDS interventions and spends US$750,000 annually on these programs. Current allocation decisions are influenced by donors, NGOs and the government as well as by ethical and religious factors. Without additional funding, an optimal allocation of the total budget suggests that the portion allotted to condom distribution be increased from 1% to 15% and the portion allotted to prevention and treatment of opportunistic infections be increased from 43% to 71%, while allocation to other interventions should decrease. Conclusion Condom uptake at the clinic should be increased by

  1. The dynamics of farm land allocation

    DEFF Research Database (Denmark)

    Arnberg, Søren; Hansen, Lars Gårn

    This study develops a dynamic multi-output model of farmers’ crop allocation decisions that allows estimation of both short-run and long-run adjustments to a wide array of economic incentives. The method can be used to inform decision-makers about a number of issues including agricultural policy...... reform and environmental regulation. The model allows estimation of dynamic effects relating to price expectations adjustment, investment lags and crop rotation constraints. Estimation is based on micro-panel data from Danish farmers that includes acreage, output and variable input utilisation...... at the crop level. Results indicate that there are substantial differences between the shortrun and long-run land allocation behaviour of Danish farmers and that there are substantial differences in the time lags associated with different crops. Since similar farming conditions are found in northern Europe...

  2. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  4. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  5. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    Science.gov (United States)

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  7. Detecting non-binomial sex allocation when developmental mortality operates.

    Science.gov (United States)

    Wilkinson, Richard D; Kapranas, Apostolos; Hardy, Ian C W

    2016-11-07

    Optimal sex allocation theory is one of the most intricately developed areas of evolutionary ecology. Under a range of conditions, particularly under population sub-division, selection favours sex being allocated to offspring non-randomly, generating non-binomial variances of offspring group sex ratios. Detecting non-binomial sex allocation is complicated by stochastic developmental mortality, as offspring sex can often only be identified on maturity with the sex of non-maturing offspring remaining unknown. We show that current approaches for detecting non-binomiality have limited ability to detect non-binomial sex allocation when developmental mortality has occurred. We present a new procedure using an explicit model of sex allocation and mortality and develop a Bayesian model selection approach (available as an R package). We use the double and multiplicative binomial distributions to model over- and under-dispersed sex allocation and show how to calculate Bayes factors for comparing these alternative models to the null hypothesis of binomial sex allocation. The ability to detect non-binomial sex allocation is greatly increased, particularly in cases where mortality is common. The use of Bayesian methods allows for the quantification of the evidence in favour of each hypothesis, and our modelling approach provides an improved descriptive capability over existing approaches. We use a simulation study to demonstrate substantial improvements in power for detecting non-binomial sex allocation in situations where current methods fail, and we illustrate the approach in real scenarios using empirically obtained datasets on the sexual composition of groups of gregarious parasitoid wasps. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Allocation of Load-Loss Cost Caused by Voltage Sag

    Science.gov (United States)

    Gao, X.

    2017-10-01

    This paper focuses on the allocation of load-loss cost caused by voltage sag in the environment of electricity market. To compensate the loss of loads due to voltage sags, the load-loss cost is allocated to both sources and power consumers. On the basis of Load Drop Cost (LDC), a quantitative evaluation index of load-loss cost caused by voltage sag is identified. The load-loss cost to be allocated to power consumers themselves is calculated according to load classification. Based on the theory of power component the quantitative relation between sources and loads is established, thereby a quantitative calculation method for load-loss cost allocated to each source is deduced and the quantitative compensation from individual source to load is proposed. A simple five-bus system illustrates the main features of the proposed method.

  9. Allocation Problems and Market Design

    DEFF Research Database (Denmark)

    Smilgins, Aleksandrs

    The thesis contains six independent papers with a common theme: Allocation problems and market design. The first paper is concerned with fair allocation of risk capital where independent autonomous subunits have risky activities and together constitute the entity's total risk, whose associated risk...... at a certain point in time involves countries that have excess demand and countries that have surplus of green energy. The problem addressed here is how the gains from trade ought to influence the way that members of the grid share common costs. The fifth paper extends the classical two-sided one...

  10. Biomass Resource Allocation among Competing End Uses

    Energy Technology Data Exchange (ETDEWEB)

    Newes, E.; Bush, B.; Inman, D.; Lin, Y.; Mai, T.; Martinez, A.; Mulcahy, D.; Short, W.; Simpkins, T.; Uriarte, C.; Peck, C.

    2012-05-01

    The Biomass Scenario Model (BSM) is a system dynamics model developed by the U.S. Department of Energy as a tool to better understand the interaction of complex policies and their potential effects on the biofuels industry in the United States. However, it does not currently have the capability to account for allocation of biomass resources among the various end uses, which limits its utilization in analysis of policies that target biomass uses outside the biofuels industry. This report provides a more holistic understanding of the dynamics surrounding the allocation of biomass among uses that include traditional use, wood pellet exports, bio-based products and bioproducts, biopower, and biofuels by (1) highlighting the methods used in existing models' treatments of competition for biomass resources; (2) identifying coverage and gaps in industry data regarding the competing end uses; and (3) exploring options for developing models of biomass allocation that could be integrated with the BSM to actively exchange and incorporate relevant information.

  11. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  12. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  13. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  14. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  15. The incidence of local government allocations in Tanzania

    OpenAIRE

    Jameson Boex

    2003-01-01

    Since 1999, Tanzania has been actively pursuing reforms of the way in which the central government finances local government activities. This paper looks at the current incidence of central government allocations to local authorities in Tanzania through: 1) examining of potential problems with the current financing method, 2) showing large variations between local government allocations, and 3) finding that surprisingly what drives t his distribution of resources maybe substantial pro-wealthy...

  16. Centralized Allocation in Multiple Markets

    DEFF Research Database (Denmark)

    Monte, Daniel; Tumennasan, Norovsambuu

    The problem of allocating indivisible objects to different agents, where each indi vidual is assigned at most one object, has been widely studied. Pápai (2000) shows that the set of strategy-proof, nonbossy, Pareto optimal and reallocation-proof rules are hierarchical exchange rules | generalizat...... and nonbossy rules are sequential dictatorships, a special case of Pápai's hierarchical exchange rules....

  17. Designing for dynamic task allocation

    NARCIS (Netherlands)

    Dongen, van K.; Maanen, van P.P.

    2005-01-01

    Future platforms are envisioned in which human-machine teams are able to share and trade tasks as demands in situations change. It seems that human-machine coordination has not received the attention it deserves by past and present approaches to task allocation. In this paper a simple way to make

  18. Planning and Resource Allocation Management.

    Science.gov (United States)

    Coleman, Jack W.

    1986-01-01

    Modern scientific management techniques provide college administrators with valuable planning and resource allocation insights and enhances the decision process. The planning model should incorporate assessment, strategic planning, dynamic and long-term budgeting, operational planning, and feedback and control for actual operations. (MSE)

  19. Using Excel's Matrix Operations to Facilitate Reciprocal Cost Allocations

    Science.gov (United States)

    Leese, Wallace R.; Kizirian, Tim

    2009-01-01

    The reciprocal method of service department cost allocation requires linear equations to be solved simultaneously. These computations are often so complex as to cause the abandonment of the reciprocal method in favor of the less sophisticated direct or step-down methods. Here is a short example demonstrating how Excel's sometimes unknown matrix…

  20. Optimal load allocation of multiple fuel boilers.

    Science.gov (United States)

    Dunn, Alex C; Du, Yan Yi

    2009-04-01

    This paper presents a new methodology for optimally allocating a set of multiple industrial boilers that each simultaneously consumes multiple fuel types. Unlike recent similar approaches in the utility industry that use soft computing techniques, this approach is based on a second-order gradient search method that is easy to implement without any specialized optimization software. The algorithm converges rapidly and the application yields significant savings benefits, up to 3% of the overall operating cost of industrial boiler systems in the examples given and potentially higher in other cases, depending on the plant circumstances. Given today's energy prices, this can yield significant savings benefits to manufacturers that raise steam for plant operations.

  1. Cost Allocation of Transmission Losses in Electric Market Mechanism

    Directory of Open Access Journals (Sweden)

    Erwin Dermawan

    2012-06-01

    Full Text Available This paper proposes a new method to calculate cost allocation of transmission losses (losses, based on a certain price of energy (i.e. a marginal price of system. Here is developed a mathematic model through manipulating of the network equation to separate losses. This model uses complex power injection and, does not use approximations and assumptions in determining the cost allocation of losses. Its calculation begins from the results of load flow calculation and then is continued to calculate power distribution from a generator to every load and every line. Finally, to be calculated separating of losses and cost allocation of losses. The proposed method is easy to be understood and applied. An illustration results on IEEE 14-bus system show that the method is always consistent with expectancies and somewhat different with a few reference methods.

  2. Learning and strategic asset allocation

    OpenAIRE

    Kearns, Michael

    2016-01-01

    This thesis investigates whether or not models that portray the relationship between what an investor learns and how he allocates his portfolio can explain phenomena related to household behaviour in the stock market. Endogenous modelling of household learning is utilised, which builds on a growing literature called bounded rationality with increasing explanatory power, offering an alternative to the classical rational expectations theory. Such phenomena include firstly why households often h...

  3. Resource allocation in networks via coalitional games

    NARCIS (Netherlands)

    Shams, F.

    2016-01-01

    The main goal of this dissertation is to manage resource allocation in network engineering problems and to introduce efficient cooperative algorithms to obtain high performance, ensuring fairness and stability. Specifically, this dissertation introduces new approaches for resource allocation in

  4. Concealed concern: fathers' experiences of having a child with juvenile idiopathic arthritis.

    Science.gov (United States)

    Waite-Jones, J M; Madill, A

    2008-01-01

    Despite increased research into families of chronically ill children, more needs to be known about the father's experience. We address this issue through asking: 'What is it like to be the father of a child with Juvenile Idiopathic Arthritis?' (JIA). Four members of eight families with an adolescent diagnosed with JIA, including seven fathers, were interviewed and transcripts analysed using grounded theory. This study suggests that fathers of children with JIA experience several severe losses which are exacerbated through comparisons they make between their own situation and that of fathers of healthy children. In addition, the fathers faced several constraints which reduced their opportunities to communicate with their ill child through shared activities. Fathers appeared to conceal their distress by adopting strategies of denial and distraction however their adjustment was facilitated, to some extent, by social support. They could also develop greater acceptance of their situation over time as the care of their ill child became assimilated into family life and constraints upon their life gradually reduced through the increased maturity of their son or daughter with JIA. These findings have implications for healthcare professionals and voluntary organisations.

  5. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  6. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  7. Deconstructing Concealed Gayness Text in The Film Negeri van Oranje: Critical Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Heri Setiawan

    2018-02-01

    Full Text Available As one of the most popular creative cultural products, film sometimes speaks beyond what it presents. It is not always produced merely for entertainment purposes, but also to spread a certain ideology and represent a particular culture. Anchored in queer theory, this research looks at the Indonesian film, Negeri Van Oranje, which was chosen purposely to be analyzed using Fairclough’s critical discourse analysis model with an aim to deconstruct the concealed gayness text in the film. From the analysis, it was found that the gay scenes in the film try to tell its audience about the positions, feelings, challenges, and rejections that Indonesian gay people experience living amongst heteronormative surroundings. Some new notions about gay people’s life in Indonesia are extracted based on the analysis of the gay scenes in the film. The strategy of inserting gay content into a film nationally released in Indonesia is also revealed. The results of the analysis could be used to create a picture of what gay life looks like in Indonesia, a multicultural country that is well-known as the place in which the world’s largest Muslim population dwells.

  8. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  9. Asset Allocation of Mutual Fund Investors

    OpenAIRE

    Dengpan Luo

    2003-01-01

    This paper studies mutual fund investors' asset allocation decisions using monthly flow data of U.S mutual fund industry from 1984 to 1998. We find that mutual fund investors change their asset allocations between stocks and bonds in reaction to business conditions tracked by changes in expected stock market returns. They tend to allocate less into stock funds during the trough of a business cycle when expected stock market returns are higher and to allocate more into stock funds during the p...

  10. Optimal resource allocation for distributed video communication

    CERN Document Server

    He, Yifeng

    2013-01-01

    While most books on the subject focus on resource allocation in just one type of network, this book is the first to examine the common characteristics of multiple distributed video communication systems. Comprehensive and systematic, Optimal Resource Allocation for Distributed Video Communication presents a unified optimization framework for resource allocation across these systems. The book examines the techniques required for optimal resource allocation over Internet, wireless cellular networks, wireless ad hoc networks, and wireless sensor networks. It provides you with the required foundat

  11. Availability Allocation of Networked Systems Using Markov Model and Heuristics Algorithm

    OpenAIRE

    Li, Ruiying; Liu, Xiaoxi; Huang, Ning

    2014-01-01

    It is a common practice to allocate the system availability goal to reliability and maintainability goals of components in the early design phase. However, the networked system availability is difficult to be allocated due to its complex topology and multiple down states. To solve these problems, a practical availability allocation method is proposed. Network reliability algebraic methods are used to derive the availability expression of the networked topology on the system level, and Markov ...

  12. Intelligent tactical asset allocation support system

    NARCIS (Netherlands)

    Hiemstra, Y.

    1995-01-01

    This paper presents an advanced support system for Tactical Asset Allocation. Asset allocation explains over 90% of portfolio performance (Brinson, Hood and Beebower, 1988). Tactical asset allocation adjusts a strategic portfolio on the basis of short term market outlooks. The system includes

  13. Availability Allocation of Networked Systems Using Markov Model and Heuristics Algorithm

    Directory of Open Access Journals (Sweden)

    Ruiying Li

    2014-01-01

    Full Text Available It is a common practice to allocate the system availability goal to reliability and maintainability goals of components in the early design phase. However, the networked system availability is difficult to be allocated due to its complex topology and multiple down states. To solve these problems, a practical availability allocation method is proposed. Network reliability algebraic methods are used to derive the availability expression of the networked topology on the system level, and Markov model is introduced to determine that on the component level. A heuristic algorithm is proposed to obtain the reliability and maintainability allocation values of components. The principles applied in the AGREE reliability allocation method, proposed by the Advisory Group on Reliability of Electronic Equipment, and failure rate-based maintainability allocation method persist in our allocation method. A series system is used to verify the new algorithm, and the result shows that the allocation based on the heuristic algorithm is quite accurate compared to the traditional one. Moreover, our case study of a signaling system number 7 shows that the proposed allocation method is quite efficient for networked systems.

  14. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  15. The image of the butcher (13th-20th): In search of respectability between corporate pride and blood concealment.

    OpenAIRE

    Leteux , Sylvain

    2015-01-01

    International audience; In most images that represent butchers in France since the Middle Ages, the animal’s blood and death are often eclipsed or softened, except for the realistic photographs of slaughterhouses in the 20th century. The will to conceal blood shows the butchers’ will to build an honourable image of themselves. This quest for respectability is obvious if you look at the ceremony clothes worn by butchers during civil and religious celebrations. In the 19th century, as the trade...

  16. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  17. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  18. Tradable permit allocations and sequential choice

    Energy Technology Data Exchange (ETDEWEB)

    MacKenzie, Ian A. [Centre for Economic Research, ETH Zuerich, Zurichbergstrasse 18, 8092 Zuerich (Switzerland)

    2011-01-15

    This paper investigates initial allocation choices in an international tradable pollution permit market. For two sovereign governments, we compare allocation choices that are either simultaneously or sequentially announced. We show sequential allocation announcements result in higher (lower) aggregate emissions when announcements are strategic substitutes (complements). Whether allocation announcements are strategic substitutes or complements depends on the relationship between the follower's damage function and governments' abatement costs. When the marginal damage function is relatively steep (flat), allocation announcements are strategic substitutes (complements). For quadratic abatement costs and damages, sequential announcements provide a higher level of aggregate emissions. (author)

  19. Optimizing investment fund allocation using vehicle routing problem framework

    Science.gov (United States)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita

    2014-07-01

    The objective of investment is to maximize total returns or minimize total risks. To determine the optimum order of investment, vehicle routing problem method is used. The method which is widely used in the field of resource distribution shares almost similar characteristics with the problem of investment fund allocation. In this paper we describe and elucidate the concept of using vehicle routing problem framework in optimizing the allocation of investment fund. To better illustrate these similarities, sectorial data from FTSE Bursa Malaysia is used. Results show that different values of utility for risk-averse investors generate the same investment routes.

  20. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  1. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  2. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  3. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  4. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  5. Methodology for allocating nuclear power plant control functions to human or automatic control

    International Nuclear Information System (INIS)

    Pulliam, R.; Price, H.E.; Bongarra, J.; Sawyer, C.R.; Kisner, R.A.

    1983-08-01

    This report describes a general method for allocating control functions to man or machine during nuclear power plant (NPP) design, or for evaluating their allocation in an existing design. The research examined some important characeristics of the systems design process, and the results make it clear that allocation of control functions is an intractable problem, one which increases complexity of systems. The method is reported in terms of specific steps which should be taken during early stages of a new system design, and which will lead to an optimal allocation at the functional design level of detail

  6. Development of sample size allocation program using hypergeometric distribution

    International Nuclear Information System (INIS)

    Kim, Hyun Tae; Kwack, Eun Ho; Park, Wan Soo; Min, Kyung Soo; Park, Chan Sik

    1996-01-01

    The objective of this research is the development of sample allocation program using hypergeometric distribution with objected-oriented method. When IAEA(International Atomic Energy Agency) performs inspection, it simply applies a standard binomial distribution which describes sampling with replacement instead of a hypergeometric distribution which describes sampling without replacement in sample allocation to up to three verification methods. The objective of the IAEA inspection is the timely detection of diversion of significant quantities of nuclear material, therefore game theory is applied to its sampling plan. It is necessary to use hypergeometric distribution directly or approximate distribution to secure statistical accuracy. Improved binomial approximation developed by Mr. J. L. Jaech and correctly applied binomial approximation are more closer to hypergeometric distribution in sample size calculation than the simply applied binomial approximation of the IAEA. Object-oriented programs of 1. sample approximate-allocation with correctly applied standard binomial approximation, 2. sample approximate-allocation with improved binomial approximation, and 3. sample approximate-allocation with hypergeometric distribution were developed with Visual C ++ and corresponding programs were developed with EXCEL(using Visual Basic for Application). 8 tabs., 15 refs. (Author)

  7. Security cost allocation under combined bilateral-pool market dispatch

    International Nuclear Information System (INIS)

    Abdullah, M.P.; Hassan, M.Y.; Hussin, F.

