WorldWideScience

Sample records for party line information

  1. Developing Product Lines with 3rd-party components

    NARCIS (Netherlands)

    De Jonge, M.

    2007-01-01

    The trends toward product line development and toward adopting more 3rd-party software are hard to combine. The reason is that productlines demand fine control over the software (e.g., for diversity management), while 3rd-party software (almost by definition) provides only little or no control. A

  2. Public funding of political parties when campaigns are informative

    DEFF Research Database (Denmark)

    Ortín, Ignacio Ortuño; Schultz, Christian

    dependence on vote shares induces fur- ther moderation and improves welfare. If parties are asymmetric, vote share dependent public funding bene…ts the large party and makes it moderate its candidate, while the smaller party reacts by choosing a more extremist candidate. On balance, however, if the parties......The paper considers public funding of political parties when some voters are poorly informed about parties’ candidates and campaigns are informative. For symmetric equilibria, it is shown that more pub- lic funding leads parties to chose more moderate candidates, and that an increase in the funding’s...... are not too asymmetric, an increase in vote share dependent funding improves welfare and increases the likelihood that a moderate candidate wins the election...

  3. 78 FR 23545 - Proposed Extension of Approval of Information Collection; Comment Request: Third Party Conformity...

    Science.gov (United States)

    2013-04-19

    ... Information Collection; Comment Request: Third Party Conformity Assessment Body Registration Form AGENCY... evaluate whether third party conformity assessment bodies meet the requirements to test for compliance to specified children's product safety rules. Third party conformity assessment bodies found to meet the...

  4. 10 CFR 2.905 - Access to restricted data and national security information for parties; security clearances.

    Science.gov (United States)

    2010-01-01

    ... information for parties; security clearances. 2.905 Section 2.905 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.905 Access to restricted data and national security information for parties; security clearances. (a) Access...

  5. Publishing SNP genotypes of human embryonic stem cell lines: policy statement of the International Stem Cell Forum Ethics Working Party.

    Science.gov (United States)

    Knoppers, Bartha M; Isasi, Rosario; Benvenisty, Nissim; Kim, Ock-Joo; Lomax, Geoffrey; Morris, Clive; Murray, Thomas H; Lee, Eng Hin; Perry, Margery; Richardson, Genevra; Sipp, Douglas; Tanner, Klaus; Wahlström, Jan; de Wert, Guido; Zeng, Fanyi

    2011-09-01

    Novel methods and associated tools permitting individual identification in publicly accessible SNP databases have become a debatable issue. There is growing concern that current technical and ethical safeguards to protect the identities of donors could be insufficient. In the context of human embryonic stem cell research, there are no studies focusing on the probability that an hESC line donor could be identified by analyzing published SNP profiles and associated genotypic and phenotypic information. We present the International Stem Cell Forum (ISCF) Ethics Working Party's Policy Statement on "Publishing SNP Genotypes of Human Embryonic Stem Cell Lines (hESC)". The Statement prospectively addresses issues surrounding the publication of genotypic data and associated annotations of hESC lines in open access databases. It proposes a balanced approach between the goals of open science and data sharing with the respect for fundamental bioethical principles (autonomy, privacy, beneficence, justice and research merit and integrity).

  6. Web party effect: a cocktail party effect in the web environment.

    Science.gov (United States)

    Rigutti, Sara; Fantoni, Carlo; Gerbino, Walter

    2015-01-01

    In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all) web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots) on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search). Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment): users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others.

  7. 50 CFR 23.25 - What additional information is required on a non-Party CITES document?

    Science.gov (United States)

    2010-10-01

    ... a non-Party CITES document? 23.25 Section 23.25 Wildlife and Fisheries UNITED STATES FISH AND... IN ENDANGERED SPECIES OF WILD FAUNA AND FLORA (CITES) Prohibitions, Exemptions, and Requirements § 23.25 What additional information is required on a non-Party CITES document? (a) Purpose. Under Article...

  8. 7 CFR 1.641 - How may parties obtain discovery of information needed for the case?

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false How may parties obtain discovery of information needed for the case? 1.641 Section 1.641 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE... legal theories of an attorney. (g) Experts. Unless restricted by the ALJ, a party may discover any facts...

  9. Web party effect: a cocktail party effect in the web environment

    Directory of Open Access Journals (Sweden)

    Sara Rigutti

    2015-03-01

    Full Text Available In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search. Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment: users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others.

  10. Web party effect: a cocktail party effect in the web environment

    Science.gov (United States)

    Gerbino, Walter

    2015-01-01

    In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all) web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots) on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search). Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment): users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others. PMID:25802803

  11. 49 CFR 40.331 - To what additional parties must employers and service agents release information?

    Science.gov (United States)

    2010-10-01

    ... service agents release information? 40.331 Section 40.331 Transportation Office of the Secretary of... Release of Information § 40.331 To what additional parties must employers and service agents release information? As an employer or service agent you must release information under the following circumstances...

  12. 30 CFR 280.42 - When geological data and information are obtained by a third party, what must we both do?

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false When geological data and information are... SULPHUR ON THE OUTER CONTINENTAL SHELF Data Requirements Geological Data and Information § 280.42 When geological data and information are obtained by a third party, what must we both do? A third party may obtain...

  13. Information Technology & Applications Corporation v. United States: An Interested Party's "Substantial Chance" at APA Standing

    National Research Council Canada - National Science Library

    Slicker, Christina

    2003-01-01

    .... Building on CICA's "interested party" definition with Information Technology's refinement of "substantial chance" rule, the Federal Circuit has effectively translated "APA standing" into the language...

  14. Multi-party Quantum Computation

    OpenAIRE

    Smith, Adam

    2001-01-01

    We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the adversary. For the slightly weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to establish that any multi-party quantu...

  15. 42 CFR 478.24 - Opportunity for a party to obtain and submit information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Opportunity for a party to obtain and submit information. 478.24 Section 478.24 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS RECONSIDERATIONS AND APPEALS Utilization and Quality Control Quality...

  16. 10 CFR 2.906 - Obligation of parties to avoid introduction of restricted data or national security information.

    Science.gov (United States)

    2010-01-01

    ... data or national security information. 2.906 Section 2.906 Energy NUCLEAR REGULATORY COMMISSION RULES... to Adjudicatory Proceedings Involving Restricted Data and/or National Security Information § 2.906 Obligation of parties to avoid introduction of restricted data or national security information. It is the...

  17. Party Control, Party Competition and Public Service Performance

    OpenAIRE

    Boyne, George Alexander; James, O.; John, P.; Petrovsky, Nicolai

    2012-01-01

    This article assesses party effects on the performance of public services. A policy-seeking model, hypothesizing that left and right party control affects performance, and an instrumental model, where all parties strive to raise performance, are presented. The framework also suggests a mixed model in which party effects are contingent on party competition, with parties raising performance as increasing party competition places their control of government at increasing risk. These models are t...

  18. Public Funding of Political Parties

    DEFF Research Database (Denmark)

    Ortuno-Ortin, Ignacio; Schultz, Christian

    This paper concerns public funding of parties. Parteis receive public funds depending on their vote share. Funds finance electoral campaigns. Two cases are investigated. In the first, some voters are policy motivated and some are ?impressionable? ? their vote depends directly on campaign...... expenditures. In the second, campaigning is informative and all voters are policy motivated. Public funds increase policy convergence in both cases. The effect is larger, the more funding depends on vote shares. When campaigns are informative, there may be multiple euqilibria. Intuitively, a large party can...

  19. Party member recruitment and the representativeness of party membership

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Party membership figures are in decline. However, parties are still recruiting party members. Are there any differences in the social and political characteristics of old and new party members? If there is a difference, are new party members more or less representative for party voters than old...

  20. LEGO for Two-Party Secure Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Orlandi, Claudio

    2009-01-01

    This paper continues the recent line of work of making Yao’s garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits...

  1. Leakage Resilient Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hazay, Carmit; Patra, Arpita

    2012-01-01

    we initiate the study of {\\em secure two-party computation in the presence of leakage}, where on top of corrupting one of the parties the adversary obtains leakage from the content of the secret memory of the honest party. Our study involves the following contributions: \\BE \\item {\\em Security...... and returns its result. Almost independently of secure computation, the area of {\\em leakage resilient cryptography} has recently been evolving intensively, studying the question of designing cryptographic primitives that remain secure even when some information about the secret key is leaked. In this paper...

  2. DEVELOPMENT OF POLITICAL PARTIES AND PARTY FUNDING: MODELS AND CHARACTERISTICS

    Directory of Open Access Journals (Sweden)

    Hrvoje MATAKOVIC

    2015-03-01

    Full Text Available The first modern political parties were formed at the end of the 18th century and have, from those times up to now, undergone 4 developing phases; each of the phases is bound to ideal-type political party model: cadre parties, mass parties, catch-all parties and cartel parties. Each of these party models differentiates in various characteristics: party foundation, number of members, and way of leading the election campaigns, but also in ways of financing. This paper describes the above mentioned 4 phases of political parties’ development and 4 phases of parties' finances development; it will be analysed in detail positive and negative sides of each of the models of party financing.

  3. 78 FR 23918 - Request for Information Regarding Third Party Testing for Lead Content, Phthalate Content, and...

    Science.gov (United States)

    2013-04-23

    ... CONSUMER PRODUCT SAFETY COMMISSION [Docket No. CPSC 2011-0081] Request for Information Regarding Third Party Testing for Lead Content, Phthalate Content, and the Solubility of the Eight Elements Listed in ASTM F963-11 Correction In notice document 2013-8858 appearing on pages 22518-22520 in the issue...

  4. Development of a Handheld Line Information Reader and Generator for Efficient Management of Optical Communication Lines.

    Science.gov (United States)

    Lee, Jaeyul; Kwon, Hyungwoo; Song, Jaewon; Jeon, Mansik; Kim, Jeehyun

    2017-08-24

    A handheld line information reader and a line information generator were developed for the efficient management of optical communication lines. The line information reader consists of a photo diode, trans-impedance amplifier, voltage amplifier, microcontroller unit, display panel, and communication modules. The line information generator consists of a laser diode, laser driving circuits, microcontroller unit, and communication modules. The line information reader can detect the optical radiation field of the test line by bending the optical fiber. To enhance the sensitivity of the line information reader, an additional lens was used with a focal length of 4.51 mm. Moreover, the simulation results obtained through BeamPROP ® software from Synopsys, Inc. demonstrated a stronger optical radiation field of the fiber due to a longer transmission wavelength and larger bending angle of the fiber. Therefore, the developed devices can be considered as useful tools for the efficient management of optical communication lines.

  5. Political parties and politics on the Internet: An analysis of the websites of Catalan political parties

    Directory of Open Access Journals (Sweden)

    Albert Padró-Solanet

    2008-02-01

    Full Text Available

    The article analyses the use of New Information and Communications Technologies (NICT by the political parties, going beyond approaches focusing on the potential of these technologies for political transformation and renovation. In order to do this a set of variables that characterise the strategic position of the Catalan parties is employed: ideology, organisation and position in the electoral market. The analysis shows three different forms of usage of the Internet. One group of parties (PSC, CDC-CiU uses it to promote participation and campaigning activities; a second group (ICV, Cs, to generate new resources, and finally, a third group (PSC, ERC uses it to build contact networks. The size, and to a lesser degree the type of organisation, stand out as the major explanatory variables. The major parties use the Internet to promote campaign activities and participation; in contrast, smaller parties tend to make use of the Internet to generate new sources of financing and workforce. Depending on the type of organisation, the parties of the masses seem to be more likely to use the Internet to set up and activate an extensive contact network which recreates the characteristic associative realm of these parties in cyberspace.

  6. The Institutionalisation of the Romanian Party System

    Directory of Open Access Journals (Sweden)

    Clara Volintiru

    2012-12-01

    Full Text Available This paper explores the level of institutionalisation achieved by the Romanian political system since transitioning to democracy. Following through the key components of an institutionalised party system, the inquiry looks at the stability of interparty competition in Romania and the depth of its parties’ roots in society. These components are measured through such indicators as electoral volatility or the cohesiveness of the ideological preferences. Their levels suggest that the Romanian party system isn’t fully instituionalised, with fluctuating volatility and a rather incohesive ideological positioning of both voters and parties. This paper argues that in response to the double challenge of poor institutionalisation of the political parties and the party system as a whole, informal remedies, such as patronage of public jobs, or proprietary use of state resources, become highly attractive solutions for electoral success.

  7. 47 CFR 69.120 - Line information database.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Line information database. 69.120 Section 69...) ACCESS CHARGES Computation of Charges § 69.120 Line information database. (a) A charge that is expressed... from a local exchange carrier database to recover the costs of: (1) The transmission facilities between...

  8. Circuit parties.

    Science.gov (United States)

    Guzman, R

    2000-03-01

    Circuit parties are extended celebrations, lasting from a day to a week, primarily attended by gay and bisexual men in their thirties and forties. These large-scale dance parties move from city to city and draw thousands of participants. The risks for contracting HIV during these parties include recreational drug use and unsafe sex. Limited data exists on the level of risk at these parties, and participants are skeptical of outside help because of past criticism of these events. Health care and HIV advocates can promote risk-reduction strategies with the cooperation of party planners and can counsel individuals to personally reduce their own risk. To convey the message, HIV prevention workers should emphasize positive and community-centered aspects of the parties, such as taking care of friends and avoiding overdose.

  9. Party Animals or Responsible Men: Social Class, Race, and Masculinity on Campus

    Science.gov (United States)

    Sweeney, Brian

    2014-01-01

    Studies of collegiate party and hookup culture tend to overlook variation along social class and racial/ethnic lines. Drawing on interview data at a "party school" in the Midwest, I examine the meanings and practices of drinking and casual sex for a group of class and race-diverse fraternity men. While more privileged men draw on ideas…

  10. Danish Party Membership

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Political parties have as their main assignment the creation of linkage between citizens and government. They provide one of several channels of participation in modern democracies. Yet, the general trend across the Western world is that party membership figures decline. The purpose of this article...... is to report on the state of Danish party membership; the numbers and participation. The claim of the article is that total membership figures hide evidence of membership renewal and increases, and that mere party membership figures are insufficient when evaluating political parties as channels...... of participation. Instead, membership figures at party level as well as the participation of party members need to be taken into account in order to assess parties as channels of participation. This is supported by the analyses reported here which show that even though membership figures are declining, parties...

  11. A novel quantum scheme for secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  12. Evaluation of the British Columbia AIDS Information Line.

    Science.gov (United States)

    Parsons, D C; Bell, M A; Gilchrist, L D

    1991-01-01

    We evaluated implementation of the British Columbia AIDS Information Line during its initial 15 weeks of operation. Data collected during daily operation of the line included call frequency, caller characteristics, response patterns, caller concerns and community referrals. Information on activities and resources required to implement the AIDS Line was also assembled. The study concluded that the advertising campaign sponsored by the provincial government and other AIDS-related media events had a strong impact on the frequency of calls made to the AIDS Line. However, the effect of both advertising and media events was of relatively short duration, suggesting that utilization of an AIDS information line is dependent on continuing promotional activities. The evaluation results demonstrate the importance of continuous collection of data online utilization, to track public awareness of and response to AIDS-related issues, and to facilitate planning of public education.

  13. Authentication method for authenticating a first party to a second party

    NARCIS (Netherlands)

    2014-01-01

    An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,

  14. A novel quantum solution to secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  15. Party rules, party resources and the politics of parliamentary democracies

    DEFF Research Database (Denmark)

    Poguntke, Thomas; Scarrow, Susan; Webb, Paul

    2016-01-01

    , then investigate what it tells us about contemporary party organization in these countries, focusing on parties’ resources, structures and internal decision-making. We examine organizational patterns by country and party family, and where possible we make temporal comparisons with older data sets. Our analyses...... suggest a remarkable coexistence of uniformity and diversity. In terms of the major organizational resources on which parties can draw, such as members, staff and finance, the new evidence largely confirms the continuation of trends identified in previous research: that is, declining membership......, but enhanced financial resources and more paid staff. We also find remarkable uniformity regarding the core architecture of party organizations. At the same time, however, we find substantial variation between countries and party families in terms of their internal processes, with particular regard to how...

  16. Campaigning on behalf of the party? Party constraints on candidate campaign personalisation

    DEFF Research Database (Denmark)

    Bøggild, Troels; Pedersen, Helene Helboe

    2017-01-01

    This article analyses what makes political candidates run a party-focused or personalised election campaign. Prior work shows that candidates face incentives from voters and the media to personalise their campaign rhetoric and promises at the expense of party policy. This has raised concerns about...... that party control over the candidate nomination process and campaign financing constrains most political candidates in following electoral incentives for campaign personalisation. Using candidate survey data from the 2009 EP election campaign in 27 countries, we show how candidates from parties in which...... party officials exerted greater control over the nomination process and campaign finances were less likely to engage in personalised campaigning at the expense of the party programme. The findings imply that most parties, as central gatekeepers and resource suppliers, hold important control mechanisms...

  17. Institute of party leadership system of the party creation of modern Ukraine

    Directory of Open Access Journals (Sweden)

    I. O. Lavrenyuk

    2015-06-01

    Full Text Available This article based on the study of the theory and practice of party­building in Ukraine examines the role of party leader in the political process and the establishment of parties, implementation of the political power, the development of political consciousness and the formation of modern political elite of our country. It is alleged that party leader – a reputable, recognized in its political environment, the person chosen to lead the party and the ability of citizens to consolidate around a common goal, most effectively represent the interests of a particular social group. It is stated that the defining feature of the phenomenon of party leadership is that under conditions of constant political development and irreversibility of democratic transformations in Ukraine part of leaders of political parties in fact is a powerful talent pool for senior government officials, local government agencies and other administrative institutions. The process of creating games as an integral part of the political process is characterized by a certain way, the mechanism of action of consciousness and culture in the public sphere, which deals with political parties. Regularities component of modern political elite of the party elite acts ­ governing the range of persons in the political party headed by its leader that are directly involved in strategic decision­making, policy formulation of this power, as well as its participation in the political process. We study the classification model of national political parties and the institutions of the party leadership. It is proposed to assess the level of correlation of the party leaders and the general dynamics of the civil society in Ukraine. It is stated that at this time a fundamental change in Ukrainian Party elite has not happened yet. However, there is a long evolution of the institute of the party leadership – a rather difficult process of internal and external, objective and subjective, economic

  18. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  19. Public access of environmental information. Report of an Interdepartmental Working Party on public access to information held by Pollution Control Authorities

    International Nuclear Information System (INIS)

    1986-01-01

    The working party was set up to report to the Government ways of implementing the recommendations of the Royal Commission on Environmental Pollution that 'there should be a presumption in favour of unrestricted public access to the information which the pollution control authorities obtain or receive by virtue of their statutory powers'. Chapter 6 deals with Radioactive wastes. The present situation (eg on how the information is gathered, which department or bodies are involved etc) and the current state of the law are discussed. Licensed nuclear sites, sea disposal, inspections and defence wastes are all considered briefly. The case for improving public access to information and, recommendations on how to achieve this made, and the resource implications considered. On control of radioactive wastes there is currently no power for the responsible Government Departments to make information public. It is recommended that new legislation should confer powers to make information available, including a power to require public registers to be kept at prescribed places giving information related to certificates issued under the Radioactive Substances Act 1960. (UK)

  20. Monopolizing, Mutualizing, or Muddling Through: Factions and Party Management in Contemporary Thailand

    Directory of Open Access Journals (Sweden)

    Paul W. Chambers

    2010-01-01

    Full Text Available In democracies throughout the world, intra-party factions manifest themselves in parties and governments. Formal and informal institutions have, however, proved crucial in managing factionalism. This is especially true in Thailand’s emerging parliamentary democracy where the management of factionalism has become a major objective for Thai parties. This study explores factions and factionalism as well as how different types of parties try to manage intra-party dissension especially in the case of Thailand. The findings suggest that management style tends to be a function of a party’s organization, with parties which practice a collegial style tending to be the more successful in controlling intra-party cliques over time. At the same time, the most important tools which party leaderships can use to control factions are the careful use of constitutional provisions and manipulation of party finance.

  1. 37 CFR 1.99 - Third-party submission in published application.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Third-party submission in published application. 1.99 Section 1.99 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... Provisions Information Disclosure Statement § 1.99 Third-party submission in published application. (a) A...

  2. A protocol for the secure two-party quantum scalar product

    Energy Technology Data Exchange (ETDEWEB)

    He, Li-Bao, E-mail: helibao@mail.ustc.edu.cn [National High Performance Computing Center, Department of Computer Science and Technology, USTC, Hefei 230027 (China); Suzhou Institute for Advanced Study, USTC, Suzhou 215123 (China); Huang, Liu-Sheng; Yang, Wei; Xu, Rui [National High Performance Computing Center, Department of Computer Science and Technology, USTC, Hefei 230027 (China); Suzhou Institute for Advanced Study, USTC, Suzhou 215123 (China)

    2012-03-19

    Secure scalar product serves as an important primitive for secure multi-party computation and has a wide application in different areas, such as statistical analysis, data mining, computational geometry, etc. How to collaboratively compute the correct scalar product result without leaking any participants' private information becomes the primary principle of designing secure scalar product schemes. In this Letter, we present a secure two-party quantum scalar product scheme via quantum entanglement and quantum measurement with the help of a non-colluding third party (TP). Furthermore, the scheme is proven to be secure under various kinds of outside attacks and participant attacks. -- Highlights: ► We extend the secure two-party scalar product to the quantum field. ► Our protocol is built upon quantum entanglement and quantum measurement. ► Communication cost is acceptable if the elements of participants' private vectors are not too sparse. ► Participants will leak no private information under the no-collusion model.

  3. A protocol for the secure two-party quantum scalar product

    International Nuclear Information System (INIS)

    He, Li-Bao; Huang, Liu-Sheng; Yang, Wei; Xu, Rui

    2012-01-01

    Secure scalar product serves as an important primitive for secure multi-party computation and has a wide application in different areas, such as statistical analysis, data mining, computational geometry, etc. How to collaboratively compute the correct scalar product result without leaking any participants' private information becomes the primary principle of designing secure scalar product schemes. In this Letter, we present a secure two-party quantum scalar product scheme via quantum entanglement and quantum measurement with the help of a non-colluding third party (TP). Furthermore, the scheme is proven to be secure under various kinds of outside attacks and participant attacks. -- Highlights: ► We extend the secure two-party scalar product to the quantum field. ► Our protocol is built upon quantum entanglement and quantum measurement. ► Communication cost is acceptable if the elements of participants' private vectors are not too sparse. ► Participants will leak no private information under the no-collusion model.

  4. What do Parties Want?

    DEFF Research Database (Denmark)

    Pedersen, Helene Helboe

    2012-01-01

    What parties want – policy, office or votes - is important to how they represent their voters, how they make strategic decisions and how they respond to external changes in society. What parties strive to accomplish is simply important to what they do. Moreover, our knowledge of what parties want...... is important to what we expect them to do. For instance, coalition theory assumes that parties have homogeneous goals, and hence are equally likely to join coalitions given the same circumstances. However, this article investigates this basic assumption of party goal homogeneity and finds that party goals do...

  5. Low Membership in Czech Political Parties: Party Strategy or Structural Determinants?

    Czech Academy of Sciences Publication Activity Database

    Linek, Lukáš; Pecháček, Š.

    2007-01-01

    Roč. 23, č. 2 (2007), s. 259-275 ISSN 1352-3279 R&D Projects: GA MPS 1J004/04-DP1 Institutional research plan: CEZ:AV0Z70280505 Keywords : political parties * party membership * antiparty sentiments * party organization Subject RIV: AD - Politology ; Political Sciences

  6. Parties heed (with caution): Public knowledge of and attitudes towards party finance in Britain.

    Science.gov (United States)

    vanHeerde-Hudson, Jennifer; Fisher, Justin

    2013-01-01

    Despite comprehensive reform ( Political Parties, Elections and Referendums Act ) and recent review (Phillips Review in 2007) of party finance in Britain, public opinion of party finance remains plagued by perceptions of corruption, undue influence from wealthy donors, carefree and wasteful spending and, more generally, from the perception that there is just 'too much money' in politics. In this article we argue that knowledge of and attitudes to party finance matter, not least because advocates of reform have cited public opinion as evidence for reform. However, because attitudes to party finance are part of a broader attitudinal structure, opinion-led reforms are unlikely to succeed in increasing public confidence. Using data generated from YouGov's online panel (N=2,008), we demonstrate that the public know little of the key provisions regulating party finance and attitudes to party finance can be explained along two underlying dimensions - Anti-Party Finance and Reformers . As such, we consider whether parties and politicians should be freed from the constraints of public opinion in reforming party finance.

  7. Means of discourse manipulations in political party programs in Spain

    Directory of Open Access Journals (Sweden)

    Irina V. Smirnova

    2014-01-01

    Full Text Available Thanks to different mass media sources, members of any society are well aware of political developments and events and politicians. Every person has his or her own formed political beliefs and affirmations, interpreters other people's actions during political developments and evaluates events that take place. Political forces, in turn, see a person (a potential elector as an object of external information influence. This lets them use political communication when competing for the power. In the modern democratic society this competition is carried out via parliamentarian debates, politicians' speeches, examining political parties' programs, political agitation and voting. General audience-oriented political discourse implements its function of political information influence. As the goal of any political party's program (as an independent form of text in the system of political discourse is to win the elections and come to power, thus the audience influence function is one of the most fundamental and serve as the basis for the text. The text of a program itself is characterized by its persuasive orientation towards the audience, which reveal itself in such methods as convincing, argumentation, manipulation and evaluation. All the political programs pertain to parties which are at the power or which are in opposition. The main characteristic of oppositional programs is the criticism of the power, vice versa, the dominant party's programs confirm the correctness of their policy. All the political programs are multi-authored. The written form of any political program lets put into practice a detailed text analysis. This article presents the analysis of the texts of two leading Spanish political parties (the Spanish socialist worker's party and the people's party of Spain.

  8. Third party processing

    International Nuclear Information System (INIS)

    Clark, S.

    1997-01-01

    The importance of Canada's natural gas industry to remain competitive on a global level was discussed. Third party processing is a tool that the Canadian gas industry can use to overcome the relative disadvantage of smaller, and therefore more expensive, gas processing plants in Canada, and to maintain, and even improve, its competitive position vis-a-vis its US counterparts. The principal role of a third party processor is to provide midstream services such as raw gas gathering, field compression, gas processing, sales gas transmission, and natural gas liquids fractionation. Some third party processors also provide marketing services. Third party processors add value to the gas producer by reducing risk, reducing cost, improving reliability, and improving netbacks. The many variables involved in determining the economic viability of third party processing, including the quantity and deliverability of the raw resource, facility capacity, capital investment, operating costs, technology, fee structures, operational reliability, and speed, among others, were examined and the significance of each variable was explained

  9. Looking Under the Hood of Third-Party Punishment Reveals Design for Personal Benefit.

    Science.gov (United States)

    Krasnow, Max M; Delton, Andrew W; Cosmides, Leda; Tooby, John

    2016-03-01

    Third-party intervention, such as when a crowd stops a mugger, is common. Yet it seems irrational because it has real costs but may provide no personal benefits. In a laboratory analogue, the third-party-punishment game, third parties ("punishers") will often spend real money to anonymously punish bad behavior directed at other people. A common explanation is that third-party punishment exists to maintain a cooperative society. We tested a different explanation: Third-party punishment results from a deterrence psychology for defending personal interests. Because humans evolved in small-scale, face-to-face social worlds, the mind infers that mistreatment of a third party predicts later mistreatment of oneself. We showed that when punishers do not have information about how they personally will be treated, they infer that mistreatment of other people predicts mistreatment of themselves, and these inferences predict punishment. But when information about personal mistreatment is available, it drives punishment. This suggests that humans' punitive psychology evolved to defend personal interests. © The Author(s) 2016.

  10. Mediated Leader Effects: The Impact of Newspapers’ Portrayal of Party Leadership on Electoral Support

    NARCIS (Netherlands)

    Aaldering, L.; van der Meer, T.; van der Brug, W.

    2018-01-01

    Conventional wisdom holds that party leaders matter in democratic elections. As very few voters have direct contact with party leaders, media are voters’ primary source of information about these leaders and, thus, the likely origin of leader effects on party support. Our study focuses on these

  11. FORMATION OF THE ENTITY'S ACCOUNTING POLICIES WITH REGARD TO RELATED PARTIES

    Directory of Open Access Journals (Sweden)

    B. Zasadnyi

    2015-10-01

    Full Text Available The article solved the problem concerning the development and practical application of accounting policies with regards to related parties. One element of the company’s accounting policies is to establish the principles of classification of related parties and their list considering materiality relations. In addition, the company must determine its related entities for the purposes of transfer pricing. Based the criteria definition and classification of related parties, proposed that the significance of the impact of one party to another based on the content of operations, their volume, the results and how such operations significantly affect the financial, investment and commercial activities. Only an analysis of all the factors together contribute to reliable estimates list of related parties. The critical analysis are made of methods for determining transfer prices for transactions, designed piece order of accounting policies, which reflected information about related parties.

  12. About green political parties

    Directory of Open Access Journals (Sweden)

    Orlović Slobodan P.

    2015-01-01

    Full Text Available In this work the author refers to some legal and political questions in connection with green political parties. Those questions cover: the ideology of green political parties, their number and influence, both in general and in Serbia. The first part of work is generally speaking about political parties - their definition, ideology, role and action. Main thesis in this work is that green political parties, by their appearance, were something new on the political scene. But quickly, because of objective and subjective reasons, they were changing original ideas and were beginning to resemble to all other political parties. In this way, they lost their vanguard and political alternativeness.

  13. Selfish third parties act as peacemakers by transforming conflicts and promoting cooperation.

    Science.gov (United States)

    Halevy, Nir; Halali, Eliran

    2015-06-02

    The tremendous costs of conflict have made humans resourceful not only at warfare but also at peacemaking. Although third parties have acted as peacemakers since the dawn of history, little is known about voluntary, informal third-party intervention in conflict. Here we introduce the Peacemaker Game, a novel experimental paradigm, to model and study the interdependence between disputants and third parties in conflict. In the game, two disputants choose whether to cooperate or compete and a third party chooses whether or not to intervene in the conflict. Intervention introduces side payments that transform the game disputants are playing; it also introduces risk for the third party by making it vulnerable to disputants' choices. Six experiments revealed three robust effects: (i) The mere possibility of third-party intervention significantly increases cooperation in interpersonal and intergroup conflicts; (ii) reducing the risk to third parties dramatically increases intervention rates, to everyone's benefit; and (iii) disputants' cooperation rates are consistently higher than third parties' intervention rates. These findings explain why, how, and when self-interested third parties facilitate peaceful conflict resolution.

  14. 18 CFR 37.5 - Obligations of Transmission Providers and Responsible Parties.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Obligations of Transmission Providers and Responsible Parties. 37.5 Section 37.5 Conservation of Power and Water Resources... ACCESS SAME-TIME INFORMATION SYSTEMS § 37.5 Obligations of Transmission Providers and Responsible Parties...

  15. Straight-Line: A nuclear material storage information management system

    International Nuclear Information System (INIS)

    Nilsen, C.; Mangan, D.

    1995-01-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to: (1) Provide the right sensor information to the right user immediately. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia's Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project

  16. Straight-Line: A nuclear material storage information management system

    Energy Technology Data Exchange (ETDEWEB)

    Nilsen, C.; Mangan, D.

    1995-07-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to: (1) Provide the right sensor information to the right user immediately. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia`s Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project.

  17. Golkar Party's Political Communications the New Paradigm Bakrie Leadership 2009-2013

    Directory of Open Access Journals (Sweden)

    Khoiruddin Muchtar

    2013-11-01

    Full Text Available This study base on the efforts of the Golkar Party's to the process of interpretation, socialization, and implementation of the new paradigm, the paradigm guide to reformations Golkar Party's become to democratic, independent, solid, strong, foundamental, and responsive. How Golkar party's political communication about socialization and implementation of a new paradigm of Golkar Party's leadership Aburizal Bakrie-year period from 2009 to 2012.The aim of this research is to study and overview of the process of socialization and implementation new paradigm Golkar Party's of the Aburizal Bakrie’s leadership. This contect described to using constructivist paradigm through the theory of Performance of Communication and Structuration. Research using the case study method. Data obtained by participation observer, unstructured interviews, and documentary study. The data also collected from informants. The results of this research show: 1 The Golkar Party's has a very significant infrastructure, so the making easier to socialization new paradigm to internal party, but Golkar Party's can not erase stigma society as the New Order party. Socializing new paradigm Golkar Party's to be done in integrated, systematic and continuous addressed to all cadres of various levels from the center to the village. 2 the new paradigm Golkar Party's ideals as the basis and foundation values stand for the Golkar Party's, the implementation is faced with the reality of the condition of the various political considerations and the interests of power, so it can not shown the Golkar Party's political communication with the direction of the reality, Golkar Party's must be have to political communication with the role of multi faces.

  18. Tri-party agreement databases, access mechanism and procedures. Revision 2

    International Nuclear Information System (INIS)

    Brulotte, P.J.

    1996-01-01

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc

  19. Political Parties and Innovation

    DEFF Research Database (Denmark)

    Bischoff, Carina Saxlund; Christiansen, Flemming Juul

    2017-01-01

    parties themselves as well their impact on potentially innovative public decisions. One major expectation is that hierarchical parties with centralized leadership make more efficient decisions but that sustainable innovation outcomes promoted by collaborative efforts are easier to obtain for decentralized...... political parties with participatory internal democratic processes....

  20. Political Market Orientation and Strategic Party Postures in Danish Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Henneberg, Stephan

    2011-01-01

    Purpose – This paper investigates the relationship between the strategic postures and political market orientation profile of two Danish parties. Profile stability at the organisational level is used as a control variable. Design/methodology/approach – The strategic political postures of two Danish...... parties are derived using a self-typing study. Based on configuration theory, ideal organisational profiles to implement these studies are juxtaposed with the actual political market orientation profile for each party, gained from two datasets analysed using Partial Least Squares. Member activity levels...... Ideologist. Thus, Party A exhibits a mismatch between strategic orientation and implemented organisational profile, based on configuration theory. The results were generally stable across political activity levels. Originality/value – The study contributes to understanding the concept of market orientation...

  1. FEDIX on-line information service: Design, develop, test, and implement an on-line research and education information service. Annual status report, September 1992--August 1993

    Energy Technology Data Exchange (ETDEWEB)

    Rodman, J.A.

    1993-08-01

    Federal Information Exchange, Inc. (FIE) is a diversified information services company that is recognized as the major electronic link between the higher education community and the Federal government in the field of research administration. FIE provides a range of information related services to the government, academic and private sectors, including database management, software development and technical support. FEDIX is the on-line information service designed, developed and implemented by FIE to accomplish the following objectives: (1). Broaden the participation of the education community in Federal research and education programs by providing free and unrestricted on-line access to information from all participating Federal agencies; and (2). Provide the education community with on-line access to a single keyword-searchable system for research and educational funding opportunities at the participating Federal agencies.

  2. Intra-party democracy beyond aggregation

    DEFF Research Database (Denmark)

    Wolkenstein, Fabio

    2016-01-01

    , discussing several functions intra-party deliberation is said to serve in the democratic theory literature. It then goes on to explore the deliberative credentials of political discussion between party members, drawing on group interviews with party members in two Social Democratic parties in Germany...

  3. Third-Party Incentive Strategies and Conflict Management in Africa

    DEFF Research Database (Denmark)

    Emmanuel, Nikolas G.

    2016-01-01

    Dr. Nikolas Emmanuel's examines the use of an incentives approach in managing intrastate conflict in Africa because in many cases, risks and costs make applications of hard power alone unfeasible. Furthermore, simply ignoring episodes of civil conflict in the hope that they will "burn themselves...... out"� does not appear to be a viable alternative. That said, both noncoercive and coercive incentive strategies exist and have been deployed by third parties in a variety of conflict situations. Such incentives seek to manage conflict by encouraging political bargaining. The clear intention...... parties can help manage conflicts. Second, it offers a typology of the available incentive strategies, classifying them along noncoercive and coercive lines. Thus, the article outlines the possibilities offered by an incentives approach, focusing on examples drawn from recent African cases....

  4. Straight-Line -- A nuclear material storage information management system

    International Nuclear Information System (INIS)

    Nilsen, C.; Mangan, D.

    1995-01-01

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to (1) Provide the right sensor information to the right user in a timely manner. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia's Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project

  5. Straight-Line -- A nuclear material storage information management system

    Energy Technology Data Exchange (ETDEWEB)

    Nilsen, C. [Sandia National Labs., Livermore, CA (United States); Mangan, D. [Sandia National Labs., Albuquerque, NM (United States)

    1995-12-31

    Sandia National Laboratories is developing Straight-Line -- a pilot system to demonstrate comprehensive monitoring of nuclear material in storage. Straight-Line is an integrated system of sensors providing information that will enhance the safety, security, and international accountability of stored nuclear material. The goals of this effort are to (1) Provide the right sensor information to the right user in a timely manner. (2) Reduce the expenses, risks, and frequency of human inspection of the material. (3) Provide trustworthy data to international inspectors to minimize their need to make on site inspections. In pursuit of these goals, Straight-Line unites technology from Sandia`s Authenticated Item Monitoring System (AIMS) and other programs to communicate the authenticated status of the monitored item back to central magazine receivers. Straight-Line, however, incorporates several important features not found in previous systems: (1) Information Security -- the ability to collect and safely disseminate both classified and unclassified sensor data to users on a need-to-know basis. (2) Integrate into a single system the monitoring needs of safety, security, and international accountability. (3) Incorporate the use of sensors providing analog or digital output. This paper will present the overall architecture and status of the Straight-Line project.

  6. Political Market Orientation and Strategic Party Postures in Danish Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Henneberg, Stephan

    2011-01-01

    Purpose – This paper investigates the relationship between the strategic postures and political market orientation profile of two Danish parties. Profile stability at the organisational level is used as a control variable. Design/methodology/approach – The strategic political postures of two Danish...... are used to control for organisational stability. Findings – The self-typing study revealed that Party A was perceived to follow a Relationship Builder posture, and Party B a Convinced Ideologist posture. However, both market orientation profiles resembled the organisational structures of a Convinced...... in the political sphere. More specifically it empirically links political market orientation as an issue of political marketing implementation on the one hand, and strategic postures of parties as a strategic issue on the other, following a configuration theory logic. Research limitations...

