WorldWideScience

Sample records for policies procedures computer

  1. 32 CFR 14.3 - Policies and procedures.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Policies and procedures. 14.3 Section 14.3... QUALIFICATION OF CIVILIAN DEFENSE COUNSEL § 14.3 Policies and procedures. (a) Application procedures. (1... the subject of any sanction or disciplinary action by any court, bar, or other competent governmental...

  2. Computer assisted procedure maintenance

    International Nuclear Information System (INIS)

    Bisio, R.; Hulsund, J. E.; Nilsen, S.

    2004-04-01

    The maintenance of operating procedures in a NPP is a tedious and complicated task. Through the whole life cycle of the procedures they will be dynamic, 'living' documents. Several aspects of the procedure must be considered in a revision process. Pertinent details and attributes of the procedure must be checked. An organizational structure must be created and responsibilities allotted for drafting, revising, reviewing and publishing procedures. Available powerful computer technology provides solutions within document management and computerisation of procedures. These solutions can also support the maintenance of procedures. Not all parts of the procedure life cycle are equally amenable to computerized support. This report looks at the procedure life cycle in todays NPPs and discusses the possibilities associated with introduction of computer technology to assist the maintenance of procedures. (Author)

  3. Acquisition Policy and Procedures Program

    National Research Council Canada - National Science Library

    2001-01-01

    This Instruction establishes policies, responsibilities, and procedures for the procurement of goods and services to include supplies, equipment, publications, furniture, and information technology...

  4. Automated procedure for selection of optimal refueling policies for light water reactors

    International Nuclear Information System (INIS)

    Lin, B.I.; Zolotar, B.; Weisman, J.

    1979-01-01

    An automated procedure determining a minimum cost refueling policy has been developed for light water reactors. The procedure is an extension of the equilibrium core approach previously devised for pressurized water reactors (PWRs). Use of 1 1/2-group theory has improved the accuracy of the nuclear model and eliminated tedious fitting of albedos. A simple heuristic algorithm for locating a good starting policy has materially reduced PWR computing time. Inclusion of void effects and use of the Haling principle for axial flux calculations extended the nuclear model to boiling water reactors (BWRs). A good initial estimate of the refueling policy is obtained by recognizing that a nearly uniform distribution of reactivity provides low-power peaking. The initial estimate is improved upon by interchanging groups of four assemblies and is subsequently refined by interchanging individual assemblies. The method yields very favorable results, is simpler than previously proposed BWR fuel optimization schemes, and retains power cost as the objective function

  5. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  6. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    This document includes the US Nuclear Regulatory Commission`s (NRC`s or Commission`s) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC`s policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees` health and safety, the common defense and security, and the environment.

  7. General statement of policy and procedures for NRC enforcement actions: Enforcement policy. Revision 1

    International Nuclear Information System (INIS)

    1998-05-01

    This document includes the US Nuclear Regulatory Commission's (NRC's or Commission's) revised General Statement of Policy and Procedure for Enforcement Actions (Enforcement Policy) as it was published in the Federal Register on May 13, 1998 (63 ER 26630). The Enforcement Policy is a general statement of policy explaining the NRC's policies and procedures in initiating enforcement actions, and of the presiding officers and the Commission in reviewing these actions. This policy statement is applicable to enforcement matters involving the radiological health and safety of the public, including employees' health and safety, the common defense and security, and the environment

  8. 2 CFR 3185.30 - What policies and procedures must I follow?

    Science.gov (United States)

    2010-01-01

    ... INSTITUTE OF MUSEUM AND LIBRARY SERVICES NONPROCUREMENT DEBARMENT AND SUSPENSION § 3185.30 What policies and procedures must I follow? The IMLS policies and procedures that you must follow are the policies and... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false What policies and procedures must I follow...

  9. Unexpected effects of computer presented procedures

    International Nuclear Information System (INIS)

    Blackman, H.S.; Nelson, W.R.

    1988-01-01

    Results from experiments conducted at the Idaho National Engineering Laboratory have been presented regarding the computer presentation of procedural information. The results come from the experimental evaluation of an expert system which presented procedural instructions to be performed by a nuclear power plant operator. Lessons learned and implications from the study are discussed as well as design issues that should be considered to avoid some of the pitfalls in computer presented or selected procedures

  10. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  11. Unexpected effects of computer presented procedures

    International Nuclear Information System (INIS)

    Blackman, H.S.; Nelson, W.R.

    1988-01-01

    Results from experiments conducted at the Idaho National Engineering Laboratory will be presented regarding the computer presentation of procedural information. The results come from the experimental evaluation of an expert system which presented procedural instructions to be performed by a nuclear power plant operator. Lessons learned and implications from the study will be discussed as well as design issues that should be considered to avoid some of the pitfalls in computer presented or selected procedures. 1 ref., 1 fig

  12. 15 CFR 291.6 - Additional requirements; Federal policies and procedures.

    Science.gov (United States)

    2010-01-01

    ... and Foreign Trade NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, DEPARTMENT OF COMMERCE NIST... requirements; Federal policies and procedures. Recipients and subrecipients are subject to all Federal laws and Federal and Department of Commerce policies, regulations, and procedures applicable to Federal financial...

  13. 23 CFR 630.1106 - Policy and procedures for work zone safety management.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Policy and procedures for work zone safety management... Policy and procedures for work zone safety management. (a) Each agency's policy and processes, procedures, and/or guidance for the systematic consideration and management of work zone impacts, to be...

  14. Philosophy, policies, and procedures - The three P's of flight-deck operations

    Science.gov (United States)

    Degani, Asaf; Wiener, Earl L.

    1991-01-01

    Standard operating procedures are drafted and provided to flightcrews to dictate the manner in which tasks are carried out. Failure to conform to Standard Operating Procedures (SOP) is frequently listed as the cause of violations, incidents, and accidents. However, procedures are often designed piecemeal, rather than being based on a sound philosophy of operations and policies that follow from such a philosophy. A framework of philosophy, policies, and procedures is proposed.

  15. 42 CFR 50.403 - What is the policy basis for these procedures?

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false What is the policy basis for these procedures? 50.403 Section 50.403 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL APPLICABILITY Public Health Service Grant Appeals Procedure § 50.403 What is the policy...