    2008-01-01

    Most electricity markets around the world are a combination of bilateral and pool markets, such as NordPool and NYPOOL. In these models, market participants bid into the pool and also make bilateral contracts with each other. This paper addressed the issue of congestion management and security cost allocation in a power pool market model. The basic idea of security cost allocation is to divide the incurred security cost due to congestion relief into pool and bilateral market based on their flow contribution to the congested line. A newly proposed security cost allocation strategy of the combined bilateral-pool market was also presented along with case studies using IEEE-14 bus system that tested the proposed method. Using the proposed method, it was shown that security costs are allocated to market participants at different prices which reflect the load contribution to the security problem. This solves the problem of the uniform security cost allocation in a pure pool market system having uniform pricing, and provides a proper security signal to market participants. 11 refs., 3 tabs., 4 figs

  8. Allocation decisions in network industries

    Energy Technology Data Exchange (ETDEWEB)

    Bolle, Friedel [Europa-Universitaet Viadrina Frankfurt, Lehrstuhl Volkswirtschaftslehre, insbesondere Wirtschaftstheorie (Mikrooekonomie), Postfach 1786 15207 Frankfurt (Germany)

    2008-01-15

    In this paper, I want to propagate a new analytical tool: The usage of Menu Auctions for modelling complicated auctions, negotiations, rent seeking, etc. is advocated, because, contrary to 'normal' auctions and bargaining models, an arbitrary number of additional aspects can be taken into account. After concentrating on 'Truthful Equilibria' [Bernheim, B.D., Whinston, M.D., 1986. Menu auctions, resource allocation, and economic influence, Quarterly Journal of Economics, 1-31.] a certain broad class of Menu Auctions show unique and efficient allocations. Under an additional concavity condition even the equilibrium bids are unique. Two examples are discussed: the privatisation of a state-owned industry and the buying of wholesale electricity (concluding contracts with a number of producers) by a utility. These examples also serve to trace the sources of 'non-concavities' which can prevent the uniqueness of bids and can provide the auctioneer with incentives to exclude bidders from the competition. (author)

  9. Allocation - the Howe measurement challenges

    Energy Technology Data Exchange (ETDEWEB)

    Tierney, Jim; Moksnes, Paul Ove

    2005-07-01

    The Howe Field is located in the Central North Sea Block 22/12a approximately 160 km east of Aberdeen in a water depth of 85 m. The reservoir lies some 12 km east of the Shell operated Nelson Platform, which is situated in adjacent Block 22/11. The Howe project was initiated by Shell Exploration and Production to augment the operating life and production capacity of the Nelson platform, involving the development of an additional subset infrastructure and the installation of topside facilities. The owners of the Howe Field are Enterprise Oil PLC , Intrepid Energy and OMV. The Howe well fluids are commingled with Nelson fluids. Therefore, it is required to measure the Howe well fluids to differentiate between the fields and to determine how much money each partner is allocated. The commercial agreements have stipulated that the measurements of Howe fluids are required to be measured within an accuracy of +- 5% of reading. In addition to accuracy constraints, it was important to minimise capex to ensure the development was economically viable. Given this, multiphase metering was considered to be a solution for allocation between the different ownerships, as opposed to traditional separator metering. This paper will present the journey of the project activity through the selection criteria, flow loop test, installation, commissioning and the first 3 months of operation of the MPFM including verification with the Nelson test separator. Detailing with careful management and engineering support how to succeed with this type of application. (author) (tk)

  10. On joint power allocation and multipath routing in femto-relay networks

    OpenAIRE

    Hoteit , Sahar; Duhamel , Pierre; Lasaulce , Samson

    2016-01-01

    International audience; —Transmit power allocation techniques are very important to manage interference in small-cell networks. While available power allocation algorithms in the literature rely on a predefined routing protocol, we propose in this paper a power-efficient two-step algorithm that allows power allocation and routing to be performed jointly in femto-relay networks. First, we propose an interference-based partitioning method to cluster the femto-relays, then we adopt an iterative ...

  11. Innovative Approach for Developing Spacecraft Interior Acoustic Requirement Allocation

    Science.gov (United States)

    Chu, S. Reynold; Dandaroy, Indranil; Allen, Christopher S.

    2016-01-01

    The Orion Multi-Purpose Crew Vehicle (MPCV) is an American spacecraft for carrying four astronauts during deep space missions. This paper describes an innovative application of Power Injection Method (PIM) for allocating Orion cabin continuous noise Sound Pressure Level (SPL) limits to the sound power level (PWL) limits of major noise sources in the Environmental Control and Life Support System (ECLSS) during all mission phases. PIM is simulated using both Statistical Energy Analysis (SEA) and Hybrid Statistical Energy Analysis-Finite Element (SEA-FE) models of the Orion MPCV to obtain the transfer matrix from the PWL of the noise sources to the acoustic energies of the receivers, i.e., the cavities associated with the cabin habitable volume. The goal of the allocation strategy is to control the total energy of cabin habitable volume for maintaining the required SPL limits. Simulations are used to demonstrate that applying the allocated PWLs to the noise sources in the models indeed reproduces the SPL limits in the habitable volume. The effects of Noise Control Treatment (NCT) on allocated noise source PWLs are investigated. The measurement of source PWLs of involved fan and pump development units are also discussed as it is related to some case-specific details of the allocation strategy discussed here.

  12. Optimal allocation of international atomic energy agency inspection resources

    International Nuclear Information System (INIS)

    Markin, J.T.

    1987-01-01

    Each year the Department of Safeguards of the International Atomic Energy Agency (IAEA) conducts inspections to confirm that nuclear materials and facilities are employed for peaceful purposes. Because of limited inspection resources, however, the IAEA cannot fully attain its safeguards goals either quantitatively as measured by the inspection effort negotiated in the facility attachments or qualitatively as measured by the IAEA criteria for evaluating attainment of safeguards goals. Under current IAEA procedures the allocation of inspection resources assigns essentially equal inspection effort to facilities of the same type. An alternative approach would incorporate consideration of all material categories and facilities to be assigned inspection resources when allocating effort to a particular facility. One such method for allocating inspection resources is based on the IAEA criteria. The criteria provide a framework for allocating inspection effort that includes a ranking of material types according to their safeguards importance, an implicit definition of inspection activities for each material and facility type, and criteria for judging the attainment of safeguards goals in terms of the quality and frequency of these inspection activities. This framework is applicable to resource allocation for an arbitrary group of facilities such as a state's fuel cycle, the facilities inspected by an operations division, or all of the facilities inspected by the IAEA

  13. A cooperative approach to queue allocation of indivisible objects

    NARCIS (Netherlands)

    Hamers, H.J.M.; Klijn, F.; Slikker, M.; Velzen, van B.

    2009-01-01

    We consider the allocation of a finite number of indivisible objects to the same number of agents according to an exogenously given queue. We assume that the agents collaborate in order to achieve an efficient outcome for society. We allow for side-payments and provide a method for obtaining stable

  14. Commercial Banks' Sectoral Credit Allocation and Growth of Nigeria ...

    African Journals Online (AJOL)

    This study set out to analyse the impact of commercial banks sectoral credit allocation on the growth index of Nigeria economy. Data for the study were obtained from secondary sources and analysed using econometric methods namely: ADF unit root test, Johansen Cointegration test; vector error correction model and ...

  15. Resource allocation in smart homes based on Banker's algorithm

    NARCIS (Netherlands)

    Virag, A.; Bogdan, S.

    2011-01-01

    This paper proposes a method for improved energy management in smart homes by means of resource allocation. For this purpose, a Banker's algorithm based strategy has been developed. It is used to control the system and decide which of the given processes should be provided with resources at the

  16. Portraits of Principal Practice: Time Allocation and School Principal Work

    Science.gov (United States)

    Sebastian, James; Camburn, Eric M.; Spillane, James P.

    2018-01-01

    Purpose: The purpose of this study was to examine how school principals in urban settings distributed their time working on critical school functions. We also examined who principals worked with and how their time allocation patterns varied by school contextual characteristics. Research Method/Approach: The study was conducted in an urban school…

  17. 26 CFR 1.141-6 - Allocation and accounting rules.

    Science.gov (United States)

    2010-04-01

    ... 1.141-6 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-6.... Thus, allocations generally may be made using any reasonable, consistently applied accounting method...

  18. Vehicle routing problem in investment fund allocation

    Science.gov (United States)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Mohd, Ismail

    2013-04-01

    Since its introduction by Dantzig and Ramser in 1959, vehicle routing problem keeps evolving in theories, applications and variability. The evolution in computing and technology are also important contributors to research in solving vehicle routing problem. The main sectors of interests among researchers and practitioners for vehicle routing problem are transportation, distribution and logistics. However, literature found that concept and benefits of vehicle routing problem are not taken advantages of by researchers in the field of investment. Other methods found used in investment include multi-objective programming, linear programming, goal programming and integer programming. Yet the application of vehicle routing problem is not fully explored. A proposal on a framework of the fund allocation optimization using vehicle routing problem is presented here. Preliminary results using FTSE Bursa Malaysia data testing the framework are also given.

  19. A Theoretical Assessment on Optimal Asset Allocations in Insurance Industry

    Directory of Open Access Journals (Sweden)

    Bilel Jarraya

    2013-10-01

    Full Text Available In recent years the financial markets known a rapid development and become more and more complex. So, many regulatory requirements, focused on banks as well as insurance sector, have been developed. These regulatory are concentrated essentially on business risk control and required capital to cover risks. These requirements have influenced the asset allocation issue in insurance industry. These requirements have influenced the asset allocation issue in insurance industry. This section is interested by this issue. In first time it highlights some research works in this issue. Then we will investigate the relation between Solvency and optimal asset allocation. Finally we will explore the principal used methods in modeling asset and in choosing the optimal portfolio composition.

  20. Human-Automation Allocations for Current Robotic Space Operations

    Science.gov (United States)

    Marquez, Jessica J.; Chang, Mai L.; Beard, Bettina L.; Kim, Yun Kyung; Karasinski, John A.

    2018-01-01

    Within the Human Research Program, one risk delineates the uncertainty surrounding crew working with automation and robotics in spaceflight. The Risk of Inadequate Design of Human and Automation/Robotic Integration (HARI) is concerned with the detrimental effects on crew performance due to ineffective user interfaces, system designs and/or functional task allocation, potentially compromising mission success and safety. Risk arises because we have limited experience with complex automation and robotics. One key gap within HARI, is the gap related to functional allocation. The gap states: We need to evaluate, develop, and validate methods and guidelines for identifying human-automation/robot task information needs, function allocation, and team composition for future long duration, long distance space missions. Allocations determine the human-system performance as it identifies the functions and performance levels required by the automation/robotic system, and in turn, what work the crew is expected to perform and the necessary human performance requirements. Allocations must take into account each of the human, automation, and robotic systems capabilities and limitations. Some functions may be intuitively assigned to the human versus the robot, but to optimize efficiency and effectiveness, purposeful role assignments will be required. The role of automation and robotics will significantly change in future exploration missions, particularly as crew becomes more autonomous from ground controllers. Thus, we must understand the suitability of existing function allocation methods within NASA as well as the existing allocations established by the few robotic systems that are operational in spaceflight. In order to evaluate future methods of robotic allocations, we must first benchmark the allocations and allocation methods that have been used. We will present 1) documentation of human-automation-robotic allocations in existing, operational spaceflight systems; and 2) To

  1. Reliability allocation problem in a series-parallel system

    International Nuclear Information System (INIS)

    Yalaoui, Alice; Chu, Chengbin; Chatelet, Eric

    2005-01-01

    In order to improve system reliability, designers may introduce in a system different technologies in parallel. When each technology is composed of components in series, the configuration belongs to the series-parallel systems. This type of system has not been studied as much as the parallel-series architecture. There exist no methods dedicated to the reliability allocation in series-parallel systems with different technologies. We propose in this paper theoretical and practical results for the allocation problem in a series-parallel system. Two resolution approaches are developed. Firstly, a one stage problem is studied and the results are exploited for the multi-stages problem. A theoretical condition for obtaining the optimal allocation is developed. Since this condition is too restrictive, we secondly propose an alternative approach based on an approximated function and the results of the one-stage study. This second approach is applied to numerical examples

  2. Intelligent tactical asset allocation support system

    OpenAIRE

    Hiemstra, Y.

    1995-01-01

    This paper presents an advanced support system for Tactical Asset Allocation. Asset allocation explains over 90% of portfolio performance (Brinson, Hood and Beebower, 1988). Tactical asset allocation adjusts a strategic portfolio on the basis of short term market outlooks. The system includes aprediction model that forecasts quarterly excess returns on the S and PSOO, an optimization model that adjusts a user-specified strategic portfolio on thebasis of the excess return forecast, and a compo...

  3. A game-theoretical pricing mechanism for multiuser rate allocation for video over WiMAX

    Science.gov (United States)

    Chen, Chao-An; Lo, Chi-Wen; Lin, Chia-Wen; Chen, Yung-Chang

    2010-07-01

    In multiuser rate allocation in a wireless network, strategic users can bias the rate allocation by misrepresenting their bandwidth demands to a base station, leading to an unfair allocation. Game-theoretical approaches have been proposed to address the unfair allocation problems caused by the strategic users. However, existing approaches rely on a timeconsuming iterative negotiation process. Besides, they cannot completely prevent unfair allocations caused by inconsistent strategic behaviors. To address these problems, we propose a Search Based Pricing Mechanism to reduce the communication time and to capture a user's strategic behavior. Our simulation results show that the proposed method significantly reduce the communication time as well as converges stably to an optimal allocation.

  4. An intelligent allocation algorithm for parallel processing

    Science.gov (United States)

    Carroll, Chester C.; Homaifar, Abdollah; Ananthram, Kishan G.

    1988-01-01

    The problem of allocating nodes of a program graph to processors in a parallel processing architecture is considered. The algorithm is based on critical path analysis, some allocation heuristics, and the execution granularity of nodes in a program graph. These factors, and the structure of interprocessor communication network, influence the allocation. To achieve realistic estimations of the executive durations of allocations, the algorithm considers the fact that nodes in a program graph have to communicate through varying numbers of tokens. Coarse and fine granularities have been implemented, with interprocessor token-communication duration, varying from zero up to values comparable to the execution durations of individual nodes. The effect on allocation of communication network structures is demonstrated by performing allocations for crossbar (non-blocking) and star (blocking) networks. The algorithm assumes the availability of as many processors as it needs for the optimal allocation of any program graph. Hence, the focus of allocation has been on varying token-communication durations rather than varying the number of processors. The algorithm always utilizes as many processors as necessary for the optimal allocation of any program graph, depending upon granularity and characteristics of the interprocessor communication network.

  5. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  6. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  7. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  8. Peer-Allocated Instant Response (PAIR): Computional allocation of peer tutors in learning communities

    NARCIS (Netherlands)

    Westera, Wim

    2009-01-01

    Westera, W. (2007). Peer-Allocated Instant Response (PAIR): Computational allocation of peer tutors in learning communities. Journal of Artificial Societies and Social Simulation, http://jasss.soc.surrey.ac.uk/10/2/5.html

  9. 75 FR 12173 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Science.gov (United States)

    2010-03-15

    ... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...

  10. Car allocation between household heads in car deficient households : A decision model

    NARCIS (Netherlands)

    Anggraini, Renni; Arentze, Theo A.; Timmermans, Harry J P

    2008-01-01

    This paper considers car allocation choice behaviour in car-deficient households explicitly in the context of an activity-scheduling process, focusing on work activities. A decision tree induction method is applied to derive a decision tree for the car allocation decision in automobile deficient

  11. Cost-allocation principles for pipeline capacity and usage

    International Nuclear Information System (INIS)

    Salant, D.J.; Watkins, G.C.

    1996-01-01

    The issue of cost sharing among multiple users of transmission facilities, such as pipelines, was discussed. The various ways in which a fair and reasonable pipeline cost-allocation scheme can be implemented were examined. It was suggested that no method exists for allocating costs that will achieve all major policy goals. The advantages and disadvantages of a system of uniform rates, such as postage stamp tolls, was discussed in the context of a natural gas pipeline system. A postage stamp system is one in which all users pay the same amount per unit of capacity, regardless of transport distances. This rate structure, while sometimes appropriate, is inefficient if total costs are distance-sensitive or if there is a significant variation in the sources of demand. Two commonly accepted minimal principles that a cost allocation should satisfy include: (1) the stand-alone cost test, and (2) the incremental cost test. This means that no one should pay costs in excess of their stand-alone costs and no one should pay less than their incremental costs. Postage stamp tolls were found to fail the minimal set of commonly applied principles. More optimal ways in which to allocate pipeline network costs among users were presented. The nucleolus is a unique cost allocation that is consistent, symmetric and homogeneous. The nucleolus is calculated by splitting the costs equally among users of a common facility. Another effective cost allocation system is the Shapley value which can be derived from a set of axioms which differ slightly from those that identify the nucleolus. 2 refs., 1 tab

  12. Cost-allocation principles for pipeline capacity and usage

    Energy Technology Data Exchange (ETDEWEB)

    Salant, D.J.; Watkins, G.C. [Law and Economics Consulting Group, Emeryville, CA (United States)

    1996-12-31

    The issue of cost sharing among multiple users of transmission facilities, such as pipelines, was discussed. The various ways in which a fair and reasonable pipeline cost-allocation scheme can be implemented were examined. It was suggested that no method exists for allocating costs that will achieve all major policy goals. The advantages and disadvantages of a system of uniform rates, such as postage stamp tolls, was discussed in the context of a natural gas pipeline system. A postage stamp system is one in which all users pay the same amount per unit of capacity, regardless of transport distances. This rate structure, while sometimes appropriate, is inefficient if total costs are distance-sensitive or if there is a significant variation in the sources of demand. Two commonly accepted minimal principles that a cost allocation should satisfy include: (1) the stand-alone cost test, and (2) the incremental cost test. This means that no one should pay costs in excess of their stand-alone costs and no one should pay less than their incremental costs. Postage stamp tolls were found to fail the minimal set of commonly applied principles. More optimal ways in which to allocate pipeline network costs among users were presented. The nucleolus is a unique cost allocation that is consistent, symmetric and homogeneous. The nucleolus is calculated by splitting the costs equally among users of a common facility. Another effective cost allocation system is the Shapley value which can be derived from a set of axioms which differ slightly from those that identify the nucleolus. 2 refs., 1 tab.