  7. Book Review: Training the Party: Party Adaptation and Elite Training in Reform-era China

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik

    2016-01-01

    Review of: Training the Party: Party Adaptation and Elite Training in Reform-era China. Charlotte P. Lee . Cambridge: Cambridge University Press, 2015. xii + 251 pp. $99.99. ISBN 978-1-107-09063-7......Review of: Training the Party: Party Adaptation and Elite Training in Reform-era China. Charlotte P. Lee . Cambridge: Cambridge University Press, 2015. xii + 251 pp. $99.99. ISBN 978-1-107-09063-7...

  8. Current Problems of Trade Union-Party Relations in Switzerland: Reorientation Versus Inertia

    Science.gov (United States)

    Siegenthaler, Jurg K.

    1975-01-01

    The postwar realignment of union-party relations in Switzerland severed old formal ties but left some important links undisturbed; practical and effective cooperation on legislative items supports current informal union-party alliances. Major current problems include the unions' demand for codetermination in industry and the huge numbers of…

  9. Gendering transnational party politics

    DEFF Research Database (Denmark)

    Kantola, Johanna; Rolandsen-Agustín, Lise

    2016-01-01

    research traditions, we build toward an analytical framework to study gender and transnational party politics. Our empirical analysis focuses on two policy issues, the economic crisis and the sexual and reproductive health and rights, analyzing European Parliament reports, debates and voting on the issues...... from 2009 to 2014. By focusing on gender equality constructions and the way in which consensus and contestation are built around them within and between party groups, we argue that shared constructions about gender equality are issue specific and change over time. Consensus breaks down along the left......In this article, we analyze transnational party politics in the European Union from a gender perspective. This is a subject that has been neglected both by mainstream European studies on party politics and by gender scholars who work on political parties. Drawing on the insights of these two...

  10. Corporate Governance and Related Parties Transactions - Evidence from Romanian Listed Companies

    Directory of Open Access Journals (Sweden)

    Iuliana Oana MIHAI

    2017-06-01

    Full Text Available The objective of this work is to offer contributions to improve the understanding of related party transactions. Our goal is to explore the role of related party transactions from the perspective of company�s corporate governance environment. Even though there is a growing interest in related party transactions, there is little academic literature to understand the nature of related party transactions and their economic consequences. Our study was conducted on a sample of 40 companies listed companies on Bucharest Stock Exchange activating in manuafacuring sector. Our objective was to analyse the way the companies follow the requirements of transparency of related party transaction. Based on our observations on companies� financial reports and companies web-sites, the level of transparency between these companies was reflected by an index estimated from producers� scores on Likert-type scales (one to five that showed to what extent they disclose or not disclose information such as relationship between parents and subsidiaries, key management personnel compensation, the value of transactions with related parties or separate disclosure for the group entities.

  11. 16 CFR 1507.11 - Party poppers.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Party poppers. 1507.11 Section 1507.11... FIREWORKS DEVICES § 1507.11 Party poppers. Party poppers (also known by other names such as “Champagne Party Poppers,” and “Party Surprise Poppers,”) shall not contain more than 0.25 grains of pyrotechnic...

  12. Third-party reproduction in the Internet Age: the new, patient-centered landscape.

    Science.gov (United States)

    Woodward, Julia T

    2015-09-01

    The rise of the Internet Age has brought a host of sweeping changes to the landscape of third-party reproduction. What began as a dyadic relationship between doctor and patient has evolved into a more complex system in which patients are able to access information online from a variety of external sources. Patients often seek to play a more active role in their third-party reproductive care, and the Internet allows them to do so. Further, demand for both medical and psychosocial information about donors and donor-conceived siblings, available online through patient forums and genetic registries, has altered the perception of gamete donation from a one-time event to an ongoing relationship. The advantages and disadvantages for patients and providers of this freer flow of information between third-party participants are examined. Search motivations of recipients and offspring, as well as types of information sought, are detailed. Recommendations are made regarding strategies fertility programs can use to optimally support their patients and navigate this new landscape. Copyright © 2015 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  13. TIGER/Line Shapefile, 2013, Series Information File for the Current All Lines Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  14. Billing third party payers for pharmaceutical care services.

    Science.gov (United States)

    Poirier, S; Buffington, D E; Memoli, G A

    1999-01-01

    To describe the steps pharmacists must complete when seeking compensation from third party payers for pharmaceutical care services. Government publications; professional publications, including manuals and newsletters; authors' personal experience. Pharmacists in increasing numbers are meeting with success in getting reimbursed by third party payers for patient care activities. However, many pharmacists remain reluctant to seek compensation because they do not understand the steps involved. Preparatory steps include obtaining a provider/supplier number, procuring appropriate claim forms, developing data collection and documentation systems, establishing professional fees, creating a marketing plan, and developing an accounting system. To bill for specific patient care services, pharmacists need to collect the patient's insurance information, obtain a statement of medical necessity from the patient's physician, complete the appropriate claim form accurately, and submit the claim with supporting documentation to the insurer. Although many claims from pharmacists are rejected initially, pharmacists who work with third party payers to understand the reasons for denial of payment often receive compensation when claims are resubmitted. Pharmacists who follow these guidelines for billing third party payers for pharmaceutical care services should notice an increase in the number of paid claims.

  15. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  16. Motivated Reasoning and Political Parties: Evidence for Increased Processing in the Face of Party Cues

    DEFF Research Database (Denmark)

    Petersen, Michael Bang; Skov, Martin; Serritzlew, Søren

    2013-01-01

    . As part of the latter processes, the presence of party cues would make individuals engage in effortful motivated reasoning to produce arguments for the correctness of their party’s position. Following psychological research, we use response latency to measure processing effort and, in support......Extant research in political science has demonstrated that citizens’ opinions on policies are influenced by their attachment to the party sponsoring them. At the same time, little evidence exists illuminating the psychological processes through which such party cues are filtered. From...... the psychological literature on source cues, we derive two possible hypotheses: (1) party cues activate heuristic processing aimed at minimizing the processing effort during opinion formation, and (2) party cues activate group motivational processes that compel citizens to support the position of their party...

  17. Partis islamistes et démocratisation : expérience du Parti de la ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Partis islamistes et démocratisation : expérience du Parti de la justice et du développement (Turquie). En Turquie, les élections de novembre 2002 ont été remportées par un nouveau parti politique d'orientation islamiste, l'AKP, qui détient environ les deux tiers des sièges au Parlement. La victoire de l'AKP traduit ...

  18. Partying as Everyday Life

    DEFF Research Database (Denmark)

    Demant, Jakob; Østergaard, Jeanette

    2007-01-01

    situates the event in everyday life. By drawing on Maffesoli's (1996) concept of ‘sociality' and Lincoln's (2005) concept of zoning the spatial and social logic of the house, partying is analysed using both qualitative and quantitative material. The analysis suggests that the consumption of alcohol (i.......e. collective intoxication) is one way the parents' dining room is transformed creatively into a space for teenage partying. Hence, the social logic of a party is to consume alcohol collectively as it symbolises commitment to both the party and to the specific group of friends. Finally, attention is drawn...... to reaffirm friendship and is therefore an integrated part of adolescents' everyday life.  ...

  19. SITE COMPREHENSIVE LISTING (CERCLIS) (Superfund) - Responsible Parties at CERCLIS Sites

    Data.gov (United States)

    U.S. Environmental Protection Agency — Responsible Parties at CERCLIS Sites - The Comprehensive Environmental Response, Compensation and Liability Information System (CERCLIS) (Superfund) Public Access...

  20. Political Party Songs: Analysis of the Theme in a Song Topo By ...

    African Journals Online (AJOL)

    It was through these songs that followers of different political parties expressed their feelings of sadness, happiness or hope. This paper analyses one song titled Topo by the band named Setlamo which was said to be aligned to Basotho Congress Party. Informed by New Criticism theory, the paper analyses the lyrics in the ...

  1. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  2. Promoting Party Politics in Emerging Democracies

    NARCIS (Netherlands)

    Burnell, P.; Gerrits, A.

    2010-01-01

    This opening section briefly introduces international political party support, that is, assistance to political parties by international organizations, mostly from the US and Europe, to strengthen individual political parties, to promote peaceful interaction between parties and to help to create a

  3. The ties that bind: bonding versus bridging social capital and college student party attendance.

    Science.gov (United States)

    Buettner, Cynthia K; Debies-Carl, Jeffrey S

    2012-07-01

    This study explored the relationship between bonding and bridging social capital and college student attendance at alcohol-present parties, a common method for building informal social networks. A random sample of students (n = 6,291; 52% female) from a large public midwestern university completed a survey regarding their alcohol use and party-related behaviors on targeted weekends. The survey also included questions regarding students' living arrangements, romantic relationships, and membership in student and community organizations. Based on a dichotomous logistic regression analysis, we concluded that the act of attending parties largely serves as a complement to, rather than a substitute for, more conventional and formal social capital. Membership in bonding groups is associated with increased odds of party attendance, and bridging exerts no direct effect on party attendance. However, bridging capital does mitigate the effect of bonding capital, reducing its apparent tendency to promote or contribute to partying. Off-campus parties may offer an informal supplement to more conventional social capital as students establish themselves in their new context. These findings may have implications for structural decisions (e.g., number of roommates) as well as the design of context-based prevention programs that address students' need to quickly build social capital without exposing both themselves and the students around them to the harms associated with high-risk drinking.

  4. Efficient and Secure Comparison for On-Line Auctions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Krøigaard, Mikkel; Geisler, Martin Joakim

    2007-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol and makes it more efficient than previous solutions. Our protocol is well-suited for application in on-line auctions, both...... with respect to functionality and performance. It minimizes the amount of information bidders need to send, and for comparison of 16 bit numbers with security based on 1024 bit RSA (executed by two parties), our implementation takes 0.28 seconds including all computation and communication. Using precomputation...

  5. Departies: conceptualizing extended youth parties

    DEFF Research Database (Denmark)

    Fjær, Eivind Grip; Tutenges, Sébastien

    2017-01-01

    Every year, millions of young people travel away from home to party for days or weeks on end in permissive environments, such as music festivals, dance parties, and nightlife resorts. The studies that have been conducted on these extended youth parties have focused primarily on specific risk...

  6. 17 CFR 248.10 - Limits on disclosure of nonpublic personal information to nonaffiliated third parties.

    Science.gov (United States)

    2010-04-01

    ...: Privacy of Consumer Financial Information and Safeguarding Personal Information Limits on Disclosures... customer opens an on-line account with you and agrees to receive the notices required in paragraph (a)(1) of this section electronically, and you allow the customer to opt out by any reasonable means within...

  7. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  8. Democracy, the Party, and Self-Emancipation

    NARCIS (Netherlands)

    Raekstad, P.

    2017-01-01

    The Party is once again the subject of sustained discussion among academics and popular movements. Jodi Dean’s most recent book, Crowds and Party, is an attempt to re-think the party form for contemporary politics after the experiences and lessons of Occupy. Crowds and Party is engaging and

  9. 78 FR 51696 - Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite...

    Science.gov (United States)

    2013-08-21

    ... Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite Wood Products..., concerning a third-party certification framework for the formaldehyde standards for composite wood products... INFORMATION CONTACT. List of Subjects in 40 CFR Part 770 Environmental protection, Composite wood products...

  10. Political parties and forestry relations in Turkey’s general elections in 2015

    Directory of Open Access Journals (Sweden)

    Erdoğan Atmış

    2016-07-01

    Full Text Available Political parties have important roles in the political decision making process on identifying the demand for public goods and services. In this context, political parties have significant impacts on identification and implementation of forestry policies. Their election manifestos/declarations have statements on forests and forestry, which are important sources of information for those parties' forestry policies. In this study, election manifestos of 11 parties that participated in the general elections that took place on June 7, 2015 and November 1, 2015 in Turkey were studied. Data were analysed with “Document Analyses” and “Content Analyses”, then evaluated under eight titles. As a result of these assessments, the conclusion was that; there are significant differences between the parties' approaches to forests: some of them consider the forest not as an entity but as a source of income, developing populist discourses that are sure to appeal to the general public, through ambitious or impossible promises. It can also be said that the political parties fail to base their views on forests on reliable data.

  11. THIRD PARTY SANCTIONS IN GAMES WITH COMMUNICATION

    OpenAIRE

    Obłój Jan; Abramczuk Katarzyna

    2017-01-01

    This paper discusses the relation between communication and preservation of social norms guarded by third-party sanctions. In 2001 Jonathan Bendor and Piotr Swistak derived deductively the existence of such norms from a simple boundedly rational choice model. Their analysis was based on a perfect public information case. We take into account communication and analyse at the micro level the process of production and interpretation of information on which decisions are based. We show that when ...

  12. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  13. Latin American intra-party democracy

    Directory of Open Access Journals (Sweden)

    Aldo Adrián Martínez Hernández

    2017-12-01

    Full Text Available Research proposes to determine the level of internal democracy of political parties in Latin America from perception of its members, allowing the creation of an index that has parameters for the measurement and comparison of the parties according to its democratic features. At the same time, research supports designing a profile of the parties by subjecting to analysis the relationship between ideology and internal democracy, stressing that despite the differences between left and right, parties in Latin America do not have dichotomous democratic features, while maintaining low levels despite their ideological location.

  14. Consumer Behavior Under Conflicting Information Provided by Interested Parties: Implications for Equilibrium in the Market for Credence Goods.

    Science.gov (United States)

    Russo, Carlo; Tufi, Eleonora

    2016-01-01

    Incomplete information in food consumption is a relevant topic in agricultural economics. This paper proposes a theoretical model describing consumer behavior, market equilibrium and public intervention in an industry where consumers must rely on the information of interested parties such as producers or associations. We provide simple game theory model showing the link between price competition and the strategic use of information. If information are unverifiable (as in the case of credence attributes) firms may have no incentive to advertise true claims and consumer decisions may be biased. Our model incorporates the opportunistic behavior of self-interested information providers. The result is a model of competition in prices and information finding a potential for market failure and public intervention. In the paper we discuss the efficiency of three possible regulations: banning false claims, subsidizing advertising campaigns, and public statement if favor of true claims. In that context, some recent patents related to both the regulatory compliance in communication and to the reduction of asymmetric information between producers and consumers have been considered. Finally, we found that the efficiency of these policy tools is affected by the reputation of trustworthiness of the firms.

  15. Twitter-Based Analysis of the Dynamics of Collective Attention to Political Parties.

    Science.gov (United States)

    Eom, Young-Ho; Puliga, Michelangelo; Smailović, Jasmina; Mozetič, Igor; Caldarelli, Guido

    2015-01-01

    Large-scale data from social media have a significant potential to describe complex phenomena in the real world and to anticipate collective behaviors such as information spreading and social trends. One specific case of study is represented by the collective attention to the action of political parties. Not surprisingly, researchers and stakeholders tried to correlate parties' presence on social media with their performances in elections. Despite the many efforts, results are still inconclusive since this kind of data is often very noisy and significant signals could be covered by (largely unknown) statistical fluctuations. In this paper we consider the number of tweets (tweet volume) of a party as a proxy of collective attention to the party, identify the dynamics of the volume, and show that this quantity has some information on the election outcome. We find that the distribution of the tweet volume for each party follows a log-normal distribution with a positive autocorrelation of the volume over short terms, which indicates the volume has large fluctuations of the log-normal distribution yet with a short-term tendency. Furthermore, by measuring the ratio of two consecutive daily tweet volumes, we find that the evolution of the daily volume of a party can be described by means of a geometric Brownian motion (i.e., the logarithm of the volume moves randomly with a trend). Finally, we determine the optimal period of averaging tweet volume for reducing fluctuations and extracting short-term tendencies. We conclude that the tweet volume is a good indicator of parties' success in the elections when considered over an optimal time window. Our study identifies the statistical nature of collective attention to political issues and sheds light on how to model the dynamics of collective attention in social media.

  16. Twitter-Based Analysis of the Dynamics of Collective Attention to Political Parties.

    Directory of Open Access Journals (Sweden)

    Young-Ho Eom

    Full Text Available Large-scale data from social media have a significant potential to describe complex phenomena in the real world and to anticipate collective behaviors such as information spreading and social trends. One specific case of study is represented by the collective attention to the action of political parties. Not surprisingly, researchers and stakeholders tried to correlate parties' presence on social media with their performances in elections. Despite the many efforts, results are still inconclusive since this kind of data is often very noisy and significant signals could be covered by (largely unknown statistical fluctuations. In this paper we consider the number of tweets (tweet volume of a party as a proxy of collective attention to the party, identify the dynamics of the volume, and show that this quantity has some information on the election outcome. We find that the distribution of the tweet volume for each party follows a log-normal distribution with a positive autocorrelation of the volume over short terms, which indicates the volume has large fluctuations of the log-normal distribution yet with a short-term tendency. Furthermore, by measuring the ratio of two consecutive daily tweet volumes, we find that the evolution of the daily volume of a party can be described by means of a geometric Brownian motion (i.e., the logarithm of the volume moves randomly with a trend. Finally, we determine the optimal period of averaging tweet volume for reducing fluctuations and extracting short-term tendencies. We conclude that the tweet volume is a good indicator of parties' success in the elections when considered over an optimal time window. Our study identifies the statistical nature of collective attention to political issues and sheds light on how to model the dynamics of collective attention in social media.

  17. 10 CFR 708.27 - May the Hearing Officer recommend mediation to the parties?

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false May the Hearing Officer recommend mediation to the parties... Investigation, Hearing and Decision Process § 708.27 May the Hearing Officer recommend mediation to the parties... complaint through mediation or other informal means at any time before issuance of an initial agency...

  18. Party Members in Context. Social networks and local branches as context for party membership

    OpenAIRE

    Paulis, Emilien

    2018-01-01

    In this doctoral dissertation, I put party members and activists back in context. I stress theimportance of two contextual dimensions, often overlooked in the scientific literature. On theone hand, I put forward social network explanations of party membership and activism,emphasizing the importance of social interactions, relations and structures, which were scarcelyexplored as potential triggers. Like other forms of participation, party membership haspredominantly been portrayed through indi...

  19. Constituents of political cognition: Race, party politics, and the alliance detection system.

    Science.gov (United States)

    Pietraszewski, David; Curry, Oliver Scott; Petersen, Michael Bang; Cosmides, Leda; Tooby, John

    2015-07-01

    Research suggests that the mind contains a set of adaptations for detecting alliances: an alliance detection system, which monitors for, encodes, and stores alliance information and then modifies the activation of stored alliance categories according to how likely they will predict behavior within a particular social interaction. Previous studies have established the activation of this system when exposed to explicit competition or cooperation between individuals. In the current studies we examine if shared political opinions produce these same effects. In particular, (1) if participants will spontaneously categorize individuals according to the parties they support, even when explicit cooperation and antagonism are absent, and (2) if party support is sufficiently powerful to decrease participants' categorization by an orthogonal but typically-diagnostic alliance cue (in this case the target's race). Evidence was found for both: Participants spontaneously and implicitly kept track of who supported which party, and when party cross-cut race-such that the race of targets was not predictive of party support-categorization by race was dramatically reduced. To verify that these results reflected the operation of a cognitive system for modifying the activation of alliance categories, and not just socially-relevant categories in general, an identical set of studies was also conducted with in which party was either crossed with sex or age (neither of which is predicted to be primarily an alliance category). As predicted, categorization by party occurred to the same degree, and there was no reduction in either categorization by sex or by age. All effects were replicated across two sets of between-subjects conditions. These studies provide the first direct empirical evidence that party politics engages the mind's systems for detecting alliances and establish two important social categorization phenomena: (1) that categorization by age is, like sex, not affected by alliance

  20. Two-party quantum key agreement based on four-particle GHZ states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  1. Party drugs - use and harm reduction.

    Science.gov (United States)

    Frei, Matthew

    2010-08-01

    Party drug use, the intermittent use of stimulants, ecstasy and so-called 'designer drugs' at dance parties or 'raves', is now part of the culture of many young Australians. This article discusses the risks associated with the use of 'party drugs' and describes an useful approach to general practitioner assessment and management of patients who may be using party drugs. Party drug use is associated with a range of harms, including risks associated with behaviour while drug affected, toxicity and overdose, mental health complications and physical morbidity. Multiple substance use, particularly combining sedatives, further amplifies risk. If GPs have some understanding of these drugs and their effects, they are well placed to provide an effective intervention in party drug users by supporting the reduction of harm.

  2. The Differentiation of Parties through the Lens of an Electoral Campaign

    Directory of Open Access Journals (Sweden)

    Rossana Sampugnaro

    2015-03-01

    Full Text Available Parties restructure their organizations to prepare themselves for new challenges. In many cases, the changes involve a reduction of the subsystems structure, dropping the number of territorial units or finding leaner solutions and outsourcing of activities which were once fulfilled within the boundaries of the party organization. Specifically, the phenomenon of outsourcing concerns, on the one hand, aggregation of interests and policymaking and, on the other, electoral mobilization and management of political communication. Looking for new solutions – flexible, without a unique centre – can lead to a process of de-differentiation that characterizes organization in postmodern society: a new definition of levels of hierarchy and "transgression of boundaries", through a continuous exchange of resources with the environment, which is unpredictable and constantly changing. As in other organizations, parties en-courage the formation of horizontal links with new external actors - associations, informal groups, indi-viduals and influencers - in order to build networks that cooperate to exchange essential resources for the party itself. In this framework, the study aims to interpret de-differentiation in political parties from a specific point of view: the analysis of political campaigns as indicators of this process. The “outside campaign”, created by a set of non-party actors, is growing: the sector of organized interests, that, unlike in the past, is "de-aligned" from the political parties and does not respond to traditional socio-political cleavage, is present in parties and candidates’ campaigns with greater resources than was the case formerly.

  3. Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party

    Science.gov (United States)

    Su, Chunhua; Bao, Feng; Zhou, Jianying; Takagi, Tsuyoshi; Sakurai, Kouichi

    The rapid growth of the Internet provides people with tremendous opportunities for data collection, knowledge discovery and cooperative computation. However, it also brings the problem of sensitive information leakage. Both individuals and enterprises may suffer from the massive data collection and the information retrieval by distrusted parties. In this paper, we propose a privacy-preserving protocol for the distributed kernel density estimation-based clustering. Our scheme applies random data perturbation (RDP) technique and the verifiable secret sharing to solve the security problem of distributed kernel density estimation in [4] which assumed a mediate party to help in the computation.

  4. AAEC INIS - a large, new, on-line information source

    International Nuclear Information System (INIS)

    Rugg, T.J.; Wong, S.C.

    1984-01-01

    The Australian Atomic Energy Commission's INIS database is available for on-line searching by non-AAEC personnel from all parts of Australia. An introduction to the International Nuclear Information System is followed by information on searching AAEC INIS, AAEC INIS retrieval software and accessing AAEC INIS

  5. 21 CFR 1404.950 - Excluded Parties List System

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Excluded Parties List System 1404.950 Section 1404.950 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... other information about persons who are ineligible. The EPLS system includes the printed version...

  6. Which Party Gets the Mayoralty?

    DEFF Research Database (Denmark)

    Skjæveland, Asbjørn; Serritzlew, Søren

    2010-01-01

    expands the scope of these explanatory variables. However, the study also shows that being a large party is not sufficient for a party to have a good chance of winning the mayoralty. Furthermore, norms guiding appropriate behaviour seem important in addition to instrumental behaviour. It appears......In non-presidential multiparty systems, it is not only the voters but also coalition formation after the election that decides the government of the community. Some national-level studies investigate which parties are most likely to win the Prime Minister's office. The aim of this article...... is to investigate the same question at the local level:What makes a party more likely to win the post of mayor? The article finds that party size and change in size are important along with experience and ideological centrality. The results are similar to those obtained at the national level, and this study thus...

  7. Party brands and voting

    DEFF Research Database (Denmark)

    Nielsen, Sigge Winther; Larsen, Martin Vinæs

    2014-01-01

    heuristics and voting models. Next, the article measures the brand value of Danish parties by utilizing a representative association analysis. Finally, this measure is used to conduct the very first empirical analysis of a party brand's effect on voting behavior. Overall, the primary finding demonstrates...

  8. Protection of third parties. The protection of third parties affected by building or plant construction permits under the public construction law, the emission control law, or the atomic energy law

    International Nuclear Information System (INIS)

    Koenig, S.

    1993-01-01

    Building construction permits just like plant construction permits under the Federal Emission Control Act or the Atomic Energy Act are typical cases representing the administrative order with a dual effect, or an effect on third parties: decisions supporting the interests of the project owner always affect third parties. Third party protection therefore is a major topic of public construction law or the environmental protection law to be applied to industrial installations. Although actions brought by third parties have become something ordinary for the administrative courts, substantive third party protection continues to pose specific problems. The book in hand develops and explains a way out of the dilemma created by third party protection. The solutions presented are founded on a sound dogmatic basis and take into account the Federal Constitutional Court's rulings in matters of civil rights. The starting point adopted by the authors is the third party rights warranting protection, with the objective protection provided for by the law in general gaining effect as subjective rights as far as the protection is based on the civil rights of the constitution. The scope of protection affordable depends on the individual case and the reconciliation of terests of all parties concerned. The problem solutions set forth very extensively rely on the jurisdiction in matters of third party protection and on approaches published in the relevant literature, so that the book also may serve as a guide to current practice and a helpful source of reference for readers looking for information about the issue of third party protection. (orig./HP) [de

  9. Political parties Foundations and Politicization Processes in Brazil: action domain, amalgams and ambivalences

    Directory of Open Access Journals (Sweden)

    Eliana Tavares dos Reis

    2017-12-01

    Full Text Available The article analyzes the space of party foundations in Brazil. This field of action is perceived as a vehicle and a reflection of processes of politicization.The work is based on two axis: 1 the (structural and sociographic configuration of these party sectors and its relative autonomy or dependence according to the party organizations; 2 the possible intersections between political logic and domain and intellectuals from the exploitation of this specific area. It presents data on the creation and the creation chronology of party foundations, its organizational structure (websites, offices, sectors, tasks/roles divisions; requirements of various experts, products such as books, magazines, courses, incomes; etc. from information available on the internet as well as the social, political and cultural profiles of its presidents and former presidents. It was also examined the case of the Perseu Abramo Foundation of the Workers Party.

  10. Using auditory pre-information to solve the cocktail-party problem: electrophysiological evidence for age-specific differences.

    Science.gov (United States)

    Getzmann, Stephan; Lewald, Jörg; Falkenstein, Michael

    2014-01-01

    Speech understanding in complex and dynamic listening environments requires (a) auditory scene analysis, namely auditory object formation and segregation, and (b) allocation of the attentional focus to the talker of interest. There is evidence that pre-information is actively used to facilitate these two aspects of the so-called "cocktail-party" problem. Here, a simulated multi-talker scenario was combined with electroencephalography to study scene analysis and allocation of attention in young and middle-aged adults. Sequences of short words (combinations of brief company names and stock-price values) from four talkers at different locations were simultaneously presented, and the detection of target names and the discrimination between critical target values were assessed. Immediately prior to speech sequences, auditory pre-information was provided via cues that either prepared auditory scene analysis or attentional focusing, or non-specific pre-information was given. While performance was generally better in younger than older participants, both age groups benefited from auditory pre-information. The analysis of the cue-related event-related potentials revealed age-specific differences in the use of pre-cues: Younger adults showed a pronounced N2 component, suggesting early inhibition of concurrent speech stimuli; older adults exhibited a stronger late P3 component, suggesting increased resource allocation to process the pre-information. In sum, the results argue for an age-specific utilization of auditory pre-information to improve listening in complex dynamic auditory environments.

  11. Using auditory pre-information to solve the cocktail-party problem: electrophysiological evidence for age-specific differences

    Directory of Open Access Journals (Sweden)

    Stephan eGetzmann

    2014-12-01

    Full Text Available Speech understanding in complex and dynamic listening environments requires (a auditory scene analysis, namely auditory object formation and segregation, and (b allocation of the attentional focus to the talker of interest. There is evidence that pre-information is actively used to facilitate these two aspects of the so-called cocktail-party problem. Here, a simulated multi-talker scenario was combined with electroencephalography to study scene analysis and allocation of attention in young and middle-aged adults. Sequences of short words (combinations of brief company names and stock-price values from four talkers at different locations were simultaneously presented, and the detection of target names and the discrimination between critical target values were assessed. Immediately prior to speech sequences, auditory pre-information was provided via cues that either prepared auditory scene analysis or attentional focusing, or non-specific pre-information was given. While performance was generally better in younger than older participants, both age groups benefited from auditory pre-information. The analysis of the cue-related event-related potentials revealed age-specific differences in the use of pre-cues: Younger adults showed a pronounced N2 component, suggesting early inhibition of concurrent speech stimuli; older adults exhibited a stronger late P3 component, suggesting increased resource allocation to process the pre-information. In sum, the results argue for an age-specific utilization of auditory pre-information to improve listening in complex dynamic auditory environments.

  12. From left to right: Processing acronyms referring to names of political parties activates spatial associations

    NARCIS (Netherlands)

    Elk, M. van; Schie, H.T. van; Bekkering, H.

    2010-01-01

    In line with previous studies, showing that abstract concepts like opowero or ogodo implicitly activate spatial associations, in the present study we hypothesized that spatial associations are coactivated during the processing of acronyms referring to names of political parties as well. In four

  13. Device-independent two-party cryptography secure against sequential attacks

    International Nuclear Information System (INIS)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation. (paper)

  14. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  15. Movements in Parties: OccupyPD

    Directory of Open Access Journals (Sweden)

    Donatella della Porta

    2015-03-01

    Full Text Available When the United States activists called for people to Occupy#everywhere, it is unlikely they were thinking of the headquarters of the Italian centre-left party. Parties and movements are often considered to be worlds apart. In reality, parties have been relevant players in movement politics, and movements have influenced parties, often through the double militancy of many of their members. OccupyPD testifies to a continuous fluidity at the movement-party border, but also to a blockage in the party’s interactions with society that started long before the economic crisis but drastically accelerated with it. In this paper we present the OccupyPD Movement as a case of interaction between party politics and social movement politics, and in particular between the base membership of a centre-left party and the broader anti-austerity movement that diffused from the US to Europe adopting similar forms of actions and claims. Second, by locating it within the context of the economic and democratic crisis that erupted in 2007, we understand its emergence as a reaction towards politics in times of crisis of responsibility, by which we mean a drastic drop in the capacity of the government to respond to citizens’ requests. To fulfil this double aim, we bridge social movement studies with research on party change, institutional trust and democratic theory, looking at some political effects of the economic crisis in terms of a specific form of legitimacy crisis, as well as citizens’ responses to it, with a particular focus on the political meaning of recent anti-austerity protests. In this analysis, we refer to both quantitative and qualitative data from secondary liter-ature and original in-depth interviews carried out with a sample of OccupyPD activists.

  16. Party Organizational Change: Formal Distribution of Power between National and Regional Levels in Italian Political Parties (1991-2012

    Directory of Open Access Journals (Sweden)

    Enrico Calossi

    2015-03-01

    Full Text Available In the last 20 years an increasing number of scholars have centred their attention on the relationships between party national structures and party sub-national branches. A relevant part of the specialized literature has interpreted party change as the by-product of the denationalization of party politics. The aim of this contribution is to investigate to what extent eight relevant Italian parties have followed patterns of organizational change, after the reforms of the municipal, provincial and regional election sys-tems; and the process of devolution of administrative powers begun during the Nineties. By focusing on two analytical dimensions (the level of involvement and the level of autonomy of party regional units, we analyse diachronically continuity and change in party formal organization, through an in-depth analysis of the statutes adopted from 1992 to 2012

  17. Sub-linear, Secure Comparison With Two Non-Colluding Parties

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    The classic problem in the field of secure computation is Yao’s millionaires’ problem; we consider two new protocols solving a variation of this: a number of parties, P1, . . . , Pn, securely hold two - bit values, x and y – e.g. x and y could be encrypted or secret shared. They wish to obtain...... a bit stating whether x is greater than y using only secure arithmetic; this should be done without revealing any information, even the output should remain secret. The present setting is special in the sense that it is assumed that two specific parties, referred to as Alice and Bob, are non......-colluding. Though this assumption is not satisfied in general, it clearly is for the main example of this work: two-party computation based on Paillier encryption. The first solution requires O(log()(κ + loglog())) secure arithmetic operations in O(log()) rounds, where κ is a correctness parameter. The second...

  18. "Against Fascism, War and Economies": The Communist Party of Great Britain's Schoolteachers during the Popular Front, 1935-1939

    Science.gov (United States)

    Kavanagh, Matthew

    2014-01-01

    The Popular Front line made the Communist Party of Great Britain (CPGB) a more hospitable place for "brain workers." The emphasis the line placed on mass ideological and cultural struggle against fascism meant that they became important allies to be won for the working class. As the principal transmitters of ideology and culture to the…

  19. [The Patient Rights Act (PatRG)--part 1: legislative procedure, treatment contract, contracting parties and their obligations to cooperate and inform].

    Science.gov (United States)

    Parzeller, Markus; Zedler, Barbara

    2013-01-01

    The article deals with the new regulations in the German Civil Code (BGB) which came into effect in Germany on 26 Feb 2013 as the Patient Rights Act (PatRG). In Part I, the legislative procedure, the treatment contract and the contracting parties (Section 630a Civil Code), the applicable regulations (Section 630b Civil Code) and the obligations to cooperate and inform (Section 630c Civil Code) are discussed and critically analysed.

  20. LES PARTIES DU CONTRAT DE CONCESSION

    Directory of Open Access Journals (Sweden)

    Octavian OLARU

    2008-09-01

    Full Text Available The essential feature of the administrative contract, which is part of the concession contract, differentiates from the civil contract with at least one of the topics of administrative contract that is a physical person of public law. Thus, if the subject of civil contract can be any physical or juridical person that has full the capacity to exercise, then, in the case of the administrative contract, at least one subject must have the special “quality”, namely to be a public authority or a moral person of public law. If one of the contracting parties is a public figure and the other is a person of private law, the contract may be administrative. “This condition is necessary, but not sufficient”. By the definition given to concession in article 1 line 1 of the Law on concessions, the legislator determines not only the name of the contracting parties, which formed the juridical report (the conceded, the concessionaire but also the subject concession contract, which makes it different from other administrative contracts. Moreover, in the article 4 of the cited law, it is determined the scope of the public authorities, juridical persons of public law that may have the quality of conceded, while article 5 provides the scope of persons who may have the quality of concessionaire.

  1. Social Networks and Political Parties in Chile

    Directory of Open Access Journals (Sweden)

    Adler Lomnitz, Larissa

    2002-09-01

    Full Text Available This paper describes the origin and evolution of two Chilean political parties (the Radical Party and the Christian Democrat Party through the analysis of the social networks that originated and composed them. The aim of this study is to propose a model of national political cultures on the basis of the structure of social networks related to power and of the symbol system, which legitimizes it. The structure of social networks, horizontal and vertical, are based on reciprocal or redistributive forms of exchange, on what is being exchanged and on the articulation between networks. In every society there are symmetrical and asymmetrical exchanges, which produce horizontal and vertical networks. These networks interact among themselves to form the social fabric. The dominance of some over others and how they combine, delineate the character of the political culture (authoritarian vs. egalitarian. Chile is a multiparty country within which there are cohorts of horizontal groups of friends, who informally exercise a central control over their members and create invisible boundaries setting them apart from others, in which leadership is under constrains. The result is both a strong presidential system based on an almost fanatic legitimacy, combined with factionalism and a strong parliamentary system.

  2. Picturing the Party: Instagram and Party Campaigning in the 2014 Swedish Elections

    Directory of Open Access Journals (Sweden)

    Kirill Filimonov

    2016-08-01

    Full Text Available This article explores Swedish parties’ activities on Instagram during the 2014 elections. Understanding party campaign communication as highly strategic, that is, communication to persuade and mobilize voters in order to win the elections, we ask whether Instagram was used to (1 broadcast campaign messages, (2 mobilize supporters, (3 manage the party’s image, and (4 amplify and complement other campaign material (i.e., hybrid campaign use. With this study, we follow previous studies on the use of digital communication platforms in the hands of campaigning political actors, but we direct our attention to a new platform. We conducted a content analysis of 220 party postings on Instagram, collected during the hot phase of the campaign. The result shows that the platform was mainly used for broadcasting rather than for mobilization. The image the parties were presenting leaned toward personalization with a strong presence of top candidates in their postings. Top candidates were primarily displayed in a political/professional context. Finally, half of the analyzed postings showed signs of hybridized campaign practices. The presented findings give a first glimpse on how political parties use and perform on Instagram.

  3. Nuclear opponents and party politics

    International Nuclear Information System (INIS)

    Tollmann, A.

    1987-01-01

    The question treated in this article is: what do the members of the Austrian parliament - of the different parties - against nuclear energy, in particular against nuclear installations in neighbour countries? Of special interest is the Green party, now also represented in the parliament. The conclusion is that even this party, though in principle definitely anti-nuclear, is of no help to nuclear opponents in general, and to the Working Group No to Zwentendorf in particular. (qui)

  4. Third party financing of renewable energy sources

    International Nuclear Information System (INIS)

    IDAE.

    1994-01-01

    IDAE (Institute of Energy Saving and Diversification) Hosted the Third party on financing renewable energy sources. The meeting was articulated into chapters: 1.- Experiences in the renewable energy field. 2.- Third party financing of small hydro-power projects. 3.- Third party financing of biomass projects. 4.- Third party financing of wind energy projects

  5. The niche party concept and its measurement

    OpenAIRE

    Meyer, Thomas M; Miller, Bernhard

    2015-01-01

    The concept of the niche party has become increasingly popular in analyses of party competition. Yet, existing approaches vary in their definitions and their measurement approaches. We propose using a minimal definition that allows us to compare political parties in terms of their ?nicheness?. We argue that the conceptual core of the niche party concept is based on issue emphasis and that a niche party emphasizes policy areas neglected by its rivals. Based on this definition, we propose a con...

  6. The niche party concept and its measurement.

    Science.gov (United States)

    Meyer, Thomas M; Miller, Bernhard

    2015-03-01

    The concept of the niche party has become increasingly popular in analyses of party competition. Yet, existing approaches vary in their definitions and their measurement approaches. We propose using a minimal definition that allows us to compare political parties in terms of their 'nicheness'. We argue that the conceptual core of the niche party concept is based on issue emphasis and that a niche party emphasizes policy areas neglected by its rivals. Based on this definition, we propose a continuous measure that allows for more fine-grained measurement of a party's 'nicheness' than the dominant, dichotomous approaches and thereby limits the risk of measurement error. Drawing on data collected by the Comparative Manifesto Project, we show that (1) our measure has high face validity and (2) exposes differences among parties that are not captured by alternative, static or dichotomous measures.