  16. Model of Procedure Usage – Results from a Qualitative Study to Inform Design of Computer-Based Procedures

    Energy Technology Data Exchange (ETDEWEB)

    Johanna H Oxstrand; Katya L Le Blanc

    2012-07-01

    The nuclear industry is constantly trying to find ways to decrease the human error rate, especially the human errors associated with procedure use. As a step toward the goal of improving procedure use performance, researchers, together with the nuclear industry, have been looking at replacing the current paper-based procedures with computer-based procedure systems. The concept of computer-based procedures is not new by any means; however most research has focused on procedures used in the main control room. Procedures reviewed in these efforts are mainly emergency operating procedures and normal operating procedures. Based on lessons learned for these previous efforts we are now exploring a more unknown application for computer based procedures - field procedures, i.e. procedures used by nuclear equipment operators and maintenance technicians. The Idaho National Laboratory, the Institute for Energy Technology, and participants from the U.S. commercial nuclear industry are collaborating in an applied research effort with the objective of developing requirements and specifications for a computer-based procedure system to be used by field operators. The goal is to identify the types of human errors that can be mitigated by using computer-based procedures and how to best design the computer-based procedures to do this. The underlying philosophy in the research effort is “Stop – Start – Continue”, i.e. what features from the use of paper-based procedures should we not incorporate (Stop), what should we keep (Continue), and what new features or work processes should be added (Start). One step in identifying the Stop – Start – Continue was to conduct a baseline study where affordances related to the current usage of paper-based procedures were identified. The purpose of the study was to develop a model of paper based procedure use which will help to identify desirable features for computer based procedure prototypes. Affordances such as note taking, markups

  17. Windscale inquiry and policy-making procedures

    Energy Technology Data Exchange (ETDEWEB)

    Von Moltke, K

    1978-07-01

    Policy decisions on the development and installation of nuclear facilities often strain both the time and human resources of a country, some countries having taken steps to involve the national government in specific siting decisions and shifting the constitutional balance in response to popular dissent. Challenges to nuclear facilities could be met by limiting the scope of intervenors and the use of judicial review. The 100-day Windscale Inquiry in the United Kingdom represents the most costly review any country has had of a specific nuclear policy and has international implications. A chronology of the inquiry illustrates how the debate evolved into a vote on whether nuclear energy should be developed at all and effectively cut off other avenues of recourse. The traditional procedures for planning are shown to be inadequate for setting nuclear energy policy without the intervention of Parliament. 18 references.

  18. 12 CFR 609.930 - Policies and procedures.

    Science.gov (United States)

    2010-01-01

    .... Before engaging in E-commerce, you must weigh its business risks against its benefits. You must also....930 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM ELECTRONIC COMMERCE Standards for Boards and Management § 609.930 Policies and procedures. The FCA supports E-commerce and wants to...

  19. University Policies and Procedures on Sexual Harassment.

    Science.gov (United States)

    McIntyre, Jerilyn S.

    Sexual harassment complaints are challenges to the abuse of power in certain kinds of communicative relationships, and sexual harassment policies and procedures are ways of defining the responsible exercise of power and providing the means to address grievances that result from irresponsible and potentially harmful uses of power in those…

  20. Responding to Self-Harm: A Documentary Analysis of Agency Policy and Procedure

    Science.gov (United States)

    Paul, Sally; Hill, Malcolm

    2013-01-01

    This paper reports on the findings of a documentary analysis of policies and procedures relating to self-harm from a range of organisations working with young people in the UK. It identifies the extent to which policies and/or procedures relating to self-harm are available for service providers and offers a wider understanding of the concepts of…

  1. Academic medical libraries' policies and procedures for notifying library users of retracted scientific publications.

    Science.gov (United States)

    Hughes, C

    1998-01-01

    Academic medical libraries have a responsibility to inform library users regarding retracted publications. Many have created policies and procedures that identify flawed journal articles. A questionnaire was sent to the 129 academic medical libraries in the United States and Canada to find out how many had policies and procedures for identifying retracted publications. Of the returned questionnaires, 59% had no policy and no practice for calling the attention of the library user to retracted publications. Forty-one percent of the libraries called attention to retractions with or without a formal policy for doing so. Several responding libraries included their policy statement with the survey. The increasing number of academic medical libraries that realize the importance of having policies and practices in place highlights the necessity for this procedure.

  2. 12 CFR 616.6300 - Leasing policies, procedures, and underwriting standards.

    Science.gov (United States)

    2010-01-01

    ... property and associated risks; (e) Property tax and sales tax reporting; (f) Title and ownership of leased... engaged in lease underwriting must adopt a written policy (or policies). Management, at the direction of the board, must develop procedures that reflect lease practices that control risk and comply with all...

  3. MyHealthAtVanderbilt: policies and procedures governing patient portal functionality

    Science.gov (United States)

    Rosenbloom, S Trent; Stenner, Shane P; Anders, Shilo; Muse, Sue; Johnson, Kevin B; Jirjis, Jim; Jackson, Gretchen Purcell

    2011-01-01

    Explicit guidelines are needed to develop safe and effective patient portals. This paper proposes general principles, policies, and procedures for patient portal functionality based on MyHealthAtVanderbilt (MHAV), a robust portal for Vanderbilt University Medical Center. We describe policies and procedures designed to govern popular portal functions, address common user concerns, and support adoption. We present the results of our approach as overall and function-specific usage data. Five years after implementation, MHAV has over 129 800 users; 45% have used bi-directional messaging; 52% have viewed test results and 45% have viewed other medical record data; 30% have accessed health education materials; 39% have scheduled appointments; and 29% have managed a medical bill. Our policies and procedures have supported widespread adoption and use of MHAV. We believe other healthcare organizations could employ our general guidelines and lessons learned to facilitate portal implementation and usage. PMID:21807648

  4. Computer software review procedures

    International Nuclear Information System (INIS)

    Mauck, J.L.

    1993-01-01

    This article reviews the procedures which are used to review software written for computer based instrumentation and control functions in nuclear facilities. The utilization of computer based control systems is becoming much more prevalent in such installations, in addition to being retrofit into existing systems. Currently, the Nuclear Regulatory System uses Regulatory Guide 1.152, open-quotes Criteria for Programmable Digital Computer System Software in Safety-Related Systems of Nuclear Power Plantsclose quotes and ANSI/IEEE-ANS-7-4.3.2-1982, open-quotes Application Criteria for Programmable Digital Computer Systems in Safety Systems of Nuclear Power Generating Stationsclose quotes for guidance when performing reviews of digital systems. There is great concern about the process of verification and validation of these codes, so when inspections are done of such systems, inspectors examine very closely the processes which were followed in developing the codes, the errors which were detected, how they were found, and the analysis which went into tracing down the causes behind the errors to insure such errors were not propagated again in the future

  5. Development of Policies, Institutions and Procedures for Water Reuse

    Science.gov (United States)

    Demouche, L.; Pfiefer, J.; Hanson, A.; Skaggs, R.

    2009-12-01

    In the arid, water scarce region of New Mexico and West Texas there is growing interest in the potential for water reuse to extend existing supplies and mitigate drought shortage impacts. There are no new sources of water in New Mexico, except reclaimed water. Communities and individuals are uncertain about and have many unanswered questions about polices, institutions involved (agencies), legal and regulatory requirements, and procedures governing water reuse. Issues to be addressed by this project include: the legal ability to reuse water, ownership of water rights, downstream or third party impacts, regulatory and procedural requirements, water quality concerns, state and local agency involvement, and cost effectiveness of water reuse compared to alternative sources. Presently, there is very little implementation or directives in New Mexico policy that addresses reuse, reclamation, or recycled water. The only regulations pertaining to reuse is New Mexico Environmental Department currently allows the use of reclaimed domestic wastewater for irrigation of golf courses and green spaces, which is listed in the Policy for the Above Ground Use of Reclaimed Domestic Wastewater (NMED, 2003). This document identifies the various reclaimed quality classifications that are required for specific applications and the permits required for application. This document does not identify or address policy applications on the distribution, ownership, or trading of reclaimed water. Even though reclaimed water reuse projects are currently being implemented in many cities in the U.S., mainly for commercial and municipal irrigation (golf courses and green space), its potential has not yet been exploited. A policy analysis matrix (PAM) is being designed to identify and examine the policy framework and consequences of non-policy implementation for decision makers and interest groups and assist them in understanding the consequences of policy actions and project outcomes if no laws or

  6. 32 CFR 168a.4 - Policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... to pursue graduate degrees in science, engineering, or other fields of study that are designated, in... DEFENSE SCIENCE AND ENGINEERING GRADUATE FELLOWSHIPS § 168a.4 Policy and procedures. (a) Sponsoring... nationwide competition in which all appropriate actions have been taken to encourage applications from...