  13. Time allocation of disabled individuals.

    Science.gov (United States)

    Pagán, Ricardo

    2013-05-01

    Although some studies have analysed the disability phenomenon and its effect on, for example, labour force participation, wages, job satisfaction, or the use of disability pension, the empirical evidence on how disability steals time (e.g. hours of work) from individuals is very scarce. This article examines how disabled individuals allocate their time to daily activities as compared to their non-disabled counterparts. Using time diary information from the Spanish Time Use Survey (last quarter of 2002 and the first three quarters of 2003), we estimate the determinants of time (minutes per day) spent on four aggregate categories (market work, household production, tertiary activities and leisure) for a sample of 27,687 non-disabled and 5250 disabled individuals and decompose the observed time differential by using the Oaxaca-Blinder methodology. The results show that disabled individuals devote less time to market work (especially females), and more time to household production (e.g. cooking, cleaning, child care), tertiary activities (e.g., sleeping, personal care, medical treatment) and leisure activities. We also find a significant effect of age on the time spent on daily activities and important differences by gender and disability status. The results are consistent with the hypothesis that disability steals time, and reiterate the fact that more public policies are needed to balance working life and health concerns among disabled individuals. Copyright © 2013 Elsevier Ltd. All rights reserved.

  14. Multiobjective optimal allocation problem with probabilistic non ...

    African Journals Online (AJOL)

    user

    In multivariate stratified sampling where more than one characteristic are to be estimated, an allocation which is optimum for one characteristic may not be optimum for other characteristics also. In such situations a compromise criterion is needed to work out a usable allocation which is optimum for all characteristics in some ...

  15. A Time Allocation Study of University Faculty

    Science.gov (United States)

    Link, Albert N.; Swann, Christopher A.; Bozeman, Barry

    2008-01-01

    Many previous time allocation studies treat work as a single activity and examine trade-offs between work and other activities. This paper investigates the at-work allocation of time among teaching, research, grant writing and service by science and engineering faculty at top US research universities. We focus on the relationship between tenure…

  16. Obtaining a Proportional Allocation by Deleting Items

    NARCIS (Netherlands)

    Dorn, B.; de Haan, R.; Schlotter, I.; Röthe, J.

    2017-01-01

    We consider the following control problem on fair allocation of indivisible goods. Given a set I of items and a set of agents, each having strict linear preference over the items, we ask for a minimum subset of the items whose deletion guarantees the existence of a proportional allocation in the

  17. Directed networks, allocation properties and hierarchy formation

    NARCIS (Netherlands)

    Slikker, M.; Gilles, R.P.; Norde, H.W.; Tijs, S.H.

    2005-01-01

    We investigate properties for allocation rules on directed communication networks and the formation of such networks under these payoff properties. We study allocation rules satisfying two appealing properties, Component Efficiency (CE) and the Hierarchical Payoff Property (HPP). We show that such

  18. Nash social welfare in multiagent resource allocation

    NARCIS (Netherlands)

    Ramezani, S.; Endriss, U.; David, E.; Gerding, E.; Sarne, D.; Shehory, O.

    2010-01-01

    We study different aspects of the multiagent resource allocation problem when the objective is to find an allocation that maximizes Nash social welfare, the product of the utilities of the individual agents. The Nash solution is an important welfare criterion that combines efficiency and fairness

  19. Risk and reliability allocation to risk control

    International Nuclear Information System (INIS)

    Vojnovic, D.; Kozuh, M.

    1992-01-01

    The risk allocation procedure is used as an analytical model to support the optimal decision making for reliability/availability improvement planning. Both levels of decision criteria, the plant risk measures and plant performance indices, are used in risk allocation procedure. Decision support system uses the multi objective decision making concept. (author) [sl

  20. Bidding for surplus in network allocation problems

    NARCIS (Netherlands)

    Slikker, M.

    2007-01-01

    In this paper we study non-cooperative foundations of network allocation rules. We focus on three allocation rules: the Myerson value, the position value and the component-wise egalitarian solution. For any of these three rules we provide a characterization based on component efficiency and some

  1. Cost Allocation and Convex Data Envelopment

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tind, Jørgen

    such as Data Envelopment Analysis (DEA). The convexity constraint of the BCC model introduces a non-zero slack in the objective function of the multiplier problem and we show that the cost allocation rules discussed in this paper can be used as candidates to allocate this slack value on to the input (or output...

  2. Optimal allocation of resources in systems

    International Nuclear Information System (INIS)

    Derman, C.; Lieberman, G.J.; Ross, S.M.

    1975-01-01

    In the design of a new system, or the maintenance of an old system, allocation of resources is of prime consideration. In allocating resources it is often beneficial to develop a solution that yields an optimal value of the system measure of desirability. In the context of the problems considered in this paper the resources to be allocated are components already produced (assembly problems) and money (allocation in the construction or repair of systems). The measure of desirability for system assembly will usually be maximizing the expected number of systems that perform satisfactorily and the measure in the allocation context will be maximizing the system reliability. Results are presented for these two types of general problems in both a sequential (when appropriate) and non-sequential context

  3. Resource allocation in public health practice: a national survey of local public health officials.

    Science.gov (United States)

    Baum, Nancy M; DesRoches, Catherine; Campbell, Eric G; Goold, Susan Dorr

    2011-01-01

    The purpose of this study was to gain an empirical understanding of the types of allocation decisions local health officials (LHOs) make and the factors that influence those allocation decisions. We conducted a national survey of LHOs in the United States in 2008 to 2009. The sample was stratified by the size of the population served by the department. We merged our data with data from the 2008 National Association of County and City Health Officials Profile survey. Descriptive statistics were generated using weighted data. Our final sample size was 608 respondents, with an average of 10 years experience. The LHOs reported little shifting of resources among population groups but greater capacity to redirect staffing time. Less than half of LHOs reported using economic analyses or conducting needs assessments when setting priorities. Having sole provider status in a community strongly influenced LHOs' allocation decisions. In addition, the effectiveness of activities, previous budget allocations, and input from boards of health were influential factors in allocation decisions. Public expectations were moderately to very influential, but direct public input had a low impact on allocation decisions. Survey findings provide a clearer understanding of how LHOs fulfill their obligations as stewards of public health resources and ensure effective activities and access to needed services. It may be useful to assess the value of more structured allocation methods (eg, decision frameworks) in the allocation process. Expanding opportunities for public engagement in priority setting may also be valuable for difficult allocation decisions.

  4. Modeling Budget Optimum Allocation of Khorasan Razavi Province Agriculture Sector

    Directory of Open Access Journals (Sweden)

    Seyed Mohammad Fahimifard

    2016-09-01

    Full Text Available Introduction: Stock shortage is one of the development impasses in developing countries and trough it the agriculture sector has faced with the most limitation. The share of Iran’s agricultural sector from total investments after the Islamic revolution (1979 has been just 5.5 percent. This fact causes low efficiency in Iran’s agriculture sector. For instance per each 1 cubic meter of water in Iran’s agriculture sector, less that 1 kilogram dry food produced and each Iranian farmer achieves less annual income and has less mechanization in comparison with similar countries in Iran’s 1404 perspective document. Therefore, it is clear that increasing investment in agriculture sector, optimize the budget allocation for this sector is mandatory however has not been adequately and scientifically revised until now. Thus, in this research optimum budget allocation of Iran- Khorasan Razavi province agriculture sector was modeled. Materials and Methods: In order to model the optimum budget allocation of Khorasan Razavi province’s agriculture sector at first optimum budget allocation between agriculture programs was modeled with compounding three indexes: 1. Analyzing the priorities of Khorasan Razavi province’s agriculture sector experts with the application of Analytical Hierarchy Process (AHP, 2. The average share of agriculture sector programs from 4th country’s development program for Khorasan Razavi province’s agriculture sector, and 3.The average share of agriculture sector programs from 5th country’s development program for Khorasan Razavi province’s agriculture sector. Then, using Delphi technique potential indexes of each program was determined. After that, determined potential indexes were weighted using Analytical Hierarchy Process (AHP and finally, using numerical taxonomy model to optimize allocation of the program’s budget between cities based on two scenarios. Required data, also was gathered from the budget and planning

  5. Optimal allocation of sensors for state estimation of distributed parameter systems

    International Nuclear Information System (INIS)

    Sunahara, Yoshifumi; Ohsumi, Akira; Mogami, Yoshio.

    1978-01-01

    The purpose of this paper is to present a method for finding the optimal allocation of sensors for state estimation of linear distributed parameter systems. This method is based on the criterion that the error covariance associated with the state estimate becomes minimal with respect to the allocation of the sensors. A theorem is established, giving the sufficient condition for optimizing the allocation of sensors to make minimal the error covariance approximated by a modal expansion. The remainder of this paper is devoted to illustrate important phases of the general theory of the optimal measurement allocation problem. To do this, several examples are demonstrated, including extensive discussions on the mutual relation between the optimal allocation and the dynamics of sensors. (author)

  6. Dynamic pricing and automated resource allocation for complex information services reinforcement learning and combinatorial auctions

    CERN Document Server

    Schwind, Michael; Fandel, G

    2007-01-01

    Many firms provide their customers with online information products which require limited resources such as server capacity. This book develops allocation mechanisms that aim to ensure an efficient resource allocation in modern IT-services. Recent methods of artificial intelligence, such as neural networks and reinforcement learning, and nature-oriented optimization methods, such as genetic algorithms and simulated annealing, are advanced and applied to allocation processes in distributed IT-infrastructures, e.g. grid systems. The author presents two methods, both of which using the users??? w

  7. Identifying Memory Allocation Patterns in HEP Software

    Science.gov (United States)

    Kama, S.; Rauschmayr, N.

    2017-10-01

    HEP applications perform an excessive amount of allocations/deallocations within short time intervals which results in memory churn, poor locality and performance degradation. These issues are already known for a decade, but due to the complexity of software frameworks and billions of allocations for a single job, up until recently no efficient mechanism has been available to correlate these issues with source code lines. However, with the advent of the Big Data era, many tools and platforms are now available to do large scale memory profiling. This paper presents, a prototype program developed to track and identify each single (de-)allocation. The CERN IT Hadoop cluster is used to compute memory key metrics, like locality, variation, lifetime and density of allocations. The prototype further provides a web based visualization back-end that allows the user to explore the results generated on the Hadoop cluster. Plotting these metrics for every single allocation over time gives a new insight into application’s memory handling. For instance, it shows which algorithms cause which kind of memory allocation patterns, which function flow causes how many short-lived objects, what are the most commonly allocated sizes etc. The paper will give an insight into the prototype and will show profiling examples for the LHC reconstruction, digitization and simulation jobs.

  8. Effective Loss Minimization and Allocation of Unbalanced Distribution Network

    Directory of Open Access Journals (Sweden)

    Manvir Kaur

    2017-11-01

    Full Text Available An efficient distribution network must be able to supply power with good voltage profile. The main objective of the proposed work is to allocate losses of the unbalanced distribution network by the firefly algorithm in regulated and deregulated environments before and after loss minimization. Reconfiguration is one of the methods for loss reduction of unbalanced distribution network. Further, optimal placement of distributed generation and capacitor in the reconfigured unbalanced distribution network can further reduce the loss. The results of reconfigured unbalanced distribution network in regulated environment have already been reported. In this paper reconfiguration of an unbalanced distribution network in a deregulated environment is also carried out using an established Fuzzy Firefly algorithm. Loss sensitivity factor of unbalanced distribution networks is used to get the appropriate location of distributed generation and capacitor to be placed in the unbalanced distribution network. Their ratings have been found out by using bacteria foraging optimization algorithm (BFOA. The suggested loss allocation method using Firefly algorithm is implemented at first on 13 node unbalanced distribution network to check the performance of the proposed loss allocation method when compared to other available method. Finally the proposed method has been implemented on 25 node unbalanced distribution network. Both of the implementations are carried out under MATLAB environment.

  9. Optimal allocation of resources for suppressing epidemic spreading on networks

    Science.gov (United States)

    Chen, Hanshuang; Li, Guofeng; Zhang, Haifeng; Hou, Zhonghuai

    2017-07-01

    Efficient allocation of limited medical resources is crucial for controlling epidemic spreading on networks. Based on the susceptible-infected-susceptible model, we solve the optimization problem of how best to allocate the limited resources so as to minimize prevalence, providing that the curing rate of each node is positively correlated to its medical resource. By quenched mean-field theory and heterogeneous mean-field (HMF) theory, we prove that an epidemic outbreak will be suppressed to the greatest extent if the curing rate of each node is directly proportional to its degree, under which the effective infection rate λ has a maximal threshold λcopt=1 / , where is the average degree of the underlying network. For a weak infection region (λ ≳λcopt ), we combine perturbation theory with the Lagrange multiplier method (LMM) to derive the analytical expression of optimal allocation of the curing rates and the corresponding minimized prevalence. For a general infection region (λ >λcopt ), the high-dimensional optimization problem is converted into numerically solving low-dimensional nonlinear equations by the HMF theory and LMM. Counterintuitively, in the strong infection region the low-degree nodes should be allocated more medical resources than the high-degree nodes to minimize prevalence. Finally, we use simulated annealing to validate the theoretical results.

  10. Worst-case analysis of heap allocations

    DEFF Research Database (Denmark)

    Puffitsch, Wolfgang; Huber, Benedikt; Schoeberl, Martin

    2010-01-01

    the worst-case heap allocations of tasks. The analysis builds upon techniques that are well established for worst-case execution time analysis. The difference is that the cost function is not the execution time of instructions in clock cycles, but the allocation in bytes. In contrast to worst-case execution...... time analysis, worst-case heap allocation analysis is not processor dependent. However, the cost function depends on the object layout of the runtime system. The analysis is evaluated with several real-time benchmarks to establish the usefulness of the analysis, and to compare the memory consumption...

  11. Dynamic Allocation of Sugars in Barley

    Science.gov (United States)

    Cumberbatch, L. C.; Crowell, A. S.; Fallin, B. A.; Howell, C. R.; Reid, C. D.; Weisenberger, A. G.; Lee, S. J.; McKisson, J. E.

    2014-03-01

    Allocation of carbon and nitrogen is a key factor for plant productivity. Measurements are carried out by tracing 11C-tagged sugars using positron emission tomography and coincidence counting. We study the mechanisms of carbon allocation and transport from carbohydrate sources (leaves) to sinks (stem, shoot, roots) under various environmental conditions such as soil nutrient levels and atmospheric CO2 concentration. The data are analyzed using a transfer function analysis technique to model transport and allocation in barley plants. The experimental technique will be described and preliminary results presented. This work was supported in part by USDOE Grant No. DE-FG02-97-ER41033 and DE-SC0005057.

  12. The net effect of alternative allocation ratios on recruitment time and trial cost.

    Science.gov (United States)

    Vozdolska, Ralitza; Sano, Mary; Aisen, Paul; Edland, Steven D

    2009-04-01

    Increasing the proportion of subjects allocated to the experimental treatment in controlled clinical trials is often advocated as a method of increasing recruitment rates and improving the performance of trials. The presumption is that the higher likelihood of randomization to the experimental treatment will be perceived by potential study enrollees as an added benefit of participation and will increase recruitment rates and speed the completion of trials. However, studies with alternative allocation ratios require a larger sample size to maintain statistical power, which may result in a net increase in time required to complete recruitment and a net increase in total trial cost. To describe the potential net effect of alternative allocation ratios on recruitment time and trial cost. Models of recruitment time and trial cost were developed and used to compare trials with 1:1 allocation to trials with alternative allocation ratios under a range of per subject costs, per day costs, and enrollment rates. In regard to time required to complete recruitment, alternative allocation ratios are net beneficial if the recruitment rate improves by more than about 4% for trials with a 1.5:1 allocation ratio and 12% for trials with a 2:1 allocation ratio. More substantial improvements in recruitment rate, 13 and 47% respectively for scenarios we considered, are required for alternative allocation to be net beneficial in terms of tangible monetary cost. The cost models were developed expressly for trials comparing proportions or means across treatment groups. Using alternative allocation ratio designs to improve recruitment may or may not be time and cost-effective. Using alternative allocation for this purpose should only be considered for trial contexts where there is both clear evidence that the alternative design does improve recruitment rates and the attained time or cost efficiency justifies the added study subject burden implied by a larger sample size.

  13. Vehicle Sliding Mode Control with Adaptive Upper Bounds: Static versus Dynamic Allocation to Saturated Tire Forces

    Directory of Open Access Journals (Sweden)

    Ali Tavasoli

    2012-01-01

    Full Text Available Nonlinear vehicle control allocation is achieved through distributing the task of vehicle control among individual tire forces, which are constrained to nonlinear saturation conditions. A high-level sliding mode control with adaptive upper bounds is considered to assess the body yaw moment and lateral force for the vehicle motion. The proposed controller only requires the online adaptation of control gains without acquiring the knowledge of upper bounds on system uncertainties. Static and dynamic control allocation approaches have been formulated to distribute high-level control objectives among the system inputs. For static control allocation, the interior-point method is applied to solve the formulated nonlinear optimization problem. Based on the dynamic control allocation method, a dynamic update law is derived to allocate vehicle control to tire forces. The allocated tire forces are fed into a low-level control module, where the applied torque and active steering angle at each wheel are determined through a slip-ratio controller and an inverse tire model. Computer simulations are used to prove the significant effects of the proposed control allocation methods on improving the stability and handling performance. The advantages and limitations of each method have been discussed, and conclusions have been derived.