  7. ‘My colleague’: Third party and generalization of referents in reports involving unprotected sexual activities

    Directory of Open Access Journals (Sweden)

    Minéia Frezza

    2017-06-01

    Full Text Available In this article, by means of the Conversation Analytical perspective (Sacks, Schegloff, & Jefferson, 1974, we analyze phone calls initiated by female callers to a toll free, government-run health helpline that offers information about transmission, symptoms and prevention of diseases, and referrals to health centers. The paper aims at analyzing how the participants (callers and call takers refer to the beneficiary of the requested information. Some callers, despite being informed that all calls are anonymous, avoid revealing that they themselves are the beneficiary of the information, and thus attribute to third parties the need for the information, a phenomenon we call here ‘third party referencing’. Other callers refer to the beneficiary of the information as ‘women’, ‘people’, ‘someone’ etc., a phenomenon we call here as ‘generalization’. When making use of third party referencing or of generalizations to talk about the beneficiary of the information, callers exempt themselves of the responsibility for something that might be seen as ‘morally questionable’ (Bergmann, 1992, e.g., having unprotected sexual intercourse. An analysis of how such negotiation unfolds becomes particularly relevant for the context investigated here, as the existence of an actual beneficiary for the information reveals itself as decisive for referrals to health centers to happen.

  8. 28 CFR 51.7 - Political parties.

    Science.gov (United States)

    2010-07-01

    ... THE VOTING RIGHTS ACT OF 1965, AS AMENDED General Provisions § 51.7 Political parties. Certain activities of political parties are subject to the preclearance requirement of section 5. A change affecting... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Political parties. 51.7 Section 51.7...

  9. On-line sources of toxicological information in Canada

    International Nuclear Information System (INIS)

    Racz, William J.; Ecobichon, Donald J.; Baril, Marc

    2003-01-01

    This paper will provide an overview of the on-line resources available in toxicology in Canada. It will describe a brief history of The Society of Toxicology of Canada, with reference to other societies and also provide information on education, research and other resources related to toxicology. Toxicology in Canada emerged as a distinct and vibrant discipline following the thalidomide tragedy of the 1960s. In the pharmaceutical industry and government, toxicology was readily established as an essential component of drug development and safety, and as the need for toxicologists expanded, training programs were established, usually in collaboration with departments of pharmacology. In the last two to three decades other disciplines, environmental biology, analytical chemistry and epidemiology joined the ranks of toxicology. The on-line sources of toxicology information are rapidly expanding. This article describes those sources considered by the authors to be important from a national and international perspective. The majority of these sources are professional organizations and government agencies

  10. Mediated Leader Effects: The Impact of Newspapers' Portrayal of Party Leadership on Electoral Support.

    Science.gov (United States)

    Aaldering, Loes; van der Meer, Tom; Van der Brug, Wouter

    2018-01-01

    Conventional wisdom holds that party leaders matter in democratic elections. As very few voters have direct contact with party leaders, media are voters' primary source of information about these leaders and, thus, the likely origin of leader effects on party support. Our study focuses on these supposed electoral effects of the media coverage of party leaders. We examine the positive and negative effects of specific leadership images in Dutch newspapers on vote intentions. To this end, we combine an extensive automated content analysis of leadership images in the media with a panel data set, the Dutch 1Vandaag Opinion Panel (1VOP), consisting of more than fifty thousand unique respondents and 110 waves of interviews conducted between September 2006 and September 2012. The results confirm that media coverage of party leaders' character traits affects voters: Positive mediated leadership images increase support for the leader's party, while negative images decrease this support. However, this influence is not unconditional: During campaign periods, positive leadership images have a stronger effect, while negative images no longer have an impact on subsequent vote intentions.

  11. Mediated Leader Effects: The Impact of Newspapers’ Portrayal of Party Leadership on Electoral Support

    Science.gov (United States)

    Aaldering, Loes; van der Meer, Tom; Van der Brug, Wouter

    2017-01-01

    Conventional wisdom holds that party leaders matter in democratic elections. As very few voters have direct contact with party leaders, media are voters’ primary source of information about these leaders and, thus, the likely origin of leader effects on party support. Our study focuses on these supposed electoral effects of the media coverage of party leaders. We examine the positive and negative effects of specific leadership images in Dutch newspapers on vote intentions. To this end, we combine an extensive automated content analysis of leadership images in the media with a panel data set, the Dutch 1Vandaag Opinion Panel (1VOP), consisting of more than fifty thousand unique respondents and 110 waves of interviews conducted between September 2006 and September 2012. The results confirm that media coverage of party leaders’ character traits affects voters: Positive mediated leadership images increase support for the leader’s party, while negative images decrease this support. However, this influence is not unconditional: During campaign periods, positive leadership images have a stronger effect, while negative images no longer have an impact on subsequent vote intentions. PMID:29527251

  12. Ombuds’ corner: the third party, the institution

    CERN Multimedia

    Vincent Vuillemin

    2012-01-01

    “The Ombuds shall provide confidential assistance for the informal resolution of interpersonal issues, in the interests of the good functioning of CERN.”*   In any institution, conflicts are inevitable. They can, however, offer an opportunity for a positive resolution. Relationships in a workplace are generally better and stronger between people who have been able to reach a positive resolution of their disagreement, than they are between people who get along moderately well. However, in disputes involving two antagonistic parties, people often forget that there is actually a third party behind the scenes: the institution. It is sometimes surprising to see that even people holding management responsibilities or hierarchical positions in projects fight each other, and completely forget that they are accountable for the good functioning of CERN. Commitment and professionalism are part of the five priority values of CERN, as expressed in its Code of Conduct: “Promot...

  13. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  14. How to hold an ethical pox party.

    Science.gov (United States)

    Jamrozik, Euzebiusz

    2018-04-01

    Pox parties are a controversial alternative to vaccination for diseases such as chickenpox. Such parties involve parents infecting non-immune children by exposing them to a contagious child. If successful, infection will usually lead to immunity, thus preventing infection later in life, which, for several vaccine-preventable diseases, is more severe than childhood infection. Some may consider pox parties more morally objectionable than opting out of vaccination through non-medical exemptions. In this paper, I argue that this is not the case. Pox parties involve immediate risk of harm for children and reduce future harms, whereas opting out of vaccination places children at long-term risk of harms that increase with time, at least for some pathogens. Regarding harm to others through onward transmission of infection, this can be easily prevented in the case of pox parties-given the relatively controlled timing of infection-by quarantining attendees after the party, whereas opting out of vaccination involves risks to others that are more difficult to control. I defend three criteria for an ethical pox party: (1) that the disease is sufficiently low risk, (2) that parents consent to their child's attendance and (3) that children exposed to infection are quarantined and isolated appropriately. I argue that, if these criteria are met, pox parties are morally preferable to non-vaccination; such parties involve less risk to non-consenting others and, for some pathogens in some cases, even involve less risk for the children who participate. Thus, policies that permit non-medical exemption to vaccination should also permit ethical pox parties. Alternatively, if pox parties are not permitted, then vaccination should be mandated for those without medical contraindication. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Intra-party policy entrepreneurship and party goals. The case of political parties’ climate policy preferences in Ireland

    DEFF Research Database (Denmark)

    Little, Conor

    2017-01-01

    This study contributes to the growing literature on the domestic politics of climate change by examining the climate policy preferences of Fianna Fáil, Fine Gael and the Labour Party over 20 years. Bringing the concept of ‘policy entrepreneurship’ into the study of intra-party politics, it uses...... who have engaged in policy entrepreneurship with the aim of strengthening their parties’ climate policy preferences. In instances where office-seeking incentives for climate policy have been strong, they have often contributed to changes in policy preferences, whether or not intra-party policy...... entrepreneurship has been present. Theoretically, the study argues that the concept of ‘policy entrepreneurship’ can be usefully borrowed from the public policy literature by researchers of party policy preferences and intra-party politics. Empirically, it adds to the small but growing body of research on climate...

  16. Influence of awareness on the usage of motor third party insurance ...

    African Journals Online (AJOL)

    a case study of Kampala district. ... informants (insurers, insurance regulators as well as enforcers – traffic police officers); and carried out desk review of motor third party insurance ... enormous negative economic impact on individuals, fam-.

  17. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  18. Inheritance and the Dynamics of Party Identification

    OpenAIRE

    Kroh, Martin; Selb, Peter

    2009-01-01

    Extensive research efforts notwithstanding, scholars continue to disagree on the nature and meaning of party identification. Traditionalists conceive of partisanship as a largely affective attachment to a political party that emerges in childhood through parental influences and tends to persist throughout life. The revisionist conception of partisanship is that of a running tally of party utilities that is updated based on current party performance. We attempt to reconcile both schools of tho...

  19. Domesday 2000 - a National Land Information System for Britain

    DEFF Research Database (Denmark)

    Sabel, C. E.; Ralphs, M. P.

    1992-01-01

    The Domesday 2000 Project aims to ensure that by the year 2000 there will be a National Land Information System for Britain, containing up to date information on land and property ownership, value and use. It is proposed that the system will make use of distributed databases connected over a wide......-area network, to integrate data from a wide variety of sources, using GIS technology to enable interested parties to access the on-line information via locally based terminals. This article explains the background to the project, before moving on to discuss the proposed format and data holdings...

  20. Corruption and re-election chances of incumbent parties in ...

    African Journals Online (AJOL)

    The effect of information about corruption depends on whether the incumbent parties field different candidates from those in previous elections. In Africa, South and Central America, however, the effect also depends on whether the elections are free or fair. A key finding is that press freedom reduces the re-election chances ...

  1. Party-state relationship, an effect of the political competition. The party system and patronage in Romanian politics

    Directory of Open Access Journals (Sweden)

    Irina Lonean

    2012-06-01

    Full Text Available The article examines the party-state relationship in post-communist Romania. It shows the connections between the existence of patronage, corruption and the states’ weak administrative capacity, on one hand, and the dynamics of the political party system, as an explanatory variable, on the other hand. The instability of the political parties in Romania and their changing relations within the system make the electorates’ task of anticipating and sanctioning their politics impossible. Consequently, the political parties have the possibility of extracting resources from the state without being held accountable in elections, as an effect of their dynamic, but non-robust competition.

  2. The Perceived Importance of HR duties to Danish line managers

    DEFF Research Database (Denmark)

    Brandl, Julia; Madsen, Mona Toft; Madsen, Henning

    2009-01-01

    Today, HR scholars widely acknowledge that realising HRM requires the involvement of all managers and that the personal motivation of line managers plays an important role in their successful involvement. Yet, previous research has neglected to study how line managers rate the importance of parti...

  3. Between Party, Parents and Peers

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2012-01-01

    This article explores the lived contradictions entailed in being a young member of the Chinese Communist Party (ccp) today. The focus is on how political and existential issues intersect. It explores party membership as a strategy for personal mobility among Beijing elite university students by p...

  4. Third-party online payment solutions in China

    OpenAIRE

    Yang, Qian

    2017-01-01

    The topic of this paper is third-party online payment solutions in China and the main purpose of this paper is to figure out the research question: What are the impacts of third-party online payment solutions on China? Generally speaking, the third-party online payment solutions, including mobile payments, usually used by customer who purchase online and usually used in transaction platform. However, in China, people can use third-party payment solutions in different platfor...

  5. Gender differences in Assessments of Party Leaders

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina; Hansen, Kasper Møller

    2015-01-01

    Is there a relationship between party leader gender and voters' assessments? Yes, according to theses on gender identity and stereotyping. A voter survey during the 2011 Danish general election allows for a comprehensive analysis of a less likely case with four male and four female party leaders...... of gender does not increase with age, actually, the opposite is the case among men since younger male voters have smaller sympathy for female party leaders. Furthermore, there is no support for the expectation that voters with more education or with higher levels of political interest and knowledge are more....... Female party leaders are assessed more positively by female voters than male voters both in regard to general party leader sympathy and assessment of specific characteristics, whereas it is not the case that male party leaders are assessed more positively by male voters than female voters. The impact...

  6. So Close But So Far: Voting Propensity and Party Choice for Left-�Wing Parties

    DEFF Research Database (Denmark)

    Bochsler, Daniel; Sciarini, Pascal

    2010-01-01

    While the bulk of the literature focuses on the vote for parties from different blocs, the purpose of our article is to study the vote for two parties that are ideologically very close to each other: The Social Democrats and the Greens in Switzerland. To that end, we develop a two-step model, where...... voters first make a selection of parties that are acceptable to them and then make their electoral choice out of this set of acceptable al- ternatives. We use voting propensities as a measure of the first, consideration step and we show that they strongly depend on the distance between voters and parties...... on the Left–Right scale. With regard to the second, choice stage of the electoral process we hypothesize about the factors that may account for the varying ability of the two par- ties to convert potential voters into real voters. Our empirical tests provide encourag- ing support for our hypotheses regarding...

  7. Complete Fairness in Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Gordon, S. Dov; Hazay, Carmit; Katz, Jonathan

    2011-01-01

    In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees, informa...... for such functions must have round complexity super-logarithmic in the security parameter. Our results demonstrate that the question of completely fair secure computation without an honest majority is far from closed.......In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees......-party setting. We demonstrate that this folklore belief is false by showing completely fair protocols for various nontrivial functions in the two-party setting based on standard cryptographic assumptions. We first show feasibility of obtaining complete fairness when computing any function over polynomial...

  8. Runtime party switch in an inter-organizational collaboration

    NARCIS (Netherlands)

    Pourmirza, S.

    2016-01-01

    During the execution of an inter-organizational business-to-business (B2B) collaboration, a collaborating party may drop out for technical reasons or for business reasons. In such a case, the leaving party must be replaced, at runtime, by a new party. Ideally, the new party can pick up where the old

  9. Base Stock Policy in a Join-Type Production Line with Advanced Demand Information

    Science.gov (United States)

    Hiraiwa, Mikihiko; Tsubouchi, Satoshi; Nakade, Koichi

    Production control such as the base stock policy, the kanban policy and the constant work-in-process policy in a serial production line has been studied by many researchers. Production lines, however, usually have fork-type, join-type or network-type figures. In addition, in most previous studies on production control, a finished product is required at the same time as arrival of demand at the system. Demand information is, however, informed before due date in practice. In this paper a join-type (assembly) production line under base stock control with advanced demand information in discrete time is analyzed. The recursive equations for the work-in-process are derived. The heuristic algorithm for finding appropriate base stock levels of all machines at short time is proposed and the effect of advanced demand information is examined by simulation with the proposed algorithm. It is shown that the inventory cost can decreases with little backlogs by using the appropriate amount of demand information and setting appropriate base stock levels.

  10. 45 CFR 99.22 - Rights of parties.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights of parties. 99.22 Section 99.22 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROCEDURE FOR HEARINGS FOR THE CHILD CARE AND DEVELOPMENT FUND Hearing Procedures § 99.22 Rights of parties. All parties may: (a...

  11. When can we trust a third party?

    NARCIS (Netherlands)

    Hee, van K.M.; Sidorova, N.; Werf, van der J.M.E.M.; Koutny, M.; Aalst, van der W.M.P.; Yakovlev, A.

    2013-01-01

    Organizations often do not want to reveal the way a product is created or a service is delivered. As a consequence, if two organizations want to cooperate, they contact a trusted third party. Each specifies how it wants to communicate with the other party. The trusted third party then needs to

  12. Information Technology & Applications Corporation v. United States: An Interested Party's "Substantial Chance" at APA Standing

    National Research Council Canada - National Science Library

    Slicker, Christina

    2003-01-01

    ... of government contracts. The purpose of this paper is not to prove with mathematical certainty that the standing result would be identical whether a court applied the Federal Circuit's "interested party" standard or the APA two-prong test...

  13. OK, Computer: File Sharing, the Music Industry, and Why We Need the Pirate Party

    Directory of Open Access Journals (Sweden)

    Adrian Cosstick

    2009-03-01

    Full Text Available The Pirate Party believes the state and big business are in the process of protecting stale and inefficient models of business for their own monetary benefit by limiting our right to share information. The Pirate Party suggests that they are achieving this goal through the amendment of intellectual property legislation. In the dawn of the digital era, the Pirate Party advocates that governments and multinational corporations are using intellectual property to: crack down on file sharing which limits the ability to share knowledge and information; increase the terms and length of copyright to raise profits; and build code into music files which limits their ability to be shared (Pirate Party, 2009. There are a number of ‘copyright industries’ that are affected by these issues, none more so than the music industry. Its relationship with file sharing is topical and makes an excellent case study to address the impact big business has had on intellectual property and the need for the Pirate Party’s legislative input. The essay will then examine the central issues raised by illegal file sharing. In particular, the future for record companies in an environment that increasingly demands flexibility, and whether the Pirate Party’s proposal is a viable solution to the music industry’s problems

  14. 26 CFR 301.7430-5 - Prevailing party.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Prevailing party. 301.7430-5 Section 301.7430-5... Prevailing party. (a) In general. For purposes of an award of reasonable administrative costs under section... prevailing party only if— (1) The position of the Internal Revenue Service was not substantially justified...

  15. 6 CFR 13.17 - Rights of parties.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Rights of parties. 13.17 Section 13.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.17 Rights of parties. Except as otherwise limited by this part, all parties may: (a) Be accompanied...

  16. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  17. From Protest to Political Parties: Online Deliberation in New Parties in Spain

    Directory of Open Access Journals (Sweden)

    Rosa Borge Bravo

    2016-12-01

    Full Text Available The new parties that emerged following the 15-M movement and against the austerity measures in Spain want to build parties open to the participation and deliberation for all the citizenry. To what extent are these ideals being fulfilled? The aim of this article is to describe and assess some of the main online deliberative processes of the two most important parties, Podemos and Barcelona En Comú, following commonly accepted criteria in the literature for measuring online deliberation. Specifically, we have examined the two most-voted proposals from the online platform Plaza Podemos and the online development of the electoral programme of Barcelona En Comú. Thus, we have conducted a content analysis of 713 (Plaza Podemos and 563 (Barcelona En Comú posts. Both platforms meet the structural and technical criteria for fostering deliberation, but the external impact is high only in the case of Barcelona En Comú. The deliberative quality of the communication is good but not the criteria of reflexivity, inclusion and plurality.

  18. The Labour Party and British Republicanism

    Directory of Open Access Journals (Sweden)

    Kenneth O. MORGAN

    2003-10-01

    Full Text Available The famous detective, Sherlock Holmes, once solved a case by referring to “the dog that did not bark.” In the past 250 years of British history, republicanism is another dog that did not bark. This is particularly true of supposedly our most radical major political party, the Labour Party. Over the monarchy, as over constitutional matters generally, Labour’s instincts have been conservative. Even after 1997, when the party, led by Lord Irvine, has indeed embarked upon major constitutional ref...

  19. Mário de Sá-Carneiro and the Parisian party of the Belle Époque

    Directory of Open Access Journals (Sweden)

    Teresa Cristina Cerdeira da Silva

    2016-12-01

    Full Text Available http://dx.doi.org/10.5007/2175-7917.2016v21n2p21 The episode of the American’s party in A Confissão de Lúcio conveys the magical atmosphere of the “Belle Époque” in Paris. The party seems to play a double role in the novel: a theatrical role and a learning role. On the one side, that magical and orgiastic party exemplifies the notion of “lavishness”, far away from the constraints and strict rules of the working world. On the other side, one can see this party as an unexpected amalgam of pleasure and intellectual aptitude, of the orgiastic excesses and the spiritual quest, as evoked in Plato’s Symposium. This erotic sophistication of the language is not far from the sinuous lines, the volutes and the ornamentation proper of “Art Nouveau”, the famous style of the “Belle Époque”. The impressionist colours, Baudelaire’s correspondence of sensations, combined with a double experience of excesses and subtlety present a mise-en-scène of voluptuousness, following the model imagined by this strange woman – to an extent, Sá-Carneiro’s spokeswoman. Like so many other young artists, Mário de Sá-Carneiro came to Paris at the dawn of the 20th century to enjoy Modernity.

  20. The on-line European Community urgent radiological information exchange (ECURIE) information system

    International Nuclear Information System (INIS)

    De Cort, M.; Breitenbach, L.; De Vries, G.

    1998-01-01

    Immediately after the accident at the Chernobyl NPP, both the International Atomic Energy Agency (IAEA) and the Commission of the European Communities (CEC) set up a system to meet the requirements for early warning and exchange of information. The Environment Institute of the CEC JRC-Ispra provides technical assistance for the European community Urgent Radiological Information Exchange system (ECURIE). By this system, Member State contact points can exchange information in a coded format. In order to facilitate the use and to assure the data quality, a Coding-Decoding Software (CDS) was developed in collaboration with the I.A.E.A. A new version, called CoDecS, is under development. An ECURIE data bank is under construction, which will automatically recognize and store incoming ECURIE messages. Further on, query and reporting software will be developed. The background objectives and the conceptual basis for the structure of the on-line information system is described. (author)

  1. How are Voters Influenced by Opinion Polls? The Effect of Polls on Voting Behavior and Party Sympathy

    DEFF Research Database (Denmark)

    Dahlgaard, Jens Olav; Hansen, Jonas Hedegaard; Hansen, Kasper Møller

    2016-01-01

    Similar to all other types of information, public opinion polls can influence public opinion. We present two hypotheses to understand how polls affect public opinion: the bandwagon and the underdog effect. The bandwagon effect claims that voters "jump on the bandwagon," which means that if a party...... hypotheses. We find evidence of the bandwagon effect, and the effect is strongest in the positive direction. When voters learn that a party is gaining in the polls, voters will be more likely to vote for it. There is also some evidence for the negative bandwagon effect. We find no evidence for the underdog...... is gaining in the polls, the party will gain additional support from the voters, and vice versa if the party is losing in the polls. The underdog effect suggests that if a party is losing in the polls, the party will gain some sympathy votes to offset this loss. We use a survey experiment to test the two...

  2. Effects of Surrounding Information and Line Length on Text Comprehension from the Web

    Directory of Open Access Journals (Sweden)

    Jess McMullin

    2002-02-01

    Full Text Available The World Wide Web (Web is becoming a popular medium for transmission of information and online learning. We need to understand how people comprehend information from the Web to design Web sites that maximize the acquisition of information. We examined two features of Web page design that are easily modified by developers, namely line length and the amount of surrounding information, or whitespace. Undergraduate university student participants read text and answered comprehension questions on the Web. Comprehension was affected by whitespace; participants had better comprehension for information surrounded by whitespace than for information surrounded by meaningless information. Participants were not affected by line length. These findings demonstrate that reading from the Web is not the same as reading print and have implications for instructional Web design.

  3. 7 CFR 955.91 - Additional parties.

    Science.gov (United States)

    2010-01-01

    ... Marketing Agreement § 955.91 Additional parties. After the effective date thereof, any handler may become a... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... then be effective as to such new contracting party. ...

  4. Political Marketing Mix in Indonesia Parties

    Directory of Open Access Journals (Sweden)

    Freddy Simbolon

    2016-05-01

    Full Text Available The reform era has changed the paradigm of Indonesian politics. Multiparty system has demanded a political party to be able to compete for their constituents. Article aimed to convey a political marketing concept that can helppolitical parties in planning a strategy to win the election. Research method used descriptive method analysis. The results suggest that the approach of the marketing mix that includes the product, price, place, and promotion areapproaches that are very helpful in presenting a plan to win the marketing strategy of political parties in elections.

  5. Social praxis, party, and class relations today

    Directory of Open Access Journals (Sweden)

    Egni Malo

    2014-01-01

    Full Text Available Today’s political sociologists are once again interested in the study of the crisis of mass-based parties, anti-politics and anti-parliamentarism, crisis in the authority of the political class, prevailing corporate interests within republican institutions, and populism. Political sociology however, takes the party, as a construct of political sociology alone, without consideration upon its militancy and action, as the party, which objectifies the foundation of a State, and as a result the party becomes, simply an historical category. We approach the problem of the modern state from many angles; analysing the nature of a political party as such; the ideological dangers of determinism and spontaneism which a party necessarily must struggle with; the type of non-administrative internal regime which is necessary for a party to be effective and so on. The problem we seek to elaborate is the specific character of the collective action that makes possible the passage from a sectored, corporate and subordinate role of purely negative opposition, to a leading role of conscious action towards not merely a partial adjustment within the system, but posing the issue of the State in its entirety. In developing this theme – as a study of the real relations between the political party, the classes and the State – a two-fold consideration is devoted to the study of Machiavelli and Marx: first from the angle of the real relations between the two, as thinkers of revolutionary politics, of action; and secondly from a perspective which would derive from the Marxist doctrines an articulated system of contemporary politics, as found in The Prince.

  6. Two-party quantum key agreement with five-particle entangled states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  7. Terrorism and Political Parties

    DEFF Research Database (Denmark)

    Bourne, Angela

    In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army (IRA). More...... for realization of free speech rights and representation is also emphasized, and where proscription is seen as inimical to resolution of conflict underpinning violence. In the context of party competition, a winning coalition is required for one discourse to predominate. However, I also argued that both ideas...

  8. The Organizational Weapon: Ruling Parties in Authoritarian Regimes

    OpenAIRE

    Meng, Anne

    2016-01-01

    This project examines party building in authoritarian regimes. The overarching puzzle I seek to address is: why are some autocratic ruling parties stronger organizations than others? What explains variation in the institutional capacity of autocratic rule? The collection of three essays in this dissertation outline the strategic logic of party institutionalization, in addition to providing new and original ways in which to measure this key concept of authoritarian party strength. It tests pre...

  9. The doctrine of party autonomy in international commercial arbitration

    African Journals Online (AJOL)

    The freedom of parties to consensually execute arbitration agreement is known as the principle of party autonomy. The principle provides a right for the parties to international commercial arbitration to choose applicable substantive law and these laws when chosen shall govern the contractual relationship of the parties.

  10. 78 FR 49280 - 30-Day Notice of Proposed Information Collection: Third-Party Documentation Facsimile Transmittal...

    Science.gov (United States)

    2013-08-13

    ... calling the toll-free Federal Relay Service at (800) 877-8339. This is not a toll- free number. Copies of... produces an electronic version of the document that will be matched with the electronic application....g., permitting electronic submission of responses. HUD encourages interested parties to submit...

  11. Authoritarian Inheritance and Conservative Party-Building in Latin America

    OpenAIRE

    Loxton, James Ivor

    2014-01-01

    Beginning in the late 1970s, with the onset of the third wave of democratization, a host of new conservative parties emerged in Latin America. The trajectories of these parties varied tremendously. While some went on to enjoy long-term electoral success, others failed to take root. The most successful new conservative parties all shared a surprising characteristic: they had deep roots in former dictatorships. They were "authoritarian successor parties," or parties founded by high-level in...

  12. The Chinese Communist Party in Reform

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik; Yongnian, Zheng

    Contrary to the expectations of many people, China's recent economic growth has not led to the collapse of the Chinese Communist Party. In fact, the party has recently carried out a peaceful and orderly transition to the so-called fourth generation of leadership, has revitalised itself, and created...... a new, younger and better trained cadre corps. Despite this successful transformation, there continue to be many problems that the party will need to overcome if it is to remain in power, including pressures for democratization in both urban and rural areas, widespread corruption, the emergence of new...

  13. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    http://www.cern.ch/cern50/All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director-General would like to invite all the people working at CERN to celebrate the success of the organization. The party will be held in the cafeteria and on the terrace (if the weather permits) of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks, snacks and a surprise music show by the CERN Big Bang Orchestra! Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! Early closure of Restaurant No. 1 (Bldg. 501, Meyrin site): Friday 17 September at 2:00 p.m. On Friday, 17 September, Restaurant No. 1 (NOVAE) will close at 2:00 p.m. owing to the Golden Jubilee party for the CERN staff. No dinner will be served that evening.

  14. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    http://www.cern.ch/cern50/ All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director-General would like to invite all the people working at CERN to celebrate the success of the organization. Your Golden Jubilee Party Friday 17 September 2004 at 16:00 Restaurant 1, Main Building Programme Speech by Director-General Toast in honour of CERN Cocktails and ambient music Video projections of five decades of CERN and at 18:00 ... A surprise music show. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! Early closure of Restaurant No. 1 (bldg. 501, Meyrin site): Friday 17 September at 2:00 p.m. On Friday, 17 September, Restaurant No. 1 (NOVAE) will close at 2:00 p.m. owing to the Golden Jubilee party for the CERN staff. No dinner will be served that evening.

  15. 40 CFR 24.14 - Scheduling the hearing; pre-hearing submissions by the parties.

    Science.gov (United States)

    2010-07-01

    ..., time, location and agenda for the hearing and shall transmit this information to the parties along with... the Presiding Officer at least twenty-one (21) days before the hearing. (2) The Presiding Officer may...

  16. Political parties in the Sverdlovsk region: stages of development

    Directory of Open Access Journals (Sweden)

    Mukhametov Ruslan Salikhovich

    2013-12-01

    Full Text Available This article analyzes the processes of party building in the Russian Federation. On the example of a single region – the Sverdlovsk region – we study the evolution of political parties. The factors favoring the process of formation and functioning of regional political parties and political movements in the Middle Urals are identified and classified. Much attention is paid to such factors of development of the parties in the region as a party-electoral law and the electoral system view.

  17. Enhancing Information Usefulness by Line Managers’ Involvement in Cross-Unit Activities

    DEFF Research Database (Denmark)

    Foss, Kirsten; Rodgers, Waymond

    2011-01-01

    Organization and management scholars have long advocated that efficient use of information is critical for firms to compete successfully in the modern marketplace. This study examines whether the use of managerial cross-unit involvement in an organization enhances managers’ propensity to use useful...... information provided by a functionally related unit in the organization. Senior line managers in a major global bank participated in our study in which they provided information related to their information processing and assessments of the usefulness of corporate audit information. We analyse the effect...

  18. 31 CFR 19.950 - Excluded Parties List System

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Excluded Parties List System 19.950 Section 19.950 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 19.950 Excluded Parties List System Excluded Parties...

  19. Implications of Counter-Attitudinal Information Exposure in Further Information- Seeking and Attitude Change

    Science.gov (United States)

    Lee, Sangwon

    2017-01-01

    Introduction: Given that people rely heavily on their party affiliation to make their political decisions, an interesting dilemma occurs when people are exposed to counter-attitudinal information from the party they identify with. This paper examines how exposure to counter-attitudinal messages from the party an individual identifies with…

  20. Understanding the Public Service Obligation in the Electricity Sector. Lessons for the Contracting Parties of the Energy Community Treaty

    Energy Technology Data Exchange (ETDEWEB)

    Karova, R. [Energy Community Secretariat, Vienna (Austria)

    2012-01-15

    The paper underlines that the EU energy acquis does not simply require the Contracting Parties to the Energy Community Treaty to liberalize their electricity markets, but it also provides for a 'safety net' to ensure the available of public services through the imposition of Public Service Obligations (PSO). Nevertheless, the paper points out that the present understanding of the PSOs in the Contracting Parties is not in compliance with the conditions provided byArtide 3 of the Electricity Directive. Therefore, it includes some policy recommendations and a proposal for introducing a duty of notification, which should be instructive for the Contracting Parties to improve their understanding of PSO in line with EU law, by thus effectively safeguarding the availability of public services in the electricity sector to their citizens without jeopardizing the effective electricity market liberalization.

  1. The Dark Side of Altruistic Third-Party Punishment

    Science.gov (United States)

    Leibbrandt, Andreas; Lopez-Perez, Raul

    2011-01-01

    This article experimentally studies punishment from unaffected third parties in ten different games. The authors show that third-party punishment exhibits several features that are arguably undesirable. First, third parties punish strongly a decider if she chooses a socially efficient or a Pareto efficient allocation and becomes the richest party…

  2. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  3. The German Environmentalist Party - The Greens

    International Nuclear Information System (INIS)

    Mettke, J.R.

    1982-01-01

    The Greens are winning supporters throughout the FRG, quite a few of them are already members of the parliament of various lands. Will they cooperate with the established political parties in Bonn. Will they take over from the Free Democrats the role of holding the balance of power. In this book, Spiegel editors present their analyses of the changing concepts of the new political movement. The most outstanding members of the Environmentalist Party - the so-called Greens - define their position and state their opinions on the problems of coalition forming, and prominent members of the parties of the German Bundestag answer these statements. (orig.) [de

  4. Front-Line Physicians' Satisfaction with Information Systems in Hospitals.

    Science.gov (United States)

    Peltonen, Laura-Maria; Junttila, Kristiina; Salanterä, Sanna

    2018-01-01

    Day-to-day operations management in hospital units is difficult due to continuously varying situations, several actors involved and a vast number of information systems in use. The aim of this study was to describe front-line physicians' satisfaction with existing information systems needed to support the day-to-day operations management in hospitals. A cross-sectional survey was used and data chosen with stratified random sampling were collected in nine hospitals. Data were analyzed with descriptive and inferential statistical methods. The response rate was 65 % (n = 111). The physicians reported that information systems support their decision making to some extent, but they do not improve access to information nor are they tailored for physicians. The respondents also reported that they need to use several information systems to support decision making and that they would prefer one information system to access important information. Improved information access would better support physicians' decision making and has the potential to improve the quality of decisions and speed up the decision making process.

  5. 12 CFR 263.102 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Prevailing party. 263.102 Section 263.102 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES... Prevailing party. Only an eligible applicant that prevailed on the merits of an adversary proceeding may...

  6. Sex Parties: Female Teen Sexual Experimentation

    Science.gov (United States)

    Toscano, Sharyl Eve

    2006-01-01

    Adolescent participants in a study aimed at exploring the nature and characteristics of girls' dating relationships revealed the phenomenon of sex parties. These teens defined a "sex party" as an opportunity to engage in sexual contact outside of typical dating relationships. Sexual activity could involve actual intercourse, but usually involved…

  7. Server-Aided Two-Party Computation with Simultaneous Corruption

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; Ranellucci, Samuel

    We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal composab......We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal...

  8. Museums & Mermaids: Bringing Climate Literacy to the Party

    Science.gov (United States)

    Tillinger, D.

    2014-12-01

    If science is for everyone, then it needs to be taught in environments that are welcoming to people who may not feel at home in a traditional classroom. A team of scientists and educators at the American Museum of Natural History have developed a new course, Our Earth's Future, which prepares participants to contribute intelligently and fluently to informal "cocktail party" conversations about climate and climate change. The course, taught after hours at the museum, culminates in an actual cocktail party in one of the museum's halls where participants can practice their skills. Participants' knowledge of climate change and attitudes towards climate change were quantitatively and qualitatively assessed before and after the two five-week course sessions.Climate literacy can also be included in existing events that are not obviously science-focused. Venues such as festivals, galleries, and underground art parties may be willing to broaden their definition of culture to include science - but only if they are asked. Given the increase in public discourse around the topic of climate change, there is an opportunity to reach people who wouldn't attend a formal science lecture, but might attend a film screening or a fundraiser that had some scientific content. Qualitative audience assessments done after the annual "Mermaid Lagoon," a fundraiser for ocean related causes that includes a scientific segment along with dance and theatrical performances, show increased enthusiasm and support for climate science when it is presented in a relevant, fun, and non-intimidating manner.

  9. 76 FR 16609 - Proposed Information Collection; Comment Request; Identification of Human Cell Lines Project

    Science.gov (United States)

    2011-03-24

    ... differentiate among cell lines, as described in Designation: ASN-0002 Authentication of Human Cell Lines... NIST (contact information above). III. Data OMB Control Number: None. Form Number: None. Type of Review...

  10. 12 CFR 747.603 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Prevailing party. 747.603 Section 747.603 Banks... in NCUA Board Adjudications § 747.603 Prevailing party. An eligible applicant may be a “prevailing... dismissed. In appropriate situations an applicant may also have prevailed if the outcome of the proceeding...

  11. 12 CFR 308.173 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Prevailing party. 308.173 Section 308.173 Banks....173 Prevailing party. (a) General rule. An eligible applicant who, following an adversary adjudication has gained victory on the merits in the proceeding is a “prevailing party”. An eligible applicant may...

  12. 6 CFR 13.13 - Parties to the hearing.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Parties to the hearing. 13.13 Section 13.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.13 Parties to the hearing. (a) The parties to the hearing will be the Defendant and the Authority...

  13. Financing of Political Parties and Electoral Campaigns in Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    Farije ALIU

    2016-07-01

    thorough information provided empirical evidence to create a clear picture in areas that require reform. Based on empirical data and results of research conducted within this work it can be concluded that the functioning of the state and public oversight over the financing of election campaigns of political parties in Macedonia is more pronounced within the law than in practice. There is a large discrepancy between the legal and factual situation.

  14. Social Networks and Political Parties in Chile

    OpenAIRE

    Adler Lomnitz, Larissa

    2002-01-01

    This paper describes the origin and evolution of two Chilean political parties (the Radical Party and the Christian Democrat Party) through the analysis of the social networks that originated and composed them. The aim of this study is to propose a model of national political cultures on the basis of the structure of social networks related to power and of the symbol system, which legitimizes it. The structure of social networks, horizontal and vertical, are based on reciprocal or redistribut...

  15. THE POLITICS OF BENEVOLENCE: Political Patronage of Party-based Charitable Organizations in Contemporary Indonesian Islam

    Directory of Open Access Journals (Sweden)

    Hilman Latief

    2013-12-01

    Full Text Available The rise of party-based Islamic charities has had a profound impact on the nature of philanthropic activities in contemporary Indonesia, and stimulated a new debate over the issue of the politics of benevolent acts. Over the past few years, in line with the increase of the influence of the Islamic factor in Indonesian politics, there have been a number of political parties which actively engaged with social welfare activities through the newly-established Islamic charitable organizations. The close ties between charitable organizations and political parties may lead to the new patterns of Muslim social and political activism, and to the new forms of political clientelism. This article analyzes the vibrant effort of political parties in sponsoring the inception and operation of Islamic charitable organizations in the post New Order era, and investigates how political clientelism has been established through charity practices. This paper compares the roles of charitable organizations set up by the nationalist and Islamist parties in formulating strategies to promote their political interest. Based on three political parties studied in this article, which are the Prosperous Justice Party (PKS, Golkar Party, and the Indonesian Democratic Party of Struggle (PDI-P, this paper argues that the practice of charity has become a popular way used by politicians to patronize their constituents, but at the same time, this practice has weakened the Muslim perspective of development and social change.[Munculnya lembaga-lembaga amal yang dikelola oleh partai politik berpengaruh luas terhadap aktifitas filantropi di Indonesia dan memicu perdebatan seputar politik-kedermawanan. Dalam beberapa tahun terakhir, selaras dengan semakin meningkatnya pengaruh Islam dalam lanskap politik Indonesia, partai-partai politik juga berlomba-lomba untuk terlibat aktif dalam aktifitas filantropi dengan mendirikan lembaga amal. Ikatan kuat antara partai politik dan lembaga amal

  16. THIRD PARTY SANCTIONS IN GAMES WITH COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Obłój Jan

    2017-06-01

    Full Text Available This paper discusses the relation between communication and preservation of social norms guarded by third-party sanctions. In 2001 Jonathan Bendor and Piotr Swistak derived deductively the existence of such norms from a simple boundedly rational choice model. Their analysis was based on a perfect public information case. We take into account communication and analyse at the micro level the process of production and interpretation of information on which decisions are based. We show that when information is fully private and we allow for communication a state of anomie can result. If some social control mechanisms are available, social stability can be maintained. The less efficient the social control mechanisms however, the more restrictive rules will be needed to sustain the social norms. Furthermore not all cognitive strategies for interpreting received messages are equally effective. Strategies based on reputation are better than strategies based on profit analysis.