  7. 31 CFR 206.3 - Billing policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Billing policy and procedures. 206.3 Section 206.3 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY FINANCIAL MANAGEMENT SERVICE MANAGEMENT OF FEDERAL AGENCY RECEIPTS...

  8. Computer-Based Procedures for Field Workers in Nuclear Power Plants: Development of a Model of Procedure Usage and Identification of Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Katya Le Blanc; Johanna Oxstrand

    2012-04-01

    The nuclear industry is constantly trying to find ways to decrease the human error rate, especially the human errors associated with procedure use. As a step toward the goal of improving procedure use performance, researchers, together with the nuclear industry, have been looking at replacing the current paper-based procedures with computer-based procedure systems. The concept of computer-based procedures is not new by any means; however most research has focused on procedures used in the main control room. Procedures reviewed in these efforts are mainly emergency operating procedures and normal operating procedures. Based on lessons learned for these previous efforts we are now exploring a more unknown application for computer based procedures - field procedures, i.e. procedures used by nuclear equipment operators and maintenance technicians. The Idaho National Laboratory and participants from the U.S. commercial nuclear industry are collaborating in an applied research effort with the objective of developing requirements and specifications for a computer-based procedure system to be used by field workers. The goal is to identify the types of human errors that can be mitigated by using computer-based procedures and how to best design the computer-based procedures to do so. This paper describes the development of a Model of Procedure Use and the qualitative study on which the model is based. The study was conducted in collaboration with four nuclear utilities and five research institutes. During the qualitative study and the model development requirements and for computer-based procedures were identified.

  9. 33 CFR 157.415 - Bridge resource management policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK... Petroleum Oils § 157.415 Bridge resource management policy and procedures. (a) Not later than February 1...

  10. 21 CFR 203.34 - Policies and procedures; administrative systems.

    Science.gov (United States)

    2010-04-01

    ... distribution security and audit system, including conducting random and for-cause audits of sales... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Policies and procedures; administrative systems...; administrative systems. Each manufacturer or authorized distributor of record that distributes drug samples shall...

  11. Simple multicomponent batch distillation procedure with a variable reflux policy

    Directory of Open Access Journals (Sweden)

    A. N. García

    2014-06-01

    Full Text Available This paper describes a shortcut procedure for batch distillation simulation with a variable reflux policy. The procedure starts from a shortcut method developed by Sundaram and Evans in 1993 and uses an iterative cycle to calculate the reflux ratio at each moment. The functional relationship between the concentrations at the bottom and the dome is evaluated using the Fenske equation and is complemented with the equations proposed by Underwood and Gilliland. The results of this procedure are consistent with those obtained using a fast method widely validated in the relevant literature.

  12. Computer managed emergency operating procedures

    International Nuclear Information System (INIS)

    Salamun, I.; Mavko, B.; Stritar, A.

    1994-01-01

    New computer technology is a very effective tool for developing a new design of nuclear power plant control room. It allows designer possibility to create a tool for managing with large database of power plant parameters and displaying them in different graphic forms and possibility of automated execution of well known task. The structure of Emergency Operating Procedures (EOP) is very suitable for programming and for creating expert system. The Computerized Emergency Operating Procedures (CEOP) described in this paper can be considered as an upgrading of standard EOP approach. EmDiSY (Emergency Display System - computer code name for CEOP) main purpose is to supply the operator with necessary information, to document all operator actions and to execute well known tasks. It is a function oriented CEOP that gives operator guidance on how to verify the critical safety functions and how to restore and maintain these functions where they are degraded. All knowledge is coded and stored in database files. The knowledge base consists from stepping order for verifying plant parameters, desired values of parameters, conditions for comparison and links between procedures and actions. Graphical shell allows users to read database, to follow instruction and to find out correct task. The desired information is concentrated in one screen and allows users to focus on a task. User is supported in two ways: desired parameter values are displayed on the process picture and automated monitoring critical safety function status trees are all time in progress and available to the user. (author). 4 refs, 4 figs

  13. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  14. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    Science.gov (United States)

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  15. Usability test of the ImPRO, computer-based procedure system

    International Nuclear Information System (INIS)

    Jung, Y.; Lee, J.

    2006-01-01

    ImPRO is a computer based procedure in both flowchart and success logic tree. It is evaluated on the basis of computer based procedure guidelines. It satisfies most requirements such as presentations and functionalities. Besides, SGTR has been performed with ImPRO to evaluate reading comprehension and situation awareness. ImPRO is a software engine which can interpret procedure script language, so that ImPRO is reliable by nature and verified with formal method. One bug, however, had hidden one year after release, but it was fixed. Finally backup paper procedures can be prepared on the same format as VDU in case of ImPRO failure. (authors)

  16. Situation awareness and trust in computer-based procedures in nuclear power plant operations

    Energy Technology Data Exchange (ETDEWEB)

    Throneburg, E. B.; Jones, J. M. [AREVA NP Inc., 7207 IBM Drive, Charlotte, NC 28262 (United States)

    2006-07-01

    Situation awareness and trust are two issues that need to be addressed in the design of computer-based procedures for nuclear power plants. Situation awareness, in relation to computer-based procedures, concerns the operators' knowledge of the plant's state while following the procedures. Trust concerns the amount of faith that the operators put into the automated procedures, which can affect situation awareness. This paper first discusses the advantages and disadvantages of computer-based procedures. It then discusses the known aspects of situation awareness and trust as applied to computer-based procedures in nuclear power plants. An outline of a proposed experiment is then presented that includes methods of measuring situation awareness and trust so that these aspects can be analyzed for further study. (authors)

  17. Situation awareness and trust in computer-based procedures in nuclear power plant operations

    International Nuclear Information System (INIS)

    Throneburg, E. B.; Jones, J. M.

    2006-01-01

    Situation awareness and trust are two issues that need to be addressed in the design of computer-based procedures for nuclear power plants. Situation awareness, in relation to computer-based procedures, concerns the operators' knowledge of the plant's state while following the procedures. Trust concerns the amount of faith that the operators put into the automated procedures, which can affect situation awareness. This paper first discusses the advantages and disadvantages of computer-based procedures. It then discusses the known aspects of situation awareness and trust as applied to computer-based procedures in nuclear power plants. An outline of a proposed experiment is then presented that includes methods of measuring situation awareness and trust so that these aspects can be analyzed for further study. (authors)

  18. 78 FR 69286 - Electric System Construction Policies and Procedures

    Science.gov (United States)

    2013-11-19

    ... DEPARTMENT OF AGRICULTURE Rural Utilities Service 7 CFR Part 1726 Electric System Construction Policies and Procedures CFR Correction In Title 7 of the Code of Federal Regulations, Parts 1600 to 1759, revised as of January 1, 2013, on page 246, in Sec. 1726.14, the second definition of Minor modification...