  14. Allocation of scarce resources during mass casualty events.

    Science.gov (United States)

    Timbie, Justin W; Ringel, Jeanne S; Fox, D Steven; Waxman, Daniel A; Pillemer, Francesca; Carey, Christine; Moore, Melinda; Karir, Veena; Johnson, Tiffani J; Iyer, Neema; Hu, Jianhui; Shanman, Roberta; Larkin, Jody Wozar; Timmer, Martha; Motala, Aneesa; Perry, Tanja R; Newberry, Sydne; Kellermann, Arthur L

    2012-06-01

    This systematic review sought to identify the best available evidence regarding strategies for allocating scarce resources during mass casualty events (MCEs). Specifically, the review addresses the following questions: (1) What strategies are available to policymakers to optimize the allocation of scarce resources during MCEs? (2) What strategies are available to providers to optimize the allocation of scarce resources during MCEs? (3) What are the public's key perceptions and concerns regarding the implementation of strategies to allocate scarce resources during MCEs? (4) What methods are available to engage providers in discussions regarding the development and implementation of strategies to allocate scarce resources during MCEs? We searched Medline, Scopus, Embase, CINAHL (Cumulative Index to Nursing and Allied Health Literature), Global Health, Web of Science®, and the Cochrane Database of Systematic Reviews from 1990 through 2011. To identify relevant non-peer-reviewed reports, we searched the New York Academy of Medicine's Grey Literature Report. We also reviewed relevant State and Federal plans, peer-reviewed reports and papers by nongovernmental organizations, and consensus statements published by professional societies. We included both English- and foreign-language studies. Our review included studies that evaluated tested strategies in real-world MCEs as well as strategies tested in drills, exercises, or computer simulations, all of which included a comparison group. We reviewed separately studies that lacked a comparison group but nonetheless evaluated promising strategies. We also identified consensus recommendations developed by professional societies or government panels. We reviewed existing State plans to examine the current state of planning for scarce resource allocation during MCEs. Two investigators independently reviewed each article, abstracted data, and assessed study quality. We considered 5,716 reports for this comparative effectiveness

  15. ALLOCATION OF FINANCIAL RESOURCE TO ENHANCE ...

    African Journals Online (AJOL)

    GRACE

    This study examines the allocation of financial resource to the education industry and ..... This should check all books of account at least once a month to reconcile ... All cash advance request must be supported with relevant documents vii.

  16. Fund allocation using capacitated vehicle routing problem

    Science.gov (United States)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Darus, Maslina

    2014-09-01

    In investment fund allocation, it is unwise for an investor to distribute his fund into several assets simultaneously due to economic reasons. One solution is to allocate the fund into a particular asset at a time in a sequence that will either maximize returns or minimize risks depending on the investor's objective. The vehicle routing problem (VRP) provides an avenue to this issue. VRP answers the question on how to efficiently use the available fleet of vehicles to meet a given service demand, subjected to a set of operational requirements. This paper proposes an idea of using capacitated vehicle routing problem (CVRP) to optimize investment fund allocation by employing data of selected stocks in the FTSE Bursa Malaysia. Results suggest that CRVP can be applied to solve the issue of investment fund allocation and increase the investor's profit.

  17. U.S. Army Recruiter Allocation Model

    National Research Council Canada - National Science Library

    Brence, John

    2004-01-01

    .... Our methodology will build on both the new and old schools of recruiting by conducting stakeholder interviews that will lead us to a model that is an efficient starting point for the Recruiter Mission Allocation (RMA...

  18. Optimal Resource Allocation in Library Systems

    Science.gov (United States)

    Rouse, William B.

    1975-01-01

    Queueing theory is used to model processes as either waiting or balking processes. The optimal allocation of resources to these processes is defined as that which maximizes the expected value of the decision-maker's utility function. (Author)

  19. Resource allocation based on cost efficiency

    DEFF Research Database (Denmark)

    Dehnokhalaji, Akram; Ghiyasi, Mojtaba; Korhonen, Pekka

    2017-01-01

    -objective linear programming problem using two different strategies. First, we propose an RA model which keeps the cost efficiencies of units unchanged. This is done assuming fixed technical and allocative efficiencies. The approach is based on the assumption that the decision maker (DM) may not have big changes......In this paper, we consider a resource allocation (RA) problem and develop an approach based on cost (overall) efficiency. The aim is to allocate some inputs among decision making units (DMUs) in such way that their cost efficiencies improve or stay unchanged after RA. We formulate a multi...... in the structure of DMUs within a short term. The second strategy does not impose any restrictions on technical and allocative efficiencies. It guarantees that none of the cost efficiencies of DMUs get worse after RA, and the improvement for units is possible if it is feasible and beneficial. Two numerical...

  20. regional grain allocation and transportation in China

    African Journals Online (AJOL)

    use

    2011-12-14

    Dec 14, 2011 ... China was partitioned into eight regions, and the virtual water flow due to regional grain allocation and ... strategy can be choices which can realize Chinese food security and ..... Globalization of water: Sharing the planet's ...

  1. Telecommunications Circuit Allocation Programs - Kansas City Area

    National Research Council Canada - National Science Library

    Thomas, William

    1994-01-01

    The overall objective of the audit was to determine whether DoD circuit allocation programs identified and used the most effective configurations for leased long-haul, special-purpose telecommunications circuits...

  2. Addressing congestion on single allocation hub-and-spoke networks

    Directory of Open Access Journals (Sweden)

    Ricardo Saraiva de Camargo

    2012-12-01

    Full Text Available When considering hub-and-spoke networks with single allocation, the absence of alternative routes makes this kind of systems specially vulnerable to congestion effects. In order to improve the design of such networks, congestion costs must be addressed. This article deploys two different techniques for addressing congestion on single allocation hub-and-spoke networks: the Generalized Benders Decomposition and the Outer Approximation method. Both methods are able to solve large scale instances. Computational experiments show how the adoption of advanced solution strategies, such as Pareto-optimal cut generation on the Master Problem branch-and-bound tree, may be decisive. They also demonstrate that the solution effort is not only associated with the size of the instances, but also with their combination of the installation and congestion costs.

  3. A Compromise Programming Model for Highway Maintenance Resources Allocation Problem

    Directory of Open Access Journals (Sweden)

    Hui Xiong

    2012-01-01

    Full Text Available This paper formulates a bilevel compromise programming model for allocating resources between pavement and bridge deck maintenances. The first level of the model aims to solve the resource allocation problems for pavement management and bridge deck maintenance, without considering resource sharing between them. At the second level, the model uses the results from the first step as an input and generates the final solution to the resource-sharing problem. To solve the model, the paper applies genetic algorithms to search for the optimal solution. We use a combination of two digits to represent different maintenance types. Results of numerical examples show that the conditions of both pavements and bridge decks are improved significantly by applying compromise programming, rather than conventional methods. Resources are also utilized more efficiently when the proposed method is applied.

  4. Capacity Allocation and Revenue Sharing in Airline Alliances: A Combinatorial Auction-Based Modeling

    Directory of Open Access Journals (Sweden)

    Ying-jing Gu

    2017-01-01

    Full Text Available This paper attempts to establish a framework to help airline alliances effectively allocate their seat capacity with the purpose of maximizing alliances’ revenue. By assuming the airline alliance as the auctioneer and seat capacity in an itinerary as lots, the combinatorial auction model is constructed to optimize the allocation of the seat, and the revenue sharing method is established to share revenue between partners by Vickrey-Clarke-Groves (VCG mechanism. The result of the numerical study shows that the seat capacity allocation is effective even without information exchanging completely and the twofold revenue shares method shows more excitation for the airlines.

  5. Macroeconomic influences on optimal asset allocation

    OpenAIRE

    Flavin, Thomas; Wickens, M.R.

    2003-01-01

    We develop a tactical asset allocation strategy that incorporates the effects of macroeconomic variables. The joint distribution of financial asset returns and the macroeconomic variables is modelled using a VAR with a multivariate GARCH (M-GARCH) error structure. As a result, the portfolio frontier is time varying and subject to contagion from the macroeconomic variable. Optimal asset allocation requires that this be taken into account. We illustrate how to do this using three ri...

  6. Human Capital and Risky Asset Allocation

    OpenAIRE

    Lu, Wenjie; Yu, Qun

    2011-01-01

    Much research has been done to examine the relation between investors' human capital and their financial asset allocation. While some showed that the value of human capital should be taken into consideration to make financial asset allocation decisions on the composition of investing portfolios, most argued not. In this paper, we selected the monthly return of 9 industrial ETFs from June of 2007 to July 2011, used the present value of total future income as estimate of human capital, and reli...

  7. Cost Allocation and Overpricing of Spare Parts.

    Science.gov (United States)

    1986-09-01

    traditional cost allocation process as reported in accounting literature. Horngren reported there are essen- tially three facets of cost allocation as...is for more than one unit of a product. Horngren reports cost accounting systems commonly have two major cost objectives: departments and products (8...Standards Board: Standards, Rules, and Regulations. Washington: Government Printing Office, 1985. 8. Horngren , Charles T. Cost Accounting : A Managerial

  8. Cost allocation. Combined heat and power production

    International Nuclear Information System (INIS)

    Sidzikauskas, V.

    2002-01-01

    The benefits of Combined Heat and Power (CHP) generation are discussed. The include improvement in energy intensity of 1% by 2010, 85-90% efficiency versus 40-50% of condensation power and others. Share of CHP electricity production in ERRA countries is presented.Solutions for a development CHP cost allocation are considered. Conclusion are presented for CHP production cost allocation. (R.P.)

  9. Allocation of authority in European health policy.

    Science.gov (United States)

    Adolph, Christopher; Greer, Scott L; Massard da Fonseca, Elize

    2012-11-01

    Although many study the effects of different allocations of health policy authority, few ask why countries assign responsibility over different policies as they do. We test two broad theories: fiscal federalism, which predicts rational governments will concentrate information-intensive operations at lower levels, and redistributive and regulatory functions at higher levels; and "politicized federalism", which suggests a combination of systematic and historically idiosyncratic political variables interfere with efficient allocation of authority. Drawing on the WHO Health in Transition country profiles, we present new data on the allocation of responsibility for key health care policy tasks (implementation, provision, finance, regulation, and framework legislation) and policy areas (primary, secondary and tertiary care, public health and pharmaceuticals) in the 27 EU member states and Switzerland. We use a Bayesian multinomial mixed logit model to analyze how different countries arrive at different allocations of authority over each task and area of health policy, and find the allocation of powers broadly follows fiscal federalism. Responsibility for pharmaceuticals, framework legislation, and most finance lodges at the highest levels of government, acute and primary care in the regions, and provision at the local and regional levels. Where allocation does not follow fiscal federalism, it appears to reflect ethnic divisions, the population of states and regions, the presence of mountainous terrain, and the timing of region creation. Copyright © 2012 Elsevier Ltd. All rights reserved.

  10. From efficacy to equity: Literature review of decision criteria for resource allocation and healthcare decisionmaking

    NARCIS (Netherlands)

    Guindo, L.A.; Wagner, M.; Baltussen, R.; Rindress, D.; van Til, Janine Astrid; Kind, P.; Goetghebeur, M.

    2012-01-01

    Objectives Resource allocation is a challenging issue faced by health policy decisionmakers requiring careful consideration of many factors. Objectives of this study were to identify decision criteria and their frequency reported in the literature on healthcare decisionmaking. Method An extensive

  11. 78 FR 29771 - Notice of Formula Allocations and Program Requirements for Neighborhood Stabilization Programs 1...

    Science.gov (United States)

    2013-05-21

    .... ACTION: Notice of allocation method, waivers granted, alternative requirements applied, and statutory... map provides foreclosure-related needs scores based on grantee-selected target geography. A grantee... all [[Page 29772

  12. Reconsidering Gender Bias in Intra-Household Allocation in India

    OpenAIRE

    Zimmermann, Laura

    2011-01-01

    Detecting gender discrimination among children in the intra-household allocation of goods from household surveys has often proven to be difficult. This paper uses some of the commonly used techniques in this field to analyze education expenditures in India. Contrary to most previous research, I find evidence of discrimination against girls. Results at the all-India level are robust to the statistical method and the education expenditure measure, while they are more sensitive to changes in the...

  13. Synchronous Condenser Allocation for Improving System Short Circuit Ratio

    DEFF Research Database (Denmark)

    Jia, Jundi; Yang, Guangya; Nielsen, Arne Hejde

    2018-01-01

    With converter-based renewable energy sources increasingly integrated into power systems and conventional power plants gradually phased out, future power systems will experience reduced short circuit strength. The deployment of synchronous condensers can serve as a potential solution. This paper...... presents an optimal synchronous condenser allocation method for improving system short circuit ratio at converter point of common coupling using a modified short circuit analysis approach. The total cost of installing new synchronous condensers is minimized while the system short circuit ratios...

  14. Online Job Allocation with Hard Allocation Ratio Requirement (Author’s Manuscript)

    Science.gov (United States)

    2016-04-14

    server divided by its capacity. Specifically , let nj be the number of jobs that have already been allocated to server j. When job i arrives, it is...decisions solely based on current system state is needed. The problem of online job allocation has attracted much attention . Most current studies study...closed-form expressions for their performance. Specifically , we prove that, in order to allocate at least 1− 1θ of jobs , the two policies only need to

  15. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  16. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  17. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  18. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  19. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  20. Optimizing 4DCBCT projection allocation to respiratory bins

    International Nuclear Information System (INIS)

    O’Brien, Ricky T; Kipritidis, John; Shieh, Chun-Chien; Keall, Paul J

    2014-01-01

    4D cone beam computed tomography (4DCBCT) is an emerging image guidance strategy used in radiotherapy where projections acquired during a scan are sorted into respiratory bins based on the respiratory phase or displacement. 4DCBCT reduces the motion blur caused by respiratory motion but increases streaking artefacts due to projection under-sampling as a result of the irregular nature of patient breathing and the binning algorithms used. For displacement binning the streak artefacts are so severe that displacement binning is rarely used clinically. The purpose of this study is to investigate if sharing projections between respiratory bins and adjusting the location of respiratory bins in an optimal manner can reduce or eliminate streak artefacts in 4DCBCT images. We introduce a mathematical optimization framework and a heuristic solution method, which we will call the optimized projection allocation algorithm, to determine where to position the respiratory bins and which projections to source from neighbouring respiratory bins. Five 4DCBCT datasets from three patients were used to reconstruct 4DCBCT images. Projections were sorted into respiratory bins using equispaced, equal density and optimized projection allocation. The standard deviation of the angular separation between projections was used to assess streaking and the consistency of the segmented volume of a fiducial gold marker was used to assess motion blur. The standard deviation of the angular separation between projections using displacement binning and optimized projection allocation was 30%–50% smaller than conventional phase based binning and 59%–76% smaller than conventional displacement binning indicating more uniformly spaced projections and fewer streaking artefacts. The standard deviation in the marker volume was 20%–90% smaller when using optimized projection allocation than using conventional phase based binning suggesting more uniform marker segmentation and less motion blur. Images

  1. Power Allocation based on Certain Equivalent Margin Applicable to Wireless Communication Systems Limited by Interference

    Directory of Open Access Journals (Sweden)

    Tadeu Junior Gross

    2015-10-01

    Full Text Available This paper analyzes the method of power allocation for wireless communication networks, limited by multiple access interference under fading Rayleigh channels. The method takes into account the statistical variation of the desired and interfering signals power and optimally and dynamically allocates the power resources in the system. This allocation is made being taken into account the restrictions imposed by the outage probability for each receiver/transmitter pair. Based on the Perron-Frobenius eigenvalue and geometric programming (GP theories, some interesting results were found for the optimization problem analyzed. A GP is a special type of optimization problem that can be transformed in a non-linear convex optimization problem simply by the change of variables, and then to be globally solved. Also, an iterative method for fast convergence was shown to find the optimally power allocation seeking to minimize the outage probability in the communication.

  2. The use of resource allocation approach for hospitals based on the initial efficiency by using data envelopment analysis

    Directory of Open Access Journals (Sweden)

    Nahid Yazdian Hossein Abadi

    2017-10-01

    Full Text Available Introduction: Recourse allocation is very important in today’s highly competitive environment to enhance the quality and reduce costs due to limited resources and unlimited needs of the society. The aim of this study was to implement resource allocation in order to improve the efficiency of hospital. Method: This is a mixed method study. The data used in this paper are secondary data related to the 30 large acute and general hospitals in the US. Bed, service mix, full-time equivalent (FTE, and operational expenses are input indicators in hospital, and adjusted admissions and outpatient visits are output indicators. Using goal programming (GP model and data envelopment analysis (DEA model with a common weights, we suggest three scenarios for resource allocation and budget allocation. “Resource allocation based on efficiency”, “budget allocation based on efficiency” and “two stage allocation of budget”. The first scenario was used for allocating the resources and the second and third ones for allocating budget to decision making units (DMUs. The data were analyzed by LINGO software. Results: Before the allocation, four hospitals were efficient and the efficiency of six hospitals was less than 50%, but after allocation, in the first case of the first scenario 14 hospitals, 11 hospitals in the second case of the first scenario, 24 hospitals in the second scenario and 17 hospitals in the third scenario were efficient, and it is an important point that after the allocation, efficiency of all hospitals increased. Conclusion: This study can be useful for hospital administrators; it can help them to allocate their resource and budget and increase the efficiency of their hospitals.

  3. Examining Police Strategic Resource Allocation in a Time of Austerity

    Directory of Open Access Journals (Sweden)

    Garth den Heyer

    2014-03-01

    Full Text Available The increasing importance of proactive policing has highlighted the need to ensure that the police utilise their resources both efficiently and effectively. Traditionally, police agencies have allocated resources in response to their operational demands or requirements, with the majority of resources being distributed in response to political demands and public calls for service. In recent years there has been a greater emphasis by police to deliver services proactively, and to direct resources to specific geographic areas of high crime or to specific crimes, and to apply intelligence led targeted policing initiatives. The changing operating environment to a public service ethos of accountability and ‘do more with less’ means that historical methods of allocating police officers may not meet an agency's strategic goals. This paper examines if an economic approach to allocating police strategic resources is an appropriate and equitable method in a time of austerity. This greater emphasis on proactive, rather than reactive policing, which also represents a shift from centralised control, underlines the need to ensure the efficient and effective use of resources.

  4. Optimal and Fair Resource Allocation for Multiuser Wireless Multimedia Transmissions

    Directory of Open Access Journals (Sweden)

    Zhangyu Guan

    2009-01-01

    Full Text Available This paper presents an optimal and fair strategy for multiuser multimedia radio resource allocation (RRA based on coopetition, which suggests a judicious mixture of competition and cooperation. We formulate the co-opetition strategy as sum utility maximization at constraints from both Physical (PHY and Application (APP layers. We show that the maximization can be solved efficiently employing the well-defined Layering as Optimization Decomposition (LOD method. Moreover, the coopetition strategy is applied to power allocation among multiple video users, and evaluated through comparing with existing- competition based strategy. Numerical results indicate that, the co-opetition strategy adapts the best to the changes of network conditions, participating users, and so forth. It is also shown that the coopetition can lead to an improved number of satisfied users, and in the meanwhile provide more flexible tradeoff between system efficiency and fairness among users.