  17. Economic Beliefs and Party Preference

    OpenAIRE

    Michael W.M. Roos; Andreas Orland

    2014-01-01

    This paper reports the results of a questionnaire study used to explore the economic understanding, normative positions along the egalitarian-libertarian spectrum, and the party preferences of a large student sample. The aim of the study is both to find socio-economic determinants of normative and positive beliefs and to explore how beliefs about the economy influence party support. We find that positive beliefs of lay people differ systematically from those of economic experts. Positive beli...

  18. Internal party democracy as a factor of transitional societiy consolidation

    Directory of Open Access Journals (Sweden)

    O. L. Tupitzya

    2016-08-01

    The possibility of intra-party democracy appearance as a sustainable and well played phenomena can only be based on the formation of political parties as a competitive and dynamic structures that have a high degree of internal relationships and a clear understanding of a common goal that is shared by both the governing parties and the basis of parties and ordinary party members. Distribution of party members in top management, middle functional rank and ordinary members is an obvious consequence of the organizational functioning of any extensive and systematic organization.

  19. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate!

  20. Matrix revolutions? An analysis of party organization and ICT use by political parties in the Republic of Ireland

    NARCIS (Netherlands)

    Wall, M.; Sudulich, M.L.

    2010-01-01

    This article investigates the characteristics of political parties' websites in the Republic of Ireland and seeks to evaluate whether parties' organizational structures influence the manner in which they present themselves online. Ireland has been chosen as a research environment because there is

  1. Consumer use and response to online third-party raw DNA interpretation services.

    Science.gov (United States)

    Wang, Catharine; Cahill, Tiernan J; Parlato, Andrew; Wertz, Blake; Zhong, Qiankun; Cunningham, Tricia Norkunas; Cummings, James J

    2018-01-01

    With the availability of raw DNA generated from direct-to-consumer (DTC) testing companies, there has been a proliferation of third-party online services that are available to interpret the raw data for both genealogy and/or health purposes. This study examines the current landscape and downstream clinical implications of consumer use of third-party services. Study participants were recruited online from social media platforms. A total of 321 survey respondents reported using third-party services for raw DNA interpretation. Participants were highly motivated to explore raw DNA for ancestral information (67%), individual health implications (62%), or both (40%). Participants primarily used one of seven companies to interpret raw DNA; 73% used more than one. Company choice was driven by the type of results offered (51%), price (45%), and online reviews (31%). Approximately 30% of participants shared results with a medical provider and 21% shared with more than one. Outcomes of sharing ranged from disinterest/discounting of the information to diagnosis of genetic conditions. Participants were highly satisfied with their decision to analyze raw DNA (M = 4.54/5), yet challenges in understanding interpretation results were reported irrespective of satisfaction ratings. Consumers face challenges in understanding the results and may seek out clinical assistance in interpreting their raw DNA results. © 2017 The Authors. Molecular Genetics & Genomic Medicine published by Wiley Periodicals, Inc.

  2. Direct and indirect welfare chauvinism as party strategies

    DEFF Research Database (Denmark)

    Careja, Romana; Elmelund-Præstekær, Christian; Klitgaard, Michael Baggesen

    2016-01-01

    negatively affect immigrants the most. Combining quantitative and qualitative analysis of labour market reforms in Denmark, where one of the most successful populist right-wing parties in Europe – the Danish People's Party – held a pivotal position in the period 2001–11, the article traces the intentions...... and deliberate policy-making strategies of the party. It shows that the distinction between direct and indirect chauvinism is a useful theoretical tool for understanding how the Danish People's Party can fulfill the expectations of both its electorate and its coalition partners, even if they point in different...

  3. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  4. Psychometric Analyses of the Birthday Party

    Science.gov (United States)

    Lee, Young-Sun

    2016-01-01

    The present research focuses on the psychometric properties of the Birthday Party measure for ages 3-5. The Birthday Party was developed to provide a reliable, valid, and engaging measure of early mathematical content--Number and Operation, Shape, Space, and Pattern--that can be given in either a short or a long form to English and Spanish…

  5. Quantifying the Twitter Influence of Third Party Commercial Entities versus Healthcare Providers in Thirteen Medical Conferences from 2011 - 2013.

    Directory of Open Access Journals (Sweden)

    Tejas Desai

    Full Text Available Twitter channels are increasingly popular at medical conferences. Many groups, including healthcare providers and third party entities (e.g., pharmaceutical or medical device companies use these channels to communicate with one another. These channels are unregulated and can allow third party commercial entities to exert an equal or greater amount of Twitter influence than healthcare providers. Third parties can use this influence to promote their products or services instead of sharing unbiased, evidence-based information. In this investigation we quantified the Twitter influence that third party commercial entities had in 13 major medical conferences.We analyzed tweets contained in the official Twitter hashtags of thirteen medical conferences from 2011 to 2013. We placed tweet authors into one of four categories based on their account profile: healthcare provider, third party commercial entity, none of the above and unknown. We measured Twitter activity by the number of tweet authors per category and the tweet-to-author ratio by category. We measured Twitter influence by the PageRank of tweet authors by category.We analyzed 51159 tweets authored by 8778 Twitter account holders in 13 conferences that were sponsored by 5 medical societies. A quarter of all authors identified themselves as healthcare providers, while only 18% could be identified as third party commercial entities. Healthcare providers had a greater tweet-to-author ratio than their third party commercial entity counterparts (8.98 versus 6.93 tweets. Despite having less authors and composing less tweets, third party commercial entities had a statistically similar PageRank as healthcare providers (0.761 versus 0.797.The Twitter influence of third party commercial entities (PageRank is similar to that of healthcare providers. This finding is interesting because the number of tweets and third party commercial entity authors required to achieve this PageRank is far fewer than that

  6. Quantifying the Twitter Influence of Third Party Commercial Entities versus Healthcare Providers in Thirteen Medical Conferences from 2011 - 2013.

    Science.gov (United States)

    Desai, Tejas; Dhingra, Vibhu; Shariff, Afreen; Shariff, Aabid; Lerma, Edgar; Singla, Parteek; Kachare, Swapnil; Syed, Zoheb; Minhas, Deeba; Madanick, Ryan; Fang, Xiangming

    Twitter channels are increasingly popular at medical conferences. Many groups, including healthcare providers and third party entities (e.g., pharmaceutical or medical device companies) use these channels to communicate with one another. These channels are unregulated and can allow third party commercial entities to exert an equal or greater amount of Twitter influence than healthcare providers. Third parties can use this influence to promote their products or services instead of sharing unbiased, evidence-based information. In this investigation we quantified the Twitter influence that third party commercial entities had in 13 major medical conferences. We analyzed tweets contained in the official Twitter hashtags of thirteen medical conferences from 2011 to 2013. We placed tweet authors into one of four categories based on their account profile: healthcare provider, third party commercial entity, none of the above and unknown. We measured Twitter activity by the number of tweet authors per category and the tweet-to-author ratio by category. We measured Twitter influence by the PageRank of tweet authors by category. We analyzed 51159 tweets authored by 8778 Twitter account holders in 13 conferences that were sponsored by 5 medical societies. A quarter of all authors identified themselves as healthcare providers, while only 18% could be identified as third party commercial entities. Healthcare providers had a greater tweet-to-author ratio than their third party commercial entity counterparts (8.98 versus 6.93 tweets). Despite having less authors and composing less tweets, third party commercial entities had a statistically similar PageRank as healthcare providers (0.761 versus 0.797). The Twitter influence of third party commercial entities (PageRank) is similar to that of healthcare providers. This finding is interesting because the number of tweets and third party commercial entity authors required to achieve this PageRank is far fewer than that needed by

  7. The gender of party leadership and its impact on voter's asessment

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Even though most political parties are still male dominated, an increasing number of women reach the top position of party leader. Furthermore, party leadership is increasingly regarded as an important part of party images due to the personalization of politics. Does the gender of the party leader...... leader characteristics appreciated by men and women. If this holds, the gender of party leadership matters to women because they value woman party leaders higher, not because they value other characteristics than men....

  8. The Hobby Horse of the Party for the Animals

    NARCIS (Netherlands)

    Otjes, Simon

    2016-01-01

    Can a small, new political party increase the attention to nonhuman animal welfare? This paper traces the effect of the Party for the Animals on the Dutch parliament. This was the first animal advocacy party to enter parliament.

  9. STEM and the Evolution of the Astronomical Star Party

    Science.gov (United States)

    Day, B. H.; Munive, P.; Franco, J.; Jones, A. P.; Shaner, A. J.; Buxner, S.; Bleacher, L.

    2015-12-01

    The astronomical star party has long been a powerful and effective way to engage the public and enhance cohesiveness within the amateur astronomy community. Early star parties tended to be strictly small, local events. But with improvements in transportation, larger regional star parties became popular. These advanced the considerable capabilities for citizen science in the amateur community, shared technology and engineering innovations in the field of telescope making, and refined numerous mathematical techniques in areas such instrument design and ephemeris generation, covering the full breadth of STEM. Advancements in astrophotography showcased at these events brought the star party from STEM to STEAM. Now, the advent of social media, web streaming, and virtual presence has facilitated the phenomenon of very large, networked star parties with international scope. These mega star parties take public engagement to a new, far greater levels, giving a vastly larger and more diverse public the opportunity to directly participate in exciting first-hand STEM activities. This presentation will recount the evolution of the star party and will focus on two examples of large, multinational, networked star parties, International Observe the Moon Night and Noche de las Estrellas. We will look at lessons learned and ways to participate.

  10. Race, ideology, and the tea party: a longitudinal study.

    Directory of Open Access Journals (Sweden)

    Eric D Knowles

    Full Text Available The Tea Party movement, which rose to prominence in the United States after the election of President Barack Obama, provides an ideal context in which to examine the roles of racial concerns and ideology in politics. A three-wave longitudinal study tracked changes in White Americans' self-identification with the Tea Party, racial concerns (prejudice and racial identification, and ideologies (libertarianism and social conservatism over nine months. Latent Growth Modeling (LGM was used to evaluate potential causal relationships between Tea Party identification and these factors. Across time points, racial prejudice was indirectly associated with movement identification through Whites' assertions of national decline. Although initial levels of White identity did not predict change in Tea Party identification, initial levels of Tea Party identification predicted increases in White identity over the study period. Across the three assessments, support for the Tea Party fell among libertarians, but rose among social conservatives. Results are discussed in terms of legitimation theories of prejudice, the "racializing" power of political judgments, and the ideological dynamics of the Tea Party.

  11. Race, Ideology, and the Tea Party: A Longitudinal Study

    Science.gov (United States)

    Knowles, Eric D.; Lowery, Brian S.; Shulman, Elizabeth P.; Schaumberg, Rebecca L.

    2013-01-01

    The Tea Party movement, which rose to prominence in the United States after the election of President Barack Obama, provides an ideal context in which to examine the roles of racial concerns and ideology in politics. A three-wave longitudinal study tracked changes in White Americans’ self-identification with the Tea Party, racial concerns (prejudice and racial identification), and ideologies (libertarianism and social conservatism) over nine months. Latent Growth Modeling (LGM) was used to evaluate potential causal relationships between Tea Party identification and these factors. Across time points, racial prejudice was indirectly associated with movement identification through Whites’ assertions of national decline. Although initial levels of White identity did not predict change in Tea Party identification, initial levels of Tea Party identification predicted increases in White identity over the study period. Across the three assessments, support for the Tea Party fell among libertarians, but rose among social conservatives. Results are discussed in terms of legitimation theories of prejudice, the “racializing” power of political judgments, and the ideological dynamics of the Tea Party. PMID:23825630

  12. Turkish Political Market and the Perception of Political Parties

    Directory of Open Access Journals (Sweden)

    Cihat Polat

    2015-06-01

    Full Text Available This study attempts to describe the Turkish political market and determine where and how Turkish political parties are perceived by voters. The study uses a two-dimensional map to determine the voter perceptions of the parties in the Turkish political market based on a survey questionnaire applied to 400 young voters. It also investigates whether there are any major differences in the perception of parties in the political space based on voter ideologies. The study finds that young voters have clear perceptions of the positions of Turkish parties. It also finds that voter perceptions of parties vary based on voters’ ideological positions.

  13. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  14. [Eng] Voting for Parties or for Candidates? The Trade-Off Between Party and Personal Representation in Spanish Regional and Local Elections

    Directory of Open Access Journals (Sweden)

    Pablo Barberá

    2010-01-01

    Full Text Available When voters cast their ballot, are they choosing a candidate or a party? Electoral systems have a significant impact on how this question is answered in each country. As previous literature has shown, some electoral rules foster a more personal representation, while others strengthen the intermediary role of parties. In this paper I maintain that there exists a trade-off between these two types of representation. To empirically verify its existence and how it works, I have chosen local and regional elections in Spain as a case study. Given that they take place simultaneously under similar electoral systems, they can be considered a natural experiment for the study of this trade-off, which allows me to overcome the potential problems of endogeneity present in previous studies. By measuring the significance of ideological closeness and candidate evaluations in voters? decisions at each level, it is shown that the importance of personal representation increases in local elections at the expense of a less frequent use of ideological proximity as an informational shortcut, thus confirming the existence of the trade-off.

  15. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks! Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! http://www.cern.ch/cern50/

  16. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! http://www.cern.ch/cern50/

  17. JUDGMENT OF POLITICAL PARTIES ACCOUNTABILITY OF THE RIO GRANDE DO NORTE STATE: WHICH ASPECTS RELATE WITH APPROVAL AND DISAPPROVAL?

    Directory of Open Access Journals (Sweden)

    Stênnia Maria Ferreira de Brito

    2016-03-01

    Full Text Available The aim of this study is to identify factors that relate to the judgment of political parties accountability operating in the state of Rio Grande do Norte. Twenty-four political parties with directory in the state were selected considering those who have had their accounts judged between 2006 to 2013. In order to determine which factors are related to the trial of party accounts, logistic regression were considered for the analysis. Independent variables were the total revenues received by the party (in logarithm, dummy for political parties with or without the resources of the party fund and dummy for years that there were state elections, while the trial of the accounts of parties (approval / disapproval is dependent variable. The results show that only the dummy's Party Fund positively influence the judgments of the annual accounts parties. Thus, it is understood that the parties receiving public funds are more likely to provide better information and, therefore, have its accounts approved by the Unidade Técnica do Tribunal Regional Eleitoral do Rio Grande do Norte. Moreover, one can even say that the parties receiving such government help have a trend or an indication of concern with the concept of accountability, since the party fund is a public resource. It is recommended that future studies address other indicators, for example, liquidity, debt and profitability. Moreover, as also proxies related to the disclosure of financial statements, number of persons elected by party in relation to the number of candidates and party members number could become plausible indicators for future research that would use the same methodology. In addition, replicate this metodology to other states for comparative issues, and even use the same methodology at national level could be aspects of research to be worked for the future.

  18. 13 CFR 120.920 - Required participation by the Third Party Lender.

    Science.gov (United States)

    2010-01-01

    ...) Third Party Loan collateral. Third Party Loans usually are collateralized by a first lien on the Project... BUSINESS LOANS Development Company Loan Program (504) Third Party Loans § 120.920 Required participation by the Third Party Lender. (a) Amount of Third Party Loans. A Project financing must include one or more...

  19. Crossing boundaries : Involving external parties in innovation

    NARCIS (Netherlands)

    Slot, J.H.

    2013-01-01

    To improve the return on investments in innovation, firms increasingly open up their new product development (NPD) processes by inviting external parties to participate. This dissertation focuses on the involvement of three different types of external parties in the NPD process: suppliers,

  20. Information barriers and authentication

    International Nuclear Information System (INIS)

    MacArthur, D.W.; Wolford, J.K.

    2001-01-01

    Acceptance of nuclear materials into a monitoring regime is complicated if the materials are in classified shapes or have classified composition. An attribute measurement system with an information barrier can be emplo,yed to generate an unclassified display from classified measurements. This information barrier must meet two criteria: (1) classified information cannot be released to the monitoring party, and (2) the monitoring party must be convinced that the unclassified output accurately represents the classified input. Criterion 1 is critical to the host country to protect the classified information. Criterion 2 is critical to the monitoring party and is often termed the 'authentication problem.' Thus, the necessity for authentication of a measurement system with an information barrier stems directly from the description of a useful information barrier. Authentication issues must be continually addressed during the entire development lifecycle of the measurement system as opposed to being applied only after the system is built.

  1. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  2. Major trends in party system in Ukraine for 1998-2014 years

    Directory of Open Access Journals (Sweden)

    D. K. Nosenko

    2015-01-01

    Full Text Available The current party system of Ukraine, defined its main features and trends with regard of parliamentary elections 2014 was investigated. The classification, which distinguish the parliamentary system was determined. It is established that the party system has undergone significant changes compared to previous years. Thus, according to classification Mayra Ukrainian party system evolved from a secondary party system to a system of small parties because the two largest parties have 47.5% of votes in parliament. Meyer’s Index fell by almost a factor of 2, indicating that the party system became more competitive, the process of forming a coalition will be longer, and the stability of the government will be lower than in previous years. The calculated effective indices of the number of parties suggested Laakso, Taagepera and Golosov also show that the party system became more fragmented. Based on the analyzed results of parliamentary elections for 1998­2014 years, it has found that increasing or decreasing the percentage threshold of 1%, not significantly affected by the number of parties represented in Parliament; none of the parties could not be present in every convocation; there is uncertainty in electoral preferences.

  3. Use of information barriers to protect classified information

    International Nuclear Information System (INIS)

    MacArthur, D.; Johnson, M.W.; Nicholas, N.J.; Whiteson, R.

    1998-01-01

    This paper discusses the detailed requirements for an information barrier (IB) for use with verification systems that employ intrusive measurement technologies. The IB would protect classified information in a bilateral or multilateral inspection of classified fissile material. Such a barrier must strike a balance between providing the inspecting party the confidence necessary to accept the measurement while protecting the inspected party's classified information. The authors discuss the structure required of an IB as well as the implications of the IB on detector system maintenance. A defense-in-depth approach is proposed which would provide assurance to the inspected party that all sensitive information is protected and to the inspecting party that the measurements are being performed as expected. The barrier could include elements of physical protection (such as locks, surveillance systems, and tamper indicators), hardening of key hardware components, assurance of capabilities and limitations of hardware and software systems, administrative controls, validation and verification of the systems, and error detection and resolution. Finally, an unclassified interface could be used to display and, possibly, record measurement results. The introduction of an IB into an analysis system may result in many otherwise innocuous components (detectors, analyzers, etc.) becoming classified and unavailable for routine maintenance by uncleared personnel. System maintenance and updating will be significantly simplified if the classification status of as many components as possible can be made reversible (i.e. the component can become unclassified following the removal of classified objects)

  4. Electoral Entry and Success of Ethnic Minority Parties in Central and Eastern Europe: A Hierarchical Selection Model

    DEFF Research Database (Denmark)

    Bernauer, Julian; Bochsler, Daniel

    2011-01-01

    and electoral demand, measured here as the size of ethnic groups and the saliency of ethnic issues. In line with these expectations, parties only run if they can expect electoral support sufficient to pass the electoral threshold. This finding would have been overlooked by a na??ve model of electoral success...... which does not take self-selection into account. ?? 2011 Elsevier Ltd....

  5. Modelling the dynamics of two political parties in the presence of switching.

    Science.gov (United States)

    Nyabadza, F; Alassey, Tobge Yawo; Muchatibaya, Gift

    2016-01-01

    This paper generalizes the model proposed by Misra, by considering switching between political parties. In the model proposed, the movements of members from political party B to political party C and vice versa, are considered but the net movement is considered by assuming that [Formula: see text] (a constant), which implies that the movement of members is either from party B to party C or from party C to party B. In this paper we remodel these movements through switching functions to capture how individuals switch between parties. The results provide a more comprehensive synopsis of the dynamics between two political parties.

  6. Third party objection and action against enforcement: Request for exclusion

    Directory of Open Access Journals (Sweden)

    Salma Marija

    2014-01-01

    Full Text Available This paper deals with a right of a third party to prevent enforcement on the basis of a claim and evidence that rights or assets seized in enforcement proceeding belong to him (third party and not to the enforcement debtor. In most of jurisdictions that were subject of analysis of this paper, this right of a third party is exercised by filing an objection to the court conducting enforcement proceedings. The claim of the third party is directed towards the enforcement creditor as well as against the enforcement debtor. In the event the claim of the third party is being contested, the court instructs the third party to initiate litigation proceedings for determining whether the third party is entitled to exclusion of such rights or assets from enforcement, especially if such third party holds property rights or some other rights over the assets that are being subject to enforcement proceedings. In majority of analyzed jurisdictions, enforcement proceedings are being suspended provided the third party, in the objection being filed makes prima facie likely, on the basis of credible evidence, that his assets were seized in the enforcement proceedings. However, according to the law of the Republic of Serbia, a credible objection of a third party does not result in suspension of enforcement proceedings, something that is being criticized in this paper. As a result of this provision of the law, a bona fide third party is forced to endure the enforcement although his claim has been made likely and subsequently confirmed in the litigation proceedings. The author, in particular, points to the legal consequences of mala fide enforcement creditor that knew that the assets that are being subject of the enforcement proceedings do not belong to the enforcement debtor. The author is of the opinion that, in such cases, the enforcement creditor should be obliged to pay to the third party damages that such party suffered as a result of enforcement proceedings being

  7. Third party Superfund lawsuit defense influenced by the choice of remediation method

    International Nuclear Information System (INIS)

    Haddad, B.I.; Parish, G.B.

    1994-01-01

    Paper Company A was sued in a third party action suit initiated by a local utility who was a potential responsible party (PRP) to a contaminated site regulated under the Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) program. In addition to Paper Company A, other parties to the third party suit included Paper Company B and Contractor C, a demolition contractor/waste hauler. Other PRPs included land owners where the contaminated debris was dumped, Mr. and Mrs. D. Based on background information, Paper Company A dumped coal ash, off quality feed stock, wood and trash north of the D-property. Paper Company B admitted dumping material north of the D-property. Samples of industrial sludges on the D-property had properties characteristic of the Paper Company B's sludges. Paper Company B dumped ash, chromium contaminated gypsum sludge and other waste. The utility company dumped ash on the D-property. Contractor C hauled demolition debris to the D property. A third PRP, Company E was the original owner of the buildings that were demolished. This PRP settled with the EPA as part of a bankruptcy settlement. The hazardous substances encountered at the site included PCBs, chromium and lead in the coal ash, demolition debris and industrial sludges. Disposal of material containing hazardous substances resulted in PCB contaminated debris and sediment, and chromium and lead contamination in the sediment, soil and groundwater

  8. Bewitched - The Tea Party Movement

    DEFF Research Database (Denmark)

    Ashbee, Edward

    2011-01-01

    This article considers the development of the Tea Party movement, the character of its thinking and the nature of the interests and constituencies to which it is tied. The article suggests that despite the importance of ideas and interests, and the process of interaction between them, the movement....... The political friction that this creates has contributed to the anger that has characterised the movement. While the Tea Party movement may, as such, have only an ephemeral existence, independent conservatives are likely to remain a significant and potent constituency and will, within the institutional...

  9. Key Design Properties for Shipping Information Pipeline

    DEFF Research Database (Denmark)

    Jensen, Thomas; Tan, Yao-Hua

    2015-01-01

    on paper, e-mail, phone and text message, and far too costly. This paper explores the design properties for a shared information infrastructure to exchange information between all parties in the supply chain, commercial parties as well as authorities, which is called a Shipping Information Pipeline...

  10. Évolution des partis politiques dans le monde arabe | Page 3 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Political parties in Algeria : the limits of participation ... IDRC invests in research and knowledge to empower women in India ... New website will help record vital life events to improve access to services for all. A new website and resource library will help improve developing country registration and information systems for ...

  11. Flawed Political Party Primaries In Nigeria's Fourth Republic: The ...

    African Journals Online (AJOL)

    African Journal for the Psychological Study of Social Issues ... However, through an assessment of extant secondary data, this paper submits that the experience in the Peoples Democratic Party; the ruling party, during the 2007 General Elections was a case of deliberate imposition of candidates by powerful party leaders.

  12. Quantifying the Twitter Influence of Third Party Commercial Entities versus Healthcare Providers in Thirteen Medical Conferences from 2011 – 2013

    Science.gov (United States)

    Dhingra, Vibhu; Shariff, Afreen; Shariff, Aabid; Lerma, Edgar; Singla, Parteek; Kachare, Swapnil; Syed, Zoheb; Minhas, Deeba; Madanick, Ryan; Fang, Xiangming

    2016-01-01

    Introduction Twitter channels are increasingly popular at medical conferences. Many groups, including healthcare providers and third party entities (e.g., pharmaceutical or medical device companies) use these channels to communicate with one another. These channels are unregulated and can allow third party commercial entities to exert an equal or greater amount of Twitter influence than healthcare providers. Third parties can use this influence to promote their products or services instead of sharing unbiased, evidence-based information. In this investigation we quantified the Twitter influence that third party commercial entities had in 13 major medical conferences. Methods We analyzed tweets contained in the official Twitter hashtags of thirteen medical conferences from 2011 to 2013. We placed tweet authors into one of four categories based on their account profile: healthcare provider, third party commercial entity, none of the above and unknown. We measured Twitter activity by the number of tweet authors per category and the tweet-to-author ratio by category. We measured Twitter influence by the PageRank of tweet authors by category. Results We analyzed 51159 tweets authored by 8778 Twitter account holders in 13 conferences that were sponsored by 5 medical societies. A quarter of all authors identified themselves as healthcare providers, while only 18% could be identified as third party commercial entities. Healthcare providers had a greater tweet-to-author ratio than their third party commercial entity counterparts (8.98 versus 6.93 tweets). Despite having less authors and composing less tweets, third party commercial entities had a statistically similar PageRank as healthcare providers (0.761 versus 0.797). Conclusion The Twitter influence of third party commercial entities (PageRank) is similar to that of healthcare providers. This finding is interesting because the number of tweets and third party commercial entity authors required to achieve this Page

  13. Christmas party

    CERN Multimedia

    Staff Association

    2011-01-01

    The Christmas party organized by the Staff Association took place on Saturday 3 December. 200 children from 5 to 7 years old attended a magic show which filled them with wonder. Then they were served a snack in the Novae restaurant. Finally, just before their parents came to pick them up, Father Christmas gave them a present. The Staff Association wishes you a Merry Christmas and a Happy New Year!

  14. The Third Party Logistics Partner Selection of B2C E-Commerce Enterprise

    Directory of Open Access Journals (Sweden)

    Xu Wei

    2017-01-01

    Full Text Available In recent years, with the rapid development of Internet, e-commerce enterprises in China is at an alarming rate of sustainable development, the B2C e-commerce in the online shopping market accounted for a large proportion, with the rapid change of the market and customer needs to establish a flexible distribution service is one of the many e-commerce companies need to solve. Using self logistics capital occupancy bigger; the logistics alliance, with the risk of internal information disclosure; and on the third party logistics, not only capital and manpower can be effectively used, helps enterprises to strengthen the core business. Therefore, it is very important to choose the appropriate third party logistics providers to reduce operating costs and improve the market influence. This paper analyses the existing problems in the third party logistics, the establishment of a more complete index system, according to the actual situation of the suppliers, using the improved AHP method and the entropy coefficient method to get the comprehensive weight, finally get the approximation method to meet the business requirements of the logistics service providers use the ideal, for commercial enterprises to third party logistics service provider selection and puts forward some available models.

  15. Party-political and electoral system of Uruguay

    Directory of Open Access Journals (Sweden)

    Samuel Decresci

    2015-06-01

    Full Text Available The Oriental Republic of Uruguay is seen by many as a pioneer among Latin American nations to modernize its state and its policy. Since the late nineteenth century to the twentieth, Uruguayan political actors operate significant changes such as the separation of church and state, labor regulation, divorce law, women's vote, etc. Because of this and the progressive modernization, it was called the “Switzerland of the Americas”. Today, it still stands out in this area by regularizing abortion, homoaffective marriage, liberalization and access to marijuana. Moreover, noteworthy that such measures were achieved largely because of governance that the executive enjoys in the midst of this political system. Thus, this work aims to analyze such Uruguayan political system. In short, a political system is understood by the government system, the electoral system and the party system. That said, it will be analyzed in the political scenario of the country, their characteristics, party and election rules, political parties, party dynamics and relations between the powers.

  16. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  17. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  18. Off-line electronic cash based on secret-key certificates

    NARCIS (Netherlands)

    S.A. Brands (Stefan)

    1995-01-01

    textabstractAn off-line electronic coin system is presented that offers multi-party security and unconditional privacy of payments. The system improves significantly on the efficiency of the previously most efficient such system known in the literature, due to application of a recently proposed

  19. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Faust, Sebastian; Hazay, Carmit

    2011-01-01

    We propose a 2-party UC-secure computation protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic...

  20. Third party financing of renewable energy sources

    International Nuclear Information System (INIS)

    1994-01-01

    The Institut of Energy Saving and Diversification (IDAE) hosted the third party on financing Renewable Energy Sources in Spain. The main aspects were : 1) Experiences in renewable energy. 2) Financing of small hydro-power projects. 3) Third party financing of biomass projects. 4) Financing of wind energy projects

  1. Librarians and Party Girls: Cultural Studies and the Meaning of the Librarian.

    Science.gov (United States)

    Radford, Marie L.; Radford, Gary P.

    2003-01-01

    Responds to Wayne Wiegand's article that criticizes library and information science by suggesting a cultural studies approach to the field. Applies the work of Stuart Hall to a media stereotype of the female librarian based on the film "Party Girl" to allow new interpretations of media images of the profession. (Author/LRW)

  2. Incorrect strain information for mouse cell lines: sequential influence of misidentification on sublines.

    Science.gov (United States)

    Uchio-Yamada, Kozue; Kasai, Fumio; Ozawa, Midori; Kohara, Arihiro

    2017-03-01

    Misidentification or cross-contamination of cell lines can cause serious issues. Human cell lines have been authenticated by short tandem repeat profiling; however, mouse cell lines have not been adequately assessed. In this study, mouse cell lines registered with the JCRB cell bank were examined by simple sequence length polymorphism (SSLP) analysis to identify their strains. Based on comparisons with 7 major inbred strains, our results revealed their strains in 80 of 90 cell lines. However, 12 of the 80 cell lines (15%) were found to differ from registered information. Of them, 4 cell lines originated from the same mouse, which had been generated through mating between two different inbred strains. The genotype of the mouse sample had not been examined after the backcross, leading to strain misidentification in those cell lines. Although 8 other cell lines had been established as sublines of a BALB/c cell line, their SSLP profiles are similar to a Swiss cell line. This affects differences in genotypes between inbred and outbred strains. Because the use of inbred samples and interbreeding between strains are not involved in human materials, our results suggest that the cause and influence of misidentification in mouse cell lines are different from those in human.

  3. Party Governance and the Selection of Parliamentarians

    NARCIS (Netherlands)

    K.J. Beniers (Klaas)

    2005-01-01

    textabstractThis paper examines the incentives for a party leader in office and for a parties' rank-and-file to replace a sitting member of parliament. As to the leader's decision, we show that the leader prefers to replace a critical member of parliament who votes against the leader's policy. A

  4. Parties, rituals and symbolisms in schools

    Directory of Open Access Journals (Sweden)

    Ana Cecilia Valencia Aguirre

    2015-07-01

    Full Text Available This paper aims at analyzing school parties from interaction spaces and principals’ narratives in six schools in the state of Jalisco. A party is a ritual where participants share symbols related to imaginary –hence the importance of conducting an analysis for understanding institutions as a symbolic framework. A core argument is that established actors are configured from symbolic practices in the institutional space (schools. The repetition of these practices awash with symbolism leads to daily rituals or micro rituals that are ratified in institutions. Methodologically, interviews and non-participant observation in school interaction spaces were used. Based on the findings, it may be stated that the nuclear family, rooted in the Christian image in which authority is a central point, becomes a fundamental factor in shaping institutional life as well as the imaginary linked to school parties.

  5. Candidate nomination, intra-party democracy, and election violence in Africa

    DEFF Research Database (Denmark)

    Seeberg, Merete Bech; Wahman, Michael; Skaaning, Svend-Erik

    2018-01-01

    . When local-level or national-level competition between parties is low, as in much of Africa, electoral politics become a matter of intra-party rather than inter-party competition. Nominations are a part of the electoral process often left to the discretion of poorly institutionalized parties, free......This article introduces a special issue on candidate nomination, intra-party democracy, and election violence in Africa. Although a burgeoning literature on African democratization has focused on the topic of electoral violence, little attention has been given to violence during party nominations...... of the involvement of electoral management bodies and external monitors, and violence often results. Rather than developing an elaborate theoretical framework on the causes of nomination violence, our ambition in this introduction is to introduce the concept of nomination violence and situate it in the literatures...

  6. Secure multi-party quantum summation based on quantum Fourier transform

    Science.gov (United States)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  7. Simulating political stability and change in the Netherlands (1998-2002). An agent-based model of party competition with media effects empirically tested.

    NARCIS (Netherlands)

    Muis, J.C.

    2010-01-01

    Agent-based models of political party competition in a multidimensional policy space have been developed in order to reflect adaptive learning by party leaders with very limited information feedback. The key assumption is that two categories of actors continually make decisions: voters choose which

  8. Simple multi-party set reconciliation

    DEFF Research Database (Denmark)

    Mitzenmacher, Michael; Pagh, Rasmus

    2017-01-01

     set reconciliation: two parties A1A1 and A2A2 each hold a set of keys, named S1S1 and S2S2 respectively, and the goal is for both parties to obtain S1∪S2S1∪S2. Typically, set reconciliation is interesting algorithmically when sets are large but the set difference |S1−S2|+|S2−S1||S1−S2|+|S2−S1| is small...

  9. A contextual analysis of party system formation in Nigeria, 1960-2011

    Directory of Open Access Journals (Sweden)

    Aliyu Mukhtar Katsina

    2013-12-01

    Full Text Available This article investigates the parties and party systems in Nigeria since independence. The article argues that the country has witnessed four different types of party systems corresponding to the four democratisation attempts that saw the emergence of constitutional governments since 1960. Special focus is awarded to the transformations of the four party systems and developments in their various institutional designs including regulating the number of parties that participate in the electoral politics of the country. In trying to achieve its objective, the article adopts chronological and thematic approaches. Chronologically, the paper investigates these party systems in successive order beginning with the First Republic when the elements of party politics were first adopted in Nigeria. Thematically, the article focuses on those issues that influenced the formation and transformation of the party systems from the First Republic in 1960 to the present Fourth Republic.

  10. Hotel Overbooking and Cooperation with Third-Party Websites

    Directory of Open Access Journals (Sweden)

    Yufeng Dong

    2015-08-01

    Full Text Available Hotels cooperate with third-party websites to enhance their competitive position and attain sustainable development in the era of e-commerce. Furthermore, hotel managers overbook to hedge against last-minute cancellations and customer no-shows. This paper discusses pricing and overbooking strategies of a hotel in the context of cooperation with multiple third-party websites and analyzes how these strategies influence the cooperation process. The increase in profits resulting from the overbooking strategy is also examined. A model of a Stackelberg game between the hotel and third-party websites and a Nash game among the third-party websites are developed to analyze the process. Results indicate that the compensation coefficient has a slight influence on hotel pricing strategy, but causes a sharp decrease in overbooking level. As the hotel demands to lessen the probability of denying under higher compensation rate, the third-party websites would exert less sales effort to reduce the demand of online customers. Results also show that under a given market demand, hotel effort only serves to redistribute market shares among the hotel and third-party websites, without influencing hotel pricing and overbooking decisions. Specifically, the market shares of the third-party websites decrease in the effort level of the hotel resulting from an increase in the hotel market share. Finally, in the numerical example where one hotel and two websites are analyzed, hotel overbooking strategy improves hotel profit by 4.20%, whereas profit improvements for Websites 1 and 2 are as high as 5.26% and 5.21%, respectively. Managerial implications of the study are also provided.

  11. Report of the 33rd Japanese Antarctic Research ExpeditionーActivities of the summer party(1991-1992and wintering party(1992ー

    Directory of Open Access Journals (Sweden)

    Mitsuo Fukuchi

    1996-03-01

    Full Text Available Summer activities in the 1991/92 austral summer and winter activities in 1992 of the 33rd Japanese Antarctic Research Expedition (JARE are described. The JARE-33 consisted of 16 members of the summer party and 37 members of the wintering party (one member of the wintering party returned with the summer party. Two Brazilian fish physiologists joined the summer party based on the exchange scientist program of the Antarctic Treaty. The icebreaker SHIRASE left Tokyo on 14 November 1991 and arrived at Breid Bay on 18 December, where the closing of Asuka Camp was completed. Then she headed to Syowa Station and arrived there on 4 January 1992. Transportation of cargo by helicopter to Syowa Station was carried out between 23 December 1991 and 18 January 1992. A total of 848t of cargo, including pipe transport of light oil (342kl and freight by oversnow vehicles (215t, were transported. A new central building was constructed from 23 December to 17 February as the start of an 8-year reintegration project of Syowa Station. Three generator engines of 200kVA capacity were overhauled. Concurrently, various research programs such as absolute gravity measurement and field surveys including inland oversnow traverse were performed. However, there were some problems with a super conducting gravity meter while the gravity meter was being tested for winter operation. Therefore, one scientist working on the gravity meter who planned to winter-over decided to leave Syowa Station with the gravity meter. all of the summer party left Syowa Station on 17 February and headed to Sydney, Australia, while oceanographic and marine biological observations were carried out on board. Members of the summer party of JARE-33 and the wintering party of JARE-32 returned to Narita by air on 27 March 1992. The wintering party of JARE-33 worked at Syowa Station from 1 February 1992 to 31 January 1993. The scientific research programs cover the following four major disciplines : (1 upper

  12. Contract law: relationship between dermatologists and third-party payers.

    Science.gov (United States)

    Askanas, A V

    1993-04-01

    The relationship between third-party payers and dermatologists is generally governed by a written contract. That relationship can be more beneficial to the dermatologist, and chances of liability may be decreased, both for breach of contract and for malpractice, if the dermatologist pays close attention to the language in the contract. All contracts are generally negotiable; detrimental language in the contract often may be removed or changed. This article presents information to help prepare dermatologists to review and negotiate contracts.