  19. Computable general equilibrium modelling in the context of trade and environmental policy

    Energy Technology Data Exchange (ETDEWEB)

    Koesler, Simon Tobias

    2014-10-14

    This thesis is dedicated to the evaluation of environmental policies in the context of climate change. Its objectives are twofold. Its first part is devoted to the development of potent instruments for quantitative impact analysis of environmental policy. In this context, the main contributions include the development of a new computable general equilibrium (CGE) model which makes use of the new comprehensive and coherent World Input-Output Dataset (WIOD) and which features a detailed representation of bilateral and bisectoral trade flows. Moreover it features an investigation of input substitutability to provide modellers with adequate estimates for key elasticities as well as a discussion and amelioration of the standard base year calibration procedure of most CGE models. Building on these tools, the second part applies the improved modelling framework and studies the economic implications of environmental policy. This includes an analysis of so called rebound effects, which are triggered by energy efficiency improvements and reduce their net benefit, an investigation of how firms restructure their production processes in the presence of carbon pricing mechanisms, and an analysis of a regional maritime emission trading scheme as one of the possible options to reduce emissions of international shipping in the EU context.

  20. Computable general equilibrium modelling in the context of trade and environmental policy

    International Nuclear Information System (INIS)

    Koesler, Simon Tobias

    2014-01-01

    This thesis is dedicated to the evaluation of environmental policies in the context of climate change. Its objectives are twofold. Its first part is devoted to the development of potent instruments for quantitative impact analysis of environmental policy. In this context, the main contributions include the development of a new computable general equilibrium (CGE) model which makes use of the new comprehensive and coherent World Input-Output Dataset (WIOD) and which features a detailed representation of bilateral and bisectoral trade flows. Moreover it features an investigation of input substitutability to provide modellers with adequate estimates for key elasticities as well as a discussion and amelioration of the standard base year calibration procedure of most CGE models. Building on these tools, the second part applies the improved modelling framework and studies the economic implications of environmental policy. This includes an analysis of so called rebound effects, which are triggered by energy efficiency improvements and reduce their net benefit, an investigation of how firms restructure their production processes in the presence of carbon pricing mechanisms, and an analysis of a regional maritime emission trading scheme as one of the possible options to reduce emissions of international shipping in the EU context.

  1. Applying computer-based procedures in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, Mauro V. de; Carvalho, Paulo V.R. de; Santos, Isaac J.A.L. dos; Grecco, Claudio H.S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil). Div. de Instrumentacao e Confiabilidade Humana], e-mail: mvitor@ien.gov.br, e-mail: paulov@ien.gov.br, e-mail: luquetti@ien.gov.br, e-mail: grecco@ien.gov.br; Bruno, Diego S. [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Escola Politecnica. Curso de Engenharia de Controle e Automacao], e-mail: diegosalomonebruno@gmail.com

    2009-07-01

    Plant operation procedures are used to guide operators in coping with normal, abnormal or emergency situations in a process control system. Historically, the plant procedures have been paper-based (PBP), with the digitalisation trend in these complex systems computer-based procedures (CBPs) are being developed to support procedure use. This work shows briefly the research on CBPs at the Human-System Interface Laboratory (LABIHS). The emergency operation procedure EOP-0 of the LABIHS NPP simulator was implemented in the ImPRO CBP system. The ImPRO system was chosen for test because it is available for download in the Internet. A preliminary operation test using the implemented procedure in the CBP system was realized and the results were compared to the operation through PBP use. (author)

  2. A general digital computer procedure for synthesizing linear automatic control systems

    International Nuclear Information System (INIS)

    Cummins, J.D.

    1961-10-01

    The fundamental concepts required for synthesizing a linear automatic control system are considered. A generalized procedure for synthesizing automatic control systems is demonstrated. This procedure has been programmed for the Ferranti Mercury and the IBM 7090 computers. Details of the programmes are given. The procedure uses the linearized set of equations which describe the plant to be controlled as the starting point. Subsequent computations determine the transfer functions between any desired variables. The programmes also compute the root and phase loci for any linear (and some non-linear) configurations in the complex plane, the open loop and closed loop frequency responses of a system, the residues of a function of the complex variable 's' and the time response corresponding to these residues. With these general programmes available the design of 'one point' automatic control systems becomes a routine scientific procedure. Also dynamic assessments of plant may be carried out. Certain classes of multipoint automatic control problems may also be solved with these procedures. Autonomous systems, invariant systems and orthogonal systems may also be studied. (author)

  3. A Case Study of Policies and Procedures to Address Cyberbullying at a Technology-Based Middle School

    Science.gov (United States)

    Tate, Bettina Polite

    2017-01-01

    This qualitative case study explored the policies and procedures used to effectively address cyberbullying at a technology-based middle school. The purpose of the study was to gain an in-depth understanding of policies and procedures used to address cyberbullying at a technology-based middle school in the southern United States. The study sought…

  4. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  5. CERN’s Computing rules updated to include policy for control systems

    CERN Multimedia

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  6. 2 CFR 801.30 - What policies and procedures must I follow?

    Science.gov (United States)

    2010-01-01

    ...? 801.30 Section 801.30 Grants and Agreements Federal Agency Regulations for Grants and Agreements DEPARTMENT OF VETERANS AFFAIRS NONPROCUREMENT DEBARMENT AND SUSPENSION § 801.30 What policies and procedures... § 801.220 in this part (2 CFR 801.220). ...

  7. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...... and corporate policies on the adoption of cloud computing services and deduce the impact of these policies on their adoption of opportunistic cloud computing services. We conclude that there are regulatory challenges on data protection that raises issues for cloud computing adoption in general; and the lack...... of a single globally accepted data protection standard poses some challenges for very successful implementation of OCCS for companies. However, the direction of current public and corporate policies on cloud computing make a good case for them to try out opportunistic cloud computing services....

  8. Study on computer-aided simulation procedure for multicomponent separating cascade

    International Nuclear Information System (INIS)

    Kinoshita, Masahiro

    1982-11-01

    The present report reviews the author's study on the computer-aided simulation procedure for a multicomponent separating cascade. As a conclusion, two very powerful simulation procedures have been developed for cascades composed of separating elements whose separation factors are very large. They are applicable in cases where interstage flow rates are input variables for the calculation and stage separation factors are given either as constants or as functions of compositions of the up and down streams. As an application of the new procedure, a computer-aided simulation study has been performed for hydrogen isotope separating cascades by porous membrane method. A cascade system configuration is developed and pertinent design specifications are determined in an example case of the feed conditions and separation requirements. (author)

  9. Policies and procedures in the workplace: how health care organizations compare.

    Science.gov (United States)

    Loo, R

    1993-01-01

    Many organizations are implementing programs and services to manage the human and economic costs of stress. A mail survey was conducted of 500 randomly selected Canadian organizations having at least 500 employees. The survey tapped four major areas: organizational policies and procedures for managing stress; programs and services offered; perceived benefits and constraints for the organization; and projected future directions in this area. Analyses of returns from 210 organizations-43 health and 167 non-health-revealed various findings. For example, over half of health care organizations have policies and procedures as opposed to less than half of non-health care organizations. Also, health care organizations place greater emphasis on smoking cessation, weight control programs and on stress management training. Although some Canadian organizations are addressing stress, much more could and should be done, especially by organizations that do not yet recognize the impact of stress on employees and their work performance.