  5. Optimum fuel allocation in parallel steam generator systems

    International Nuclear Information System (INIS)

    Bollettini, U.; Cangioli, E.; Cerri, G.; Rome Univ. 'La Sapienza'; Trento Univ.

    1991-01-01

    An optimization procedure was developed to allocate fuels into parallel steam generators. The procedure takes into account the level of performance deterioration connected with the loading history (fossil fuel allocation and maintenance) of each steam generator. The optimization objective function is the system hourly cost, overall steam demand being satisfied. Costs are due to fuel and electric power supply and to plant depreciation and maintenance as well. In order to easily updata the state of each steam generator, particular care was put in the general formulation of the steam production function by adopting a special efficiency-load curve description based on a deterioration scaling parameter. The influence of the characteristic time interval length on the optimum operation result is investigated. A special implementation of the method based on minimum cost paths is suggested

  6. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  7. SOME NOTES ON COST ALLOCATION IN MULTICASTING

    Directory of Open Access Journals (Sweden)

    Darko Skorin-Kapov

    2012-12-01

    Full Text Available We analyze the cost allocation strategies with the problef of broadcasting information from some source to a number of communication network users. A multicast routing chooses a minimum cost tree network that spans the source and all the receivers. The cost of such a network is distributed among its receivers who may be individuals or organizations with possibly conflicting interests. Providing network developers, users and owners with practical computable 'fair' cost allocation solution procedures is of great importance for network mamagement. Consequently, this multidisciplinary problem was extensively studied by Operational Researchers, Economists, Mathematicians and Computer Scientists. The fairness of various proposed solutions was even argued in US courts. This presentation overviews some previously published, as well as some recent results, in the development of algorithmic mechanisms to efficiently compute 'attractive' cost allocation solutions for multicast networks. Specifically, we will analyze cooperative game theory based cost allocation models that avoid cross subsidies and/or are distance and population monotonic. We will also present some related open cost allocation problems and the potential contribution that such models might make to this problem in the future.

  8. Cognitive allocation and the control room

    International Nuclear Information System (INIS)

    Paradies, M.W.

    1985-01-01

    One of the weakest links in the design of nuclear power plants is the inattention to the needs and capabilities of the operators. This flaw causes decreased plant reliability and reduced plant safety. To solve this problem the designer must, in the earliest stages of the design process, consider the operator's abilities. After the system requirements have been established, the designer must consider what functions to allocate to each part of the system. The human must be considered as part of this system. The allocation of functions needs to consider not only the mechanical tasks to be performed, but also the control requirements and the overall control philosophy. In order for the designers to consider the control philosophy, they need to know what control decisions should be automated and what decisions should be made by an operator. They also need to know how these decisions will be implemented: by an operator or by automation. ''Cognitive Allocation'' is the allocation of the decision making process between operators and machines. It defines the operator's role in the system. When designing a power plant, a cognitive allocation starts the process of considering the operator's abilities. This is the first step to correcting the weakest link in the current plant design

  9. Methodology for allocating reliability and risk

    International Nuclear Information System (INIS)

    Cho, N.Z.; Papazoglou, I.A.; Bari, R.A.

    1986-05-01

    This report describes a methodology for reliability and risk allocation in nuclear power plants. The work investigates the technical feasibility of allocating reliability and risk, which are expressed in a set of global safety criteria and which may not necessarily be rigid, to various reactor systems, subsystems, components, operations, and structures in a consistent manner. The report also provides general discussions on the problem of reliability and risk allocation. The problem is formulated as a multiattribute decision analysis paradigm. The work mainly addresses the first two steps of a typical decision analysis, i.e., (1) identifying alternatives, and (2) generating information on outcomes of the alternatives, by performing a multiobjective optimization on a PRA model and reliability cost functions. The multiobjective optimization serves as the guiding principle to reliability and risk allocation. The concept of ''noninferiority'' is used in the multiobjective optimization problem. Finding the noninferior solution set is the main theme of the current approach. The final step of decision analysis, i.e., assessment of the decision maker's preferences could then be performed more easily on the noninferior solution set. Some results of the methodology applications to a nontrivial risk model are provided, and several outstanding issues such as generic allocation, preference assessment, and uncertainty are discussed. 29 refs., 44 figs., 39 tabs

  10. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  11. Dynamic versus static allocation policies in multipurpose multireservoir systems

    Science.gov (United States)

    Tilmant, A.; Goor, Q.; Pinte, D.; van der Zaag, P.

    2007-12-01

    As the competition for water is likely to increase in the near future due to socioeconomic development and population growth, water resources managers will face hard choices when allocating water between competing users. Because water is a vital resource used in multiple sectors, including the environment, the allocation is inherently a political and social process, which is likely to become increasingly scrutinized as the competition grows between the different sectors. Since markets are usually absent or ineffective, the allocation of water between competing demands is achieved administratively taking into account key objectives such as economic efficiency, equity and maintaining the ecological integrity. When crop irrigation is involved, water is usually allocated by a system of annual rights to use a fixed, static, volume of water. In a fully-allocated basin, moving from a static to a dynamic allocation process, whereby the policies are regularly updated according to the hydrologic status of the river basin, is the first step towards the development of river basin management strategies that increase the productivity of water. More specifically, in a multipurpose multireservoir system, continuously adjusting release and withdrawal decisions based on the latest hydrologic information will increase the benefits derived from the system. However, the extent to which such an adjustment can be achieved results from complex spatial and temporal interactions between the physical characteristics of the water resources system (storage, natural flows), the economic and social consequences of rationing and the impacts on natural ecosystems. The complexity of the decision-making process, which requires the continuous evaluation of numerous trade-offs, calls for the use of integrated hydrologic-economic models. This paper compares static and dynamic management approaches for a cascade of hydropower-irrigation reservoirs using stochastic dual dynamic programming (SDDP

  12. Integrated Cost Allocation of Transmission Usage under Electricity Markets

    Directory of Open Access Journals (Sweden)

    Hermagasantos Zein

    2012-08-01

    Full Text Available Cost allocation of transmission usage on the power networks is an important issue especially in the modern electricity market mechanism. In this context, all costs that have been embedded in the transmission, embedded cost, should be covered by the transmission users. This paper follows general methods, where generators are fullyresponsible to cover the embedded cost. It proposes a method to determine the cost allocation of transmission usage based on decomposition through the superposition techinique to determine power flow contributions from an integrated base case of the results of the power flow calculations of all transactions, bilateral and nonbilateral contracts. Mathematically, the applied formulations are illustrated clearly in this paper. The proposed method has been tested with 5-bus system and the results are much different compared to a few of the published methods. This is shown by the test results on the 5 bus system. The published methods produce total power flow contributions in each line is greater than the actual. And they earn total revenues approximately 11.6% greater than the embedded cost. While on the proposed method, the power flow contribu tions are equal to the actual and the revenues are equal to the embedded cost. It shows also that the proposed method gives results as expected.

  13. 24 CFR 791.404 - Field Office allocation planning.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General objective. The allocation planning process should provide for the equitable distribution of available budget...

  14. 40 CFR 60.4142 - Hg allowance allocations.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 6 2010-07-01 2010-07-01 false Hg allowance allocations. 60.4142... Coal-Fired Electric Steam Generating Units Hg Allowance Allocations § 60.4142 Hg allowance allocations. (a)(1) The baseline heat input (in MMBtu) used with respect to Hg allowance allocations under...

  15. Participation behavior and social welfare in repeated task allocations

    NARCIS (Netherlands)

    Ye, Q.C.; Zhang, Y.

    2016-01-01

    Task allocation problems have focused on achieving one-shot optimality. In practice, many task allocation problems are of repeated nature, where the allocation outcome of previous rounds may influence the participation of agents in subsequent rounds, and consequently, the quality of the allocations

  16. Task mapping for non-contiguous allocations.

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Vitus Joseph; Bunde, David P.; Ebbers, Johnathan; Price, Nicholas W.; Swank, Matthew.; Feer, Stefan P.; Rhodes, Zachary D.

    2013-02-01

    This paper examines task mapping algorithms for non-contiguously allocated parallel jobs. Several studies have shown that task placement affects job running time for both contiguously and non-contiguously allocated jobs. Traditionally, work on task mapping either uses a very general model where the job has an arbitrary communication pattern or assumes that jobs are allocated contiguously, making them completely isolated from each other. A middle ground between these two cases is the mapping problem for non-contiguous jobs having a specific communication pattern. We propose several task mapping algorithms for jobs with a stencil communication pattern and evaluate them using experiments and simulations. Our strategies improve the running time of a MiniApp by as much as 30% over a baseline strategy. Furthermore, this improvement increases markedly with the job size, demonstrating the importance of task mapping as systems grow toward exascale.

  17. Optimal allocation of reviewers for peer feedback

    DEFF Research Database (Denmark)

    Wind, David Kofoed; Jensen, Ulf Aslak; Jørgensen, Rasmus Malthe

    2017-01-01

    feedback to be effective students should give and receive useful feedback. A key challenge in peer feedback is allocating the feedback givers in a good way. It is important that reviewers are allocated to submissions such that the feedback distribution is fair - meaning that all students receive good......Peer feedback is the act of letting students give feedback to each other on submitted work. There are multiple reasons to use peer feedback, including students getting more feedback, time saving for teachers and increased learning by letting students reflect on work by others. In order for peer...... indicated the quality of the feedback. Using this model together with historical data we calculate the feedback-giving skill of each student and uses that as input to an allocation algorithm that assigns submissions to reviewers, in order to optimize the feedback quality for all students. We test...

  18. Prospect theory reflects selective allocation of attention.

    Science.gov (United States)

    Pachur, Thorsten; Schulte-Mecklenbeck, Michael; Murphy, Ryan O; Hertwig, Ralph

    2018-02-01

    There is a disconnect in the literature between analyses of risky choice based on cumulative prospect theory (CPT) and work on predecisional information processing. One likely reason is that for expectation models (e.g., CPT), it is often assumed that people behaved only as if they conducted the computations leading to the predicted choice and that the models are thus mute regarding information processing. We suggest that key psychological constructs in CPT, such as loss aversion and outcome and probability sensitivity, can be interpreted in terms of attention allocation. In two experiments, we tested hypotheses about specific links between CPT parameters and attentional regularities. Experiment 1 used process tracing to monitor participants' predecisional attention allocation to outcome and probability information. As hypothesized, individual differences in CPT's loss-aversion, outcome-sensitivity, and probability-sensitivity parameters (estimated from participants' choices) were systematically associated with individual differences in attention allocation to outcome and probability information. For instance, loss aversion was associated with the relative attention allocated to loss and gain outcomes, and a more strongly curved weighting function was associated with less attention allocated to probabilities. Experiment 2 manipulated participants' attention to losses or gains, causing systematic differences in CPT's loss-aversion parameter. This result indicates that attention allocation can to some extent cause choice regularities that are captured by CPT. Our findings demonstrate an as-if model's capacity to reflect characteristics of information processing. We suggest that the observed CPT-attention links can be harnessed to inform the development of process models of risky choice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  19. Factors application of MW-mile method and participation in the allocation of charges by the drills use in electricity markets; Aplicacion de los factores de participacion y del metodo de MW-milla en la asignacion de cargos por uso de redes de transmision en mercados de electricidad

    Energy Technology Data Exchange (ETDEWEB)

    Alba-Gomez, L; Tovar-Hernandez, J. H; Gutierrez-Alcaraz, G [Instituto Tecnologico de Morelia, Michoacan (Mexico)]. E-mail: horaciotovar@mexico.com; ggutier@itmorelia.edu.mx

    2007-04-15

    Use of network allocation costs by shift factors and MW-Mile method is reported in this paper. Conventional shift factors are computed based on DC power flow. DC power flow requires to selecting a slack bus in order to avoid matrix singularity. Therefore, shift factors are slack bus dependent. In order to evade slack bus dependency, two approaches are considered. [Spanish] Este trabajo presenta la asignacion de costos por uso de red mediante la aplicacion de Factores de Participacion (FP) y el metodo de MW-Milla. Los FP clasicos son calculados a partir del modelo lineal de flujos de potencia para lo que se requiere de establecer un nodo de referencia a fin de eliminar la singularidad de la matriz de coeficientes. Por lo tanto, los FP son dependientes de la asignacion del nodo de referencia. Dos metodos alternativos para evitar la dependencia del nodo compensador en la obtencion de los factores de participacion son presentados.

  20. RESSOURCES ALLOCATION POSSIBILITIES WITHIN HEALTH SERVICES

    Directory of Open Access Journals (Sweden)

    Manea Liliana

    2011-12-01

    Full Text Available The state policy in the health care area must take into account the complexity and specificity of the domain. Health means not only “to treat”, but also “to prevent” and “to recover and rehabilitate the individual physically”. Regardless of the adopted health insurance system, the health system is facing a big problem and this is the insufficient funds necessary to function properly. The underfunding may have various causes, from a wrong health policy, based on “treating” instead of “preventing”, by the misuse of funds. This papers intended to formulate assumptions that underpin the research I am conducting within the Doctoral Research Program held at the Valahia University of Targoviste, which aims at using the management control in increasing the health services performance. The application of the accounting and management control methods in determining health costs can be a beginning to streamline the system. This is also a result of the fact that health care is a public service with specific characteristics: it can not be subject only to market requirements but at the same time he must undergo an administrative savings, representing a typical case of market failure. The increased cost of treatment, as well as the decline in their quality can be determined by the discrepancy between the funding and payment mechanisms. Different payment systems currently available do nothing but perpetuate the shortcomings in the system. Switching to the introduction of cost and budgets by cost centers or object (if solved can be a step forward for a better management of resources. In this context, we consider as a necessity to be imposed the cost analysis on responsibility centers, the definition of the cost object and cost center identification and determination of direct costs and those indirect services to choose the basis for the allocation of cost centers and the determination of each actual cost per diagnosis.

  1. Methodology for reliability allocation based on fault tree analysis and dualistic contrast

    Institute of Scientific and Technical Information of China (English)

    TONG Lili; CAO Xuewu

    2008-01-01

    Reliability allocation is a difficult multi-objective optimization problem.This paper presents a methodology for reliability allocation that can be applied to determine the reliability characteristics of reactor systems or subsystems.The dualistic contrast,known as one of the most powerful tools for optimization problems,is applied to the reliability allocation model of a typical system in this article.And the fault tree analysis,deemed to be one of the effective methods of reliability analysis,is also adopted.Thus a failure rate allocation model based on the fault tree analysis and dualistic contrast is achieved.An application on the emergency diesel generator in the nuclear power plant is given to illustrate the proposed method.

  2. A new reliability allocation weight for reducing the occurrence of severe failure effects

    International Nuclear Information System (INIS)

    Kim, Kyungmee O.; Yang, Yoonjung; Zuo, Ming J.

    2013-01-01

    A reliability allocation weight is used during the early design stage of a system to apportion the system reliability requirement to its individual subsystems. Since some failures have serious effects on public safety, cost and environmental issues especially in a mission critical system, the failure effect must be considered as one of the important factors in determining the allocation weight. Previously, the risk priority number or the criticality number was used to consider the failure effect in the allocation weight. In this paper, we identify the limitations of the previous approach and propose a new allocation weight based on the subsystem failure severity and its relative frequency. An example is given to illustrate that the proposed method is more effective than the previous method for reducing the occurrence of the unacceptable failure effects in a newly designed system

  3. Vascularized Composite Allografts: Procurement, Allocation, and Implementation.

    Science.gov (United States)

    Rahmel, Axel

    Vascularized composite allotransplantation is a continuously evolving area of modern transplant medicine. Recently, vascularized composite allografts (VCAs) have been formally classified as 'organs'. In this review, key aspects of VCA procurement are discussed, with a special focus on interaction with the procurement of classical solid organs. In addition, options for a matching and allocation system that ensures VCA donor organs are allocated to the best-suited recipients are looked at. Finally, the different steps needed to promote VCA transplantation in society in general and in the medical community in particular are highlighted.

  4. THE EFFECTIVENESS OF BUDGET ALLOCATION IN PUBLIC PROCUREMENT

    Directory of Open Access Journals (Sweden)

    Irina Yu. Fedorova

    2015-01-01

    Full Text Available This article deals with the problem of budget allocation in the state order inRussia. Assesses the effectiveness of the financial mechanism of the public procurement business entities, purchasing activities are regulated by Federal Law №44-FZ and №223-FZ. The dynamics of financing the procurement process and reveal its features by using the most common methods of procurement through competitive bidding and without bidding. Identifies the causes of inefficient spending budget as a result of the non-competitive procurement methods by certain categories of business entities. 

  5. Type monotonic allocation schemes for multi-glove games

    OpenAIRE

    Brânzei, R.; Solymosi, T.; Tijs, S.H.

    2007-01-01

    Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...

  6. Multidemand Multisource Order Quantity Allocation with Multiple Transportation Alternatives

    Directory of Open Access Journals (Sweden)

    Jun Gang

    2015-01-01

    Full Text Available This paper focuses on a multidemand multisource order quantity allocation problem with multiple transportation alternatives. To solve this problem, a bilevel multiobjective programming model under a mixed uncertain environment is proposed. Two levels of decision makers are considered in the model. On the upper level, the purchaser aims to allocate order quantity to multiple suppliers for each demand node with the consideration of three objectives: total purchase cost minimization, total delay risk minimization, and total defect risk minimization. On the lower level, each supplier attempts to optimize the transportation alternatives with total transportation and penalty costs minimization as the objective. In contrast to prior studies, considering the information asymmetry in the bilevel decision, random and fuzzy random variables are used to model uncertain parameters of the construction company and the suppliers. To solve the bilevel model, a solution method based on Kuhn-Tucker conditions, sectional genetic algorithm, and fuzzy random simulation is proposed. Finally, the applicability of the proposed model and algorithm is evaluated through a practical case from a large scale construction project. The results show that the proposed model and algorithm are efficient in dealing with practical order quantity allocation problems.