  13. Church parties in the Arian controversy: problems of typologization

    Directory of Open Access Journals (Sweden)

    Georgy Zakharov

    2017-12-01

    Full Text Available The article is devoted to the problems of typologization of the church parties of the 4th century. This historical phenomenon arises within the framework of a long church conflict, called the Arian crisis. The designations of the church parties used by contemporaries are polemical concepts and do not correspond to the self-consciousness of their supporters. In the early Christian heresiological tradition and in the modern historiography, the basis of church parties’ classification is their theological position. However, it is necessary to take into account other consolidating factors, such as Eucharistic communion and church-political activity. The formation of church parties, as a rule, was directly related to the development of the synodal institution. Analysis of sources in the 4th century allows us to distinguish, in addition to the extensive currents - macro-parties - claiming a universal or regional consensus based on the heritage of one of the representative and authoritative councils, some small consolidated groups - micro-parties, which gather for little councils and constantly coordinate their actions within the ecclesiastical confrontation. Micro-parties could exist both within the limits of macro-party, in many respects determining the trends of it’s development, and beyond it’s boundaries. In the latter case, it is actually a marginal church group rallied around one or more extraordinary theologian, sometimes even without the episcopal rank.

  14. Attendance and alcohol use at parties and bars in college: a national survey of current drinkers.

    Science.gov (United States)

    Harford, Thomas C; Wechsler, Henry; Seibring, Mark

    2002-11-01

    This study examines attendance and alcohol use at parties and bars among college students by gender, residence, year in school and legal drinking age. The study participants were respondents in the 1997 and 1999 Harvard School of Public Health College Alcohol Study (CAS). The combined sample consisted of 12,830 students (61% women) who reported use of alcohol in the past 30 days prior to interview. Their responses provided information on attendance and alcohol use at parties (dormitory, fraternity, off campus) and off-campus bars. Logistic regression analyses examined the influence of gender, residence, year in school and legal drinking age related to attendance, drinking/non-drinking and heavy drinking (5 or more drinks) at each select setting. Consistent with the literature, fraternity/ sorority parties were occasions of heavy drinking (49%) among drinkers in those settings, yet they drew upon smaller proportions of students (36%) when compared to off-campus parties (75%) and off-campus bars (68%). Off-campus parties (45%) and bars (37%) were also occasions for heavy drinking among drinkers in these settings. College residence was shown to relate to differential exposure to drinking settings, but residence had less impact on the decision to drink and the level of heavy drinking. Attendance at parties decreased with advance in school years, but attendance at off-campus bars increased. Although heavy drinking at off-campus bars decreased with advancing grade year in school, slightly higher proportions of under-age students (41%) compared to students of legal drinking age (35%) exhibited heavy drinking at off-campus bars. The identification of high-risk settings and their correlates serves to better understand the development of heavy drinking on college campuses. Off-campus parties, as compared to campus parties and bars, may pose greater difficulties related to successful intervention.

  15. The value of political parties to representative democracy

    NARCIS (Netherlands)

    Kölln, Ann-Kristin

    2015-01-01

    Political parties play a major role in democratic processes around the world. Recent empirical research suggests that parties are increasingly less important to citizens. Simultaneously, classic and contemporary theories of representative democracy specifically still minimally incorporate accounts

  16. From Party Systems to Party Organizations: The Adaptation of Latin American Parties to Changing Environments De sistemas partidarios a la organización partidaria. La adaptación de partidos latinoamericanos a ambientes cambiantes

    Directory of Open Access Journals (Sweden)

    Laura Wills-Otero

    2009-04-01

    Full Text Available Review Article:Alcántara Sáez, Manuel (ed. (2008, Politicians and Politics in Latin America, Boulder: Lynne Rienner Publishers. Greene, Kenneth F. (2007, Why Dominant Parties Lose. Mexico’s Democratization in Comparative Perspective, New York: Cambridge University Press. Levitsky, Steven (2003, Transforming Labor-based Parties in Latin America: Argentine Peronism in Comparative Perspective, New York: Cambridge University Press. The study of party systems and political parties is one of the largest subfields in political science. Classic studies in advanced democracies focused primarily on party systems and developed theories about the causes and consequences of different types of systems. In recent years, new academic work begun to differentiate parties within systems by understanding their organizational structure, their internal dynamics, the different ways in which they interact with their constituencies, and the strategies that they use to attract voters. Studies show that parties within the same system behave and react differently given their internal conditions. This article reviews three scholarly books that deal with this issue. The works analyze the internal dynamics of Latin American political parties and their capacity to respond and adapt their structures when environmental challenges take place. Review Article:Alcántara Sáez, Manuel (ed. (2008, Politicians and Politics in Latin America, Boulder: Lynne Rienner Publishers. Greene, Kenneth F. (2007, Why Dominant Parties Lose. Mexico���s Democratization in Comparative Perspective, New York: Cambridge University Press. Levitsky, Steven (2003, Transforming Labor-based Parties in Latin America: Argentine Peronism in Comparative Perspective, New York: Cambridge University Press. El estudio de los sistemas de partidos y partidos políticos es una de las áreas más amplias en la ciencia política. Trabajos clásicos llevados a cabo en democracias avanzadas, enfocaron su atenci

  17. 11 CFR 109.37 - What is a “party coordinated communication”?

    Science.gov (United States)

    2010-01-01

    ... Provisions for Political Party Committees § 109.37 What is a “party coordinated communication”? (a) Definition. A political party communication is coordinated with a candidate, a candidate's authorized... paragraphs (a)(1), (a)(2), and (a)(3) of this section. (1) The communication is paid for by a political party...

  18. 25 CFR 11.906 - Rights of parties.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Children's Court § 11.906 Rights of parties. (a) In all hearings and proceedings under §§ 11.900-11.1114 of this part the following rights will be observed unless modified by the particular... 25 Indians 1 2010-04-01 2010-04-01 false Rights of parties. 11.906 Section 11.906 Indians BUREAU...

  19. The impact of product market competition on transactions with related parties and company performance

    Directory of Open Access Journals (Sweden)

    Mojtaba Asadi

    2015-03-01

    Full Text Available This paper presents an empirical investigation on the effect of product market competition on transactions with related parties and company performance. The study selects a sample of 250 randomly selected firms whose common shares were traded on Tehran Stock Exchange. The study uses Herfindahl-Hirschman Index (HHI to measure the market concentration and uses historical information over the period 2008-2012 to examine the hypotheses of the survey. Using simple regression analysis, the study has detected a positive relationship between HHI and related party transactions. In addition, the study has detected a negative relationship between competition and company performance measured by return on assets.

  20. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block...... known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse...

  1. The 2014 Elections and the Brazilian Party System

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2015-04-01

    Full Text Available The Brazilian party system presents a paradox. Although the Workers Party (PT and the Brazilian Social Democratic Party (PSDB have controlled presidential elections for the last 20 years, their force at the other levels of electoral competition has not grown. The objective of this study is to undertake a discussion of this situation through the 2014 general elections. After attempting to explain why successive challengers have not been able to change the structure of competition for the Brazilian presidency, I will analyze the relation established between the pattern observed at this level and the other “connected” electoral disputes—both those for state executive and federal legislative office. The general conclusion is that even if the pattern continues, it is quite improbable that this will significantly impact the other levels of national political party competition.

  2. Third Party Liability governing Dangerous and Nuclear Activities

    International Nuclear Information System (INIS)

    Di Martino, Vittorio.

    1979-01-01

    The introductory chapters of this book analyse the concept of fault as a basis for third party liability and the evolution of jurisprudence and doctrine towards the concept of absolute liability. The following part covers the Italian system of liability for hazardous activities. The nuclear third party liability system is then analysed according to existing international conventions and nuclear legislation in several countries. The Appendix contains various legislative and regulatory texts on nuclear third party liability in Italy and in other countries which provide for special legislation in this field. (NEA) [fr

  3. Inequality and anti-globalization backlash by political parties

    NARCIS (Netherlands)

    Burgoon, B.

    2013-01-01

    Does income inequality increase political backlash against European and global integration? This paper reports research suggesting that it can. The article analyses party opposition to and support for trade openness, European Union integration and general internationalism of political party

  4. Role of political parties in the formation of civil society in Uzbekistan

    Directory of Open Access Journals (Sweden)

    Сирожжон Насипкулович Бердикулов

    2015-06-01

    Full Text Available The article considers the role of political parties in the development of civil society and the rule of law, as well as issues of political parties differ from other public organizations, the concept of a multi-party system, the importance of a multi-party system in ensuring political pluralism, inter-party competition, constructive opposition, the expression of the interests of the electorate, the space of political parties in parliament and local councils (soviets

  5. Second review meeting of the Contracting Parties to the Convention on Nuclear Safety

    International Nuclear Information System (INIS)

    Rafferty, Barbara

    2002-01-01

    identified that require special attention, particularly, with regard to safety management, safety culture, plant ageing, upgrading and effectiveness of regulatory practices, as well as maintaining competence and knowledge in the industry, regulatory bodies and research institutions. The review process highlighted factors and circumstances, external to nuclear safety as such, which nevertheless may impact on nuclear safety. Contracting Parties were invited to provide further information in their next national reports on maintaining competence and motivation of staff needed for safe regulation and operation of nuclear installation. Since the 1999 Review Meeting, several Contracting Parties have restructured their regulatory bodies and adopted new legislation or improved existing legislation to more closely meet the requirements of the Convention. Examples of areas of new legislation are: establishing independent regulatory bodies; emergency preparedness; decommissioning; and radiation protection provisions consistent with the International Commission on Radiological Protection's 1990 Recommendations (ICRP 60) and the International Basic Safety Standards published by the IAEA (BSS). Full implementation of the ICRP 60 recommendations and BSS is not complete in some countries. Contracting Parties reported on their individual national regulatory strategies. Some Contracting Parties use probabilistic safety assessment (PSA) as an additional tool in optimizing their regulatory or inspection activities, and some use performance indicators, whether they be quantitative or qualitative, to monitor the safety of their nuclear installations. In discussions, comparison was made of the advantages and disadvantages of regulations that are detailed and prescriptive in nature as compared to less prescriptive, goal-oriented approaches and the complementary use of risk assessments. Contracting Parties agreed to review their experience and report at the next Review Meeting. All Contracting

  6. Third party bargaining and contract terms: a link over time?

    Science.gov (United States)

    Brooks, John M; Doucette, William R; Sorofman, Bernard A

    2002-01-01

    To evaluate whether prior pharmacy bargaining process strategies and pharmacy dependence on third parties affect the bargaining power of pharmacies in price negotiations with third parties. One-time survey. Random sample of 900 independent and small chain pharmacies in nine states: Colorado, Connecticut, Georgia, Kentucky, Minnesota, Oklahoma, Oregon, Pennsylvania, and Wisconsin. Two hundred sixteen of the returned surveys contained sufficient responses for this analysis. Survey data on pharmacy bargaining power and prior pharmacy bargaining strategies, pharmacy dependence, and market characteristics were analyzed using multiple regression in a previously developed and modified provider/third party bargaining model. Pharmacy bargaining power. Pharmacy bargaining power varied across our sample. Pharmacy bargaining power was positively related to whether a pharmacy previously bargained with the third parties, negatively related to prior requests for contract changes, and negatively related to the pharmacy's dependence on third parties in total. Pharmacy bargaining power is related to the bargaining strategies employed by pharmacies during the previous year and the dependence of pharmacies on third party payers in total. With the prevalence of "take-it-or-leave-it" contracts from third parties, prior pharmacy bargaining behavior may affect the initial terms of the contracts that pharmacies are offered.

  7. Deception and price in a market with asymmetric information

    Directory of Open Access Journals (Sweden)

    Kimmo Eriksson

    2007-02-01

    Full Text Available In markets with asymmetric information, only sellers have knowledge about the quality of goods. Sellers may of course make a declaration of the quality, but unless there are sanctions imposed on false declarations or reputations are at stake, such declarations are tantamount to cheap talk. Nonetheless, in an experimental study we find that most people make honest declarations, which is in line with recent findings that lies damaging another party are costly in terms of the liar's utility. Moreover, we find in this experimental market that deceptive sellers offer lower prices than honest sellers, which could possibly be explained by the same wish to limit the damage to the other party. However, when the recipient of the offer is a social tie we find no evidence for lower prices of deceptive offers, which seems to indicate that the rationale for the lower price in deceptive offers to strangers is in fact profit-seeking (by making the deal more attractive rather than moral.

  8. Évolution des partis politiques dans le monde arabe | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  9. Inequality and anti-globalization backlash by political parties

    NARCIS (Netherlands)

    Burgoon, B.

    2011-01-01

    Does inequality fuel anti-globalization backlash? This paper answers this question by analyzing how income inequality affects the embrace or eschew of globalization by political parties. It focuses on party opposition to and support for trade openness, European-Union integration, and general

  10. Parsing the Behavioral and Brain Mechanisms of Third-Party Punishment.

    Science.gov (United States)

    Ginther, Matthew R; Bonnie, Richard J; Hoffman, Morris B; Shen, Francis X; Simons, Kenneth W; Jones, Owen D; Marois, René

    2016-09-07

    The evolved capacity for third-party punishment is considered crucial to the emergence and maintenance of elaborate human social organization and is central to the modern provision of fairness and justice within society. Although it is well established that the mental state of the offender and the severity of the harm he caused are the two primary predictors of punishment decisions, the precise cognitive and brain mechanisms by which these distinct components are evaluated and integrated into a punishment decision are poorly understood. Using fMRI, here we implement a novel experimental design to functionally dissociate the mechanisms underlying evaluation, integration, and decision that were conflated in previous studies of third-party punishment. Behaviorally, the punishment decision is primarily defined by a superadditive interaction between harm and mental state, with subjects weighing the interaction factor more than the single factors of harm and mental state. On a neural level, evaluation of harms engaged brain areas associated with affective and somatosensory processing, whereas mental state evaluation primarily recruited circuitry involved in mentalization. Harm and mental state evaluations are integrated in medial prefrontal and posterior cingulate structures, with the amygdala acting as a pivotal hub of the interaction between harm and mental state. This integrated information is used by the right dorsolateral prefrontal cortex at the time of the decision to assign an appropriate punishment through a distributed coding system. Together, these findings provide a blueprint of the brain mechanisms by which neutral third parties render punishment decisions. Punishment undergirds large-scale cooperation and helps dispense criminal justice. Yet it is currently unknown precisely how people assess the mental states of offenders, evaluate the harms they caused, and integrate those two components into a single punishment decision. Using a new design, we isolated

  11. Creating A Nationwide Nonpartisan Initiative for Family Caregivers in Political Party Platforms.

    Science.gov (United States)

    Scribner, Ben; Lynn, Joanne; Walker, Victoria; Morgan, Les; Montgomery, Anne; Blair, Elizabeth; Baird, Davis; Goldschmidt, Barbara; Kirschenbaum, Naomi

    2017-06-01

    Policymakers have been slow to support family caregivers, and political agendas mostly fail to address the cost burdens, impact on employment and productivity, and other challenges in taking on long-term care tasks. This project set out to raise policymakers' awareness of family caregivers through proposals to Republican and Democratic party platforms during the 2016 political season. The Family Caregiver Platform Project (FCPP) reviewed the state party platform submission process for Democratic and Republican parties in all 50 states and the District of Columbia. We built a website to make each process understandable by caregiver advocates. We designed model submissions to help volunteers tailor a proposal and recruited caregiver advocates participating in their state process. Finally, we mobilized a ground operation in many states and followed the progress of submissions in each state, as well as the formation of the national platforms. In 39 states, at least one party, Republican or Democrat, hosted a state party platform process. As of September 2016 FCPP volunteers submitted proposals to 29 state parties in 22 states. Family caregiver language was added to eight state party platforms, one state party resolution, two bipartisan legislative resolutions, and one national party platform. The FCPP generated a non-partisan grassroots effort to educate and motivate policymakers to address caregiving issues and solutions. Democratic party leaders provided more opportunities to connect with political leaders, with seven Democratic parties and one Republican party, addressing family caregiver issues in their party platforms. © 2017, Copyright the Authors Journal compilation © 2017, The American Geriatrics Society.

  12. NOAA Freedom of Information Act (FOIA) Corporate Services, Staff and Line

    Science.gov (United States)

    Financial Officer (CFO) 301-444-2132 Jerry McNamara FOIA Liaison Office of the Chief Information Officer Office of the Chief Administrative Officer (OCAO) 301-713-0850 x195 Sharon Daniels FOIA Liaison Chief ; tITLE Line/Staff Office Phone Number Wendy Schumacher FOIA and Privacy Act Officer NOAA Corporate

  13. Political Parties and Popular Representation in Myanmar’s Democratisation Process

    Directory of Open Access Journals (Sweden)

    Kristian Stokke

    2015-01-01

    Full Text Available The article examines the role of political parties in Myanmar’s democratisation process. We argue that the substance of democratisation depends on popular representation through political parties but question their capacity to provide such representation. Examining capacity through the concept of party institutionalisation, we find that most parties have not been able to build effective organisational structures. However, we also find a degree of party institutionalisation in the form of rootedness in society. Political cleavages between those favouring authoritarian rule over democratic rule and Burman nationhood over ethnic notions of nationhood have produced divisions between state-centred parties associated with Myanmar’s authoritarian legacy and society-centred pro-democracy and ethnic parties. Although being less dichotomous than in the past, we argue that these cleavages continue to provide a basis for party identity and rootedness in society. We conclude that further development of political parties and popular representation will be shaped by the relations between parties, the state, and society – where individual parties are shaped according to their tendencies towards state-centred cartel parties or society-centred mass parties.

  14. Healthcare.gov shares personal data with third parties

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2015-01-01

    Full Text Available No abstract available. Article truncated after 150 words. According to the Associated Press, the Centers for Medicare and Medicaid's (CMS website, HealthCare.gov, has been sending consumers’ personal data to private companies that specialize in advertising and analyzing Internet data for performance and marketing (1. What information is being disclosed was not immediately clear, but it could include age, income, ZIP code, and smoking status. It could also include a computer’s Internet address, which can identify a person’s name or address when combined with other information collected by sophisticated online marketing or advertising firms. “We deploy tools on the window shopping application that collect basic information to optimize and assess system performance,” said CMS’s Aaron Albright in a statement. “We believe that the use of these tools are common and represent best practices for a typical e-commerce site.” There is no evidence that personal information has been misused. But connections to dozens of third-party tech firms were documented by ...

  15. Energy-political ideas of environmentalist parties in Western Europe

    International Nuclear Information System (INIS)

    Hrbek, R.

    1990-01-01

    By and large the green-alternative parties embrace the same energy policies: They reject nuclear energy, they demand a radically new approach to energy politics and they want to realise their programmes within a comprehensive restructuring of the political and economic order of the respective states. The reasons for this categorical NO to nuclear energy seen in its social and environmental compatibility. In the following we will explain how this type of party works and functions. The reasons for the formation of these parties and the profile of green-alternative parties on a national and international level are described in detail as well as the resonance in society and their chances of success in general. (orig./HSCH) [de

  16. Two-party quantum key agreement protocol with four-particle entangled states

    Science.gov (United States)

    He, Yefeng; Ma, Wenping

    2016-09-01

    Based on four-particle entangled states and the delayed measurement technique, a two-party quantum key agreement protocol is proposed in this paper. In the protocol, two participants can deduce the measurement results of each other’s initial quantum states in terms of the measurement correlation property of four-particle entangled states. According to the corresponding initial quantum states deduced by themselves, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. This guarantees the fair establishment of a shared key. Since each particle in quantum channel is transmitted only once, the protocol is congenitally free from the Trojan horse attacks. The security analysis shows that the protocol not only can resist against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.

  17. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  18. 29 CFR 1425.6 - Use of third-party mediation assistance.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Use of third-party mediation assistance. 1425.6 Section 1425.6 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE MEDIATION ASSISTANCE IN THE FEDERAL SERVICE § 1425.6 Use of third-party mediation assistance. If the parties...

  19. Effects and outcomes of third-party reproduction: parents.

    Science.gov (United States)

    Greenfeld, Dorothy A

    2015-09-01

    Third-party reproduction has introduced a host of changing family constellations. Research has shown that children conceived through third-party reproduction are doing well psychologically and developmentally, but what about their parents? How have they coped with the transition to third-party reproduction? Has the experience impacted their marital stability or the quality of their parenting? This review will address parents of children conceived through oocyte donation, parents of children conceived through gestational surrogacy, and gay male parents of children conceived through oocyte donation and gestational surrogacy. Copyright © 2015 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  20. Regulating third party assurance engagements on sustainability reports in Sweden – issues and challenges

    OpenAIRE

    Sonnerfeldt, Amanda

    2013-01-01

    The well-institutionalised notion of audits put forth that information subjected to independent examination by third parties potentially contribute to better quality information for decision making (towards more sustainable companies?). The presence of different assurance providers offering a myriad of services in the name of “sustainability assurance” led to concerns about their quality and comparability and as a consequence a call for standards to regulate these services. This study analyse...

  1. Political Party Financing and why it Matters in Tanzania | Walwa ...

    African Journals Online (AJOL)

    Among the key recommendations is that public funding for ongoing party activities and campaigns should be allocated by a mix of proportional rules and flat subsidies to all parties that meet reasonable thresholds and flat subsidies as refers here imply providing subsidies to all political parties on equal basis. The other key ...

  2. Crescent and Electoral Strength: Islamic Party Portrait of Reform Era In Indonesia

    Directory of Open Access Journals (Sweden)

    LILI ROMLI

    2013-12-01

    Full Text Available The establishment of Islamic political parties in the reform era in Indonesia after the fall of Suharto (1998, considered as resurgence of political stream. There are several factors that led to the revival of Islamic parties after the New Order, the theological factor, historical, sociological, and reform factor. The presence of Islamic political parties after the New Order was apparently diverse and fragmented. In the political elite of Islam itself in establishing a political party based on Islam and there is also based on nationality, and in establishing political party was using substantially approach and there is also that use formalistic approach. In the reform era elections, political Islam has failed, in which Islamic parties do not receive optimal support from voters Islam. The failure of Islamic parties in election of reform era is caused of factor among Muslims has been change the orientation of political views. Islamic parties in the reform era stuck in a political myth quantity, and Islamic parties are also fragmented and fractured in to small forces.

  3. Mauritania: an authoritarian regime and the reconfiguration of the party system

    Directory of Open Access Journals (Sweden)

    Raquel Ojeda García

    2015-05-01

    Full Text Available This investigation raises the question of whether Mauritania should be considered an authoritarian regime. The explanatory variable used is not the only factor, but in Mauritania’s case it is one that has been given little attention. It is an analysis of the party system and its level of institutionalisation through five indicators: the social rooting of the parties; personalism and the profile of the leader; the level of volatility; the calling and participation of the opposition parties in the boycott of the elections and the ultimate acceptance by those parties of their results. It starts from the premise that representative democracy is built on a party political structure and draws conclusions about the low level of institutionalisation of the party system and the authoritarianism of the Mauritanian regime.

  4. Effective implementation of the UNCRPD by Thailand State Party: challenges and potential remedies.

    Science.gov (United States)

    Srisuppaphon, Donruedee; Sriboonroj, Arnon; Riewpaiboon, Wachara; Tangcharoensathien, Viroj

    2017-05-25

    The Thai government ratified the United Nations Convention on the Rights of Persons with Disabilities (UNCRPD) in 2008, and the first progress report by the State Party was issued in 2012. This study assesses and identifies gaps in the Government's implementation of the Convention. Using the Deming Plan-Do-Check-Act Cycle as an analytical framework for continuous quality improvement, we reviewed five documents which are: the 2012 State Party report; the list of issues by the Committee on the Rights of Persons with Disabilities; the 2015 replies to the list of issues by the Thai government; an alternative report produced by Civil Society Organizations (CSOs); and an alternative report produced by the National Human Rights Commission of Thailand. Content analysis is applied to generate the emerging gaps in implementation. Thailand's main advantage is the evolving legal frameworks operating in compliance with the convention, although further amendment is still needed, including effective law enforcement. Conflicting information between the Government's and alternative reports reflects the shortcomings in the information system that intends to support rigorous monitoring and evaluation. Lacking of concrete measures and outcome indicators on certain articles reflects the State Party's limited understanding of the concept of human rights and participatory approaches and insufficient institutional capacities for effective implementation. To rectify these implementation gaps, a few actions are suggested. This includes amending the laws which violate the rights of persons with psychosocial disability; reforming governance where the monitoring bodies are truly independent from implementing agencies; strengthening cross-sectoral actions; and improving information systems which facilitate monitoring and evaluation where Disabled People's Organizations and Civil Society Organizations are recognized as true equal partners. Implementation research can provide evidence for further

  5. Psychological support for mothers of children with autism spectrum disorders via traditional Russian tea party

    Directory of Open Access Journals (Sweden)

    Belopolskaya N.L.

    2016-02-01

    Full Text Available The study aimed to discuss the possibility of providing psychological support for mothers of children with autism spectrum disorders via traditional Russian tea party. Questionnaire results, according to which mothers of children with ASD are essentially focused on receiving psychological counseling in the area of child development and education are presented. However personal problems of the woman, including psychological weightiness is usually taken a back seat. The research supports a hypothesis that informal format of tea party allows mothers decreasing psychological distance with psychologist, feeling at ease. The article includes an analysis of psychological meetings focused on personal life questions of participants. The results obtained in the research showed effectiveness of this approach. The Russian tea party is a meeting form that fosters the growth of confidence toward psychologist, expanding the range of personal questions that could be discussed. The mothers had the opportunity of open communication with each other, reported psychological safety valve.

  6. Peoples Democratic Party in the Fourth Republic of Nigeria

    Directory of Open Access Journals (Sweden)

    Aliyu Mukhtar Katsina

    2016-06-01

    Full Text Available Their nature and functions make political parties central to democratic governance especially in the new democracies of Africa that face the challenge of building strong and enduring democratic institutions. It is accepted that the existing trend in most of these democracies of one big party dominating the political space weakens democracy and undermines its prospects for consolidation. Big parties—usually the ruling ones—exhibit tendencies such as absence of internal democracy that are antithetical to democratic governance. While observations such as these are incontestable, there is little understanding into the nature, character, ideology, and internal structure of big parties generally. In this article, I attempt to address this concern. Specifically, I examine the nature, structure, and ideology of the Peoples Democratic Party (PDP, Nigeria’s ruling party at the federal level with considerable strength at local level between 1999 and 2015. Relying on data obtained from multiple sources, I investigate the process of its formation, the nature of its ideology, internal organization, its electoral strength, and how absence of internal democracy contributed significantly to its defeat in 2015 general elections.

  7. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement

    International Nuclear Information System (INIS)

    Yang Yuguang; Wen Qiaoyan

    2009-01-01

    Following some ideas of the quantum secret sharing (QSS) protocol (2008, Phys. Lett. A 372, 1957), we propose an efficient quantum private comparison (QPC) protocol for comparing information of equality with the help of a third party (TP). The protocol can ensure fairness, efficiency and security. The protocol is fair, which means that one party knows the sound result of the comparison if and only if the other one knows the result. The protocol is efficient with the help of the TP for calculating. However, the TP cannot learn any information about the players' respective private inputs and even about the comparison result and cannot collude with any player. The protocol is secure for the two players, that is, any information about their respective secret inputs will not leak except the final computation result. A precise proof of security of the protocol is presented. Applications of this protocol may include private bidding and auctions, secret ballot elections, commercial business, identification in a number of scenarios and so on

  8. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian

    2012-01-01

    We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic in the size...... on the knowledge of exponent in an RSA group, and build succinct zero-knowledge arguments in the CRS model....

  9. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cn^2k) bits, which...... circuit randomization due to Beaver (Crypto’91), and an abstraction of certificates, which can be of independent interest....

  10. IndElec: A Software for Analyzing Party Systems and Electoral Systems

    Directory of Open Access Journals (Sweden)

    Francisco Ocaña

    2011-08-01

    Full Text Available IndElec is a software addressed to compute a wide range of indices from electoral data, which are intended to analyze both party systems and electoral systems in political studies. Further, IndElec can calculate such indices from electoral data at several levels of aggregation, even when the acronyms of some political parties change across districts. As the amount of information provided by IndElec may be considerable, this software also aids the user in the analysis of electoral data through three capabilities. First, IndElec automatically elaborates preliminary descriptive statistical reports of computed indices. Second, IndElec saves the computed information into text files in data matrix format, which can be directly loaded by any statistical software to facilitate more sophisticated statistical studies. Third, IndElec provides results in several file formats (text, CSV, HTML, R to facilitate their visualization and management by using a wide range of application softwares (word processors, spreadsheets, web browsers, etc.. Finally, a graphical user interface is provided for IndElec to manage calculation processes, but no visualization facility is available in this environment. In fact, both the inputs and outputs for IndElec are arranged in files with the aforementioned formats.

  11. Nuclear operators' third party liability amounts and financial security limits (Last updated: December 2017)

    International Nuclear Information System (INIS)

    2017-12-01

    This table aims to gather information on the amounts available to compensate potential victims of a nuclear incident in countries and economies having nuclear power plants and/or having ratified at least one of the international conventions on nuclear third party liability. In the table: Public funds correspond to the amounts provided from public funds beyond the Operator's Liability Amount to be made available by the States parties to the BSC or CSC according to such conventions, or by any public authority pursuant to applicable laws and regulations. International funds correspond to public funds contributed jointly by all the States parties to the BSC or CSC according to a pre-determined formula provided in the respective conventions. The amount provided in the table corresponds to the total amount of the international funds calculated the day the table was updated. For the CSC international fund, an on-line calculator is available at https://ola.iaea.org/ola/CSCND/index.html Under Article V, subparagraph 1 of the Vienna Convention, 'The liability of the operator may be limited by the Installation State to not less than US $5 million for any one nuclear incident'. Subparagraph 3 of the same article further provides that 'The United States dollar referred to in this Convention is a unit of account equivalent to the value of the United States dollar in terms of gold on 29 April 1963, that is to say US $35 per one troy ounce of fine gold'. Therefore, in this table (1963: USD 5 million) means that a country applies the Operator's Liability Amount as provided under the Vienna Convention. With regard to the BSC, in 1992 the OECD Council issued a recommendation [C(92)166/FINAL] that the contracting parties to the BSC shall not invoke Article 3 (b)(i) of the BSC in cases where the amount of the insurance or other financial security of the operator is higher than SDR 175 million per incident (i.e. public funds tier) of the BSC. As a

  12. Moral emotions as determinants of third-party punishment

    Directory of Open Access Journals (Sweden)

    Rob M. A. Nelissen

    2009-12-01

    Full Text Available Third-party punishment has recently received attention as an explanation for human altruism. Feelings of anger in response to norm violations are assumed to motivate third-party sanctions, yet there is only sparse and indirect support for this idea. We investigated the impact of both anger and guilt feelings on third-party sanctions. In two studies both emotions were independently manipulated. Results show that anger and guilt independently constitute sufficient but not necessary causes of punishment. Low levels of punishment are observed only when neither emotion is elicited. We discuss the implications of these findings for the functions of altruistic sanctions.

  13. TIGER/Line Shapefile, 2016, Series Information for the All Roads County-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  14. TIGER/Line Shapefile, 2016, Series Information for the Area Landmark State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  15. TIGER/Line Shapefile, 2015, Series Information for the Current Place State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  16. Nationalism, territory and extremism in party politics

    DEFF Research Database (Denmark)

    Bourne, Angela

    In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army. More specifica......In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army. More...... for realization of free speech rights and representation is also emphasized, and where proscription is seen as inimical to resolution of conflict underpinning violence. In the context of party competition, a winning coalition is required for one discourse to predominate. However, I also argued that both ideas...

  17. 78 FR 63164 - Certain Small Diameter Carbon and Alloy Seamless Standard, Line and Pressure Pipe From Romania...

    Science.gov (United States)

    2013-10-23

    ... Carbon and Alloy Seamless Standard, Line and Pressure Pipe From Romania: Final Results of Antidumping... carbon and alloy seamless standard, line and pressure pipe from Romania. For the final results we... pressure pipe from Romania.\\1\\ We invited interested parties to comment on the Preliminary Results. We...

  18. Patient information and education with modern media: the Spine Society of Europe Patient Line.

    Science.gov (United States)

    Pellisé, Ferran; Sell, P

    2009-08-01

    The role of the patient as an active partner in health care, and not just a passive object of diagnostic testing and medical treatment, is widely accepted. Providing information to patients is considered a crucial issue and the central focus in patient educational activities. It is necessary to educate patients on the nature of the outcomes and the benefits and risks of the procedures to involve them in the decision-making process and enable them to achieve fully informed consent. Information materials must contain scientifically reliable information and be presented in a form that is acceptable and useful to patients. Given the mismatch between public beliefs and current evidence, strategies for changing the public perceptions are required. Traditional patient education programmes have to face the potential barriers of storage, access problems and the need to keep content materials up to date. A computer-based resource provides many advantages, including "just-in-time" availability and a private learning environment. The use of the Internet for patient information needs will continue to expand as Internet access becomes readily available. However, the problem is no longer in finding information, but in assessing the credibility and validity of it. Health Web sites should provide health information that is secure and trustworthy. The large majority of the Web sites providing information related to spinal disorders are of limited and poor quality. Patient Line (PL), a patient information section in the Web site of Eurospine, was born in 2005 to offer patients and the general population the accumulated expertise represented by the members of the society and provide up-to-date information related to spinal disorders. In areas where evidence is scarce, Patient Line provides a real-time opinion of the EuroSpine membership. The published data reflect the pragmatic and the common sense range of treatments offered by the Eurospine membership. The first chapters have been

  19. Information barriers for the protection of sensitive information

    International Nuclear Information System (INIS)

    Dougan, A.D.; Dunn, J.; Seager, K.; Smith, M.; Beach, D.; Clinton, J.; Vanier, P.

    2013-01-01

    An Information Barrier is a combination of technology and procedures that prevent the release of a host country's sensitive information to a monitoring party during an inspection of a sensitive item, while enabling assurance of an accurate assessment of host country declarations regarding the item. Information barriers, as a concept, arose from the need to balance two competing requirements - specifically, certification of information protection by a host country and authentication of measurement and information accuracy by a monitoring party. The U.S. Department of Energy's National Nuclear Security Administration, in conjunction with several U.S. National Laboratories, has explored information barrier development in detail, and has continued the evolution of essential work done by the U.S. Information Barrier Working Group beginning in the late 1990's, and other international efforts, including the U.S.-Russia-IAEA Trilateral Initiative. This paper explains the rationale for information barriers, and explores the development and application of information barrier concepts for potential future arms control initiatives, including recent work and advances in capabilities. It also considers applications of information barrier concepts applied in other fields.The paper is followed by the slides of the presentation. (authors)

  20. Recent tendency of Nuclear Third Party Legislation

    International Nuclear Information System (INIS)

    Gohara, Fumiaki

    1988-01-01

    Nuclear accidents in Three Mile Island and Chernobyl have a great influence on Nuclear Third Party Legislation of many countries. Nuclear Third Party Law of Japan is due to expire as at 31st, December, 1989, under the recent circumstances in which threre exist pros and cons to nuclear installations among people. This report describes the outline of Japanese Nuclear Law compared with foreign ones and the prospect of its revision. (author)

  1. Immigration politics Italian style: the paradoxical behaviour of mainstream and populist parties.

    Science.gov (United States)

    Perlmutter, T

    1996-01-01

    This article explores the role of electoral politics in managing immigration as a policy option in Italy. Italy was late in passing its first comprehensive immigration legislation (1990). A small, liberal party waged a campaign against the proposed immigration law. A party known for right-wing posturing did not mobilize against the law. These political postures were not anticipated by conventional wisdom. Conventional wisdom suggests that immigration should not be an electoral issue and that consensus solutions should be sought. It is argued that the Italian response supports the view that in a fragmented, multi-party system, minor parties will be more likely to mobilize. Two mass media studies were used as the basis for this article's analysis. The studies provide detailed evidence on party willingness to publicly discuss immigration and the ways the issues are framed. The Italian case illustrates the tendency for mainstream, pro-system parties to politicize the issue and extremist, anti-system parties to depoliticize it. The DC and PCI, as mass parties, behaved traditionally and supported moderately open immigration policies, but in closed forums. The minor parties had a stake in shifting electoral support, so the PSI took an outspoken stand and the PARI publicized its exclusion from the policy-making process and its support for more restrictive policies. It was the constituencies and the leadership structure that facilitated these strategies. The author differs from Betz's party analysis by arguing that party ideology may not be a useful guide for predicting stands on immigration, and that it is difficult to generalize about immigration.

  2. Tracing the territorial dynamics of party fragmentation in Mexico (1991-2015

    Directory of Open Access Journals (Sweden)

    Willibald SONNLEITNER

    2017-06-01

    Full Text Available Over the past decades, Mexican politics evolved from a closed, corporative and hegemonic-party authoritarianism, towards a more plural and competitive multi-party system. In the nineties, three relevant parties structured electoral politics. But this system soon fragmented and reached an average of 5.6 effective parties in 2015. What causes and drives political and partisan fragmentation in Mexico? Which have been the main temporal and territorial dynamics? How did they reshape Mexico’s electoral geography?

  3. The Party-state Order

    DEFF Research Database (Denmark)

    Grünberg, Nis

    society through its legacy as a socialist work unit (danwei). Using Polanyi’s concept of embeddedness, the paper reveals how SOEs are split into two tiers each tasked with the respective objectives of economic development and political stability, and thus as Party-state organizations are used to flexibly...

  4. New Swiss legislation on nuclear third party liability

    International Nuclear Information System (INIS)

    Fischer, U.