  10. Data publication - policies and procedures from the PREPARDE project

    Science.gov (United States)

    Callaghan, Sarah; Murphy, Fiona; Tedds, Jonathan; Kunze, John; Lawrence, Rebecca; Mayernik, , Matthew S.; Whyte, Angus; Roberts, Timothy

    2013-04-01

    Data are widely acknowledged as a first class scientific output. Increases in researchers' abilities to create data need to be matched by corresponding infrastructures for them to manage and share their data. At the same time, the quality and persistence of the datasets need to be ensured, providing the dataset creators with the recognition they deserve for their efforts. Formal publication of data takes advantage of the processes and procedures already in place to publish academic articles about scientific results, enabling data to be reviewed and more broadly disseminated. Data are vastly more varied in format than papers, and so the policies required to manage and publish data must take into account the complexities associated with different data types, scientific fields, licensing rules etc. The Peer REview for Publication & Accreditation of Research Data in the Earth sciences (PREPARDE) project is JISC- and NERC-funded, and aims to investigate the policies and procedures required for the formal publication of research data. The project is investigating the whole workflow of data publication, from ingestion into a data repository, through to formal publication in a data journal. To limit the scope of the project, the focus is primarily on the policies required for the Royal Meteorological Society and Wiley's Geoscience Data Journal, though members of the project team include representatives from the life sciences (F1000Research), and will generalise the policies to other disciplines. PREPARDE addresses key issues arising in the data publication paradigm, such as: what criteria are needed for a repository to be considered objectively trustworthy; how does one peer-review a dataset; and how can datasets and journal publications be effectively cross-linked for the benefit of the wider research community and the completeness of the scientific record? To answer these questions, the project is hosting workshops addressing these issues, with interactions from key

  11. Standardized Procedure Content And Data Structure Based On Human Factors Requirements For Computer-Based Procedures

    International Nuclear Information System (INIS)

    Bly, Aaron; Oxstrand, Johanna; Le Blanc, Katya L

    2015-01-01

    Most activities that involve human interaction with systems in a nuclear power plant are guided by procedures. Traditionally, the use of procedures has been a paper-based process that supports safe operation of the nuclear power industry. However, the nuclear industry is constantly trying to find ways to decrease the human error rate, especially the human errors associated with procedure use. Advances in digital technology make computer-based procedures (CBPs) a valid option that provides further enhancement of safety by improving human performance related to procedure use. The transition from paper-based procedures (PBPs) to CBPs creates a need for a computer-based procedure system (CBPS). A CBPS needs to have the ability to perform logical operations in order to adjust to the inputs received from either users or real time data from plant status databases. Without the ability for logical operations the procedure is just an electronic copy of the paper-based procedure. In order to provide the CBPS with the information it needs to display the procedure steps to the user, special care is needed in the format used to deliver all data and instructions to create the steps. The procedure should be broken down into basic elements and formatted in a standard method for the CBPS. One way to build the underlying data architecture is to use an Extensible Markup Language (XML) schema, which utilizes basic elements to build each step in the smart procedure. The attributes of each step will determine the type of functionality that the system will generate for that step. The CBPS will provide the context for the step to deliver referential information, request a decision, or accept input from the user. The XML schema needs to provide all data necessary for the system to accurately perform each step without the need for the procedure writer to reprogram the CBPS. The research team at the Idaho National Laboratory has developed a prototype CBPS for field workers as well as the

  12. Standardized Procedure Content And Data Structure Based On Human Factors Requirements For Computer-Based Procedures

    Energy Technology Data Exchange (ETDEWEB)

    Bly, Aaron; Oxstrand, Johanna; Le Blanc, Katya L

    2015-02-01

    Most activities that involve human interaction with systems in a nuclear power plant are guided by procedures. Traditionally, the use of procedures has been a paper-based process that supports safe operation of the nuclear power industry. However, the nuclear industry is constantly trying to find ways to decrease the human error rate, especially the human errors associated with procedure use. Advances in digital technology make computer-based procedures (CBPs) a valid option that provides further enhancement of safety by improving human performance related to procedure use. The transition from paper-based procedures (PBPs) to CBPs creates a need for a computer-based procedure system (CBPS). A CBPS needs to have the ability to perform logical operations in order to adjust to the inputs received from either users or real time data from plant status databases. Without the ability for logical operations the procedure is just an electronic copy of the paper-based procedure. In order to provide the CBPS with the information it needs to display the procedure steps to the user, special care is needed in the format used to deliver all data and instructions to create the steps. The procedure should be broken down into basic elements and formatted in a standard method for the CBPS. One way to build the underlying data architecture is to use an Extensible Markup Language (XML) schema, which utilizes basic elements to build each step in the smart procedure. The attributes of each step will determine the type of functionality that the system will generate for that step. The CBPS will provide the context for the step to deliver referential information, request a decision, or accept input from the user. The XML schema needs to provide all data necessary for the system to accurately perform each step without the need for the procedure writer to reprogram the CBPS. The research team at the Idaho National Laboratory has developed a prototype CBPS for field workers as well as the

  13. An empirical analysis of journal policy effectiveness for computational reproducibility.

    Science.gov (United States)

    Stodden, Victoria; Seiler, Jennifer; Ma, Zhaokun

    2018-03-13

    A key component of scientific communication is sufficient information for other researchers in the field to reproduce published findings. For computational and data-enabled research, this has often been interpreted to mean making available the raw data from which results were generated, the computer code that generated the findings, and any additional information needed such as workflows and input parameters. Many journals are revising author guidelines to include data and code availability. This work evaluates the effectiveness of journal policy that requires the data and code necessary for reproducibility be made available postpublication by the authors upon request. We assess the effectiveness of such a policy by ( i ) requesting data and code from authors and ( ii ) attempting replication of the published findings. We chose a random sample of 204 scientific papers published in the journal Science after the implementation of their policy in February 2011. We found that we were able to obtain artifacts from 44% of our sample and were able to reproduce the findings for 26%. We find this policy-author remission of data and code postpublication upon request-an improvement over no policy, but currently insufficient for reproducibility.

  14. Assessment of LANL transportation policies and procedures

    International Nuclear Information System (INIS)

    Danna, J.G.; Jennrich, E.A.; Lund, D.M.; Davis, K.D.; Hoevemeyer, S.S.