  7. Energy-Efficient Power Allocation for MIMO-SVD Systems

    KAUST Repository

    Sboui, Lokman

    2017-05-24

    In this paper, we address the problem of energyefficient power allocation in MIMO systems. In fact, the widely adopted water-filling power allocation does not ensure the maximization of the energy efficiency (EE). Since the EE maximization is a non-convex problem, numerical methods based on fractional programming were introduced to find the optimal power solutions. In this paper, we present a novel and simple power allocation scheme based on the explicit expressions of the optimal power. We also present a low-complexity algorithm that complements the proposed scheme for low circuit-power regime. Furthermore, we analyze power-constrained and rate-constrained systems and present the corresponding optimal power control. In the numerical results, we show that the presented analytical expressions are accurate and that the algorithm converges within two iterations. We also show that as the number of antenna increases, the system becomes more energy-efficient. Also, a saturation of the EE is observed at high power budget and low minimal rate regimes.

  8. Application research of power allocation based on Buck circuit in DC microgrid

    OpenAIRE

    Wang Zihao; Zhou Mingyu

    2017-01-01

    In a traditional DC microgrid, the power sharing control strategy has been always used in the distributed power converters, resulting in not making outer power allocation arbitrarily. In order to solve the power output allocation problem of wind power in DC microgrid, the intelligent Buck circuit based on PI algorithm and the load current feed-forward method was used to realize the arbitrary regulation of the output power of the wind power in the DC microgrid system. Compared with traditional...

  9. Learn-and-Adapt Stochastic Dual Gradients for Network Resource Allocation

    OpenAIRE

    Chen, Tianyi; Ling, Qing; Giannakis, Georgios B.

    2017-01-01

    Network resource allocation shows revived popularity in the era of data deluge and information explosion. Existing stochastic optimization approaches fall short in attaining a desirable cost-delay tradeoff. Recognizing the central role of Lagrange multipliers in network resource allocation, a novel learn-and-adapt stochastic dual gradient (LA-SDG) method is developed in this paper to learn the sample-optimal Lagrange multiplier from historical data, and accordingly adapt the upcoming resource...

  10. Trajectories of goods in distributed allocation

    NARCIS (Netherlands)

    Chevaleyre, Y.; Endriss, U.; Maudet, N.; Padgham, L.; Parkes, D.; Müller, J.; Parsons, S.

    2008-01-01

    Distributed allocation mechanisms rely on the agents' autonomous (and supposedly rational) behaviour: states evolve as a result of agents contracting deals and exchanging resources. It is no surprise that restrictions on potential deals also restrict the reachability of some desirable states, for

  11. Multiobjective optimal allocation problem with probabilistic non ...

    African Journals Online (AJOL)

    This paper considers the optimum compromise allocation in multivariate stratified sampling with non-linear objective function and probabilistic non-linear cost constraint. The probabilistic non-linear cost constraint is converted into equivalent deterministic one by using Chance Constrained programming. A numerical ...

  12. Human Resource Subjects Allocation and Students' Academic ...

    African Journals Online (AJOL)

    This study investigated human resource subjects' allocation and students' academic performance in Secondary Schools in Obudu, Nigeria. The relevant variables of teachers subject was used as independent variable while the dependent variables were students' academic performance. Six hundred teachers from 20 ...

  13. FARM RESOURCE ALLOCATION AND PROFITABILITY OF ...

    African Journals Online (AJOL)

    Unique cropping systems have emerged in Nigeria to suit limited farmer resources and production objectives in humid forest inland valley ecosystems. But the basis for farm resource allocation and profitability of different crop enterprises are not properly understood. This study is based on a survey of 48 randomly selected ...

  14. Administrative Decision Making and Resource Allocation.

    Science.gov (United States)

    Sardy, Susan; Sardy, Hyman

    This paper considers selected aspects of the systems analysis of administrative decisionmaking regarding resource allocations in an educational system. A model of the instructional materials purchase system is presented. The major components of this model are: environment, input, decision process, conversion structure, conversion process, output,…

  15. Dynamic resource allocation using performance forecasting

    NARCIS (Netherlands)

    Moura, Paulo; Kon, Fabio; Voulgaris, Spyros; Van Steen, Maarten

    2016-01-01

    To benefit from the performance gains and cost savings enabled by elasticity in cloud IaaS environments, effective automated mechanisms for scaling are essential. This automation requires monitoring system status and defining criteria to trigger allocation and deallocation of resources. While these

  16. Resource Allocation Patterns and Student Achievement

    Science.gov (United States)

    James, Lori; Pate, James; Leech, Donald; Martin, Ellice; Brockmeier, Lantry; Dees, Elizabeth

    2011-01-01

    This quantitative research study was designed to examine the relationship between system resource allocation patterns and student achievement, as measured by eighth grade Criterion-Referenced Competency Test (CRCT) mathematics, eighth grade CRCT reading, eleventh grade Georgia High School Graduation Test (GHSGT) mathematics, eleventh grade and…

  17. 42 CFR 24.2 - Allocation.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24... talent. (e) The Secretary will ensure that SBRS slots are used in support of high priority programs...

  18. Biased Allocation of Faces to Social Categories

    NARCIS (Netherlands)

    Dotsch, R.; Wigboldus, D.H.J.; Knippenberg, A.F.M. van

    2011-01-01

    Three studies show that social categorization is biased at the level of category allocation. In all studies, participants categorized faces. In Studies 1 and 2, participants overallocated faces with criminal features-a stereotypical negative trait-to the stigmatized Moroccan category, especially if

  19. Cooperation and profit allocation in distribution chains

    NARCIS (Netherlands)

    Guardiola, L.A.; Meca, A.; Timmer, Judith B.

    2005-01-01

    We study the coordination of actions and the allocation of profit in distribution chains under decentralized control. We consider distribution chains in which a single supplier supplies goods for replenishment of stocks of several retailers who, in turn, sell these goods to their own separate

  20. Cooperation and profit allocation in distribution chains

    NARCIS (Netherlands)

    Guardiola, Luis A.; Meca, Ana; Timmer, Judith B.

    2007-01-01

    We study the coordination of actions and the allocation of profit in supply chains under decentralized control in which a single supplier supplies several retailers with goods for replenishment of stocks. The goal of the supplier and the retailers is to maximize their individual profits. Since the

  1. Analysts' earnings forecasts and international asset allocation

    NARCIS (Netherlands)

    Huijgen, Carel; Plantinga, Auke

    1999-01-01

    The aim of this paper is to investigate whether financial analysts’ earnings forecasts are informative from the viewpoint of allocating investments across different stock markets. Therefore we develop a country forecast indicator reflecting the analysts’ prospects for specific stock markets. The

  2. Adaptive resource allocation for efficient patient scheduling

    NARCIS (Netherlands)

    Vermeulen, Ivan B.; Bohte, Sander M.; Elkhuizen, Sylvia G.; Lameris, Han; Bakker, Piet J. M.; La Poutré, Han

    2009-01-01

    Efficient scheduling of patient appointments on expensive resources is a complex and dynamic task. A resource is typically used by several patient groups. To service these groups, resource capacity is often allocated per group, explicitly or implicitly. Importantly, due to fluctuations in demand,

  3. Patient flow based allocation of hospital resources.

    Science.gov (United States)

    Vissers, J M

    1995-01-01

    The current practice of allocating resources within a hospital introduces peaks and troughs in the workloads of departments and leads therefore to loss of capacity. This happens when requirements for capacity coordination are not adequately taken into account in the decision making process of allocating resources to specialties. The first part of this research involved an analysis of the hospital's production system on dependencies between resources, resulting in a number of capacity coordination requirements that need to be fulfilled for optimized resource utilization. The second, modelling, part of the study involved the development of a framework for resource management decision making, of a set of computer models to support hospital managerial decision making on resource allocation issues in various parts of the hospital, and of an implementation strategy for the application of the models to concrete hospital settings. The third part of the study was devoted to a number of case-studies, illustrating the use of the models when applied in various resource management projects, such as a reorganization of an operating theatre timetable, or the development of a master plan for activities of a group of general surgeons serving two locations of a merged hospital system. The paper summarizes the main findings of the study and concludes with a discussion of results obtained with the new allocation procedure and with recommendations for future research.

  4. Issues in organ procurement, allocation, and transplantation.

    Science.gov (United States)

    Nierste, Deborah

    2013-01-01

    Organ transplantation extends lives and improves health but presents complex ethical dilemmas for nurses caring for donors, recipients, and their families. This article overviews organ procurement and allocation, discusses ethical dilemmas in transplantation, and offers strategies from professional and biblical perspectives for coping with moral distress and maintaining compassionate care.

  5. 15 CFR 923.110 - Allocation formula.

    Science.gov (United States)

    2010-01-01

    ... and comment. (f) Calculation of financial assistance award levels. Actual financial assistance award... matches any such grant according to the following ratios of Federal-to-state contributions for the...) Allocation formula factors and weighting. Each State eligible to receive a financial assistance award shall...

  6. Allocation of Cognitive Resources in Translation

    DEFF Research Database (Denmark)

    Hvelplund, Kristian Tangsgaard

    The present study is an empirical investigation of translators' allocation of cognitive resources during the translation process, and it aims at investigating how translators' mental processing resources are put to use during translation. The study bases ts analyses on quantitative eye...

  7. Axioms for health care resource allocation

    DEFF Research Database (Denmark)

    Østerdal, Lars Peter

    2005-01-01

    This paper examines principles of health care resource allocation based on axioms for individual preferences and distributive justice. We establish axioms for representing individual preferences by quality-adjusted life years (QALYs), as well as axioms for existence of a social welfare function...

  8. Financial Resource Allocation in Higher Education

    Science.gov (United States)

    Ušpuriene, Ana; Sakalauskas, Leonidas; Dumskis, Valerijonas

    2017-01-01

    The paper considers a problem of financial resource allocation in a higher education institution. The basic financial management instruments and the multi-stage cost minimization model created are described involving financial instruments to constraints. Both societal and institutional factors that determine the costs of educating students are…

  9. Capital Allocation Effects of Financial Reporting Regulation

    NARCIS (Netherlands)

    Koenigsgruber, R.

    2012-01-01

    This paper analyses the effects of stricter financial reporting enforcement on capital allocation and reporting quality in a game-theoretic model and derives conclusions about optimal enforcement strictness. Analysis of the model shows that reporting quality strictly increases with tighter

  10. Stochastic resource allocation in emergency departments with a multi-objective simulation optimization algorithm.

    Science.gov (United States)

    Feng, Yen-Yi; Wu, I-Chin; Chen, Tzu-Li

    2017-03-01

    The number of emergency cases or emergency room visits rapidly increases annually, thus leading to an imbalance in supply and demand and to the long-term overcrowding of hospital emergency departments (EDs). However, current solutions to increase medical resources and improve the handling of patient needs are either impractical or infeasible in the Taiwanese environment. Therefore, EDs must optimize resource allocation given limited medical resources to minimize the average length of stay of patients and medical resource waste costs. This study constructs a multi-objective mathematical model for medical resource allocation in EDs in accordance with emergency flow or procedure. The proposed mathematical model is complex and difficult to solve because its performance value is stochastic; furthermore, the model considers both objectives simultaneously. Thus, this study develops a multi-objective simulation optimization algorithm by integrating a non-dominated sorting genetic algorithm II (NSGA II) with multi-objective computing budget allocation (MOCBA) to address the challenges of multi-objective medical resource allocation. NSGA II is used to investigate plausible solutions for medical resource allocation, and MOCBA identifies effective sets of feasible Pareto (non-dominated) medical resource allocation solutions in addition to effectively allocating simulation or computation budgets. The discrete event simulation model of ED flow is inspired by a Taiwan hospital case and is constructed to estimate the expected performance values of each medical allocation solution as obtained through NSGA II. Finally, computational experiments are performed to verify the effectiveness and performance of the integrated NSGA II and MOCBA method, as well as to derive non-dominated medical resource allocation solutions from the algorithms.

  11. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  12. Determining a functional responsibility allocation between public and private parties in a long-term maintenance contract for waterworks

    NARCIS (Netherlands)

    Brommet, O.D.; Schoenmaker, R.; Hertogh, M.J.C.M.; Kleijn van Willigen, G.R.; Chen, Y.; Bakker, Jaap; Frangopol, Dan M.; van Breugel, Klaas

    2017-01-01

    A proper allocation of risks and responsibilities is vital for the success of long-term maintenance contracts. This paper focuses on a method to identify an adequate allocation of responsibilities for the maintenance of waterworks. The Dutch agency recently started outsourcing the maintenance of

  13. Dual Kidney Allocation Score: A Novel Algorithm Utilizing Expanded Donor Criteria for the Allocation of Dual Kidneys in Adults.

    Science.gov (United States)

    Johnson, Adam P; Price, Thea P; Lieby, Benjamin; Doria, Cataldo

    2016-09-08

    BACKGROUND Dual kidney transplantation (DKT) of expanded-criteria donors is a cost-intensive procedure that aims to increase the pool of available deceased organ donors and has demonstrated equivalent outcomes to expanded-criteria single kidney transplantation (eSKT). The objective of this study was to develop an allocation score based on predicted graft survival from historical dual and single kidney donors. MATERIAL AND METHODS We analyzed United Network for Organ Sharing (UNOS) data for 1547 DKT and 26 381 eSKT performed between January 1994 and September 2013. We utilized multivariable Cox regression to identify variables independently associated with graft survival in dual and single kidney transplantations. We then derived a weighted multivariable product score from calculated hazard ratios to model the benefit of transplantation as dual kidneys. RESULTS Of 36 donor variables known at the time of listing, 13 were significantly associated with graft survival. The derived dual allocation score demonstrated good internal validity with strong correlation to improved survival in dual kidney transplants. Donors with scores less than 2.1 transplanted as dual kidneys had a worsened median survival of 594 days (24%, p-value 0.031) and donors with scores greater than 3.9 had improved median survival of 1107 days (71%, p-value 0.002). There were 17 733 eSKT (67%) and 1051 DKT (67%) with scores in between these values and no differences in survival (p-values 0.676 and 0.185). CONCLUSIONS We have derived a dual kidney allocation score (DKAS) with good internal validity. Future prospective studies will be required to demonstrate external validity, but this score may help to standardize organ allocation for dual kidney transplantation.

  14. Instructions to suppress semantic memory enhances or has no effect on P300 in a concealed information test (CIT).

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel

    2017-03-01

    The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  16. What do consumer surveys and experiments reveal and conceal about consumer preferences for genetically modified foods?

    Science.gov (United States)

    Colson, Gregory; Rousu, Matthew C

    2013-01-01

    Assessing consumer perceptions and willingness to pay for genetically modified (GM) foods has been one of the most active areas of empirical research in agricultural economics. Researchers over the past 15 years have delivered well over 100 estimates of consumers' willingness to pay for GM foods using surveys and experimental methods. In this review, we explore a number of unresolved issues related to three questions that are critical when considering the sum of the individual contributions that constitute the evidence on consumer preferences for GM foods.

  17. Profit Allocation in Fuzzy Cooperative Games in Manufacturing and Logistics Industry

    Directory of Open Access Journals (Sweden)

    Xiaoyan Wang

    2014-05-01

    Full Text Available Purpose: Alliance between manufacturing and logistics industry is a new model of the joint development of the two industries. A reasonable profit allocation mechanism is the key to ensure the stable operation of the alliance, as well as to achieve the desired objectives. Based on uncertainty of alliance expected return as well as the inherent features of the alliance, this research establishes an improved model of profit allocation in manufacturing and logistics industry alliance.Design/methodology/approach: This article studies how to introduce comprehensive correction factors to improve interval Shapley value method, which is based on the fact that had been proved by exiting studies. In this study, interval Shapley value method is first applied to calculate the initial allocation of fuzzy cooperative games. Next AHP-GEM method and fuzzy comprehensive evaluation method are incorporated. Based on those results, an improved model of profit allocation is established. After that, a case study is demonstrated the practicality and feasibility of the improved model.Findings: Profit allocation is a complex issue in fuzzy cooperative games. There’re impacts from partner risk sharing, collaborative effort market competition, innovative contribution as well as resource investment. All these factors should be involved in the profit allocation, and different factors have different weight in importance.Practical implications: The new model established in the paper is more scientific and reasonable, and more in line with the actual situation. This method also provides good incentives to each enterprise to ensure the healthy and stable development of the alliance.Originality/value: Based on alliance characteristics, this paper establishes an indicator system and a new model for profit allocation in manufacturing and logistics industry alliance, using AHP-GEM method.

  18. Proposal of an efficient operation method about order processing sequence and allocating goods to racks in the automatic picking system; Jido picking system ni okeru shohin no tanawaritsuke to chumon shori junjo no koritsuka un`yo hoshiki no teian

    Energy Technology Data Exchange (ETDEWEB)

    Ono, T.; Kagami, A.; Kosaka, M. [Hitachi Ltd., Tokyo (Japan)

    1997-07-05

    The material distribution center is a facility to store the goods from a factory and to prepare to ship the goods in response to order from retail store. Recently, with multiplication of consumption market, multi-variety and less-amount of the goods, multi-frequency of delivery and time saving form order to delivery are required. As picking work to prepare the stored goods for each customer requires specially many man-hours out of the works in this center, time saving of working becomes an important problem. In this paper, for an object of the automatic picking system constructed by plural equipments and to execute picking of small goods for each order, the following two operation methods were proposed: (1) To define shelf sharing of the goods so that the picking requirement numbers for each picking hand may be uniform as well as possible in response to order distribution for each goods, and (2) to define treating sequence of order so as not to generate large difference in order treating times among each treating hand on operation in parallel. These operation methods were confirmed their total treating time saving by some experiments using actual ordered data. 7 refs., 8 figs., 6 tabs.

  19. Allocation of losses in distribution system with dispersed generation of electricity

    International Nuclear Information System (INIS)

    Atanasovski, Metodija B.