    1981-10-01

    Following a description of the Paris Convention and Brussels Supplementary Convention system for nuclear third party liability and that prevailing until now in Switzerland, the paper reviews the new Swiss nuclear third party liability Bill prepared after a popular consultation. The new provisions are analysed and in particular, that providing for unlimited liability. (NEA) [fr

  5. Imitating the newcomer. How, when and why established political parties imitate the policy positions and issue attention of new political parties in the electoral and parliamentary arena : the case of the Netherlands

    NARCIS (Netherlands)

    Otjes, Simon Pieter

    2012-01-01

    This thesis studies, how, when and why established political parties imitate new political parties. It examines new party effects on both the policy positions of established parties and the attention established political parties spend on issues. It examines this effect in both the electoral and

  6. Manipulating Morality: Third-Party Intentions Alter Moral Judgments by Changing Causal Reasoning.

    Science.gov (United States)

    Phillips, Jonathan; Shaw, Alex

    2015-08-01

    The present studies investigate how the intentions of third parties influence judgments of moral responsibility for other agents who commit immoral acts. Using cases in which an agent acts under some situational constraint brought about by a third party, we ask whether the agent is blamed less for the immoral act when the third party intended for that act to occur. Study 1 demonstrates that third-party intentions do influence judgments of blame. Study 2 finds that third-party intentions only influence moral judgments when the agent's actions precisely match the third party's intention. Study 3 shows that this effect arises from changes in participants' causal perception that the third party was controlling the agent. Studies 4 and 5, respectively, show that the effect cannot be explained by changes in the distribution of blame or perceived differences in situational constraint faced by the agent. © 2014 Cognitive Science Society, Inc.

  7. Party policy position of Die Linke. A continuation of the PDS?

    NARCIS (Netherlands)

    Coffé, H.R.; Plassa, R.

    2010-01-01

    In 2007, the German party Die Linke emerged as the result of the PDS (Party of Democratic Socialism; the successor of the Communist Party) merging with the WASG (Wahlalternative Arbeit und Soziale Gerechtigkeit; a break away left wing of the Social Democrats). This article compares the policy

  8. No, Virginia, It's Not True What They Say About Publicity's "Implied Third-Party Endorsement" Effect.

    Science.gov (United States)

    Hallahan, Kirk

    1999-01-01

    Re-examines "implied third-party endorsement" as an explanation of publicity's effectiveness. Argues that any effect involves inferences by audience members who use biased processing that favors news and disfavors advertising. Suggests that the presentation of information as news is not necessarily perceived by audiences as an…

  9. Line lessons: Enbridge's Northern Line provides valuable information

    Energy Technology Data Exchange (ETDEWEB)

    Ross, E.

    2000-02-01

    Experiences gained from the 14-year old Norman Wells crude oil pipeline in the Northwest Territories may provide operators with valuable insights in natural gas pipeline developments in northern Canada. The Norman Wells line is the first and only long-distance pipeline in North America buried in permafrost and has proven to be a veritable laboratory on pipeline behaviour in extremely cold climates which also happen to be discontinuous at the same time. The line was built by Enbridge with a 'limit state' design, i e. it was built to move within the permafrost within certain limits, the amount of movement depending upon the area in which the line was built. This technology, which is still cutting edge, allows the pipeline to react to the freeze-thaw cycle without being affected by the heaving and resettling. The knowledge gained from the Norman Wells Line has come in very useful in the more recent AltaGas Services project transporting natural gas from a nearby well into the the town of Inuvik. Enbridge also contributed to the development of various pipeline inspection tools such as the 'Geopig' which travels within the pipeline and can pinpoint the location of problems practically within a matter of inches, and the 'Rolligon' an amphibious vehicle with five-foot diameter rubber tires that displaces only two pounds per square inch, leaving barely a track as it travels along the right-of-way during times other than winter.

  10. the doctrine of party autonomy in international commercial arbitration

    African Journals Online (AJOL)

    RAYAN_

    provoke discussions in many fora on the applicability of party autonomy in international ... questions, this article analyses the principle of party autonomy. The ultimate aim of .... 12 Odoe, (n 1) 48; English Arbitration Act 1996 s 6. 13 Odoe ibid ...

  11. English Collocation Learning through Corpus Data: On-Line Concordance and Statistical Information

    Science.gov (United States)

    Ohtake, Hiroshi; Fujita, Nobuyuki; Kawamoto, Takeshi; Morren, Brian; Ugawa, Yoshihiro; Kaneko, Shuji

    2012-01-01

    We developed an English Collocations On Demand system offering on-line corpus and concordance information to help Japanese researchers acquire a better command of English collocation patterns. The Life Science Dictionary Corpus consists of approximately 90,000,000 words collected from life science related research papers published in academic…

  12. The Finns Party: Euroscepticism, Euro Crisis, Populism and the Media

    Directory of Open Access Journals (Sweden)

    Juha Herkman

    2017-03-01

    Full Text Available In many European countries, populist right-wing parties have been most noticeable representatives of Euroscepticism. In Finland, the Finns Party (Perussuomalaiset has been a constant promoter of organisational Euroscepticism through its leader, Timo Soini. The party broke through in Finland’s ‘big bang elections’ of 2011, when the most debated issue was the European economic crisis, which was dominated by Eurosceptic Soini. Research concerning the relationship between the media, populism and Euroscepticism usually focus on national or European Parliament elections. This study analyses the media portrayal of the Eurosceptic Finns Party during times other than elections, focusing on the Finland’s overall Euro crisis press coverage in 2010–2012. The analysis shows that the populist Finns Party has been a minor player in that coverage, which was dominated by the Euro positive political and economic elites. Differences between newspapers indicate that journalistic routines and political context direct media coverage toward particular framings, even when the media proclaims itself politically independent and neutral.

  13. Trends in nuclear third party liability law

    International Nuclear Information System (INIS)

    Avossa, G.

    1992-01-01

    For some ten years now, nuclear third-party liability has been changing at an ever-faster pace, further accelerated by the Chernobyl catastrophe. Some of these changes are discussed in this article. A joint protocol drawn up by the International Atomic Energy Agency (IAEA) and the Nuclear Energy Agency (NEA) mutually extends the benefit of the special third-party liability system regarding nuclear damage instituted by virtue of previous Conventions and settles the conflicts of law likely to result from the simultaneous application of the two international instruments. Within the framework of the IAEA, a review procedure of the Convention of Vienna has been underway since 1989, in which the NEA has taken an integral part. At the outcome of the process underway, not only will the Convention of Vienna be revised, but so, indirectly but very rapidly, will the Conventions of Paris and Brussels. Ultimately, the entire field of nuclear third-party liability will be recast for decades to come. The texts under discussion are as yet nowhere near their final stage but two areas of consideration have already emerged, which will be discussed. Substantial modifications are made in nuclear third-party liability law. Secondly, the indemnification process for nuclear damage will be vastly modified, due to the subsidiary nature of government intervention and new obligations on operators to become members of a Nuclear Operator Pool. (author)

  14. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  15. Strategic information transmission: a mathematica tool for analysis

    OpenAIRE

    Dickhaut, John; Kaplan, Todd R; Mukherji, Arijit

    1992-01-01

    Economists and other applied researchers use game theory to study industrial organization, financial markets, and the theory of the firm. In an earlier article in the Mathematica Journal, [Dickhaut and Kaplan 1991] present a procedure for solving two-person games of complete information. In many applications, however, "asymmetric information" is a central issue. By asymmetric information, we mean that one party has access to information that the other party lacks. The branch of game the...

  16. Highs and lows: patterns of use, positive and negative effects of benzylpiperazine-containing party pills (BZP-party pills) amongst young people in New Zealand.

    Science.gov (United States)

    Butler, Rachael A; Sheridan, Janie L

    2007-11-19

    This study aimed to investigate patterns and context of use of BZP-party pills, function of use, and positive and negative effects experienced by a sample of New Zealand young people who had used the products. A qualitative study comprised of semi-structured interviews and group discussions. The sample included 58 young people aged 17-23 years who had used BZP-party pills in the previous 12 months. Young people were using these substances in a range of settings--primarily during weekend social occasions--particularly as part of the dance party culture. They were mostly used for their stimulant properties and to enhance socialisation, and were often taken in combination with other legal and illicit drugs. Young people had suffered a range of physical and emotional negative effects, although none of these was reported as being life-threatening or long-term. Many participants had reduced the frequency with which they used BZP-party pills due to adverse effects. Potentially risky behaviours identified included taking large doses, mixing BZP-party pills with alcohol and other substances, and driving whilst under the influence of BZP-party pills. Findings suggest that young people in this study were not suffering excessive or dangerous adverse effects. However, potentially risky use of these products raises the issue of the need for developing harm reduction interventions.

  17. Political Parties and the Institutionalization of Education: A Comparative Analysis of Party Manifestos

    Science.gov (United States)

    Jakobi, Anja P.

    2011-01-01

    Education has been featured prominently in recent election campaigns in different countries. This article explains this observation by the idea of a world culture and the global institutionalization of education. It compares party manifestors of 25 OECD countries from 1946 onward, analyzing how education developed in election campaigns over time…

  18. Jewish problem in the Polish Communist Party

    Directory of Open Access Journals (Sweden)

    Cimek Henryk

    2016-12-01

    Full Text Available Jews accounted for approx. 8-10% of the population of the Second Republic and in the communist movement (Polish Communist Party and Polish Communist Youth Union the rate was approx, 30%, while in subsequent years it much fluctuated. The percentage of Jews was the highest in the authorities of the party and in the KZMP. This had a negative impact on the position of the KPP on many issues, especially in its relation to the Second Republic.

  19. Party website – instrument of political communication. Case study: www.psd.ro

    Directory of Open Access Journals (Sweden)

    Monica Pătruţ

    2012-06-01

    Full Text Available Romanian political parties’ websites have developed especially after 2000 and have been used to disseminate information about candidates, campaigns and political agendas. Combining the quantitative content analysis with well-known models I will quantify the degree in which the Romanian Social Democratic Party website contributes to informing, connecting, involving, and mobilizing visitors. Another objective of the analysis is to pinpoint the place that websites occupy on the trajectory web 1.0 – web 2.0. The findings show that the political website is used more to inform and less to involve or mobilize visitors and that the SDP website is far from the web 2.0. taking account the virtual practices performed.

  20. THE THIRD PARTY CERTIFICATION SYSTEM FOR ORGANIC PRODUCTS

    Directory of Open Access Journals (Sweden)

    Adina-Roxana MUNTEANU

    2015-12-01

    Full Text Available In the context of an increasing organic trade worldwide, the organic standards and the certification of the organic practices are ever more important and relevant for both business and consumers. The certification by third parties of the organic operators is meant to ensure the application of an organic standard. However, the documented fraud cases are proof that the current system can undergo further improvement. The current paper gives an overview of the mechanisms of certification and inspection worldwide and discusses the issues raised by third party certification of the organic operators in the European context. Moreover, the paper reviews the major arguments for the effectiveness of the third party certification and also points to the improvement possibilities of the systems.

  1. 12 CFR 366.13 - What is my obligation regarding confidential information?

    Science.gov (United States)

    2010-01-01

    ... services on your behalf may use or disclose information obtained from us or a third party in connection... general public. (b) The following are examples of when your use of confidential information is... financial information, such as a financial statement to an unauthorized party. ...

  2. Multi-party arbitration in international trade: problems and solutions

    DEFF Research Database (Denmark)

    Siig, Kristina

    2007-01-01

    Legal disputes regarding international trade frequently involve more than two parties. This leads to problems, as the preferred means of dispute resolution within international trade - arbitration - tends to be ill-equipped to handle such disputes. The topic of the paper is arbitration as a means...... of dispute resolution in a multy-party set-up. Both the possible legal bases and the problems encountered are considere. It is concluded that arbitration is still the only real option to the parties in international business disputes and that many of the shortcomings  may be contered by skilful drafting...

  3. Organizational Loyalty and Organizational Commitment: An Analysis in Terms of Political Party Organizations

    Directory of Open Access Journals (Sweden)

    Akyay Uygur

    2010-12-01

    Full Text Available Sense of belonging is a psychological condition in which loyalties are divided into two. Organizational commitment, the value of the individual within the organization to accept and hear the desire to remain in the organization as it is defined. Identify a specific individual's loyalty to the organizational integration organizations, in the form of sincere commitment and dedication has been defined. This study aimed to determine the level of organizational loyalty to Turkey's third largest political party (AKP, CHP, MHP, feeling of belonging to the organization aims to determine the level of loyalty of the individual. Organizational loyalty created in accordance with this scale in city information was collected from 674 people. Accordingly, the highest level of organizational loyalty to the party MHP, the second CHP and third place in the AKP has emerged.

  4. The Puzzle of Democratic Monopolies: Single Party Dominance and Decline in India

    OpenAIRE

    Dasgupta, Aditya

    2016-01-01

    How to explain political monopolies in democratic institutional settings? Dominant parties in countries with robust formal democratic institutions are surprisingly frequent, yet poorly understood. Existing theories explain away the puzzle by characterizing dominant parties as `catch-all' parties that survive on the basis of historically imbued mass voter legitimacy. This dissertation develops a theory of how dominant parties in fact routinely win free and fair elections despite counter-majori...

  5. Partis politiques et médias en Grande-Bretagne : entre rivalité et complicité Political Parties and Media in Great Britain Rivals or Partners ?

    Directory of Open Access Journals (Sweden)

    Karine Rivière De Franco

    2005-01-01

    Full Text Available During the weeks preceding a General Election, British political parties try to convince the electorate to vote for them, but given the limited degree of direct communication, the parties need the media to transmit their messages. Their relationships are complex and behind an apparent antagonism, a real partnership sometimes develops. Indeed, political parties endeavour to influence the media in order to benefit from positive coverage, by resorting to political marketing, by hiring advisers, by giving the media the type of news that they need and by controlling press conferences and press releases. The media do not accept this manipulation and react by making independent political choices, by finding other sources of political news or by revealing the methods used by the political parties to convince voters. In other circumstances, the political parties and the media become partners, since the media enable the parties to transmit their messages without any external modification through electoral broadcasts and advertisements and sometimes they even take an active part in the parties’ electoral campaigns. Even if the political parties and the media need each other, they use and manipulate each other. During electoral campaigns, these relationships are not to be neglected because they can either facilitate or hinder the persuasion of the electorate.

  6. Third party liability insurance for international transport of nuclear substances in countries party to the Paris Convention

    International Nuclear Information System (INIS)

    Lacroix, F.

    1977-01-01

    The number of international transports of radioactive materials has been increasing at an accelerating rate for several years. These transports are subject to specific safety rules which must be complied with in order to obtain nuclear third party liability cover. In general nuclear transports are insured under a policy which differs from that for installations. Transport policy criteria have been harmonized to some extent, in particular, in the frame of the OECD Nuclear Energy Agency. Certificates established by the competent national authorities testifying to the existence of insurance must in principle be approved by the countries crossed which are parties to the Paris Convention. (NEA) [fr

  7. Supreme matters: tea parties and the activism of restraint

    NARCIS (Netherlands)

    Kurzbauer, H.

    2010-01-01

    An essay on the impact of Tea Parties on the appointment of Supreme Court Justices. According to recently released statistics, one-fifth of all US citizens are Tea Party Supporters: predominately white conservatives convinced of the 'evils' of the Obama administration. Taking their cue from the

  8. 76 FR 36400 - Third-Party Provision of Ancillary Services; Accounting and Financial Reporting for New Electric...

    Science.gov (United States)

    2011-06-22

    ...-000 and AD10-13-000] Third-Party Provision of Ancillary Services; Accounting and Financial Reporting... Commission's accounting and financial reporting requirements currently do not contain specific accounting \\12... financial reporting requirements \\41\\ for public utilities \\42\\ are designed to provide information about a...

  9. 12 CFR 573.6 - Information to be included in privacy notices.

    Science.gov (United States)

    2010-01-01

    ... and 573.15; (4) The categories of nonpublic personal information about your former customers that you... personal information about your former customers, other than those parties to whom you disclose information... applicable; and (ii) State whether the third party is: (A) A service provider that performs marketing...

  10. ISLAMIC PARTIES AND THE POLITICS OF CONSTITUTIONALISM IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Mukrimin Mukrimin

    2012-12-01

    Full Text Available This article examines the relationship between religion and the state in Indonesia by exploring how Islam is used by political parties to shape the politics. The study shows that Islamic politics is a complementary in both nationhood and statehood in Indonesia. From the early days of the new-born nation-state, Muslims in Indonesia had played significant role in shaping the nation; nonetheless, they have never dominated the political power. Fragmentation among Muslims themselves and internal political parties is among the reason why religious (Islamic parties failed in bringing religious identity to the state arena. Political subordination-inclusion-ignorance-confrontation is the circular game that features Islamic politics in Indonesia. The debatable issue on shari‘ah law, which is frequently used by Islamic parties, always becomes the core problem of the relation between Islam and the state. Even though Islam has played an important role in colouring the Indonesian politics, its existence remains complementary.

  11. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  12. Choosing memories? Russian political parties as actors of historical policy

    Directory of Open Access Journals (Sweden)

    Anikin Daniil Alexandrovich

    2017-12-01

    Full Text Available The article takes an attempt to analyse the transformation of relations between the state power and political parties in Russia within the framework of implementation the politics of memory. On the basis of the content analysis, the article analyses the specifics of using the images of the past in the activities of the 7th State Duma’s political parties: mentioning the historical periods, frequency of mentions, the function of a statement containing positive, neutral or critical assessments of the past, the theme of the continuity of historical experience of the Russian statehood, ways of implementation of some elements of the politics of memory. To sum up, the stumbling block for the main parliamentary parties becomes the Soviet past concerning which there are only separate points of correlation of all political forces. Today we can talk about the process set by the parties to develop the systematic strategies for comprehending the past. The article also analyses the history of the political parties in the context of the politics of memory.

  13. Fault-Tolerate Three-Party Quantum Secret Sharing over a Collective-Noise Channel

    International Nuclear Information System (INIS)

    Li Chun-Yan; Li Yan-Song

    2011-01-01

    We present a fault-tolerate three-party quantum secret sharing (QSS) scheme over a collective-noise channel. Decoherence-free subspaces are used to tolerate two noise modes, a collective-dephasing channel and a collective-rotating channel, respectively. In this scheme, the boss uses two physical qubits to construct a logical qubit which acts as a quantum channel to transmit one bit information to her two agents. The agents can get the information of the private key established by the boss only if they collaborate. The boss Alice encodes information with two unitary operations. Only single-photon measurements are required to rebuilt Alice's information and detect the security by the agents Bob and Charlie, not Bell-state measurements. Moreover, Almost all of the photons are used to distribute information, and its success efficiency approaches 100% in theory. (general)

  14. 32 CFR 327.6 - Collecting personal information

    Science.gov (United States)

    2010-07-01

    ... personal data, a Privacy Act Statement will be added. ...) PRIVACY PROGRAM DEFENSE COMMISSARY AGENCY PRIVACY ACT PROGRAM § 327.6 Collecting personal information (a... third party sources for security or employment suitability determinations; (2) Seeking third party...

  15. Risk based approach and interactions between interested parties in ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... interested parties in QSE management systems. Hanae DAHMAN EL ... relevant interested parties participating in the logistics chain and who contribute to the ... huge logistic crossroads of loads and flows: supply of aircraft in kerosene, ... Swissport which represents the global supplier of services to the ...

  16. 16 CFR 240.13 - Customer's and third party liability.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Customer's and third party liability. 240.13 Section 240.13 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.13 Customer's and third party...

  17. Reflexive intergroup bias in third-party punishment.

    Science.gov (United States)

    Yudkin, Daniel A; Rothmund, Tobias; Twardawski, Mathias; Thalla, Natasha; Van Bavel, Jay J

    2016-11-01

    Humans show a rare tendency to punish norm-violators who have not harmed them directly-a behavior known as third-party punishment. Research has found that third-party punishment is subject to intergroup bias, whereby people punish members of the out-group more severely than the in-group. Although the prevalence of this behavior is well-documented, the psychological processes underlying it remain largely unexplored. Some work suggests that it stems from people's inherent predisposition to form alliances with in-group members and aggress against out-group members. This implies that people will show reflexive intergroup bias in third-party punishment, favoring in-group over out-group members especially when their capacity for deliberation is impaired. Here we test this hypothesis directly, examining whether intergroup bias in third-party punishment emerges from reflexive, as opposed to deliberative, components of moral cognition. In 3 experiments, utilizing a simulated economic game, we varied participants' group relationship to a transgressor, measured or manipulated the extent to which they relied on reflexive or deliberative judgment, and observed people's punishment decisions. Across group-membership manipulations (American football teams, nationalities, and baseball teams) and 2 assessments of reflexive judgment (response time and cognitive load), reflexive judgment heightened intergroup bias, suggesting that such bias in punishment is inherent to human moral cognition. We discuss the implications of these studies for theories of punishment, cooperation, social behavior, and legal practice. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Political party affiliation, political ideology and mortality.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Muennig, Peter

    2015-05-01

    Ecological and cross-sectional studies have indicated that conservative political ideology is associated with better health. Longitudinal analyses of mortality are needed because subjective assessments of ideology may confound subjective assessments of health, particularly in cross-sectional analyses. Data were derived from the 2008 General Social Survey-National Death Index data set. Cox proportional analysis models were used to determine whether political party affiliation or political ideology was associated with time to death. Also, we attempted to identify whether self-reported happiness and self-rated health acted as mediators between political beliefs and time to death. In this analysis of 32,830 participants and a total follow-up time of 498,845 person-years, we find that political party affiliation and political ideology are associated with mortality. However, with the exception of independents (adjusted HR (AHR)=0.93, 95% CI 0.90 to 0.97), political party differences are explained by the participants' underlying sociodemographic characteristics. With respect to ideology, conservatives (AHR=1.06, 95% CI 1.01 to 1.12) and moderates (AHR=1.06, 95% CI 1.01 to 1.11) are at greater risk for mortality during follow-up than liberals. Political party affiliation and political ideology appear to be different predictors of mortality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol; Parties a la convention-cadre des Nations-Unies sur les changements climatiques et seconde reunion des parties au Protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  20. TIGER/Line Shapefile, 2013, Series Information File for the All Roads County-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  1. TIGER/Line Shapefile, 2013, Series Information File for the Current Place State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  2. TIGER/Line Shapefile, 2012, Series Information File for the Current Secondary School Districts Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  3. Series Information File for the 2017 TIGER/Line Shapefile, All Roads County-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  4. TIGER/Line Shapefile, 2016, Series Information for the Current County Subdivision State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  5. TIGER/Line Shapefile, 2016, Series Information for the Address Range-Feature County-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  6. TIGER/Line Shapefile, 2016, Series Information for the Current Block Group State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  7. TIGER/Line Shapefile, 2016, Series Information for the Current Census Tract State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  8. TIGER/Line Shapefile, 2015, Series Information for the Current Block Group State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  9. 76 FR 69595 - Application of Third Party Testing Requirements; Reducing Third Party Testing Burdens

    Science.gov (United States)

    2011-11-08

    ... material change in the product's design or manufacturing process, including the sourcing of component parts...)) defines a ``children's product,'' in relevant part, as a consumer product designed or intended primarily... testing by a third party) be designed to show the similarity between the products? Also, sampling...

  10. Characterization of ParTI Phoswiches Using Charged Pion Beams

    Science.gov (United States)

    Churchman, Emily; Zarrella, Andrew; Youngs, Michael; Yennello, Sherry

    2017-09-01

    The Partial Truncated Icosahedron (ParTI) detector array consists of 15 phoswiches. Each phoswich is made of two scintillating components - a thallium-doped cesium iodide (CsI(Tl)) crystal and an EJ-212 scintillating plastic - coupled to a photomultiplier tube. Both materials have different scintillation times and are sensitive to both charged and neutral particles. The type of particle and amount of energy deposited determine the shape of the scintillation pulse as a function of time. By integrating the fast and slow signals of the scintillation pulses, a ``Fast vs. Slow Integration'' plot can be created that produces particle identification lines based on the energy deposited in the scintillating materials. Four of these phoswiches were taken to the Paul Scherrer Institute (PSI) in Switzerland where π + , π-, and proton beams were scattered onto the phoswiches to demonstrate their particle identification (PID) capabilities. Using digitizers to record the detector response waveforms, pions can also be identified by the characteristic decay pulse of the muon daughters.

  11. Report of the ITER Council's Ways and Means Working Party

    International Nuclear Information System (INIS)

    1990-01-01

    Beginning in 1988 and continuing through 1990, the four Parties involved, under the auspices of the IAEA, have been cooperating in the ITER Conceptual Design Activities. In order to develop ways and means to comply with the objective of the cooperation, a Working Party was chartered by the Council in July, 1989. This report contains the outcome of the Working Party's effort to fulfil the Council's charge and subsequent additional guidance, which are also given in this document. 2 figs, 13 tabs

  12. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium

    Science.gov (United States)

    Joly, Jeroen K.; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties. PMID:29719525

  13. Personality and Party Ideology Among Politicians. A Closer Look at Political Elites From Canada and Belgium.

    Science.gov (United States)

    Joly, Jeroen K; Hofmans, Joeri; Loewen, Peter

    2018-01-01

    We examined the relationship between Big Five personality and the political ideology of elected politicians. To this end, we studied 303 politicians from Flanders, Wallonia, and Canada, relating their self-reported Big Five scores to a partisanship-based measure of political ideology. Our findings show that, in line with the congruency model of personality, Openness to Experience is the best and most consistent correlate of political ideology, with politicians high on Openness to Experience being more likely to be found among the more progressive left-wing political parties.

  14. Electoral system, pesonal votes, and party choice

    DEFF Research Database (Denmark)

    Thomsen, Søren Risbjerg

    Using local elections in Denmark as an example this paper shows that individual party choice is influenced both by individual level, municipality level, and national level characteristics. Some hypotheses about the effects of the electoral system on personal votes derived from a theory by Carey...... & Shugart (1995) are first tested using a fixed-effects model. The effect of the personal reputation of the candidates, measured by personal votes, on party choice is then tested using a multilevel multinomial logit model suggested by Rabe-Hesketh and Skrondal (2008). The paper shows that both the electoral...

  15. African Ruling Political Parties and the Making of 'Authoritarian ...

    African Journals Online (AJOL)

    appearing to be a 'reincarnation' of the one-party system and military rule that held sway for about three to four decades in Africa (from the 1960s). In the process of this transformation, African ruling parties have been grossly destabilising opposition and perceived dissenters through clientelism, patronage politics and ...

  16. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  17. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  18. Candidate nomination, intra-party democracy, and election violence in Africa

    DEFF Research Database (Denmark)

    Seeberg, Merete Bech; Wahman, Michael; Skaaning, Svend-Erik

    2018-01-01

    This article introduces a special issue on candidate nomination, intra-party democracy, and election violence in Africa. Although a burgeoning literature on African democratization has focused on the topic of electoral violence, little attention has been given to violence during party nominations...... of the involvement of electoral management bodies and external monitors, and violence often results. Rather than developing an elaborate theoretical framework on the causes of nomination violence, our ambition in this introduction is to introduce the concept of nomination violence and situate it in the literatures...... on intra-party democracy and election violence. We also offer new descriptive data on nomination rules and nomination violence across parties on the African continent. The data show that nomination violence is a prevalent problem across both democracies and electoral autocracies. However, the level...

  19. Management of Helicobacter pylori infection--a Working Party Report of the Malaysian Society of Gastroenterology and Hepatology.

    Science.gov (United States)

    Goh, K L; Mahendra Raj, S; Parasakthi, N; Kew, S T; Kandasami, P; Mazlam, Z

    1998-09-01

    The Working Party Report on the Management of Helicobacter pylori serves as a clinical practice guideline for Malaysian doctors. H. pylori is not uncommon in the Malaysian population. Marked racial differences and the consistently low prevalence rates amongst Malays are noted. The working party recommends that if endoscopy is to be performed, a rapid urease test should be used for diagnosis. Where suspicion of the infection is strong and the urease test is negative, histology should be performed on gastric biopsies. Culture should be used to monitor resistance patterns to antibiotics and regional laboratories should assume this responsibility. The urea breath tests are highly accurate tests for diagnosis of H. pylori but is as yet not widely available in Malaysia. The working party strongly recommends that all peptic ulcer patients infected with H. pylori whether active, in remission and complicated ulcers should be treated for the infection. Patients with low-grade gastric mucosal lymphoid tissue lymphoma should also be treated for H. pylori infection. It is considered advisable that patients on long term nonsteroidal antinflammatory drug (NSAID) treatment with a history of peptic ulcers or dyspepsia and patients following resection of early gastric cancer or those with a family history of gastric cancer should also be tested and treated for H. pylori. The working party recommends, as first line treatment a 7-day combination therapy of a proton pump inhibitor, clarithromycin and metronidazole or amoxicillin. High metronidazole resistance rates locally may adversely affect regimens containing the antibiotic. It should also be noted that regimens that yield lower eradication rates may result in higher long term expenditure.

  20. VT Digital Line Graph Miscellaneous Transmission Lines

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) This datalayer is comprised of Miscellaineous Transmission Lines. Digital line graph (DLG) data are digital representations of cartographic...

  1. Political Culture, Values and Economic Utility: A Different Perspective on Norwegian Party-based Euroscepticism

    Directory of Open Access Journals (Sweden)

    Marianne S. Skinner

    2010-08-01

    Full Text Available Drawing on a content analysis of party manifestos and a survey of Norwegian MPs, this article examines the nuances in, and the causality of, the different Norwegian parties’ Euroscepticism. The study of the comparative party politics of Euroscepticism, which focuses on ideology and strategy, falls short of accounting for the Norwegian case, where, unlike other European countries, the parties’ Euroscepticism is exceptionally stable and appears across the political spectrum. Therefore, the article tests an alternative set of theories, drawn from the literature on opinion formation on European integration, to find a more suitable framework for analysing and explaining the motivation of Norwegian Euroscepticism. The analysis shows that Norwegian party-based Euroscepticism can be divided into three types when it comes to its strength and policy opposition, with the Centre Party and the Socialist Left Party on the ‘hardest’ end of the Euroscepticism scale, followed by the Christian Democratic Party and the Liberal Party, and finally, the Labour Party and the Progress Party. Furthermore, the analysis indicates that Norwegian Eurosceptic party stances on Europe are primarily driven by political values and political culture concerns, except for the Progress Party, which base its Eurosceptic motivation on economic utilitarianism and political culture.

  2. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  3. Social Movements and New Forms of Political Organization: Podemos as a Hybrid Party

    Directory of Open Access Journals (Sweden)

    Daniela Chironi

    2017-05-01

    Full Text Available In recent years, the restructuring of the party systems in several European countries was accompanied or preceded by massive waves of anti-austerity protests. Although the causal relation between these mobilizations and the rise of new parties has already been assessed, the organizational features remain understudied. To fill this gap, here we analyse the impact of the cycle of anti-austerity and pro-real democracy protests which emerged in 2011 with the birth and organizational development of the Spanish party Podemos. Bridging two subfields of social and political sciences—movement studies and party studies—we pay particular attention to the dichotomy between horizontality and verticality within Podemos' organization. In particular, we address the issues of social movement effects as well as party foundation and organizational development. Our main findings suggest that movement mobilization played a large role in shaping Podemos' foundational choices, particularly with reference to the fundamental principles of the party and its strategic positioning. Podemos is also experimenting new democratic methods internally. Nonetheless, empirical analysis shows that, overall, the influence of movements' organizational models on the organizational structure of the party has been limited. Yet, the result is a “hybrid” party that finds a balance between the horizontalism of social movements and the efficiency of parties.

  4. Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem

    Directory of Open Access Journals (Sweden)

    Xin Liu

    2017-01-01

    Full Text Available The millionaires’ problem is the basis of secure multiparty computation and has many applications. Using a vectorization method and the Paillier encryption scheme, we first propose a secure two-party solution to the millionaires’ problem, which can determine x=y,  xy in one execution. Subsequently, using the vectorization and secret splitting methods, we propose an information-theoretically secure protocol to solve the multiparty millionaires’ problem (a.k.a. secure sorting problem, and this protocol can resist collusion attacks. We analyze the accuracy and security of our protocols in the semihonest model and compare the computational and communication complexities between the proposed protocols and the existing ones.

  5. Online network organization of Barcelona en Comú, an emergent movement-party.

    Science.gov (United States)

    Aragón, Pablo; Gallego, Helena; Laniado, David; Volkovich, Yana; Kaltenbrunner, Andreas

    2017-01-01

    The emerging grassroots party Barcelona en Comú won the 2015 Barcelona City Council election. This candidacy was devised by activists involved in the Spanish 15M movement to transform citizen outrage into political change. On the one hand, the 15M movement was based on a decentralized structure. On the other hand, political science literature postulates that parties develop oligarchical leadership structures. This tension motivates to examine whether Barcelona en Comú preserved a decentralized structure or adopted a conventional centralized organization. In this study we develop a computational methodology to characterize the online network organization of every party in the election campaign on Twitter. Results on the network of retweets reveal that, while traditional parties are organized in a single cluster, for Barcelona en Comú two well-defined groups co-exist: a centralized cluster led by the candidate and party accounts, and a decentralized cluster with the movement activists. Furthermore, results on the network of replies also shows a dual structure: a cluster around the candidate receiving the largest attention from other parties, and another with the movement activists exhibiting a higher predisposition to dialogue with other parties.

  6. Partying as Everyday Life

    DEFF Research Database (Denmark)

    Demant, Jakob; Østergaard, Jeanette

    2007-01-01

    situates the event in everyday life. By drawing on Maffesoli's (1996) concept of ‘sociality' and Lincoln's (2005) concept of zoning the spatial and social logic of the house, partying is analysed using both qualitative and quantitative material. The analysis suggests that the consumption of alcohol (i...... to reaffirm friendship and is therefore an integrated part of adolescents' everyday life.  ...

  7. Comparative Party System Analysis in Central and Eastern Europe: the Case of the Baltic States

    Directory of Open Access Journals (Sweden)

    Tõnis Saarts

    2011-11-01

    Full Text Available The nature of the party systems in Central and Eastern Europe (CEE has puzzled many scholars. High instability of the party systems and their specific evolution makes the application of theoretical models designed predominately for Western European party politics problematic. The paper puts forward the argument that we should further elaborate and specify the models for a small N comparative party system analysis in CEE countries and to incorporate some region specific components into the framework. The essential dimensions included into proposed comparative framework are as follows: (1 the stability of the party system, (2 party system fragmentation, (3 parties´ penetration into society, (4 the ideology and origins of the major parties, (5 the dominant cleavage constellations framing the party competition (6 the strength of the party organizations. The above-mentioned dimensions are expected to capture the most important aspects that make the difference between the party systems in general, and each dimension is complemented with the specific additional variables suitable for party system analysis in CEE in particular. The framework will be tested on the Baltic States, which party systems are often regarded to be very similar to each other. However, the analysis will demonstrate that based on the above-mentioned framework, very significant and noteworthy differences will be revealed.

  8. The Changing of Political Orientation of Masyumi Party During 1950-1959

    Directory of Open Access Journals (Sweden)

    Alfi Hafidh Ishaqro

    2017-06-01

    Full Text Available Through historical method, this article studies the Shifts in Political Ideological Orientation of Masyumi Party during the Liberal Democracy Era 1950–1959. The shifted orientations of Masyumi Party included a shif of orientation in its principle, form of government and the government executive system. The establishment of Masyumi Party was the apex of the Japanese concern in trying to map the axis of the powers of various groups in Indonesia. The formations of PUTERA, which bore the nationalist inclination and MIAI, which tended to accommodate urban Muslims were not attractive enough to win the hearts and empathy from the Indonesian native communities for its occupation in Indonesia. Masyumi Party made Islam as a its struggling principle, not only as a symbol but also tha ideology and spirits in conducting the various siyasah preaches within the scope of political struggles. Numerous internal dynamics were then occuring in the body Masymi Party. The Party’s change in its orientation began to be visible, indicated by the idea suggested by M. Natsir to formulate the Constitution or Law of General Election. The formation of the General Election Law made M. Natsir and Masyumi the symbol of the establishment and growth of democracy in the Republic of Indonesia, which became more evident when M. Natsir was ousted and the subsequent working cabinet heads failed to hold a General Election. And finally, at the end of 1955 under the leadership of Burhanuddin Harahap, who was himself a Masyumi figure, a general election was held for the first time. The political attitude shown by Masyumi indicated that Masumi Party had shifted its political orientation. Masyumi Party, which originally struggled to implement Islam by employing the Syura in forming a government was helplessly compromising its principle by following and combining itself into a democracy model the initiator of which was the leader of Masyumi Party itself. Such political behavioral changes

  9. Évolution des partis politiques dans le monde arabe | Page 4 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  10. Évolution des partis politiques dans le monde arabe | Page 2 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  11. Costly third-party punishment in young children.

    Science.gov (United States)

    McAuliffe, Katherine; Jordan, Jillian J; Warneken, Felix

    2015-01-01

    Human adults engage in costly third-party punishment of unfair behavior, but the developmental origins of this behavior are unknown. Here we investigate costly third-party punishment in 5- and 6-year-old children. Participants were asked to accept (enact) or reject (punish) proposed allocations of resources between a pair of absent, anonymous children. In addition, we manipulated whether subjects had to pay a cost to punish proposed allocations. Experiment 1 showed that 6-year-olds (but not 5-year-olds) punished unfair proposals more than fair proposals. However, children punished less when doing so was personally costly. Thus, while sensitive to cost, they were willing to sacrifice resources to intervene against unfairness. Experiment 2 showed that 6-year-olds were less sensitive to unequal allocations when they resulted from selfishness than generosity. These findings show that costly third-party punishment of unfair behavior is present in young children, suggesting that from early in development children show a sophisticated capacity to promote fair behavior. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. Between Confessionalism and Liberal Conservatism : The Christian Democratic Parties of Belgium and the Netherlands

    NARCIS (Netherlands)

    Lucardie, Anthonie; Ten Napel, Hans_Martien; Hanley, David

    1994-01-01

    According to Horner (1981), the Christian Democratic parties of the Low Countries are still confessional parties (Konjessionsparteien) , whereas their sister parties in Germany and Italy are evolving towards liberal conservative catch-all parties (Volksparteien). In this chapter Horner's thesis will

  13. The Analysis Of Political Marketing Mix In Influencing Image And Reputation Of Political Party And Their Impact Toward The Competitiveness Of Political Party The Survey Of Voters In West Java Province

    Directory of Open Access Journals (Sweden)

    Dedeh Maryani

    2015-08-01

    Full Text Available Abstract Recently in Indonesia public trust toward political parties has been decreasing. Most voters tend to be neutral they had better to choose to none. The Experts argued that political competitivness will be high when political parties apply the accurate marketing mix or enhance their image and reputation. The aim of this research is to show how far political marketing mix in influencing the image or the reputation of political party and their impact toward the competitivness of 10 political parties conducted in Province West Java. I use quantitative method with explanatory survey method design. The population in this research is all voters in West Java while the samples are about 400 persons with cluster random sampling. Data analysis in this research is descriptive with Parsial Least Square PLS hypothesis test. PLS describes political marketing mix toward the image and the reputation of political party and their impact toward the competitivness of political party. The result shows that independent variable X political marketing mix gives a positive and significant influence to intervening variables Y1 and Y2 the image and the reputation of political party and dependent variable Y3 political party competitivness their impact to the variable depend on it. The finding in this study is that marketing mix has high influence toward the competitiveness of political party by enhancing the image and the reputation of political party.