    1991-04-01

    In order to determine whether activities related to the transportation of waste at Los Alamos National Laboratory (LANL) were being conducted in accordance with DOE policy, requirements stated in applicable DOE Orders were reviewed and compared with LANL policies and procedures described in the Administrative Requirements and the On-Site Transportation Manual. The following DOE Orders were determined to pertain to waste transportation and thus reviewed to identify requirements for which LANL is responsible for satisfying: Order 5820.2A Radioactive Waste Management; Order 1540.1 Materials Transportation and Traffic Management; and Order 5480.3 Safety Requirements for the Packaging and Transportation of Hazardous Materials, Hazardous Substances, and Hazardous Wastes. The LANL On-Site Transportation Manual and the Administrative Requirements contained in the LANL Environment, Safety, and Health Manual were reviewed to verify that each of the requirements identified through the review of the Orders and 10 CFR Part 71 were being satisfied. The following Administrative Requirements were considered in this task: Shipment of Radioactive Materials; Radioactive Liquid Waste; Low-Level Radioactive Solid Waste; Chemical, Hazardous, and Mixed Waste; Polychlorinated Biphenyls; and Transuranic (TRU) Solid Waste

  15. Benefits of computer screen-based simulation in learning cardiac arrest procedures.

    Science.gov (United States)

    Bonnetain, Elodie; Boucheix, Jean-Michel; Hamet, Maël; Freysz, Marc

    2010-07-01

    What is the best way to train medical students early so that they acquire basic skills in cardiopulmonary resuscitation as effectively as possible? Studies have shown the benefits of high-fidelity patient simulators, but have also demonstrated their limits. New computer screen-based multimedia simulators have fewer constraints than high-fidelity patient simulators. In this area, as yet, there has been no research on the effectiveness of transfer of learning from a computer screen-based simulator to more realistic situations such as those encountered with high-fidelity patient simulators. We tested the benefits of learning cardiac arrest procedures using a multimedia computer screen-based simulator in 28 Year 2 medical students. Just before the end of the traditional resuscitation course, we compared two groups. An experiment group (EG) was first asked to learn to perform the appropriate procedures in a cardiac arrest scenario (CA1) in the computer screen-based learning environment and was then tested on a high-fidelity patient simulator in another cardiac arrest simulation (CA2). While the EG was learning to perform CA1 procedures in the computer screen-based learning environment, a control group (CG) actively continued to learn cardiac arrest procedures using practical exercises in a traditional class environment. Both groups were given the same amount of practice, exercises and trials. The CG was then also tested on the high-fidelity patient simulator for CA2, after which it was asked to perform CA1 using the computer screen-based simulator. Performances with both simulators were scored on a precise 23-point scale. On the test on a high-fidelity patient simulator, the EG trained with a multimedia computer screen-based simulator performed significantly better than the CG trained with traditional exercises and practice (16.21 versus 11.13 of 23 possible points, respectively; p<0.001). Computer screen-based simulation appears to be effective in preparing learners to

  16. Towards Static Analysis of Policy-Based Self-adaptive Computing Systems

    DEFF Research Database (Denmark)

    Margheri, Andrea; Nielson, Hanne Riis; Nielson, Flemming

    2016-01-01

    For supporting the design of self-adaptive computing systems, the PSCEL language offers a principled approach that relies on declarative definitions of adaptation and authorisation policies enforced at runtime. Policies permit managing system components by regulating their interactions...... and by dynamically introducing new actions to accomplish task-oriented goals. However, the runtime evaluation of policies and their effects on system components make the prediction of system behaviour challenging. In this paper, we introduce the construction of a flow graph that statically points out the policy...... evaluations that can take place at runtime and exploit it to analyse the effects of policy evaluations on the progress of system components....

  17. 47 CFR 64.401 - Policies and procedures for provisioning and restoring certain telecommunications services in...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Policies and procedures for provisioning and restoring certain telecommunications services in emergencies. 64.401 Section 64.401 Telecommunication... procedures for provisioning and restoring certain telecommunications services in emergencies. The...

  18. Government Cloud Computing Policies: Potential Opportunities for Advancing Military Biomedical Research.

    Science.gov (United States)

    Lebeda, Frank J; Zalatoris, Jeffrey J; Scheerer, Julia B

    2018-02-07

    This position paper summarizes the development and the present status of Department of Defense (DoD) and other government policies and guidances regarding cloud computing services. Due to the heterogeneous and growing biomedical big datasets, cloud computing services offer an opportunity to mitigate the associated storage and analysis requirements. Having on-demand network access to a shared pool of flexible computing resources creates a consolidated system that should reduce potential duplications of effort in military biomedical research. Interactive, online literature searches were performed with Google, at the Defense Technical Information Center, and at two National Institutes of Health research portfolio information sites. References cited within some of the collected documents also served as literature resources. We gathered, selected, and reviewed DoD and other government cloud computing policies and guidances published from 2009 to 2017. These policies were intended to consolidate computer resources within the government and reduce costs by decreasing the number of federal data centers and by migrating electronic data to cloud systems. Initial White House Office of Management and Budget information technology guidelines were developed for cloud usage, followed by policies and other documents from the DoD, the Defense Health Agency, and the Armed Services. Security standards from the National Institute of Standards and Technology, the Government Services Administration, the DoD, and the Army were also developed. Government Services Administration and DoD Inspectors General monitored cloud usage by the DoD. A 2016 Government Accountability Office report characterized cloud computing as being economical, flexible and fast. A congressionally mandated independent study reported that the DoD was active in offering a wide selection of commercial cloud services in addition to its milCloud system. Our findings from the Department of Health and Human Services

  19. Basic policy of JMTR refurbishment and regulatory procedure

    International Nuclear Information System (INIS)

    Tobita, Kenji

    2012-04-01

    The JMTR refurbishment started from FY2007 had been completed on the end of the FY2010. The refurbishment works carried out on about 60 items nuclear reactor systems, (about 40 of facilities and about 20 constructions) with no trouble. This report review the basic policy of JMTR refurbishment, such as a selection of facilities/equipments for the refurbishment and the determination method of specifications for repairs. The deliberation and discussion by the safety review committee of Oarai Research and Development Center in the Japan Atomic Energy Agency and nuclear regulatory procedure are included in this report. (author)

  20. A Semantic Based Policy Management Framework for Cloud Computing Environments

    Science.gov (United States)

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  1. New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)

    Science.gov (United States)

    Bratus, Sergey; Locasto, Michael E.; Ramaswamy, Ashwin; Smith, Sean W.

    The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result, we believe that the focus of the Trusted Computing (TC) discipline must naturally shift from the design and implementation of the hardware root of trust (and the subsequent trust chain) to the higher-level application policies. Such policies must build on these primitives to express new sets of security goals. We highlight the relationship between enforcing these types of policies and debugging, since both activities establish the link between expected and actual application behavior. We argue that this new class of policies better fits developers' mental models of expected application behaviors, and we suggest a hardware design direction for enabling the efficient interpretation of such policies.