    2005-01-01

    The problem of allocation of losses in distribution systems with dispersed generation (DG) of electricity is considered in this work. Definition of category DG, overview of technologies which belongs to this category and main features of each technology are given. Modeling of DG in steady state analysis of distribution networks is completely elaborated. Requirements for ideal allocation of losses are summarized. Methods from the literature, for allocation of losses in distribution systems with DG, are elaborated, as: classical distribution pricing method, substitution method, marginal loss coefficients method and nodal factors pricing method. In this work a new method for allocation of losses in distribution systems with DG is also presented. The new method is based on branches and resolves the problems of implementation of branch based methods for transmission networks to distribution networks. The method establishes direct relationship between losses in each branch of the network and injected active and reactive power in the nodes on which path to the root node the branch is placed. Reactive power is considered in the loss allocation process in this method and allocation of crossed terms of active and reactive power is performed using quadratic allocation of crossed terms. DG in this method is treated as negative power injection. It is assumed that the network is radial and the power flow in each branch of the, distribution network is constant and equal to the sum of injected active and reactive power in each node on which path to the root node, the branch is placed. The network is considered loss less. The new proposed method is applied and tested on real distribution network which is a part of Distribution company-Bitola. One distribution feeder of power station 110/10 kV/kV Bitola 4 is considered. Different types of consumers and two small hydro power plants in property of JP Strezevo as typical representatives of DG are connected to the feeder. Results

  20. A CR Spectrum Allocation Algorithm in Smart Grid Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Wei He

    2014-10-01

    Full Text Available Cognitive radio (CR method was introduced in smart grid communication systems to resolve potential maladies such as the coexistence of heterogeneous networks, overloaded data flow, diversity in data structures, and unstable quality of service (QOS. In this paper, a cognitive spectrum allocation algorithm based on non-cooperative game theory is proposed. The CR spectrum allocation model was developed by modifying the traditional game model via the insertion of a time variable and a critical function. The computing simulation result shows that the improved spectrum allocation algorithm can achieve stable spectrum allocation strategies and avoid the appearance of multi-Nash equilibrium at the expense of certain sacrifices in the system utility. It is suitable for application in distributed cognitive networks in power grids, thus contributing to the improvement of the isomerism and data capacity of power communication systems.

  1. Energy resource allocation using multi-objective goal programming: the case of Lebanon

    International Nuclear Information System (INIS)

    Mezher, T.; Chedid, R.; Zahabi, W.

    1998-01-01

    The traditional energy-resources allocation problem is concerned with the allocation of limited resources among the end-uses such that the overall return is maximized. In the past, several techniques have been used to deal with such a problem. In this paper, the energy allocation process is looked at from two points of view: economy and environment. The economic objectives include costs, efficiency, energy conservation, and employment generation. The environmental objectives consider environmental friendliness factors. The objective functions are first quantified and then transformed into mathematical language to obtain a multi-objective allocation model based upon pre-emptive goal programming techniques. The proposed method allows decision-makers to encourage or discourage specific energy resources for the various household end-uses. The case of Lebanon is examined to illustrate the usefulness of the proposed technique. (Copyright (c) 1998 Elsevier Science B.V., Amsterdam. All rights reserved.)

  2. Using Excel's Solver Function to Facilitate Reciprocal Service Department Cost Allocations

    Science.gov (United States)

    Leese, Wallace R.

    2013-01-01

    The reciprocal method of service department cost allocation requires linear equations to be solved simultaneously. These computations are often so complex as to cause the abandonment of the reciprocal method in favor of the less sophisticated and theoretically incorrect direct or step-down methods. This article illustrates how Excel's Solver…

  3. Optimal load allocation of complex ship power plants

    International Nuclear Information System (INIS)

    Baldi, Francesco; Ahlgren, Fredrik; Melino, Francesco; Gabrielii, Cecilia; Andersson, Karin

    2016-01-01

    Highlights: • The optimal operation of the prime movers of hybrid ship power plants is addressed. • Both mechanical, electric and thermal power demand are considered. • The problem is modelled as a mixed integer-nonlinear programming problem. • Up to 3% savings can be achieved with hybrid power plants. • Including the thermal power demand improves the solution by up to 4%. - Abstract: In a world with increased pressure on reducing fuel consumption and carbon dioxide emissions, the cruise industry is growing in size and impact. In this context, further effort is required for improving the energy efficiency of cruise ship energy systems. In this paper, we propose a generic method for modelling the power plant of an isolated system with mechanical, electric and thermal power demands and for the optimal load allocation of the different components that are able to fulfil the demand. The optimisation problem is presented in the form of a mixed integer linear programming (MINLP) problem, where the number of engines and/or boilers running is represented by the integer variables, while their respective load is represented by the non-integer variables. The individual components are modelled using a combination of first-principle models and polynomial regressions, thus making the system nonlinear. The proposed method is applied to the load-allocation problem of a cruise ship sailing in the Baltic Sea, and used to compare the existing power plant with a hybrid propulsion plant. The results show the benefits brought by using the proposing method, which allow estimating the performance of the hybrid system (for which the load allocation is a non-trivial problem) while also including the contribution of the heat demand. This allows showing that, based on a reference round voyage, up to 3% savings could be achieved by installing the proposed system, compared to the existing one, and that a NPV of 11 kUSD could be achieved already 5 years after the installation of the

  4. Efficient exact optimization of multi-objective redundancy allocation problems in series-parallel systems

    International Nuclear Information System (INIS)

    Cao, Dingzhou; Murat, Alper; Chinnam, Ratna Babu

    2013-01-01

    This paper proposes a decomposition-based approach to exactly solve the multi-objective Redundancy Allocation Problem for series-parallel systems. Redundancy allocation problem is a form of reliability optimization and has been the subject of many prior studies. The majority of these earlier studies treat redundancy allocation problem as a single objective problem maximizing the system reliability or minimizing the cost given certain constraints. The few studies that treated redundancy allocation problem as a multi-objective optimization problem relied on meta-heuristic solution approaches. However, meta-heuristic approaches have significant limitations: they do not guarantee that Pareto points are optimal and, more importantly, they may not identify all the Pareto-optimal points. In this paper, we treat redundancy allocation problem as a multi-objective problem, as is typical in practice. We decompose the original problem into several multi-objective sub-problems, efficiently and exactly solve sub-problems, and then systematically combine the solutions. The decomposition-based approach can efficiently generate all the Pareto-optimal solutions for redundancy allocation problems. Experimental results demonstrate the effectiveness and efficiency of the proposed method over meta-heuristic methods on a numerical example taken from the literature.

  5. An Integrative Review of the Concealed Connection: Nurse Educators' Critical Thinking.

    Science.gov (United States)

    Raymond, Christy; Profetto-McGrath, Joanne; Myrick, Florence; Strean, William B

    2017-11-01

    The role of nurse educators in the development of students' critical thinking has been overlooked despite the emphasized need for effective teaching methods. An integrative review was performed to examine both quantitative and qualitative research published from 2000 to 2015 related to nurse educators' critical thinking. Many barriers and facilitators existing on individual, interpersonal, and contextual levels affected nurse educators' critical thinking. Various tools have been used to measure nurse educators' critical thinking. This review also highlighted the continued lack of a consensus definition of critical thinking and the limited presence of conceptual models to guide the use of critical thinking in nursing education. Continued examination of nurse educators' critical thinking is needed, given the limited number of studies that have been completed. Much needs to be explored further, including conceptualizations of critical thinking and confirmation of emerging themes identified in this review. [J Nurs Educ. 2017;56(11):648-654.]. © 2017 Raymond, Profetto-McGrath, Myrick, et al.

  6. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  7. The dynamics of female time allocation upon a first birth

    DEFF Research Database (Denmark)

    Belzil, Christian

    1997-01-01

    both home an labor market productivities. Overall, the model is able to explain the relatively large fraction of women who do not experience career interruptions, the rapidly declining re-employment hazards and the weak effect of education on the duration of non-employment (hometime) spells.......I estimate a non-stationary dynamic programming model of time allocation decisions between full-time work, child care and search activities upon a first birth using recursive methods. The model incorporates the following sequence of decisions; whether to stop working or not (for those who work...

  8. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  9. Child sexual abuse among adolescents in southeast Nigeria: A concealed public health behavioral issue

    Science.gov (United States)

    C, Manyike Pius; M, Chinawa Josephat; Elias, Aniwada; I, Odutola Odetunde; Awoere, Chinawa T.

    2015-01-01

    Background and Objective: Child sexual abuse among adolescents is an often overlooked issue in pediatrics, yet it is a major cause of low self esteem and stigmatization in adolescents. The objective of this study was to determine the socioeconomic determinant and pattern of child sexual abuse among adolescent attending secondary schools in South East Nigeria. Methods: This was a cross-sectional study that was carried out among children in three secondary schools in Enugu and Ebonyi states of Nigeria. Five hundred and six adolescents who met inclusion criteria were consecutively recruited into our prospective study between June and October, 2014. Results: One hundred and ninety nine (40 %) of the respondents had been abused and the commonest form of abuse was to look at pornographic pictures, drawings, films, videotapes or magazine 93(18.4%). Fifty eight (11.5%) adolescents stated that they were abused once with age at first exposure being 7-12 years 57 (11.4%). When grouped together, family members and relatives are perpetrators of child sexual abuse. There was significant difference in sex abuse between males and females (p=0.014) while there were no significant difference for age (p=0.157) and social class (p=0.233). Conclusion: Overall prevalence and one time prevalence rates of sexual abuse among adolescents in south east Nigeria was 40% and 11.5% respectively with male perpetrators. There is no link between socioeconomic class, age and child sexual abuse among adolescents. PMID:26430412

  10. Female genitalia concealment promotes intimate male courtship in a water strider.

    Directory of Open Access Journals (Sweden)

    Chang S Han

    2009-06-01

    Full Text Available Violent coercive mating initiation is typical for animals with sexual conflict over mating. In these species, the coevolutionary arms-race between female defenses against coercive mating and male counter-adaptations for increased mating success leads to coevolutionary chases of male and female traits that influence the mating. It has been controversial whether one of the sexes can evolve traits that allow them to "win" this arms race. Here, we use morphological analysis (traditional and scanning electron micrographs, laboratory experiments and comparative methods to show how females of a species characterized by typical coercive mating initiation appear to "win" a particular stage of the sexual conflict by evolving morphology to hide their genitalia from direct, forceful access by males. In an apparent response to the female morphological adaptation, males of this species added to their typically violent coercive mounting of the female new post-mounting, pre-copulatory courtship signals produced by tapping the water's surface with the mid-legs. These courtship signals are intimate in the sense that they are aimed at the female, on whom the male is already mounted. Females respond to the signals by exposing their hidden genitalia for copulatory intromission. Our results indicate that the apparent victory of coevolutionary arms race by one sex in terms of morphology may trigger evolution of a behavioral phenotype in the opposite sex.

  11. Transmission cost allocation based on power flow tracing considering reliability benefit

    International Nuclear Information System (INIS)

    Leepreechanon, N.; Singharerg, S.; Padungwech, W.; Nakawiro, W.; Eua-Arporn, B.; David, A.K.

    2007-01-01

    Power transmission networks must be able to accommodate the continuously growing demand for reliable and economical electricity. This paper presented a method to allocate transmission use and reliability cost to both generators and end-consumers. Although transmission cost allocation methods change depending on the local context of the electric power industry, there is a common principle that transmission line capacity should be properly allocated to accommodate actual power delivery with an adequate reliability margin. The method proposed in this paper allocates transmission embedded cost to both generators and loads in an equitable manner, incorporating probability indices to allocate transmission reliability margin among users in both supply and demand sides. The application of the proposed method was illustrated using Bialek's tracing method on a multiple-circuit, six-bus transmission system. Probabilistic indices known as the transmission internal reliability margin (TIRM) and transmission external reliability margin (TERM) decomposed from the transmission reliability margin (TRM) were introduced, making true cost of using overall transmission facilities. 6 refs., 11 tabs., 5 figs

  12. A Chronological Reliability Model to Assess Operating Reserve Allocation to Wind Power Plants: Preprint

    International Nuclear Information System (INIS)

    Milligan, M. R.

    2001-01-01

    As the use of wind power plants increases worldwide, it is important to understand the effect these power sources have on the operations of the grid. This paper focuses on the operating reserve impact of wind power plants. Many probabilistic methods have been applied to power system analysis, and some of these are the basis of reliability analysis. This paper builds on a probabilistic technique to allocate the operating reserve burden among power plants in the grid. The method was originally posed by Strbac and Kirschen[1] and uses an allocation that prorates the reserve burden based on expected energy not delivered. Extending this method to include wind power plants allows the reserve burden to be allocated among different plants using the same method, yet incorporates information about the intermittent nature of wind power plants

  13. Free allocation in the European Emissions Trading System (EU ETS): identifying efficient mechanisms through to 2030

    International Nuclear Information System (INIS)

    Jalard, Matthieu; Alberola, Emilie

    2015-11-01

    In a world with asymmetrical climate policies, the conclusions of the European Council of October 2014 agreed on continuing the allocation of free CO 2 emissions allowances beyond 2020 to industrial sectors in the EU ETS. This statement has been confirmed in the European Commission's proposal to revise EU ETS directive for phase IV disclosed in July 2015. The stated objective is to ensure that the most efficient industrial installations do not face undue carbon costs which would lead to carbon leakages. Furthermore, free allocations should not undermine the incentive to cut CO 2 emissions, lead to distortions or windfall profits and reduce the auctioning share of allowances. From 2013 to 2020, the allocation of free allowances has been defined according to harmonized European rules based on benchmarks (carbon intensity targets) and historical output adjusted to the free allocation cap by applying the Cross-Sectoral Correction Factor (CSCF). What would be the impact of pursuing the current mechanism through to 2030? Does the EU Commissions' proposal of 15 July respond to the Council's requirements? Which alternative mechanisms could do so? This study examines four scenarios and their potential consequences. - Scenario 1 continues the current free allocation mechanism until 2030. The volume of free allocations thus calculated would be higher than the available free allocation cap and would need to be reduced by a Cross-Sectoral Correction Factor (CSCF) of 66% in 2030. Carbon costs would thus increase for all installations, regardless their exposure to carbon leakages, reducing the protection of most exposed sectors, while widely allocating sectors with limited exposure. - Scenario 2 analyses the proposal to implement an allocation mechanism based on recent industrial output combined with appropriate updating of benchmarks. This allocation method is more effective in combating carbon leakage, as it gives clearer incentive to maintain domestic production

  14. Risk allocation in independent power supply contracts

    International Nuclear Information System (INIS)

    Willrich, M.; Campbell, W.L.

    1992-01-01

    Congress has made significant progress in recent months toward amending the Public Utility Holding Company Act of 1935 (PUHCA). The purposes of such amendment are to broaden power supply options for electric utilities and expand competition in whole-sale power generation markets. PUHCA reform is an integral part of President Bush's National Energy Strategy and has been included in legislation pending in both Houses of Congress. Congress will, hopefully, approve energy legislation that includes PUHCA reform before it adjourns this year. PUHCA reform has, however, stimulated heated debate within the power industry itself as well as among various consumer interest groups. One important issue in the public debate concerns risk allocation. If PUHCA is reformed, will risk be allocated efficiently and equitably between independent power producers and electric utility buyers? This article addresses that important question

  15. Using contests to allocate pollution rights

    International Nuclear Information System (INIS)

    MacKenzie, Ian A.; Hanley, Nick; Kornienko, Tatiana

    2009-01-01

    In this paper we advocate a new initial allocation mechanism for a tradable pollution permit market. We outline a Permit Allocation Contest (PAC) that distributes permits to firms based on their rank relative to other firms. This ranking is achieved by ordering firms based on an observable 'external action' where the external action is an activity or characteristic of the firm that is independent of their choice of emissions in the tradable permit market. We argue that this mechanism has a number of benefits over auctioning and grandfathering. Using this mechanism efficiently distributes permits, allows for the attainment of a secondary policy objective and has the potential to be more politically appealing than existing alternatives.

  16. Adolescence, Attention Allocation, and Driving Safety

    OpenAIRE

    Romer, Daniel; Lee, Yi-Ching; McDonald, Catherine C.; Winston, Flaura K.

    2014-01-01

    Motor vehicle crashes are the leading source of morbidity and mortality in adolescents in the United States and the developed world. Inadequate allocation of attention to the driving task and to driving hazards are important sources of adolescent crashes. We review major explanations for these attention failures with particular focus on the roles that brain immaturity and lack of driving experience play in causing attention problems. The review suggests that the potential for overcoming inexp...

  17. Nonparametric correlation models for portfolio allocation

    DEFF Research Database (Denmark)

    Aslanidis, Nektarios; Casas, Isabel

    2013-01-01

    This article proposes time-varying nonparametric and semiparametric estimators of the conditional cross-correlation matrix in the context of portfolio allocation. Simulations results show that the nonparametric and semiparametric models are best in DGPs with substantial variability or structural ...... currencies. Results show the nonparametric model generally dominates the others when evaluating in-sample. However, the semiparametric model is best for out-of-sample analysis....

  18. Rethinking Reinforcement: Allocation, Induction, and Contingency

    Science.gov (United States)

    Baum, William M

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: allocation, induction, and correlation. Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of choice. Allocation changes as a result of induction and correlation. The term induction covers phenomena such as adjunctive, interim, and terminal behavior—behavior induced in a situation by occurrence of food or another Phylogenetically Important Event (PIE) in that situation. Induction resembles stimulus control in that no one-to-one relation exists between induced behavior and the inducing event. If one allowed that some stimulus control were the result of phylogeny, then induction and stimulus control would be identical, and a PIE would resemble a discriminative stimulus. Much evidence supports the idea that a PIE induces all PIE-related activities. Research also supports the idea that stimuli correlated with PIEs become PIE-related conditional inducers. Contingencies create correlations between “operant” activity (e.g., lever pressing) and PIEs (e.g., food). Once an activity has become PIE-related, the PIE induces it along with other PIE-related activities. Contingencies also constrain possible performances. These constraints specify feedback functions, which explain phenomena such as the higher response rates on ratio schedules in comparison with interval schedules. Allocations that include a lot of operant activity are “selected” only in the sense that they generate more frequent occurrence of the PIE within the constraints of the situation; contingency and induction do the “selecting.” PMID:22287807

  19. Allocating nuclear power plant costs: an extension

    International Nuclear Information System (INIS)

    Bierman, H. Jr.