  14. 34 CFR 81.19 - Costs and fees of parties.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Costs and fees of parties. 81.19 Section 81.19 Education Office of the Secretary, Department of Education GENERAL EDUCATION PROVISIONS ACT-ENFORCEMENT General Provisions § 81.19 Costs and fees of parties. The Equal Access to Justice Act, 5 U.S.C. 504...

  15. Information barriers

    International Nuclear Information System (INIS)

    Fuller, J.L.; Wolford, J.

    2001-01-01

    Full text: An information barrier (IB) consists of procedures and technology that prevent the release of sensitive information during a joint inspection of a sensitive nuclear item, and provides confidence that the measurement system into which it has been integrated functions exactly as designed and constructed. Work in the U.S. on radiation detection system information barriers dates back at least to 1990, even though the terminology is more recent. In January 1999 the Joint DoD-DOE Information Barrier Working Group was formed in the United States to help coordinate technical efforts related to information barrier R and D. This paper presents an overview of the efforts of this group, by its Chairs, as well as recommendations for further information barrier R and D. Progress on the demonstration of monitoring systems containing IBs is also provided. From the U.S. perspective, the basic, top-level functional requirements for the information barrier portion of an integrated radiation signature-information barrier inspection system are twofold: The host must be assured that his classified information is protected from disclosure to the inspecting party; and The inspecting party must be confident that the integrated inspection system measures, processes, and presents the radiation-signature-based measurement conclusion in an accurate and reproducible manner. It is the position of the United States that in the absence of any agreement to share classified nuclear weapons design information in the conduct of an inspection regime, the requirement to protect host country classified warhead design information is paramount and admits no tradeoff versus the confidence provided to the inspecting party in the accuracy and reproducibility of the measurements. The U.S. has reached an internal consensus on several critical design elements that define a general standard for radiation signature information barrier design. These criteria have stood the test of time under intense

  16. Third-party social evaluations of humans by monkeys and dogs.

    Science.gov (United States)

    Anderson, James R; Bucher, Benoit; Chijiiwa, Hitomi; Kuroshima, Hika; Takimoto, Ayaka; Fujita, Kazuo

    2017-11-01

    Developmental psychologists are increasingly interested in young children's evaluations of individuals based on third-party interactions. Studies have shown that infants react negatively to agents who display harmful intentions toward others, and to those who behave unfairly. We describe experimental studies of capuchin monkeys' and pet dogs' differential reactions to people who are helpful or unhelpful in third-party contexts, and monkeys' responses to people who behave unfairly in exchanges of objects with a third party. We also present evidence that capuchin monkeys monitor the context of failures to help and violations of reciprocity, and that intentionality is one factor underlying their social evaluations of individuals whom they see interacting with others. We conclude by proposing some questions for studies of nonhuman species' third party-based social evaluations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. The Romanian Social Democratic Party versus the authoritarian monarchy

    Directory of Open Access Journals (Sweden)

    Florin Grecu

    2014-09-01

    Full Text Available The article approaches the Romanian social-democratic collaboration during 1938-1940 with the authoritarian monarch regime. Even though the party leaders had diverging political views, regards to the acceptance or the non-acceptance of the authoritarian regime, the influential PSDR members held leading positions within the single party and the corporate parliament and within the union structures. The positions were offered by the regime, so that the union leaders would stop instigating workers to go on strike, and to accept the governmental policies. The freedom of speech and the political actions were ceded to the monarch, who governed at the place of the political parties and he controlled the unions, by using the guilds.

  18. POLITICAL PARTIES AND THEIR ROLE IN SAFEGUARDING THE SUPREMACY OF THE CONSTITUTION

    Directory of Open Access Journals (Sweden)

    Silvia-Elena, OLARU

    2014-11-01

    Full Text Available Nowadays, the political scene of the world is stirred by political parties. The separate fronts of the Government, on the one side, and Parliament, on the other, are now obsolete notions, while political parties dominate social life, having become genuine states in state. Therefore, within the contemporary organization of the powers in state, the issues are assessed from a different perspective: traditional structures are maintained, while their functions evolve and transform rapidly. A modern society without political parties is unconceivable. Today, more than ever, political parties deserve their qualification of "engines of political life" and "reasons of the aging of the classical theory of the separation of powers"; at the same time, they must act within the boundaries set by law, namely by observing the principles of a democratic state and the constitutional order. When dealing with the theory of the separation of powers in state, we must keep in mind that, to a large extent, it was developed in a time in which political parties did not exist yet or were not in their modern form. The main problems were of institutional nature and referred to the various bodies, their competencies and the relationships between them. Unfortunately, in societies in transition, where authentic democracy is still developing, political parties - in some countries - perceive governing as a means of obtaining ministerial portfolios at all costs, irrespective of whether they have professionals for the field concerned or not. This often creates a governmental crisis, which usually leads to changing the incumbents and obtaining more positions in the new government. In this context, some of the incumbent parties set up all kinds of obstacles in order to limit the number of parties, and if this limitation fails, they manage to create legal provisions which discriminate among parties with seats in Parliament and those which are not represented, both in local and

  19. Pre-School Students' Informal Acquisitions Regarding the Concepts of Point and Straight Line

    Science.gov (United States)

    Orbay, Keziban; Develi, Mehmet Hikmet

    2015-01-01

    This study aimed to investigate the informal cognitive structures regarding "point" and "straight line"--two basic and undefined terms of geometry--in children registered in preschool--the previous step before in-class formal education process. The study was conducted with the participation of 50 children enrolled in nursery,…

  20. Intra-Campaign Changes in Voting Preferences: The Impact of Media and Party Communication

    Science.gov (United States)

    Johann, David; Königslöw, Katharina Kleinen-von; Kritzinger, Sylvia; Thomas, Kathrin

    2018-01-01

    An increasing number of citizens change and adapt their party preferences during the electoral campaign. We analyze which short-term factors explain intra-campaign changes in voting preferences, focusing on the visibility and tone of news media reporting and party canvassing. Our analyses rely on an integrative data approach, linking data from media content analysis to public opinion data. This enables us to investigate the relative impact of news media reporting as well as party communication. Inherently, we overcome previously identified methodological problems in the study of communication effects on voting behavior. Our findings reveal that campaigns matter: Especially interpersonal party canvassing increases voters’ likelihood to change their voting preferences in favor of the respective party, whereas media effects are limited to quality news outlets and depend on individual voters’ party ambivalence.

  1. Intra-Campaign Changes in Voting Preferences: The Impact of Media and Party Communication.

    Science.gov (United States)

    Johann, David; Königslöw, Katharina Kleinen-von; Kritzinger, Sylvia; Thomas, Kathrin

    2018-01-01

    An increasing number of citizens change and adapt their party preferences during the electoral campaign. We analyze which short-term factors explain intra-campaign changes in voting preferences, focusing on the visibility and tone of news media reporting and party canvassing. Our analyses rely on an integrative data approach, linking data from media content analysis to public opinion data. This enables us to investigate the relative impact of news media reporting as well as party communication. Inherently, we overcome previously identified methodological problems in the study of communication effects on voting behavior. Our findings reveal that campaigns matter: Especially interpersonal party canvassing increases voters' likelihood to change their voting preferences in favor of the respective party, whereas media effects are limited to quality news outlets and depend on individual voters' party ambivalence.

  2. [Ketamine as a party drug

    NARCIS (Netherlands)

    Vroegop, M.P.; Dongen, R.T.M. van; Vantroyen, B.; Kramers, C.

    2007-01-01

    Ketamine is a new party drug, which is easy to obtain. For this reason, it is possible that physicians will be increasingly confronted with users that have medical problems. Relatively few cases of ketamine intoxication with a fatal outcome have been reported thus far. Ketamine is very

  3. Changing the Rules of the Game : the development and reform of party law in Latin America

    NARCIS (Netherlands)

    Molenaar, F.F.

    2017-01-01

    Party law, or the legal regulation of political parties, has become a prominent feature of party systems. Some party laws are designed to have a much larger political impact than others. It remains unknown why some countries adopt party laws that have substantial implications for party

  4. Market Reform, Programmatic (DeAlignment and Party System Stability in Latin America

    Directory of Open Access Journals (Sweden)

    Kenneth M. ROBERTS

    2013-07-01

    Full Text Available Although democratic regimes in Latin America since the early 1980s have been surprisingly durable, party systems in much of the region continue to experience very high levels of electoral instability. A critical juncture approach to institutional change suggests that variation in party system stability is related to the impact of market liberalization in the 1980s and 90s on the programmatic alignment –or (dealignment– of partisan competition. Market reforms that were adopted by conservative leaders and opposed by a major leftist rival aligned party systems programmatically, allowing societal opposition to be channeled into institutionalized forms of competition that were highly stable in the post-adjustment era. By contrast, «bait-and-switch» reforms adopted by populist or leftist leaders were programmatically de-aligning for party systems, leaving them vulnerable to highly destabilizing reactive sequences in the aftermath to the reform process-including mass social protests, the demise of historic conservative parties, and the outflanking of traditional populist or leftist parties by more radical, anti-neoliberal outsiders. The political dynamics of market-based economic adjustment thus heavily conditioned the ways in which party systems would process the post-adjustment revival of populist and leftist alternatives in the region.

  5. Coalitions and Competition in Malaysia – Incremental Transformation of a Strong-party System

    OpenAIRE

    Meredith L. WEISS

    2013-01-01

    "The seeming entrenchment of a two-coalition system in Malaysia solidifies the centrality of strongly institutionalised parties in the polity. The primary parties in Malaysia reach deeply into society and nest within dense networks of both intra-party and external organisations. Given this order - which differentiates Malaysia from its neighbours in the region - political liberalisation, if it happens, should be expected largely via electoral politics, and, specifically, through inter-party c...

  6. House Parties: An Innovative Model for Outreach and Community-Based Health Education.

    Science.gov (United States)

    Anderson-Reeves, Timika; Goodman, Jacqueline; Bragg, Brian; Leruth, Chelsey

    2017-12-01

    Purpose To connect low resource communities to innovative services that address gaps in health access and knowledge. Description We describe the house party model, as a community-based workshop approach to health education developed by the Westside Healthy Start program (WHS) in Chicago, Illinois. Key elements of the WHS house party model include use of community health workers as facilitators, collaboration with participants and community-based organizations, referrals to health care and social services, and engagement strategies such as interactive activities, personal stories, and discussion. Assessment In 2014 and 2015, WHS completed 23 house parties with 271 participants, delivering education on relevant maternal and child health (MCH) topics. Participants demonstrated improvements in knowledge of several health-related areas. About half of participants were able to identify causes or signs of preterm labor prior to the house party, compared to over 80% after. In addition, 94% of participants rated the house party workshops "excellent" or "good". Conclusion House parties are a promising strategy for increasing knowledge about MCH topics and linking hard-to-reach populations to resources in the community.

  7. Parliamentary committees in a party-centred context : structure, composition, functioning

    NARCIS (Netherlands)

    Mickler, T.A.

    2017-01-01

    Beyond the immediately visible plenum, parliaments are highly complex institutions. They work through various venues in which decisions are prepared or even taken. The two main institutions in this regard are parliamentary party groups, which comprise legislators who are elected under the same party

  8. Media cues and citizen support for right-wing populist parties

    NARCIS (Netherlands)

    Sheets, P.; Bos, L.; Boomgaarden, H.

    2013-01-01

    Right-wing populist parties are thriving across Europe. Usual explanations for the success of these parties are based on notions related to economics, national identity or cultural alienation. Some authors, however, have shown that the mass media also play a significant role. Whereas these studies

  9. 78 FR 46360 - 30-Day Notice of Proposed Information Collection: Request Voucher for Grant Payment and Line of...

    Science.gov (United States)

    2013-07-31

    ... Information Collection: Request Voucher for Grant Payment and Line of Credit Control System (LOCCS) Voice.... Description of the need for the information and proposed use: Payment request vouchers for distribution of.... A. Overview of Information Collection Title of Information Collection: Request Voucher for Grant...

  10. Is supporting populist political parties a mental disorder?

    OpenAIRE

    McGowan, J.

    2015-01-01

    It’s just over a month until the UK general election and many Brits seem to have lost trust in their traditional politicos. Whether it’s the UK Independence Party (UKIP) scapegoating the European Union and immigrants, a rise in nationalism (the Scottish National party), or Russell Brand’s teenage anarchism, faith in facile, and sometimes ugly, solutions is on the march. It’s a huge relief, therefore, to hear that the editors of the DSM (the main reference book for psychiatric classification),...

  11. On-line monitoring applications at nuclear power plants. A risk informed approach to calibration reduction

    International Nuclear Information System (INIS)

    Shankar, Ramesh; Hussey, Aaron; Davis, Eddie

    2003-01-01

    On-line monitoring of instrument channels provides increased information about the condition of monitored channels through accurate, more frequent evaluation of each cannel's performance over time. This type of performance monitoring is a methodology that offers an alternate approach to traditional time-directed calibration. EPRI's strategic role in on-line monitoring is to facilitate its implementation and cost-effective use in numerous applications at power plants. To this end, EPRI has sponsored an on-line monitoring implementation project at multiple nuclear plants specifically intended to install and use on-line monitoring technology. The selected on-line monitoring method is based on the Multivariate State Estimation Technique. The project has a planned three-year life; seven plants are participating in the project. The goal is to apply on-line monitoring to all types of power plant applications and document all aspects of the implementation process in a series of EPRI reports. These deliverables cover installation, modeling, optimization, and proven cost-benefit. This paper discusses the actual implementation of on-line monitoring to various nuclear plant instrument systems. Examples of detected instrument drift are provided. (author)

  12. From Off-line to On-line Handwriting Recognition

    NARCIS (Netherlands)

    Lallican, P.; Viard-Gaudin, C.; Knerr, S.

    2004-01-01

    On-line handwriting includes more information on time order of the writing signal and on the dynamics of the writing process than off-line handwriting. Therefore, on-line recognition systems achieve higher recognition rates. This can be concluded from results reported in the literature, and has been

  13. 12 CFR 216.6 - Information to be included in privacy notices.

    Science.gov (United States)

    2010-01-01

    ... customers that you disclose and the categories of affiliates and nonaffiliated third parties to whom you disclose nonpublic personal information about your former customers, other than those parties to whom you... applicable; and (ii) State whether the third party is: (A) A service provider that performs marketing...

  14. Media cues and citizen support for right-wing populist parties

    NARCIS (Netherlands)

    Sheets, P.; Bos, L.; Boomgaarden, H.G.

    2016-01-01

    Right-wing populist parties are thriving across Europe. Their success is usually attributed to demand-side voter factors and supply-side factors explaining differences in success between countries and parties, such as the role of the media. This study focuses on the interplay of these factors and

  15. Friends for better or for worse: interracial friendship in the United States as seen through wedding party photos.

    Science.gov (United States)

    Berry, Brent

    2006-08-01

    Friendship patterns are instrumental for testing important hypotheses about assimilation processes and group boundaries. Wedding photos provide an opportunity to directly observe a realistic representation of close interracial friendships and race relations. An analysis of 1,135 wedding party photos and related information shows that whites are especially unlikely to have black friends who are close enough to be in their wedding party. Adjusting for group size, whites and East and Southeast Asians (hereafter E/SE Asians) are equally likely to be in each other's weddings, but whites invite blacks to be in their wedding parties only half as much as blacks invite whites, and E/SE Asians invite blacks only one-fifth as much as blacks invite E/SE Asians. In interracial marriages, both E/SE Asian and black spouses in marriages to whites are significantly less likely than their white spouses to have close friendships with members of their spouse's race.

  16. The ICRP working party on bioassay interpretation

    International Nuclear Information System (INIS)

    Fry, F.A.; Lipsztein, J.L.; Birchall, A.

    2003-01-01

    In recent years there have been many developments in modelling the behaviour of radionuclides in the human body. The current generation of models are designed to be more 'realistic' than the previous generation of simple compartment models. The International Commission on Radiological Protection (ICRP) uses these models to produce dose coefficients and recognises that there is a need to give more guidance on how these models can be used to interpret bioassay data. A working party has been set up to address the issue. This paper describes some of the problems, some approaches to solving the problems and the progress of the ICRP working party. (author)

  17. TIGER/Line Shapefile, 2016, Series Information for the Current Elementary School Districts State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  18. Series Information File for the 2017 TIGER/Line Shapefile, Current Elementary School Districts State-based

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  19. TIGER/Line Shapefile, 2013, Series Information File for the Current Census Tract State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  20. TIGER/Line Shapefile, 2013, Series Information File for the Current County Subdivision State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  1. Political Party Funding in Romania - One Step Forward, Two Steps Back?

    Directory of Open Access Journals (Sweden)

    Iulian Georgel Savenco

    2015-05-01

    Full Text Available Within political life, the determining role is given to political parties in their capacity as actors in the electoral campaign and in the race for political power. This is the reason for which we believe that the means of financing political parties and the electoral campaigns in which they partake is an important aspect within the electoral reform, as without an adequate funding their chances of winning the electoral race are drastically reduced. On the other hand, funding of political parties is of great interest as the lack of transparency which usually encircles this process can lead to a dangerous phenomenon, namely corruption. Throughout this article we present the current situation and critically analyze the changes which the Romanian legislature plans to apply to the political party financing law.

  2. Device-independence for two-party cryptography and position verification

    DEFF Research Database (Denmark)

    Ribeiro, Jeremy; Thinh, Le Phuc; Kaniewski, Jedrzej

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position......-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which...... security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary...

  3. Information flow security for business process models - just one click away

    NARCIS (Netherlands)

    Lehmann, A.; Fahland, D.; Lohmann, N.; Moser, S.

    2012-01-01

    When outsourcing tasks of a business process to a third party, information flow security becomes a critical issue. In particular implicit information leaks are an intriguing problem. Given a business process one could ask whether the execution of a confidential task is kept secret to a third party

  4. Third Party Nuclear Liability: The Case of a Supplier in the United Kingdom

    OpenAIRE

    Thomas, A.; Heffron, R. J.

    2012-01-01

    The law surrounding third party nuclear liability is important to all parties in the nuclear supply chain whether they are providing decommissioning services, project management expertise or a new reactor. This paper examines third party nuclear liability, and in particular, in relation to a Supplier in the nuclear energy sector in the United Kingdom (UK). The term “Supplier” is used in this paper and, depending on the context, is intended to cover all parties in the supply chain providing se...

  5. System dynamics research of remanufacturing closed-loop supply chain dominated by the third party.

    Science.gov (United States)

    Miao, Shidi; Wang, Tengfei; Chen, Deyun

    2017-04-01

    With the rapid development of the electronic information industry in recent years, electronic products are being updated faster and faster, and e-waste recycling has become a common problem around the world. Firstly, this article contrasts recycling at home and abroad using the predicament of Midea Corp. Based on a closed-loop supply chain with the system dynamics method, a model is constructed and simulated. In this model, the collection point coverage rate is introduced to adjust the e-waste recycling rate dynamically. Aiming at a recycling mode dominated by the third party of the closed-loop supply chain, the article mainly discusses the impact on the sales rate and market share of the recycling model by third-party enterprises and compares the total revenue of all supply chains. Simulation results show that the model is more effective and optimal than the traditional recycling model.

  6. 27 CFR 6.42 - Indirect inducement through third party arrangements.

    Science.gov (United States)

    2010-04-01

    ... TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements... other thing of value by an industry member to a third party, where the benefits resulting from such... value was furnished to a retailer by the third party without the knowledge or intent of the industry...

  7. The Political Parties and Political Participation in Rivers State, Nigeria

    African Journals Online (AJOL)

    The Political Parties and Political Participation in Rivers State, Nigeria: A Case Study of 2015 General Elections. Goddey Wilson. Abstract. The study reviewed the activities of the political parties and its impact on voters' participation in the political activities in Rivers State. In pursuit of this objective, the study generated ...

  8. Organization and Information: Firms' Governance Choices in Rational-Expectations Equilibrium

    OpenAIRE

    Robert Gibbons; Richard Holden; Michael Powell

    2012-01-01

    We analyze a rational-expectations model of price formation in an intermediate-good market under uncertainty. There is a continuum of firms, each consisting of a party who can reduce production cost and a party who can discover information about demand. Both parties can make specific investments at private cost, and there is a machine that either party can control. As in incomplete-contracting models, different governance structures (i.e., different allocations of control of the machine) crea...

  9. 76 FR 55261 - Safety Zone; Corporate Party on Hornblower Yacht, San Francisco, CA

    Science.gov (United States)

    2011-09-07

    ...-AA00 Safety Zone; Corporate Party on Hornblower Yacht, San Francisco, CA AGENCY: Coast Guard, DHS... Corporate Party on Hornblower Yacht. This temporary safety zone is established to ensure the safety of... Events will sponsor the Corporate Party on Hornblower Yacht on September 17, 2011, in the navigable...

  10. Feature Project--A Bookmaking Party.

    Science.gov (United States)

    Drury, Lori; And Others

    1984-01-01

    The teaching activities presented in this article focus on a bookmaking party, which gives children a format in which they can publish and share their activities in a formal way, provides them with books for recording their writing, and involves students, parents, and the community with children's writing. The paper describes the steps for…

  11. The transformation of southern California's residential photovoltaics market through third-party ownership

    International Nuclear Information System (INIS)

    Drury, Easan; Miller, Mackay; Macal, Charles M.; Graziano, Diane J.; Heimiller, Donna; Ozik, Jonathan; Perry IV, Thomas D.

    2012-01-01

    Third-party photovoltaics (PV) ownership is a rapidly growing market trend, where commercial companies own and operate customer-sited PV systems and lease PV equipment or sell PV electricity to the building occupant. Third-party PV companies can reduce or eliminate up-front adoption costs, reduce technology risk and complexity by monitoring system performance, and can repackage the PV value proposition by showing cost savings in the first month of ownership rather than payback times on the order of a decade. We find that the entrance of third-party business models in southern California residential PV markets has enticed a new demographic to adopt PV systems that is more highly correlated to younger, less affluent, and less educated populations than the demographics correlated to purchasing PV systems. By enticing new demographics to adopt PV, we find that third-party PV products are likely increasing total PV demand rather than gaining market share entirely at the expense of existing customer owned PV demand. We also find that mean population demographics are good predictors of third-party and customer owned PV adoption, and mean voting trends on California carbon policy (Proposition 23) are poor predictors of PV adoption. - Highlights: ► Third-party PV products increased residential PV demand in southern CA. ► Third-party PV products entice new demographic groups to adopt PV. ► Regional demographics are good predictors of PV demand. ► Regional voting trends on carbon policy are poor predictors of PV demand.

  12. Proposal of many-party controlled teleportation for multi-qubit entangled W state

    Institute of Scientific and Technical Information of China (English)

    Huang Zhi-Ping; Li Hong-Cai

    2005-01-01

    A scheme of M-party controlled teleportation for one N-qubit entangled W state via (N-1) Einstein-PodolskyRosen (EPR) pairs and one (M+2)-qubit Greenberger-Horne-Zeilinger (GHZ) state is proposed. We achieve the teleportation in such a way that M agents can execute the Hadamard transformation, perform the measurement on their qubits and inform the receiver of their measurements. Then we discuss that the receiver cannot fully recover the state from the sender if one agent does not co-operate with him.

  13. A SPANISH “YES, WE CAN!” AGAINST THE TWO-PARTY SYSTEM: THE DEVELOPMENT OF POLITICAL PARTY PODEMOS

    Directory of Open Access Journals (Sweden)

    Guillermo López García

    2016-01-01

    Full Text Available This article develops an analysis of the internal functioning of the Spanish party Podemos and its structural make-up. The used methodology consists of: 1 a descriptive analysis of the development of Podemos, based on the available information in the media; 2 an analysis centered on the presence of Podemos in social networks and the mainstream media, in addition to electoral results and polls. The analysis attempts to determine the following: the party’s decision-making process, along with the type of relationships established between leaders and supporters; to what extent the Internet is used as a primary tool for organization, mobilization and political propaganda; and the extent of the clash or harmony within the interparty’s dynamics: on one hand, the bottom-up structure of the citizen assemblies and, on the other, the top-down structure inferred from Pablo Iglesias’s hyper-leadership and the media presence of the party’s principal leaders.

  14. Direct and indirect welfare chauvinism as party strategies

    DEFF Research Database (Denmark)

    Careja, Romana; Elmelund-Præstekær, Christian; Klitgaard, Michael Baggesen

    2016-01-01

    welfare chauvinism occurs as a result of legislative changes that explicitly exclude recipients from social protection or reduce the level thereof on the basis of ethnicity. Indirect welfare chauvinism is the result of policy measures that apply to both natives and immigrants, but which deliberately...... and deliberate policy-making strategies of the party. It shows that the distinction between direct and indirect chauvinism is a useful theoretical tool for understanding how the Danish People's Party can fulfill the expectations of both its electorate and its coalition partners, even if they point in different...

  15. Ecologies of ideologies: Explaining party entry and exit in West-European parliaments, 1945-2013.

    Science.gov (United States)

    van de Wardt, Marc; Berkhout, Joost; Vermeulen, Floris

    2017-06-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our expectations. We find that political parties are more likely to exit when density within their niche increases. Also there is competition between adjacent ideological niches, i.e. between centrist and right-wing niches. In contrast to our expectations, neither density nor institutional rules impact party entry. This raises important questions about the rationale of prospective entrants.

  16. Assessing the Influence of Political Parties on Public Opinion: The Challenge from Pretreatment Effects

    DEFF Research Database (Denmark)

    Slothuus, Rune

    2016-01-01

    Despite generations of research, political scientists have trouble pinpointing the influence of political parties on public opinion. Recently, scholars have made headway in exploring whether parties in fact shape policy preferences by relying on experimental designs. Yet, the evidence from...... this work is mixed. I argue that the typical experiment faces a design problem that likely minimizes the extent to which parties apparently matter. Because parties have policy reputations, experimental participants may already know from real-world exposure to political debate where the parties stand before...... they are told in the experiment—they are “pretreated.” This study investigates how real-world political context interferes with party cue stimulus in experiments. In two experiments I show that two types of “pretreatment” from outside the experiment—exposure-based and reputation-based—dramatically moderate...

  17. 17 CFR 201.210 - Parties, limited participants and amici curiae.

    Science.gov (United States)

    2010-04-01

    ... protection of investors or consumers, may be admitted as a party upon the filing of a written motion setting... proceeding may be in the public interest or for the protection of investors, may be admitted as a party upon... affecting the person's interests: (1) Procedure. Motions for leave to participate shall be in writing, shall...

  18. Implementing Democratic Equality in Political Parties

    DEFF Research Database (Denmark)

    Bolleyer, Nicole; von Nostitz, Felix-Christopher; Little, Conor

    2015-01-01

    This article theorises and empirically assesses some important intra-organisational implications of maximising democratic equality in political parties both between followers and members and between members and elites. They include weak member commitment, passivity of the rank-and-file membership...

  19. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-01-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  20. Can green building councils serve as third party governance institutions? An economic and institutional analysis

    International Nuclear Information System (INIS)

    Sedlacek, Sabine; Maier, Gunther

    2012-01-01

    Green Building Councils (GBCs) have been established in many different countries in recent years. This paper discusses the role such organizations can play in the respective construction and real estate industry and under what circumstances a GBC can contribute positively to the development of a “greener” or “more sustainable” stock of buildings. The paper investigates the main informational problem of the industry by looking at the relation between a developer and an investor from an economic point of view. We argue that the investor's uncertainty about the true quality of a building and the corresponding incentive for the developer to cheat may lock them into a prisoners' dilemma trap. The corresponding barriers for a transition toward a “greener” buildings market are analyzed. GBCs are described as institutions of economic governance that can assist the economy in overcoming these problems. They can act as third party institutions in transactions between developers and investors. By certifying the quality of a building, they can reduce the risk for the investor to be cheated by the developer and also increase the incentive to develop good quality buildings for the developer. This task, however, raises some severe management challenges for the GBCs. - Highlights: ► We focus on Green Building Councils and their economic role. ► The paper investigates the informational problem of the sustainable building market. ► Developers and investors are locked in a prisoner's dilemma. ► Can the councils act as third party institutions to certify quality of buildings? ► Credibility and reliability are key features for third party certification.

  1. Social Class and Party Identification During the Clinton, Bush, and Obama Presidencies

    Directory of Open Access Journals (Sweden)

    Stephen L. Morgan

    2017-08-01

    Full Text Available Through an analysis of the 1994 through 2016 General Social Surveys, this article demonstrates that a substantial proportion of eligible voters within the working class turned away from solid identification with either the Democratic Party or the Republican Party during the Obama presidency. Even before the 2016 election cycle commenced, conditions were uncharacteristically propitious for a Republican candidate who could appeal to prospective voters in the working class, especially those who had not voted in recent presidential elections but could be mobilized to vote. These findings support the contested position that variation in party identification is a genuine leading indicator of electoral outcomes and perhaps also, in this case, of party realignment.

  2. Measuring the effects of social media participation on political party communities

    NARCIS (Netherlands)

    Effing, Robin; van Hillegersberg, Jos; Huibers, T.; Reddick, C.; Aikins, S.K.

    2012-01-01

    Political parties can potentially benefit from Social Media to shape interactions between their members. This chapter presents the Social Media Participation Model (SMPM), which measures the effects of Social Media Participation on political party communities. As people and politicians increasingly

  3. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  4. 12 CFR 332.6 - Information to be included in privacy notices.

    Science.gov (United States)

    2010-01-01

    ... of nonpublic personal information about your former customers that you disclose and the categories of... former customers, other than those parties to whom you disclose information under §§ 332.14 and 332.15... third party is: (A) A service provider that performs marketing services on your behalf or on behalf of...

  5. Differences in harm from legal BZP/TFMPP party pills between North Island and South Island users in New Zealand: a case of effective industry self-regulation?

    Science.gov (United States)

    Wilkins, Chris; Sweetsur, Paul

    2010-01-01

    'Party' pills containing benzylpiperazine (BZP) and trifluoromethylphenylpiperazine (TFMPP) were sold legally in New Zealand until early 2008. Prospective studies of hospital emergency department admissions appeared to suggest that the harm from party pills was greater among South Island than North Island users. The party pill industry association (the Social Tonics Association of New Zealand or STANZ) claimed these differences were due to the voluntary code of practice adopted by their members in the North Island. The aims of this study were to examine differences in harm from party pills between North and South Island users in New Zealand, and to investigate possible reasons for any differences in harm, including the impact of industry self-regulation. A national household survey of BZP/TFMPP party pill use was conducted in New Zealand. Information on the ingredients of party pills was provided by the National Poisons Centre. In a number of instances last year users of party pills from the South Island were more likely than last year users from the North Island to report harm from party pills. There were no differences between the North and South Island users with regard to the mean number of BZP/TFMPP party pills taken, mean total milligrams of BZP/TFMPP ingested or prevalence of use of other drug types in combination with party pills. A minority of users in the South Island reported using extremely high numbers of BZP/TFMPP party pills in a single session and using extremely high potency brands of party pills. Last year party pill users from the South Island were more likely than those from the North Island to be students. A number of factors may have contributed to the greater harm from BZP/TFMPP party pills among South Island users including a higher proportion of student users with higher consumption of alcohol and other drugs. Users from both Islands commonly exceeded the dosage of BZP/TFMPP recommended by STANZ suggesting the STANZ code of conduct was

  6. Political Party Development in the Arab World | Page 2 | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Iraqi Communist Party [Arabic language]. Documents. í€ l'épreuve du gouvernement urbain, les transformations du Parti de la Justice et du développement au Maroc. Documents. Rassemblement yéménite pour la réforme (al-Islâh) : la difficile construction d'un projet d'alternance. Documents. Socialist Union of Popular ...

  7. 78 FR 44090 - Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite...

    Science.gov (United States)

    2013-07-23

    ... Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite Wood Products..., concerning a third-party certification framework for the formaldehyde standards for composite wood products... Environmental protection, Composite wood products, Formaldehyde, Reporting and recordkeeping, Third-party...

  8. Third-party punishment increases cooperation in children through (misaligned) expectations and conditional cooperation.

    Science.gov (United States)

    Lergetporer, Philipp; Angerer, Silvia; Glätzle-Rützler, Daniela; Sutter, Matthias

    2014-05-13

    The human ability to establish cooperation, even in large groups of genetically unrelated strangers, depends upon the enforcement of cooperation norms. Third-party punishment is one important factor to explain high levels of cooperation among humans, although it is still somewhat disputed whether other animal species also use this mechanism for promoting cooperation. We study the effectiveness of third-party punishment to increase children's cooperative behavior in a large-scale cooperation game. Based on an experiment with 1,120 children, aged 7 to 11 y, we find that the threat of third-party punishment more than doubles cooperation rates, despite the fact that children are rarely willing to execute costly punishment. We can show that the higher cooperation levels with third-party punishment are driven by two components. First, cooperation is a rational (expected payoff-maximizing) response to incorrect beliefs about the punishment behavior of third parties. Second, cooperation is a conditionally cooperative reaction to correct beliefs that third party punishment will increase a partner's level of cooperation.

  9. Utility and recognition of lines and linear patterns on electronic displays depicting aeronautical charting information

    Science.gov (United States)

    2009-01-01

    This report describes a study conducted to explore the utility and recognition of lines and linear patterns on electronic displays depicting aeronautical charting information. The study gathered data from a large number of pilots who conduct all type...

  10. Legislative coalitions with incomplete information.

    Science.gov (United States)

    Dragu, Tiberiu; Laver, Michael

    2017-03-14

    In most parliamentary democracies, proportional representation electoral rules mean that no single party controls a majority of seats in the legislature. This in turn means that the formation of majority legislative coalitions in such settings is of critical political importance. Conventional approaches to modeling the formation of such legislative coalitions typically make the "common knowledge" assumption that the preferences of all politicians are public information. In this paper, we develop a theoretical framework to investigate which legislative coalitions form when politicians' policy preferences are private information, not known with certainty by the other politicians with whom they are negotiating over what policies to implement. The model we develop has distinctive implications. It suggests that legislative coalitions should typically be either of the center left or the center right. In other words our model, distinctively, predicts only center-left or center-right policy coalitions, not coalitions comprising the median party plus parties both to its left and to its right.

  11. Dynamic Line Rating - Technologies and Challenges of PMU on Overhead Lines

    DEFF Research Database (Denmark)

    Alvarez, David; Rosero, Javier; Silva, Filipe Miguel Faria da

    2016-01-01

    for line rating computation and monitoring are identified, these are: sensors, communications, management information system and information analysis tools, which are part of integral dynamic line rating systems. Finally, the benefits and challenges of using phasor measurement units for real time capacity...

  12. REFLECTIONS ON WAGAR ' S WORLD PARTY

    Directory of Open Access Journals (Sweden)

    Albert Bergesen

    2015-08-01

    Full Text Available Our task is to reflect upon Wagar's idea of a world party. In case such reflections are affected by the recent historical situation of the collapse of communism/existing socialism in 1989 and the implications this has for visions of progressive politics going into the 21st century. This event colors most political thinking, although for many the response has been that existing socialism was not real socialism, or that existing socialism was but the Stalinist deformation that, if avoided in the future, the 1917 project could again be resumed and human history and social relations remade anew. I don't see it that way. What existing socialism stood for in terms of the role of a vanguard party taking state power for the larger good is, now after the fall, I think off the board as a realistic program that can be sold to anyone.

  13. Ecologies of Ideologies: Explaining Party Entry and Exit in West-European Parliaments, 1945-2013

    OpenAIRE

    van de Wardt, M.; Berkhout, J.; Vermeulen, F.

    2017-01-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our exp...

  14. The Soviet Union and the Socialist and Social Democratic Parties of Western Europe.

    Science.gov (United States)

    1986-02-01

    British forces, Craxi stated, "Those missiles are not on the moon," Corriere della Sera, May 30, 1985. • 7 .- P.- N" It.- ’j -9.’-V 1.r". k7 17- -. W...Party (PIP) Progressive Labor Party of St. Lucia (PLP) People’s Electoral Movement (MEP), Venezuela Consultative Parties-in-Exile Bulgarian Social

  15. Italy's green party: on the road to success

    International Nuclear Information System (INIS)

    Rosenbaum, A.

    1988-01-01

    Italy's Green Party (Lista Verde) does not consider itself a political party but it is changing the environmental consciousness of the nation. There are new eight popular television shows covering environmental problems and a national weekly newspaper devotes a regular column to ecology. Environmental associations, including the Environmental League, have been started in the 1980s. The Greens have also succeeded in halting Italy's nuclear power programme. In a national referendum held in 1987 almost 80% of the voters agreed with the Greens' views. No fewer than 14 more popular referenda are planned throughout Italy on environmental issues. (UK)

  16. Ideology, Party Systems and Corruption Voting in European Democracies

    DEFF Research Database (Denmark)

    Charron, Nicholas; Bågenholm, Andreas

    2016-01-01

    What is the impact of corruption on citizens' voting behavior? There is a growing literature on an increasingly ubiquitous puzzle in many democratic countries: that corrupt officials continue to be re-elected by voters. In this study we address this issue with a novel theory and newly collected...... original survey data for 24 European countries. The crux of the argument is that voters' ideology is a salient factor in explaining why citizens would continue voting for their preferred party despite the fact that it has been involved in a corruption scandal. Developing a theory of supply (number...... of effective parties) and demand (voters must have acceptable ideological alternatives to their preferred party), we posit that there is a U-shaped relationship between the likelihood of corruption voting and where voters place themselves on the left/right spectrum. The further to the fringes, the more likely...

  17. 28 CFR 513.35 - Accounting/nonaccounting of disclosures to third parties.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Accounting/nonaccounting of disclosures... and Procedures § 513.35 Accounting/nonaccounting of disclosures to third parties. Accounting/nonaccounting of disclosures to third parties shall be made in accordance with Department of Justice regulations...

  18. 77 FR 31086 - Requirements Pertaining to Third Party Conformity Assessment Bodies

    Science.gov (United States)

    2012-05-24

    ... 22030 (April 20, 2011). Third Party Testing for Certain Children's Products; Toys: Requirements for... Bodies to Assess Conformity With the Limits on Phthalates in Children's Toys and Child Care Articles, 76... initiatives, including program development for third party testing of children's products. The commenter...

  19. 77 FR 31073 - Audit Requirements for Third Party Conformity Assessment Bodies

    Science.gov (United States)

    2012-05-24

    ... 1112 and 1118 Audit Requirements for Third Party Conformity Assessment Bodies and Requirements... PRODUCT SAFETY COMMISSION 16 CFR Part 1112 [CPSC Docket No. CPSC-2009-0061] Audit Requirements for Third... rule establishing requirements for the periodic audit of third party conformity assessment bodies as a...