  2. The effectiveness of sexual harassment policies and procedures at higher education institutions in South Africa

    Directory of Open Access Journals (Sweden)

    Pierre Joubert

    2011-02-01

    Research purpose: The aim of this study was to investigate the awareness levels of academic staff members at higher education institutions in South Africa of sexual harassment policies and procedures in their institutions. Motivation for the study: A number of high profile court cases emphasised the need for effective policies to reduce the incidence of sexual harassment complaints. Research design, approach and method: A cross-sectional survey design was conducted amongst 161 academic staff members, representing 10 higher education institutions in South Africa. The measuring instrument that was used is the Sexual Harassment Questionnaire (SHQ that was developed specifically for this study. Main findings: The results showed that despite indications that sexual harassment policies do exist and that they are regarded as effective tools in addressing sexual harassment, the implementation of such policies is not effective and few academic staff members received training and/or guidance on the utilisation of the policy. Significant correlation coefficients were found between the elements of an effective policy and between population group and some of the elements. Practical/managerial implications: Employers across the board should regularly conduct an audit to determine the level of awareness of sexual harassment policies and procedures and plan interventions. Contribution: No other study in South Africa attempted to measure the awareness levels of academics and its impact on the management of sexual harassment.

  3. 76 FR 50813 - Major Capital Investment Projects; Guidance on News Starts/Small Starts Policies and Procedures

    Science.gov (United States)

    2011-08-16

    ... DEPARTMENT OF TRANSPORTATION Federal Transit Administration Major Capital Investment Projects; Guidance on News Starts/Small Starts Policies and Procedures AGENCY: Federal Transit Administration (FTA... Administration (FTA) to publish policy guidance on the New and Small Starts capital project review and evaluation...

  4. Automated procedure for performing computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1984-05-01

    Computers, the invisible backbone of nuclear safeguards, monitor and control plant operations and support many materials accounting systems. Our automated procedure to assess computer security effectiveness differs from traditional risk analysis methods. The system is modeled as an interactive questionnaire, fully automated on a portable microcomputer. A set of modular event trees links the questionnaire to the risk assessment. Qualitative scores are obtained for target vulnerability, and qualitative impact measures are evaluated for a spectrum of threat-target pairs. These are then combined by a linguistic algebra to provide an accurate and meaningful risk measure. 12 references, 7 figures

  5. Heuristic and optimal policy computations in the human brain during sequential decision-making.

    Science.gov (United States)

    Korn, Christoph W; Bach, Dominik R

    2018-01-23

    Optimal decisions across extended time horizons require value calculations over multiple probabilistic future states. Humans may circumvent such complex computations by resorting to easy-to-compute heuristics that approximate optimal solutions. To probe the potential interplay between heuristic and optimal computations, we develop a novel sequential decision-making task, framed as virtual foraging in which participants have to avoid virtual starvation. Rewards depend only on final outcomes over five-trial blocks, necessitating planning over five sequential decisions and probabilistic outcomes. Here, we report model comparisons demonstrating that participants primarily rely on the best available heuristic but also use the normatively optimal policy. FMRI signals in medial prefrontal cortex (MPFC) relate to heuristic and optimal policies and associated choice uncertainties. Crucially, reaction times and dorsal MPFC activity scale with discrepancies between heuristic and optimal policies. Thus, sequential decision-making in humans may emerge from integration between heuristic and optimal policies, implemented by controllers in MPFC.

  6. Computed tomography after radical pancreaticoduodenectomy (Whipple's procedure)

    International Nuclear Information System (INIS)

    Smith, S.L.; Hampson, F.; Duxbury, M.; Rae, D.M.; Sinclair, M.T.

    2008-01-01

    Whipple's procedure (radical pancreaticoduodenectomy) is currently the only curative option for patients with periampullary malignancy. The surgery is highly complex and involves multiple anastomoses. Complications are common and can lead to significant postoperative morbidity. Early detection and treatment of complications is vital, and high-quality multidetector computed tomography (MDCT) is currently the best method of investigation. This review outlines the surgical technique and illustrates the range of normal postoperative appearances together with the common complications

  7. The Impact of Fiscal Policy on Poverty in Ethiopia: A Computable ...

    African Journals Online (AJOL)

    Ethiopia has implemented various fiscal policy reforms in the past decade. Most of these reforms center on indirect taxes and pro-poor expenditure patterns. This study investigates the economy-wide impacts of these fiscal policy changes on poverty. To this effect, the study used a static computable general equilibrium ...

  8. NEPTUNIX 2: Operating on computers network - Catalogued procedures

    International Nuclear Information System (INIS)

    Roux, Pierre.

    1982-06-01

    NEPTUNIX 2 is a package which carries out the simulation of complex processes described by numerous non linear algebro-differential equations. Main features are: non linear or time dependent parameters, implicit form, stiff systems, dynamic change of equations leading to discontinuities on some variables. Thus the mathematical model is built with an equations set F(x,x',1,t), where t is the independent variable, x' the derivative of x and 1 an ''algebrized'' logical variable. The NEPTUNIX 2 package is divided into two successive major steps: a non numerical step and a numerical step. The numerical step, using results from a picture of the model translated in FORTRAN language, in a form fitted for the executive computer, carries out the simulmations; in this way, NEPTUNIX 2 numerical step is portable. On the opposite, the non numerical step must be executed on a series 370 IBM computer or on a compatible computer. The present manual describes NEPTUNIX 2 operating procedures when the two steps are executed on the same computer and also when the numerical step is executed on an other computer connected or not on the same computing network [fr

  9. 75 FR 70557 - Endocrine Disruptor Screening Program; Draft Policies and Procedures for Screening Safe Drinking...

    Science.gov (United States)

    2010-11-17

    ... comments by referencing a Code of Federal Regulations (CFR) part or section number. iii. Explain why you... the record in accordance with section 554 of the Administrative Procedure Act (APA). (15 U.S.C. 2615(a... referencing by parties unfamiliar with the referenced regulation. C. When do these policies and procedures...

  10. OSL sensitivity changes during single aliquot procedures: Computer simulations

    DEFF Research Database (Denmark)

    McKeever, S.W.S.; Agersnap Larsen, N.; Bøtter-Jensen, L.

    1997-01-01

    We present computer simulations of sensitivity changes obtained during single aliquot, regeneration procedures. The simulations indicate that the sensitivity changes are the combined result of shallow trap and deep trap effects. Four separate processes have been identified. Although procedures can...... be suggested to eliminate the shallow trap effects, it appears that the deep trap effects cannot be removed. The character of the sensitivity changes which result from these effects is seen to be dependent upon several external parameters, including the extent of bleaching of the OSL signal, the laboratory...

  11. Comparative cost analysis -- computed tomography vs. alternative diagnostic procedures, 1977-1980

    International Nuclear Information System (INIS)

    Gempel, P.A.; Harris, G.H.; Evans, R.G.