    1984-01-01

    The author modifies and extends the argument presented in the September 22, 1983 issue by Richard E. Nellis for using economic depreciation to allocate nuclear power plant costs. The two goals of his model are to charge constant real costs to consumers and to provide a fair return of .125 to investors in each period. The addition of other objectives requires further modification of the model since the schedule of revenues that are deemed to be optimum defines the depreciation schedule. 1 table

  20. Optimum design for pipe-support allocation against seismic loading

    International Nuclear Information System (INIS)

    Hara, Fumio; Iwasaki, Akira

    1996-01-01

    This paper deals with the optimum design methodology of a piping system subjected to a seismic design loading to reduce its dynamic response by selecting the location of pipe supports and whereby reducing the number of pipe supports to be used. The author employs the Genetic Algorithm for obtaining a reasonably optimum solution of the pipe support location, support capacity and number of supports. The design condition specified by the support location, support capacity and the number of supports to be used is encored by an integer number string for each of the support allocation candidates and they prepare many strings for expressing various kinds of pipe-support allocation state. Corresponding to each string, the authors evaluate the seismic response of the piping system to the design seismic excitation and apply the Genetic Algorithm to select the next generation candidates of support allocation to improve the seismic design performance specified by a weighted linear combination of seismic response magnitude, support capacity and the number of supports needed. Continuing this selection process, they find a reasonably optimum solution to the seismic design problem. They examine the feasibility of this optimum design method by investigating the optimum solution for 5, 7 and 10 degree-of-freedom models of piping system, and find that this method can offer one a theoretically feasible solution to the problem. They will be, thus, liberated from the severe uncertainty of damping value when the pipe support guaranties the design capacity of damping. Finally, they discuss the usefulness of the Genetic Algorithm for the seismic design problem of piping systems and some sensitive points when it will be applied to actual design problems

  1. Directed graph based carbon flow tracing for demand side carbon obligation allocation

    DEFF Research Database (Denmark)

    Sun, Tao; Feng, Donghan; Ding, Teng

    2016-01-01

    In order to achieve carbon emission abatement, some researchers and policy makers have cast their focus on demand side carbon abatement potentials. This paper addresses the problem of carbon flow calculation in power systems and carbon obligation allocation at demand side. A directed graph based...... method for tracing carbon flow is proposed. In a lossy network, matrices such as carbon losses, net carbon intensity (NCI) and footprint carbon intensity (FCI) are obtained with the proposed method and used to allocate carbon obligation at demand side. Case studies based on realistic distribution...... and transmission systems are provided to demonstrate the effectiveness of the proposed method....

  2. A Channel Allocation Mechanism for Cellular Networks

    Directory of Open Access Journals (Sweden)

    Chi-Hua Chen

    2017-04-01

    Full Text Available In cellular networks, call blocking causes lower customer satisfaction and economic loss. Therefore, the channel allocation for call block avoidance is an important issue. This study proposes a mechanism that considers the real-time traffic information (e.g., traffic flow and vehicle speed and the user behavior (e.g., call inter-arrival time and call holding time to analyze the adaptable number of communication calls in the specific cell for channel allocation. In experiments about call block probabilities (CBP, this study simulated two cases that are the situations of the whole day and traffic accident. The simulation results show that all CBPs in the scenario of whole day are less than 21.5% by using the proposed mechanism, which is better than using the static channel allocation (SCA mechanism. Moreover, all CBPs in the scenario of traffic accidents are less than 16.5% by using the proposed mechanism, which is better than using the SCA mechanism. Therefore, the proposed mechanism can decrease the number of CBPs effectively.

  3. Irrational time allocation in decision-making.

    Science.gov (United States)

    Oud, Bastiaan; Krajbich, Ian; Miller, Kevin; Cheong, Jin Hyun; Botvinick, Matthew; Fehr, Ernst

    2016-01-13

    Time is an extremely valuable resource but little is known about the efficiency of time allocation in decision-making. Empirical evidence suggests that in many ecologically relevant situations, decision difficulty and the relative reward from making a correct choice, compared to an incorrect one, are inversely linked, implying that it is optimal to use relatively less time for difficult choice problems. This applies, in particular, to value-based choices, in which the relative reward from choosing the higher valued item shrinks as the values of the other options get closer to the best option and are thus more difficult to discriminate. Here, we experimentally show that people behave sub-optimally in such contexts. They do not respond to incentives that favour the allocation of time to choice problems in which the relative reward for choosing the best option is high; instead they spend too much time on problems in which the reward difference between the options is low. We demonstrate this by showing that it is possible to improve subjects' time allocation with a simple intervention that cuts them off when their decisions take too long. Thus, we provide a novel form of evidence that organisms systematically spend their valuable time in an inefficient way, and simultaneously offer a potential solution to the problem. © 2016 The Author(s).

  4. Optimal allocation of trend following strategies

    Science.gov (United States)

    Grebenkov, Denis S.; Serror, Jeremy

    2015-09-01

    We consider a portfolio allocation problem for trend following (TF) strategies on multiple correlated assets. Under simplifying assumptions of a Gaussian market and linear TF strategies, we derive analytical formulas for the mean and variance of the portfolio return. We construct then the optimal portfolio that maximizes risk-adjusted return by accounting for inter-asset correlations. The dynamic allocation problem for n assets is shown to be equivalent to the classical static allocation problem for n2 virtual assets that include lead-lag corrections in positions of TF strategies. The respective roles of asset auto-correlations and inter-asset correlations are investigated in depth for the two-asset case and a sector model. In contrast to the principle of diversification suggesting to treat uncorrelated assets, we show that inter-asset correlations allow one to estimate apparent trends more reliably and to adjust the TF positions more efficiently. If properly accounted for, inter-asset correlations are not deteriorative but beneficial for portfolio management that can open new profit opportunities for trend followers. These concepts are illustrated using daily returns of three highly correlated futures markets: the E-mini S&P 500, Euro Stoxx 50 index, and the US 10-year T-note futures.

  5. Resource allocation models of auditory working memory.

    Science.gov (United States)

    Joseph, Sabine; Teki, Sundeep; Kumar, Sukhbinder; Husain, Masud; Griffiths, Timothy D

    2016-06-01

    Auditory working memory (WM) is the cognitive faculty that allows us to actively hold and manipulate sounds in mind over short periods of time. We develop here a particular perspective on WM for non-verbal, auditory objects as well as for time based on the consideration of possible parallels to visual WM. In vision, there has been a vigorous debate on whether WM capacity is limited to a fixed number of items or whether it represents a limited resource that can be allocated flexibly across items. Resource allocation models predict that the precision with which an item is represented decreases as a function of total number of items maintained in WM because a limited resource is shared among stored objects. We consider here auditory work on sequentially presented objects of different pitch as well as time intervals from the perspective of dynamic resource allocation. We consider whether the working memory resource might be determined by perceptual features such as pitch or timbre, or bound objects comprising multiple features, and we speculate on brain substrates for these behavioural models. This article is part of a Special Issue entitled SI: Auditory working memory. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Transnational Energy Companies' Investment Allocation Decisions

    International Nuclear Information System (INIS)

    Osmundsen, Petter; Emhjellen, Magne; Halleraker, Morten

    2001-10-01

    When making international capital budgeting decisions, energy companies are often faced with capital and organisational constraints. The constraints may be real or management imposed. In addition, when entering into a new country or region the companies will incur fixed new area costs that must be considered before investment approval. The decision problem is therefore not a linear problem where the standard net present value rule applies, but a non-linear problem of selecting the combination of projects with the maximum aggregate net present value. New project investments will therefore be selected based on the size of the net present value (often referred to as financial volume or materiality) compared to the projects' use of capital and scarce personnel and organisational capacity. Consequently, projects with a positive net present value, but with low materiality, may not be approved. The portfolio choice has a parallel to the company's choice of core areas. Instead of complex portfolio models, the companies often apply simpler allocation mechanisms, e.g., combinations of fixed investment budgets and materiality requirements. Analysing petroleum cases, we compare the allocations decisions generated by portfolio models and simpler mechanisms. We also discuss the implications of this capital allocation pattern for governments' design of tax systems and license conditions. (author)

  7. Adapting water allocation management to drought scenarios

    Directory of Open Access Journals (Sweden)

    P. Giacomelli

    2008-04-01

    Full Text Available Climate change dynamics have significant consequences on water resources on a watershed scale. With water becoming scarcer and susceptible to variation, the planning and reallocation decisions in watershed management need to be reviewed. This research focuses on an in-depth understanding of the current allocation balance of water resources among competitors, placed along the course of the Adda River. In particular, during the summer period, the demand for water dramatically increases. This is due to the increase in irrigation activities in the lower part of the basin and to the highest peaks of tourist inflow, in the Como Lake and Valtellina areas. Moreover, during these months, the hydroelectric reservoirs in the upper part of the Adda River basin (the Valtellina retain most of the volume of water coming from the snow and glacier melt. The existing allocation problem among these different competing users is exacerbated by the decreasing water supplies. The summer of 2003 testified the rise in a number of allocation problems and situations of water scarcity that brought about environmental and economical consequences. The RICLIC project is committed to the understanding of water dynamics on a regional scale, to quantify the volumes involved and offer local communities an instrument to improve a sustainable water management system, within uncertain climate change scenarios.

  8. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  9. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  10. Efficient Power Allocation for Video over Superposition Coding

    KAUST Repository

    Lau, Chun Pong; Jamshaid, K.; Shihada, Basem

    2013-01-01

    are conducted to gain a better understanding of its efficiency, specifically, the impact of the received signal due to different power allocation ratios. Our experimental results show that to maintain high video quality, the power allocated to the base layer

  11. Management of electricity network cross border capacity: allocation procedures between France and Belgium

    International Nuclear Information System (INIS)

    Raytchev, D.

    2003-01-01

    This paper tries to identify a method of allocation of the Interconnector capacity for the transport of electricity which complies best with the (conflicting) interests of users, system operators and regulators in the context of a common European market of electricity. The first part combines a historical approach with a comparative study of existing allocation procedures to show that the new joint mechanism of auctioning and market splitting, applied to the whole northern zone of UCTE is vastly superior to the existing allocation arrangement on the Franco-Belgian border. The second part discusses some problems related to the implementation of the new allocation mechanism. Here we examine some difficulties concerning ca achy auctioning (like auction methods and organisation, profit distribution and derivative markets) as well as the market splitting method (neutrality, markets without power exchanges, etc). The main obstacle facing the new method remains however the lack of willingness to address the urgent issue of reforming the present allocation procedures- a remnant from the period of centrally planned electricity systems where neighbouring monopoly companies negotiated agreements of mutual assistance. These agreements are currently kept in place by tacit inaction despite their heterogeneity and arbitrariness which slow down the emergence of a real competition capable of contesting the positions of historic operators. (authors)

  12. Multiarea Transmission Cost Allocation in Large Power Systems Using the Nodal Pricing Control Approach

    Directory of Open Access Journals (Sweden)

    M. Ghayeni

    2010-12-01

    Full Text Available This paper proposes an algorithm for transmission cost allocation (TCA in a large power system based on nodal pricing approach using the multi-area scheme. The nodal pricing approach is introduced to allocate the transmission costs by the control of nodal prices in a single area network. As the number of equations is dependent on the number of buses and generators, this method will be very time consuming for large power systems. To solve this problem, the present paper proposes a new algorithm based on multi-area approach for regulating the nodal prices, so that the simulation time is greatly reduced and therefore the TCA problem with nodal pricing approach will be applicable for large power systems. In addition, in this method the transmission costs are allocated to users more equitable. Since the higher transmission costs in an area having a higher reliability are paid only by users of that area in contrast with the single area method, in which these costs are allocated to all users regardless of their locations. The proposed method is implemented on the IEEE 118 bus test system which comprises three areas. Results show that with application of multi-area approach, the simulation time is greatly reduced and the transmission costs are also allocated to users with less variation in new nodal prices with respect to the single area approach.

  13. A nodal method based on the response-matrix method

    International Nuclear Information System (INIS)

    Cunha Menezes Filho, A. da; Rocamora Junior, F.D.

    1983-02-01

    A nodal approach based on the Response-Matrix method is presented with the purpose of investigating the possibility of mixing two different allocations in the same problem. It is found that the use of allocation of albedo combined with allocation of direct reflection produces good results for homogeneous fast reactor configurations. (Author) [pt

  14. Characterization of the loss allocation techniques for radial systems with distributed generation

    International Nuclear Information System (INIS)

    Carpaneto, Enrico; Chicco, Gianfranco; Sumaili Akilimali, Jean

    2008-01-01

    In the restructured electricity industry, meaningful loss allocation methods are required in order to send correct signals to the market taking into account the location and characteristics of loads and generations, including the local sources forming the distributed generation (DG). This paper addresses the issues related to loss allocation in radial distribution systems with DG, with a three-fold focus. First, the key differences in the formulation of the loss allocation problem for radial distribution systems with respect to transmission systems are discussed, specifying the modeling and computational issues concerning the treatment of the slack node in radial distribution systems. Then, the characteristics of derivative-based and circuit-based loss allocation techniques are presented and compared, illustrating the arrangements used for adapting the various techniques to be applied to radial distribution systems with DG. Finally, the effects of introducing voltage-controllable local generation on the calculation of the loss allocation coefficients are discussed, proposing the adoption of a ''reduced'' representation of the system capable of taking into proper account the characteristics of the nodes containing voltage-controllable DG units. Numerical results are provided to show the time evolution of the loss allocation coefficients for distribution systems with variable load and local generation patterns. (author)

  15. Dynamic Asset Allocation and the Informational Efficiency of Markets.

    OpenAIRE

    Grossman, Sanford J

    1995-01-01

    Markets have an allocational role; even in the absence of news about payoffs, prices change to facilitate trade and allocate resources to their best use. Allocational price changes create noise in the signal extraction process, and markets where such trading is important are markets in which we may expect to find a failure of informational efficiency. An important source of allocational trading is the use of dynamic trading strategies caused by the incomplete equitization of risks. Incomplete...

  16. Fundamental-driven and Tactical Asset Allocation: what really matters?

    OpenAIRE

    Hartpence, Maria; Boulier, Jean-François

    2004-01-01

    Asset allocation contribution to ex-post performance is of primary importance. Nobody denies its role, yet the subject of allocating assets remains controversial. To some contenders, the added value stems only from strategic asset allocation which aims at providing the long-term average exposure to the selected asset classes. On the other hand, proponents of active management have introduced several forms of tactical asset allocation. In this paper, we will go a step further by distinguishing...

  17. Optimal allocation and adaptive VAR control of PV-DG in distribution networks

    International Nuclear Information System (INIS)

    Fu, Xueqian; Chen, Haoyong; Cai, Runqing; Yang, Ping

    2015-01-01

    Highlights: • A methodology for optimal PV-DG allocation based on a combination of algorithms. • Dealing with the randomicity of solar power energy using CCSP. • Presenting a VAR control strategy to balance the technical demands. • Finding the Pareto solutions using MOPSO and SVM. • Evaluating the Pareto solutions using WRSR. - Abstract: The development of distributed generation (DG) has brought new challenges to power networks. One of them that catches extensive attention is the voltage regulation problem of distribution networks caused by DG. Optimal allocation of DG in distribution networks is another well-known problem being widely investigated. This paper proposes a new method for the optimal allocation of photovoltaic distributed generation (PV-DG) considering the non-dispatchable characteristics of PV units. An adaptive reactive power control model is introduced in PV-DG allocation as to balance the trade-off between the improvement of voltage quality and the minimization of power loss in a distribution network integrated with PV-DG units. The optimal allocation problem is formulated as a chance-constrained stochastic programming (CCSP) model for dealing with the randomness of solar power energy. A novel algorithm combining the multi-objective particle swarm optimization (MOPSO) with support vector machines (SVM) is proposed to find the Pareto front consisting of a set of possible solutions. The Pareto solutions are further evaluated using the weighted rank sum ratio (WRSR) method to help the decision-maker obtain the desired solution. Simulation results on a 33-bus radial distribution system show that the optimal allocation method can fully take into account the time-variant characteristics and probability distribution of PV-DG, and obtain the best allocation scheme

  18. Developing Subdomain Allocation Algorithms Based on Spatial and Communicational Constraints to Accelerate Dust Storm Simulation

    Science.gov (United States)

    Gui, Zhipeng; Yu, Manzhu; Yang, Chaowei; Jiang, Yunfeng; Chen, Songqing; Xia, Jizhe; Huang, Qunying; Liu, Kai; Li, Zhenlong; Hassan, Mohammed Anowarul; Jin, Baoxuan

    2016-01-01

    Dust storm has serious disastrous impacts on environment, human health, and assets. The developments and applications of dust storm models have contributed significantly to better understand and predict the distribution, intensity and structure of dust storms. However, dust storm simulation is a data and computing intensive process. To improve the computing performance, high performance computing has been widely adopted by dividing the entire study area into multiple subdomains and allocating each subdomain on different computing nodes in a parallel fashion. Inappropriate allocation may introduce imbalanced task loads and unnecessary communications among computing nodes. Therefore, allocation is a key factor that may impact the efficiency of parallel process. An allocation algorithm is expected to consider the computing cost and communication cost for each computing node to minimize total execution time and reduce overall communication cost for the entire simulation. This research introduces three algorithms to optimize the allocation by considering the spatial and communicational constraints: 1) an Integer Linear Programming (ILP) based algorithm from combinational optimization perspective; 2) a K-Means and Kernighan-Lin combined heuristic algorithm (K&K) integrating geometric and coordinate-free methods by merging local and global partitioning; 3) an automatic seeded region growing based geometric and local partitioning algorithm (ASRG). The performance and effectiveness of the three algorithms are compared based on different factors. Further, we adopt the K&K algorithm as the demonstrated algorithm for the experiment of dust model simulation with the non-hydrostatic mesoscale model (NMM-dust) and compared the performance with the MPI default sequential allocation. The results demonstrate that K&K method significantly improves the simulation performance with better subdomain allocation. This method can also be adopted for other relevant atmospheric and numerical

  19. Matching today's allocation of LDC expenses with cost causation

    International Nuclear Information System (INIS)

    Yankel, A.J.

    1990-01-01

    This article discusses the costs of natural gas distribution and how to integrate these costs into the allocation of local distribution companies expenses for the purpose of establishing rate structures. The author's contention is that costs related to throughput are a larger share than historically used allocation factors suggest. Topics include the historical allocation factors, a case study and the conclusions drawn from it

  20. Reward-allocation judgments in Romania : A factorial survey approach

    NARCIS (Netherlands)

    Buzea, C.; Meseşan-Schmitz, L.; van de Vijver, F.J.R.

    2013-01-01

    We investigated reward-allocation judgments when positive outcomes (monetary rewards) were distributed and the allocator was not a co-recipient, in a sample of 200 Romanian students. Within a full factorial survey design, seven factors, selected to affect the allocation decision, were orthogonally