  20. When Two of the Same Are Needed: A Multilevel Model of Intragroup Ethnic Party Competition

    DEFF Research Database (Denmark)

    Bochsler, Daniel

    2012-01-01

    diversification of minority groups. In states with multiple levels of governments, intra-ethnic rival parties emerge if minorities are local majorities in certain regions. Intra-ethnic party competition is limited, however, through the national electoral system, and especially high legal thresholds can restrict......Parties of ethno-regional minorities have been created in a large number of ethnically diverse countries, but sometimes one such party is not enough. While previous work has investigated the consequences of intragroup party competition, this study looks at the causes of internal political...

  1. Exploring the ‘ultimate’ step in the mediatization of political parties

    DEFF Research Database (Denmark)

    Ørsten, Mark; Willig, Ida; Pedersen, Leif Hemming

    Previous studies exploring the fourth dimension of mediatization, that is to say the extent to which political parties adjust their perceptions and behaviour to news media logic, have focused on three steps of structural change that political parties may take as a response to the increasing......, parties may begin to especially focus on candidates who are skilled in communicating with the news media (Strömbäck & Van Alest, 2013).So far, research into the fourth dimension of mediatization in Denmark has focused mostly on the first two steps (Blach-Ørsten, 2016; Elmelund-Præstekær & Hopmann, 2016...

  2. Quantum solution to a class of two-party private summation problems

    Science.gov (United States)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  3. Vote Buying or Campaign Promises? Electoral Strategies When Party Credibility is Limited

    OpenAIRE

    Hanusch, Marek; Keefer, Philip; Vlaicu, Razvan

    2016-01-01

    What explains significant variation across countries in the use of vote buying instead of campaign promises to secure voter support? This paper explicitly models the tradeoff parties face between engaging in vote buying and making campaign promises, and explores the distributional consequences of this decision, in a setting where party credibility can vary. When parties are less credible they spend more on vote buying and target vote buying more heavily toward groups that do not believe campa...

  4. Ordinance on nuclear third party liability (ORCN)

    International Nuclear Information System (INIS)

    1983-12-01

    The Ordinance exempts from the application of the 1983 Act on Nuclear Third Party Liability some substances with low radiation effects. It determines the amount of private insurance cover and defines the risks that insurers may exclude from cover. It establishes a special fund for nuclear damage made up of contributions from the nuclear operators. Specifications are given on the amount of the contributions and their conditions, as well as on administration of the fund. The Ordinance repeals the Ordinance of 13 June 1960 on funds for delayed atomic damage, the Order of 19 December 1960 on contributions to the fund for delayed atomic damage and the Ordinance of 30 November 1981 on cover for third party liability resulting from nuclear power plant operation [fr

  5. Being a potentially responsible party

    International Nuclear Information System (INIS)

    Ronan, J.T.

    1989-01-01

    This paper reports on CERCLA II- ability for the unlucky potentially responsible parties (PRPs) which is a Draconian form of strict, joint and several liability with limited statutory defenses that in most cases are impossible to establish. CERCLA vigorously employs these legal concepts, stretching a PRP's financial exposure to the limits necessary to meet the enormous financial costs of remediation

  6. Contextualizing Intergroup Contact: Do Political Party Cues Enhance Contact Effects?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Thomsen, Jens Peter Frølund

    2015-01-01

    This article examines intergroup contact effects in different political contexts. We expand on previous efforts of social psychologists by incorporating the messages of political parties as a contextual trigger of group membership awareness in contact situations. We argue that the focus among...... political parties on us-them categorizations heightens the awareness of group memberships. This focus in turn enhances the positive intergroup contact effect by stimulating majority members to perceive contacted persons as prototypical outgroup members. A multilevel analysis of 22 countries and almost 37......,000 individuals confirms that the ability of intergroup contact to reduce antiforeigner sentiment increases when political parties focus intensively on immigration issues and cultural differences. Specifically, both workplace contact and interethnic friendship become more effective in reducing antiforeigner...

  7. The Probability of Detection in the Telephone Line of Device of the Unauthorized Removal of Information

    Directory of Open Access Journals (Sweden)

    I. V. Svintsov

    2011-06-01

    Full Text Available The article discusses the theory of quantitative description of the possible presence in the telephone line devices unauthorized removal of information, investigated with the help of probability theory.

  8. Informational precaution

    NARCIS (Netherlands)

    Pieters, Wolter; Mainzer, K.

    2010-01-01

    In environmental ethics, the precautionary principle states that parties should refrain from actions in the face of scientific uncertainties about serious or irreversible harm to public health or the environment. A similar principle is lacking when judging effects of information technology. Such a

  9. The Drastic Outcomes from Voting Alliances in Three-Party Democratic Voting (1990 → 2013)

    Science.gov (United States)

    Galam, Serge

    2013-04-01

    The drastic effect of local alliances in three-party competition is investigated in democratic hierarchical bottom-up voting. The results are obtained analytically using a model which extends a sociophysics frame introduced in 1986 (Galam in J. Math. Phys. 30:426, 1986) and 1990 (Galam in J. Stat. Phys. 61:943, 1990) to study two-party systems and the spontaneous formation of democratic dictatorship. It is worth stressing that the 1990 paper was published in the Journal of Statistical Physics, the first paper of its kind in this journal. It was shown how a minority in power can preserve its leadership using bottom-up democratic elections. However such a bias holds only down to some critical value of minimum support. The results were used latter to explain the sudden collapse of European communist parties in the nineties. The extension to three-party competition reveals the mechanisms by which a very small minority party can get a substantial representation at higher levels of the hierarchy when the other two competing parties are big. Additional surprising results are obtained, which enlighten the complexity of three-party democratic bottom-up voting. In particular, the unexpected outcomes of local voting alliances are singled out. Unbalanced democratic situations are exhibited with strong asymmetries between the actual bottom support of a party and its associated share of power at the top leadership. Subtle strategies are identified for a party to maximize its hold on the top leadership. The results are also valid to describe opinion dynamics with three competing opinions.

  10. Similarity in husbands and wives party family preference in the Netherlands

    NARCIS (Netherlands)

    Coffé, Hilde R.; Need, Ariana

    2010-01-01

    Using insights from theories on marital homogamy and political behaviour, this research examines the tendency of husbands and wives to vote for the same party family. It disentangles the extent to which similarity in party family preference can be explained by (1) partners choosing one another

  11. Political parties and the EU in national election campaigns: who talks about Europe, and how?

    DEFF Research Database (Denmark)

    Senninger, Roman; Wagner, Markus

    2015-01-01

    addressed as well as their framing. We argue that issue-based strategies and government participation may provide important reasons why parties only mobilize selectively on EU issues. We test our expectations using data from party press releases in Austrian general election campaigns in 2008 and 2013. We......This paper examines political party mobilization on European Union issues during national election campaigns. We consider which actors talk about the EU, specifically which parties and which actors within parties, as well as how these actors talk about the EU, specifically the types of EU issues...

  12. Building Up an On-Line Plant Information System for the Emergency Response Center of the Hungarian Nuclear Safety Directorate

    International Nuclear Information System (INIS)

    Vegh, Janos; Major, Csaba; Horvath, Csaba; Hozer, Zoltan; Adorjan, Ferenc; Lux, Ivan; Horvath, Kristof

    2002-01-01

    The main design features, services, and human-machine interface characteristics are described of the CERTA VITA on-line plant information system developed and installed by KFKI AEKI at the Nuclear Safety Directorate (NSD) of the Hungarian Atomic Energy Authority (HAEA) in cooperation with experts from the NSD. The Center for Emergency Response, Training, and Analysis (CERTA) located at the headquarters of NSD, Budapest, Hungary, was established in 1997. The center supports the NSD installation, radiological monitoring, and advisory team in case of nuclear emergencies, with appropriate hardware and software for communication, diagnosis, prognosis, and prediction. The vital information transfer and analysis (VITA) system represents an important part of the CERTA, as it provides for the continuous remote inspection of the four VVER-440/V213 units of the Hungarian Paks nuclear power plant (NPP). The on-line information system maintains a continuous data link with the NPP through a managed leased line that connects CERTA to a gateway computer located at the Paks NPP. The present scope of the system is a result of a 4-yr development project: In addition to the basic safety parameter display functions, the VITA system now includes an on-line break parameter estimation module, an extensive training package based on simulated transients, and on-line data transfer capabilities to feed accident diagnosis/analysis codes

  13. The Changing of Political Orientation of Masyumi Party During 1950-1959

    Directory of Open Access Journals (Sweden)

    Alfi Hafidh Ishaqro

    2017-06-01

    The formation of the General Election Law made M. Natsir and Masyumi the symbol of the establishment and growth of democracy in the Republic of Indonesia, which became more evident when M. Natsir was ousted and the subsequent working cabinet heads failed to hold a General Election. And finally, at the end of 1955 under the leadership of Burhanuddin Harahap, who was himself a Masyumi figure, a general election was held for the first time. The political attitude shown by Masyumi indicated that Masumi Party had shifted its political orientation. Masyumi Party, which originally struggled to implement Islam by employing the Syura in forming a government was helplessly compromising its principle by following and combining itself into a democracy model the initiator of which was the leader of Masyumi Party itself. Such political behavioral changes were associated with the reasoning of the then leaders of Masyumi Party, who tended to accommodative and excessively compromising.

  14. Local Party Labor Center in Radzyń Podlaski (1982–1989 – an element of the organization structure of the Polish United Workers' Party, documents creator, archival fonds

    Directory of Open Access Journals (Sweden)

    Dariusz Magier

    2017-05-01

    Full Text Available Local Party Labor Centers were created in January 1982, in connection with reorganization of assignments of the Polish United Workers’ Party in the new socio-political situation after the declaration of martial law in Poland. The article present this element of the complex bureaucratic structure, holding dictatorial authority in the party, by describing its political history and documentary legacy from the archival perspective. The laboratory example is the Local Party Labor Center in Radzyń Podlaski. The author set himself a task to describe what was the role of the Center in the Polish communist party – a formation so characteristic for the last decade of existence of the Party. The LPLCs were not elective statutory bodies of the PUWP, but they were a bureaucratic structure, that served an advisory and coordination function towards basic levels of the communist party. The LPLC in Radzyń Podlaski was one of four such formations created in the Bielsk Podlaski Voivodeship, and its area of action were counties from the period before the administrative reform in 1975. The scope of the Center were district committees of the PUWP situated in Czemierniki, Drelów, Kąkolewnica, Komarówka Podlaska, Międzyrzec Podlaski, Ulan, Wohyń; the Town Committee in Międzyrzec Podlaski and the Town-Distric Committee in Radzyń Podlaski. Archival materials of theLPLC in Radzyń Podlaski were transmitted on September 2, 1992 with documentation created by the County, the District, the Town and the Town-Disctrict Committee from 1950 to 1989. The materials were scattered. In 2007–2008 fonds of this documentation were recognized and in 2011 the materials of the LPLC were arranged and described in the State Archive in Lublin, Branch in Radzyń Podlaski. 

  15. Information management in civil engineering infrastructural development : With focus on geological and geotechnical information

    NARCIS (Netherlands)

    Tegtmeier, W.; Zlatanova, S.; Van Oosterom, P.J.M.; Hack, H.R.G.K.

    2009-01-01

    In civil engineering infrastructural projects, information exchange and (re-) use in and between involved parties is difficult. This is mainly caused by a lack of information harmonization. Various specialists are working together on the development of an infrastructural project and are all using

  16. Information-seeking strategies and science content understandings of sixth-grade students using on-line learning environments

    Science.gov (United States)

    Hoffman, Joseph Loris

    1999-11-01

    This study examined the information-seeking strategies and science content understandings learners developed as a result of using on-line resources in the University of Michigan Digital Library and on the World Wide Web. Eight pairs of sixth grade students from two teachers' classrooms were observed during inquiries for astronomy, ecology, geology, and weather, and a final transfer task assessed learners' capabilities at the end of the school year. Data included video recordings of students' screen activity and conversations, journals and completed activity sheets, final artifacts, and semi-structured interviews. Learners' information-seeking strategies included activities related to asking, planning, tool usage, searching, assessing, synthesizing, writing, and creating. Analysis of data found a majority of learners posed meaningful, openended questions, used technological tools appropriately, developed pertinent search topics, were thoughtful in queries to the digital library, browsed sites purposefully to locate information, and constructed artifacts with novel formats. Students faced challenges when planning activities, assessing resources, and synthesizing information. Possible explanations were posed linking pedagogical practices with learners' growth and use of inquiry strategies. Data from classroom-lab video and teacher interviews showed varying degrees of student scaffolding: development and critique of initial questions, utilization of search tools, use of journals for reflection on activities, and requirements for final artifacts. Science content understandings included recalling information, offering explanations, articulating relationships, and extending explanations. A majority of learners constructed partial understandings limited to information recall and simple explanations, and these occasionally contained inaccurate conceptualizations. Web site design features had some influence on the construction of learners' content understandings. Analysis of

  17. TIGER/Line Shapefile, 2013, Series Information File for the 113th Congressional District Nation-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  18. Series Information File for the 2017 TIGER/Line Shapefile, Current Unified School Districts Shapefile State-based

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  19. TIGER/Line Shapefile, 2016, Series Information for the Current Unified School Districts Shapefile State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  20. TIGER/Line Shapefile, 2016, Series Information for the Address Range-Feature Name County-based Relationship File

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  1. TIGER/Line Shapefile, 2013, Series Information File for theCurrent Elementary School Districts State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  2. TIGER/Line Shapefile, 2015, Series Information for the Current Unified School Districts Shapefile State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  3. Series Information File for the 2017 TIGER/Line Shapefile, Current Secondary School Districts Shapefile State-based

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  4. Series Information File for the 2015 TIGER/Line Shapefile, Current Elementary School Districts State-based Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  5. TIGER/Line Shapefile, 2016, Series Information for the Current Secondary School Districts Shapefile State-based Shapefile

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  6. TIGER/Line Shapefile, 2016, Series Information for the Topological Faces-Area Hydrography County-based Relationship File

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  7. TIGER/Line Shapefile, 2013, Series Information File for the Primary and Secondary Roads State-based Shapefiles

    Data.gov (United States)

    US Census Bureau, Department of Commerce — The TIGER/Line shapefiles and related database files (.dbf) are an extract of selected geographic and cartographic information from the U.S. Census Bureau's Master...

  8. Analysis of Information Leakages on Laser Printers in the Media of Electromagnetic Radiation and Line Conductions

    OpenAIRE

    Ulaş, Cihan

    2016-01-01

    In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of CE are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth, and then sampled by a high storage oscilloscope in these frequency points. Third, the collected data is converted to 2D imag...

  9. The legislative consequences of internal conflict and inter-party divisions

    Directory of Open Access Journals (Sweden)

    Matthias Haber

    2015-06-01

    Full Text Available Governments must respond quickly to pressing economic and societal problems. However, institutional rules, public opinion and unanticipated world events often delay the legislative process. Building on theories of legislative decision-making and intra-party politics, this paper shows that the speed at which bills pass is also driven by the governing party’s internal cohesiveness and its ideological distance to the opposition. Governing parties that are internally divided have greater difficulty in forming the legislative majorities necessary to pass laws quickly, especially if their preferences are further away from the opposition. I test these hypotheses using a novel collection of laws passed in the UK Parliament and conference speeches given by Labour and Conservative party members over a 10-year period. I use automated text classification techniques to determine the relative location of actors’ preferences and the level of intra-party disagreement. I then predict the duration of lawmaking based on the government’s recent internal level of conflict and its distance to the opposition. The results complement mounting evidence that parties’ internal policy divisions hold important implications for parties’ performance in government.

  10. Actively Secure Two-Party Evaluation of Any Quantum Operation

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2012-01-01

    We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal ...... functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]....

  11. Partisan heart and/or rational mind? Party identification, political knowledge and electoral turnout

    Directory of Open Access Journals (Sweden)

    Pavlović Zoran

    2018-01-01

    Full Text Available This paper aims at analysing the relationship between positive and negative party identification and political knowledge, as well as their interplay in regard to electoral turnout. The data from the Serbian 2012 post-election public opinion survey on the nationally representative probability-based sample of voting age citizens were used (N = 1568. The data show that political knowledge is significantly and positively correlated both with positive and negative party identification. Citizens who are more knowledgeable and positively identified are also more likely to vote. However, it is shown that the influence of political knowledge on electoral turnout is moderated only by positive party identification. Political knowledge significantly predicts turnout only in the group of citizens without positive party identification. Being negatively identified with a political party does not modify the relationship between political knowledge and turnout. The results are discussed in terms of the Michigan model of party identification and cognitive mobilisation thesis. The roles of affective and cognitive motivation in electoral participation are additionally stressed and debated. [Project of the Serbian Ministry of Education, Science and Technological Development, Grant no. 47010

  12. ISEE (InformationsSystem Erneuerbare Energie): Renewable Energy Information System

    International Nuclear Information System (INIS)

    Grebe, R.; Koch, H.

    1991-01-01

    Since the end of 1989 ISET has been operating the title database ISEE. Access to this on-line database may be obtained by any interested party posessing a computer, which is connected to the network of the 'Deutsche TeleCom' by telephone or Datex-P. The command language of ISEE is German. ISET will establish an English version in 1991/1992. In brief attention is paid to the components of the ISEE database, its user groups, the possibilities to access ISEE, and further developments. 3 figs

  13. Social democracy : A comparative account of the left-wing party family

    NARCIS (Netherlands)

    Keman, Hans

    2017-01-01

    The Social Democratic party family is a central part of political life in the West. This book focuses on this party family as well as a unique political force in the industrialised world. It provides a critical comparative survey of when, where, how and why Social Democracy developed within

  14. Political Market Orientation: A Framework for Understanding Relationship Structures in Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Savigny, Heather

    2012-01-01

    This article is motivated by the growing need to integrate the current political science and marketing literature in order to provide a deeper understanding of the behaviour of political actors and their relationships with relevant stakeholder groups. In our article, we demonstrate how Ormrod...... strive for contextual sensitivity. By adopting this approach it is hoped that the fears noted by political scientists that political marketing is solely concerned with applying standard management models to political parties with the resulting emphasis on communication tactics at election time, together......’s conceptual model of political market orientation complements political science models of party organization by drawing attention to the competing interests of stakeholders in shaping party strategy and organizational structure. We treat parties as a multitude of actors rather than as monolithic entities...

  15. The energy policy message of the Hamburg SPD party congress

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    On October 26-28 this year, the Social Democratic (SPD) party congress was held in Hamburg; its new party platform, the so-called ''Hamburg Program,'' constitutes a landmark for the party. The Program's chapter on ''Sustainable Progress and Qualitative Growth'' refers to energy policy in the section about ''Turning Point in Energy Policy; Environmental Protection.'' Emphasis is given to the fact that energy, like air and water, is a basis of life of our civilization, and that the present ways of wasting energy and resources have no future. For this reason, the turnaround in energy policy initiated by the SPD must be advanced in the key issue of switching from non-renewable to renewable energy resources and from polluting to non-polluting resources. The ultimate goal is a solar age. As far as nuclear power is concerned, the Social Democratic Party finds that nuclear fission appeared to many as the big hope for energy available forever, but that these hopes cannot come true. To put it in a nutshell: The SPD is fast embarking on the road into a solar age. The party does see the growing world population and the rising energy requirement as well as the resulting challenges. However, its energy policy concept is too rigidly focused on Germany and the country's pioneering role. At the present time, nuclear power stands no chance in the SPD, although the Hamburg declaration includes a cautious reminder of the fact that, until 1986, the SPD was among the proponents of nuclear power. (orig.)

  16. Lessons from past experiences: the critical path - a third party perspective

    International Nuclear Information System (INIS)

    Vincenti, J.R.

    1986-01-01

    When most people are confronted with the question, ''What do you think about the low-level radioactive waste disposal issue facing your state,'' the first reaction is one of concern and fear for public health and environmental safety. This reaction, though very common, is but a small part of a complex scenario of social and technical issues that face those who generate and those who are responsible for the disposal of hazardous and toxic waste in America. This paper discusses: 1) ten lessons that the PIER (Public Involvement and Education on Radiation) Program at Penn State has experienced since its inception back in November of 1983; 2) the role of a university as a third party in controversial issues; 3) understanding the public and influential people - what they think and their differences; 4) the importance of interacting with the news media; and 5) the bottom line summary of the important parts of continuing education programs to the public

  17. [P.A.R.T.Y. An initiative for more risk awareness among young road users].

    Science.gov (United States)

    Brockamp, T; Koenen, P; Mutschler, M; Probst, C; Bouillon, B; Schmucker, U

    2016-05-01

    Accident prevention strategies aim to inform young people about risk-taking behavior and the consequences of trauma. The Prevent Alcohol and Risk-related Trauma in Youth (P.A.R.T.Y.) program is an accident prevention program that focuses on the prevention of road traffic accidents among young road users. Initial results of the program were evaluated to find out if the implementation of this prevention program is feasible in Germany. During a 1-day interactive course young road users were introduced to the work carried out in an accident trauma unit and were informed about injury mechanisms and about the consequences of trauma. A systematic evaluation was made by all participants. The results were analyzed to find out whether it is possible to implement the program and the impressions gained by the participants of the program in order to be able to make further adjustments. A total of 219 young road users participated in the P.A.R.T.Y. program between 2011 and 2013. All participants reviewed the structure of the program with the help of school grades. Of the participants 59 % (n = 129) rated the program as "very good" and 41 % gave the rating of "good". Overall, 70 % of all participants advocated that all people of the same age should participate in the program. The structure was described as being well-balanced with respect to the theoretical and practical stations. The P.A.R.T.Y. program is a standardized and well-established concept that can also contribute to accident prevention in Germany. It provides the possibility to implement an accident awareness program throughout Germany. Initial results show that the program can be implemented in German hospitals and that the program appeals to the target group of young road users.

  18. 40 CFR Appendix E to Subpart A of... - Article 5 Parties

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 17 2010-07-01 2010-07-01 false Article 5 Parties E Appendix E to Subpart A of Part 82 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Appendix E to Subpart A of Part 82—Article 5 Parties Afghanistan, Albania, Algeria, Angola, Antigua...

  19. ParTIES: a toolbox for Paramecium interspersed DNA elimination studies.

    Science.gov (United States)

    Denby Wilkes, Cyril; Arnaiz, Olivier; Sperling, Linda

    2016-02-15

    Developmental DNA elimination occurs in a wide variety of multicellular organisms, but ciliates are the only single-celled eukaryotes in which this phenomenon has been reported. Despite considerable interest in ciliates as models for DNA elimination, no standard methods for identification and characterization of the eliminated sequences are currently available. We present the Paramecium Toolbox for Interspersed DNA Elimination Studies (ParTIES), designed for Paramecium species, that (i) identifies eliminated sequences, (ii) measures their presence in a sequencing sample and (iii) detects rare elimination polymorphisms. ParTIES is multi-threaded Perl software available at https://github.com/oarnaiz/ParTIES. ParTIES is distributed under the GNU General Public Licence v3. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  20. Economic Conditions affect Support for Prime Minister Parties in Scandinavia

    DEFF Research Database (Denmark)

    Larsen, Martin Vinæs

    2016-01-01

    between unemployment, economic growth and support for prime minister parties is re-examined in two datasets. The first is a dataset of Scandinavian elections, and the second is a yearly Danish vote function, which was constructed using election polls. Across both datasets, it is found that if one simply......Previous research has not been able to identify a relationship between objective economic indicators and support for governing parties in the Scandinavian countries. This is potentially problematic, as it suggests that political leaders are not held electorally accountable for the economic...... correlates support for the prime minister's party with economic conditions, there is no relationship; however, if one specifies a statistical model, which takes the Scandinavian context into account, it is possible to identify a statistically significant effect of economic conditions on electoral support...

  1. Social media, parties, and political inequalities

    NARCIS (Netherlands)

    Jacobs, K.T.E.; Spierings, C.H.B.M.

    2016-01-01

    This book examines how social media have transformed politics in established democracies. Specifically, the authors examine the influence of the unique qualities of social media on the power balance between and within parties. They present a general theory as well as an in-depth case study of the

  2. Capuchin Monkeys Judge Third-Party Reciprocity

    Science.gov (United States)

    Anderson, James R.; Takimoto, Ayaka; Kuroshima, Hika; Fujita, Kazuo

    2013-01-01

    Increasing interest is being shown in how children develop an understanding of reciprocity in social exchanges and fairness in resource distribution, including social exchanges between third parties. Although there are descriptions of reciprocity on a one-to-one basis in other species, whether nonhumans detect reciprocity and violations of…

  3. Ecologies of ideologies: Explaining party entry and exit in West-European parliaments, 1945–2013

    Science.gov (United States)

    Berkhout, Joost; Vermeulen, Floris

    2016-01-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our expectations. We find that political parties are more likely to exit when density within their niche increases. Also there is competition between adjacent ideological niches, i.e. between centrist and right-wing niches. In contrast to our expectations, neither density nor institutional rules impact party entry. This raises important questions about the rationale of prospective entrants. PMID:29046613

  4. Human interface for personal information systems. On-line handwriting recognition; Pasonaru joho kiki ni okeru human interface. On-line tegaki ninshiki

    Energy Technology Data Exchange (ETDEWEB)

    Morita, T. [Sharp Corp., Osaka (Japan)

    1996-01-05

    Most of information devices used in the business field use keyboards for the inputting measure, but keyboards are rather awkward for personal use. In contrast to this, the pen input method which everybody can use easily is a product of the latest development. In this articles, on-line handwritten letter recognition is roughly explained which is the basic technique of pen input. Pen input has a demerit that its letter inputting speed is slow, but has much more merits that Chinese ideographs can be directly input, figures, handwritten memoranda, etc. are treated likewise, the device itself can be made compact and no noise is made. The on-line letter recognition methods now used practically can be roughly divided into the pattern matching method and the basic stroke method. Each of them has its own merits and demerits. For the current on-line handwritten letter recognition, the condition is necessary to handwritten a letter in the square style (kaisho) and carefully within the framework for letter entry upon writing, and for this arrangement, input is performed through the work processes of pretreatment/feature extraction, stroke recognition, letter comparison, detail discrimination, and after-treatment. 3 refs., 7 figs.

  5. The Early Political Web (1995-2005) :A ten-year observational research seeking evidence of eDemocracy in the information architecture of political parties web sites worldwide

    OpenAIRE

    Ricci, Andrea

    2013-01-01

    Scholarly interest for the impact of technologies on democracy has raised in parallel to the decline of political participation. Technology has often been seen as either one of the causes of the crisis of representative democracy or as a powerful remedy to heal the negative externalities generated by party oligopolies. The study of the impact of new media in party politics or presidential elections dates back the forties (with the outgrowth of radio) and has evolved in cyclical waves until to...

  6. Electrophysiological correlates of cocktail-party listening.

    Science.gov (United States)

    Lewald, Jörg; Getzmann, Stephan

    2015-10-01

    Detecting, localizing, and selectively attending to a particular sound source of interest in complex auditory scenes composed of multiple competing sources is a remarkable capacity of the human auditory system. The neural basis of this so-called "cocktail-party effect" has remained largely unknown. Here, we studied the cortical network engaged in solving the "cocktail-party" problem, using event-related potentials (ERPs) in combination with two tasks demanding horizontal localization of a naturalistic target sound presented either in silence or in the presence of multiple competing sound sources. Presentation of multiple sound sources, as compared to single sources, induced an increased P1 amplitude, a reduction in N1, and a strong N2 component, resulting in a pronounced negativity in the ERP difference waveform (N2d) around 260 ms after stimulus onset. About 100 ms later, the anterior contralateral N2 subcomponent (N2ac) occurred in the multiple-sources condition, as computed from the amplitude difference for targets in the left minus right hemispaces. Cortical source analyses of the ERP modulation, resulting from the contrast of multiple vs. single sources, generally revealed an initial enhancement of electrical activity in right temporo-parietal areas, including auditory cortex, by multiple sources (at P1) that is followed by a reduction, with the primary sources shifting from right inferior parietal lobule (at N1) to left dorso-frontal cortex (at N2d). Thus, cocktail-party listening, as compared to single-source localization, appears to be based on a complex chronology of successive electrical activities within a specific cortical network involved in spatial hearing in complex situations. Copyright © 2015 Elsevier B.V. All rights reserved.

  7. The third review conference of the parties to the Treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1985-01-01

    The Third Review Conference of the Parties to the Treaty on the Non-Proliferation of Nuclear Weapons was held in Geneva from 27 August to 21 September 1985, with a view to assuring that the purposes and provisions of the Treaty were being realized. The Conference ended with the adoption by consensus of a Final Declaration, by which the States parties, among other things, solemnly declared their conviction that the Treaty was essential to international peace and security and expressed their support for its objectives. This Fact Sheet provides information on the preparations for the Conference, developments at the Conference and the main features of the Final Declaration. Te text of the Treaty is reproduced in Disarmament Fact Sheet No. 33, and its historical background is contained in Fact Sheet No. 41

  8. Information security employee handbook: November 2010

    OpenAIRE

    2013-01-01

    This handbook is a quick reference guide to some of the most important points of the London 2012 information security policy. This information security handbook outlines the policies that all staff, secondees, volunteers and certain third parties who process LOCOG information must comply with.

  9. Creating a new paradigm for the role of the responsible party in natural resource damage assessments

    International Nuclear Information System (INIS)

    Hansen, I.K.

    1993-01-01

    The Texas Natural Resource Trustees are conducting a negotiated rulemaking with representative from environmental groups and the oil industry. The philosophy guiding these rules, which will apply to oil spills that impact coastal waters, is that each spill is a unique circumstance. The particular spill's impact should be objectively assessed through a field investigation. Reliance solely on models or compensation tables is discouraged. The observable environmental impact is an important factor in determining the type of assessment utilized. The negotiated rules will utilize federal rules as guidance and will emphasize inclusion of the responsible party in the decision to conduct an expedited or a comprehensive assessment. The rules will establish time limits for trustee decision and completion of the assessments. The time limits, which can be waived by the Commissioner of the General Land Office, are intended to encourage rapid initiation of restoration, rehabilitation, replacement and acquisition activities. The imposition of time limits will require a new paradigm for the role of the responsible party in natural resource damage assessments. The paradigm will develop through the use of joint assessments, sharing of information, and participation of the responsible party in trustee decisions. The paper will describe a joint assessment used in a recent oil spill

  10. The Connection Between the Woman’s Christian Temperance Union and the Prohibition Party

    Directory of Open Access Journals (Sweden)

    Adam Chamberlain

    2016-12-01

    Full Text Available Scholars have long been interested in the complementary relationships forged by membership groups and political parties. The post-bellum period presents an opportunity to consider these connections using a case study of two groups concerned with the ills of alcohol, the Woman’s Christian Temperance Union (WCTU and the Prohibition Party. Our analysis of presidential elections from 1876 to 1900 reveals that—although women were disenfranchised at the time—the WCTU’s organization and infrastructure was essential to early Prohibition Party success. In 1884, the first election after the two created a formal alliance in 1882, the strength of the WCTU helped the party grow its voter base. However, the two slowly diverged over how to achieve prohibition, and this relationship dissipated; there is little evidence of any significant connection between the groups after 1884. This supports the proposition that a shared means of accomplishing goals is an essential element of an effective group–party partnership.

  11. DSHEA's third-party literature exemption; mail order sales, direct marketing, and Internet use.

    Science.gov (United States)

    Raubicheck, C J

    1999-01-01

    This article examines ways in which marketers of dietary supplements can make use of the "third-party literature" section of the Dietary Supplement Health and Education Act of 1994 (DSHEA). This provision permits persons or entities, other than manufacturers or distributors, to distribute to consumers certain publications in connection with the sale of particular supplements. These publications may include statements about the therapeutic benefits of such products without subjecting the products to regulation by the Food and Drug Administration (FDA) as unapproved new drugs. Specifically, this article addresses the following: Can a dietary supplement manufacturer or distributor send third-party literature about a dietary supplement to a customer in a mail order sales transaction? Can third-party literature be disseminated by mail with dietary supplement catalogues only? Can third-party literature be disseminated by sales representatives engaged in direct marketing of dietary supplements? Can third-party literature appear on the Internet? The answer appears to be affirmative in each of these situations.

  12. CosmoQuest: Virtual Star Parties as a Conduit to Citizen Science Research

    Science.gov (United States)

    Lewis, Scott; Gugliucci, N. E.; Gay, P. L.; Amateur Astronomer Team; Commentator Team

    2013-01-01

    CosmoQuest has created an environment that actively engages the public through online star parties while building a growing virtual research center that allows individuals anywhere in the world to participate in and contribute to scientific research. Utilizing the infrastructure of Google+ and YouTube, CosmoQuest has brought optical observational astronomy into homes across the world. Every week astronomers - amateur and professional - meet to share live sky images and to discuss the science behind their beauty during Virtual Star parties. A wide array of optics and digital detectors from varied locations collaborate in a fashion not possible in the standard public star party. Every viewer is able to virtually look through the imaging telescope simultaneously while the equipment owner doesn’t need to worry about accidental mishandling by the public. Digital cameras and CCDs also allow longer exposures of deep-sky objects, something not typical in a standard star party event. Our diversity of equipment - ranging from hand-guided Dobsonian telescopes to 16” Schmidt-Cassegrain telescopes on Paramounts - give viewers the opportunity to experience the sky through different systems. Additional Star Parties focus on special astronomical events, such as eclipses and transits. The annular eclipse of 20 May, 2012 brought together astronomers, space enthusiasts and a curious public into a Google+ Hangout On Air to celebrate the event while advocating safe observing methods and explaining the science behind the phenomenon. Public photos of the eclipse were shared live in the broadcast while video of the event was streamed for thousands of viewers to enjoy. Other special event star parties have focused on the Super Moon, Eros Opposition, and the Venus Transit. In this poster we review the technology behind star parties and the reach of these events.

  13. 19 CFR 10.589 - Certification for goods exported to a Party.

    Science.gov (United States)

    2010-04-01

    ... such other medium or format approved by the Party's customs authority for that purpose) to CBP upon... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certification for goods exported to a Party. 10.589 Section 10.589 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...

  14. Star Parties in Mexico extended to Colombia and China

    Science.gov (United States)

    Torres-Peimbert, Silvia; Franco, José

    2016-10-01

    The preparation for The International Year of Astronomy 2009 stirred our interest in preparing star parties in Mexico. The lunar eclipse of February 20th 2008 was the perfect event for the first massive observation in Mexico City that attracted over 25,000 people. To accompany this event there were additional attractions: a massive astronomical lecture, more than 100 telescopes were set up for people to watch the sky, exhibits of astronomical images, children hands-on projects, rock concert, dance performance, and chats with astronomers. Already in 2009 a collective program was organized to involve more than 30 sites in Mexico to hold star parties at the same time once a year. These star parties were more in the spirit of science fairs, that include lectures, astronomy exhibits, children projects, as well as concerts and other cultural displays. The scope of each one of them depended on the local support from volunteers and from the local authorities. After the International Year of Astronomy the group that organized these star parties decided to continue its activities. The main attraction in these fairs has been the opportunity to see the Moon, Jupiter and Saturn (if observable) through a telescope. For this program the presence of the amateur astronomers has been crucial. They have brought their instruments to the sites and have generously taught the public how to look through the telescopes and pointed out to the interesting features on the sky.

  15. 11 CFR 109.33 - May a political party committee assign its coordinated party expenditure authority to another...

    Science.gov (United States)

    2010-01-01

    ... Elections FEDERAL ELECTION COMMISSION GENERAL COORDINATED AND INDEPENDENT EXPENDITURES (2 U.S.C. 431(17... 11 Federal Elections 1 2010-01-01 2010-01-01 false May a political party committee assign its... committee includes a subordinate committee of a State committee and includes a district or local committee...

  16. Outcomes and intentions in children's, adolescents', and adults' second- and third-party punishment behavior.

    Science.gov (United States)

    Gummerum, Michaela; Chu, Maria T

    2014-10-01

    Theories of morality maintain that punishment supports the emergence and maintenance of moral behavior. This study investigated developmental differences in the role of outcomes and the violator's intentions in second-party punishment (where punishers are victims of a violation) and third-party punishment (where punishers are unaffected observers of a violation). Four hundred and forty-three adults and 8-, 12-, and 15-year-olds made choices in mini-ultimatum games and newly-developed mini-third-party punishment games, which involved actual incentives rather than hypothetical decisions. Adults integrated outcomes and intentions in their second- and third-party punishment, whereas 8-year-olds consistently based their punishment on the outcome of the violation. Adolescents integrated outcomes and intentions in second- but not third-party punishment. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Information Seeking Behaviour of Senior High School Student on General Election in Indonesia

    OpenAIRE

    Margareta Aulia Rahman

    2015-01-01

    The development of information technology affects students in searching and finding information, particularly information regarding the General Election. Theexplosion of information on mass media about the elections resulted impact (both positive and negative) to the potential voters. Nowadays, media plays role as a tool for political parties to lead public opinion to support their parties. Based on the data provided by General Election Commission (KPU) in 2014, 20% of voters were identified ...

  18. Membership ballots and the value of intra-party democracy

    DEFF Research Database (Denmark)

    Wolkenstein, Fabio

    2016-01-01

    On the face of it, membership ballots present a clear case in which intra- party democracy comes into collision with core principles of representative democracy: they weaken the autonomy of representatives, and undermine the authority of the voters. In this article, I investigate whether this is ......On the face of it, membership ballots present a clear case in which intra- party democracy comes into collision with core principles of representative democracy: they weaken the autonomy of representatives, and undermine the authority of the voters. In this article, I investigate whether...

  19. Lebanon's Hizbollah Movement: The Party of God

    National Research Council Canada - National Science Library

    Schad, Andrew

    1999-01-01

    In the summer of 1982 in Lebanon, a group of radical Shi'a Muslim clerics in association with Iranian Revolutionary Guardsmen formed the secretive and at times deadly movement known as Hizbollah, or the Party of God...

  20. Single Party Cabinets and Presidential Democracies: insights from the Argentinean case

    Directory of Open Access Journals (Sweden)

    Marcelo CAMERLO

    2013-07-01

    Full Text Available The study of presidential cabinets has mainly focused on coalitional formations, distinguishing individual ministers in terms of their party affiliation particularly at cabinet instauration and termination. This article moves the focus to single-party cabinets to study minister appointment in situations where the legislative support is less relevant. A model of analysis that observes extra-partisan affiliations, individual technical skills and personal liaison with the president is proposed and exploratory applied to the Argentinean case. The results suggest that well positioned presidents tend to apply closer strategies of portfolio distribution, with levels of institutionalization that depends on the president’s party organization and the president’s style of leadership.