    1977-12-01

    In comparing the total national cost of utilizing computed tomography (CT) for medically indicated diagnoses with that of conventional x-ray, ultrasonography, nuclear medicine, and exploratory surgery, this investigation concludes that there was little, if any, added net cost from CT use in 1977 or will there be in 1980. Computed tomography, generally recognized as a reliable and useful diagnostic modality, has the potential to reduce net costs provided that an optimal number of units can be made available to physicians and patients to achieve projected reductions in alternative procedures. This study examines the actual cost impact of CT on both cranial and body diagnostic procedures. For abdominal and mediastinal disorders, CT scanning is just beginning to emerge as a diagnostic modality. As such, clinical experience is somewhat limited and the authors assume that no significant reduction in conventional procedures took place in 1977. It is estimated that the approximately 375,000 CT body procedures performed in 1977 represent only a 5 percent cost increase over use of other diagnostic modalities. It is projected that 2,400,000 CT body procedures will be performed in 1980 and, depending on assumptions used, total body diagnostic costs will increase only slightly or be reduced. Thirty-one tables appear throughout the text presenting cost data broken down by types of diagnostic procedures used and projections by years. Appendixes present technical cost components for diagnostic procedures, the comparative efficacy of CT as revealed in abstracts of published literature, selected medical diagnoses, and references

  12. Computation of a near-optimal service policy for a single-server queue with homogeneous jobs

    DEFF Research Database (Denmark)

    Johansen, Søren Glud; Larsen, Christian

    2001-01-01

    We present an algorithm for computing a near-optimal service policy for a single-server queueing system when the service cost is a convex function of the service time. The policy has state-dependent service times, and it includes the options to remove jobs from the system and to let the server...... be off. The systems' semi-Markov decision model has infinite action sets for the positive states. We design a new tailor-made policy-iteration algorithm for computing a policy for which the long-run average cost is at most a positive tolerance above the minimum average cost. For any positive tolerance...

  13. Computation of a near-optimal service policy for a single-server queue with homogeneous jobs

    DEFF Research Database (Denmark)

    Johansen, Søren Glud; Larsen, Christian

    2000-01-01

    We present an algorithm for computing a near optimal service policy for a single-server queueing system when the service cost is a convex function of the service time. The policy has state-dependent service times, and it includes the options to remove jobs from the system and to let the server...... be off. The system's semi-Markov decision model has infinite action sets for the positive states. We design a new tailor-made policy iteration algorithm for computing a policy for which the long-run average cost is at most a positive tolerance above the minimum average cost. For any positive tolerance...

  14. Policies, Procedures, and Practices Regarding Sport-Related Concussion in Community College Athletes.

    Science.gov (United States)

    Paddack, Michael; DeWolf, Ryan; Covassin, Tracey; Kontos, Anthony

    2016-01-01

    College sport organizations and associations endorse concussion-management protocols and policies. To date, little information is available on concussion policies and practices at community college institutions. To assess and describe current practices and policies regarding the assessment, management, and return-to-play criteria for sport-related concussion (SRC) among member institutions of the California Community College Athletic Association (CCCAA). Cross-sectional study. Web-based survey. A total of 55 head athletic trainers (ATs) at CCCAA institutions. Data about policies, procedures, and practices regarding SRC were collected over a 3-week period in March 2012 and analyzed using descriptive statistics, the Fisher exact test, and the Spearman test. Almost half (47%) of ATs stated they had a policy for SRC assessment, management, and return to play at their institution. They reported being in compliance with baseline testing guidelines (25%), management guidelines (34.5%), and return-to-play guidelines (30%). Nearly 31% of ATs described having an SRC policy in place for academic accommodations. Conference attendance was positively correlated with institutional use of academic accommodations after SRC (r = 0.44, P = .01). The number of meetings ATs attended and their use of baseline testing were also positively correlated (r = 0.38, P = .01). At the time of this study, nearly half of CCCAA institutions had concussion policies and 31% had academic-accommodation policies. However, only 18% of ATs at CCCAA institutions were in compliance with all of their concussion policies. Our findings demonstrate improvements in the management of SRCs by ATs at California community colleges compared with previous research but a need for better compliance with SRC policies.

  15. A computational procedure for finding multiple solutions of convective heat transfer equations

    International Nuclear Information System (INIS)

    Mishra, S; DebRoy, T

    2005-01-01

    In recent years numerical solutions of the convective heat transfer equations have provided significant insight into the complex materials processing operations. However, these computational methods suffer from two major shortcomings. First, these procedures are designed to calculate temperature fields and cooling rates as output and the unidirectional structure of these solutions preclude specification of these variables as input even when their desired values are known. Second, and more important, these procedures cannot determine multiple pathways or multiple sets of input variables to achieve a particular output from the convective heat transfer equations. Here we propose a new method that overcomes the aforementioned shortcomings of the commonly used solutions of the convective heat transfer equations. The procedure combines the conventional numerical solution methods with a real number based genetic algorithm (GA) to achieve bi-directionality, i.e. the ability to calculate the required input variables to achieve a specific output such as temperature field or cooling rate. More important, the ability of the GA to find a population of solutions enables this procedure to search for and find multiple sets of input variables, all of which can lead to the desired specific output. The proposed computational procedure has been applied to convective heat transfer in a liquid layer locally heated on its free surface by an electric arc, where various sets of input variables are computed to achieve a specific fusion zone geometry defined by an equilibrium temperature. Good agreement is achieved between the model predictions and the independent experimental results, indicating significant promise for the application of this procedure in finding multiple solutions of convective heat transfer equations

  16. ANL statement of site strategy for computing workstations

    Energy Technology Data Exchange (ETDEWEB)

    Fenske, K.R. (ed.); Boxberger, L.M.; Amiot, L.W.; Bretscher, M.E.; Engert, D.E.; Moszur, F.M.; Mueller, C.J.; O' Brien, D.E.; Schlesselman, C.G.; Troyer, L.J.

    1991-11-01

    This Statement of Site Strategy describes the procedure at Argonne National Laboratory for defining, acquiring, using, and evaluating scientific and office workstations and related equipment and software in accord with DOE Order 1360.1A (5-30-85), and Laboratory policy. It is Laboratory policy to promote the installation and use of computing workstations to improve productivity and communications for both programmatic and support personnel, to ensure that computing workstations acquisitions meet the expressed need in a cost-effective manner, and to ensure that acquisitions of computing workstations are in accord with Laboratory and DOE policies. The overall computing site strategy at ANL is to develop a hierarchy of integrated computing system resources to address the current and future computing needs of the laboratory. The major system components of this hierarchical strategy are: Supercomputers, Parallel computers, Centralized general purpose computers, Distributed multipurpose minicomputers, and Computing workstations and office automation support systems. Computing workstations include personal computers, scientific and engineering workstations, computer terminals, microcomputers, word processing and office automation electronic workstations, and associated software and peripheral devices costing less than $25,000 per item.

  17. A conceptual application for computer-based procedures for handheld devices

    Energy Technology Data Exchange (ETDEWEB)

    Sofie, Lunde-Hanssen Linda [Industrial Psychology, Institute for Energy Technology, Halden (Norway)

    2014-08-15

    This paper describes the concepts and proposed design principles for an application for computer-based procedures (CBPs) for field operators in the nuclear domain (so-called handheld procedures). The concept is focused on the field operators' work with procedures and the communication and coordination between field operators and control room operators. The goal is to overcome challenges with shared situation awareness (SA) in a distributed team by providing effective and usable information design. An iterative design method and user-centred design is used for tailoring the concept to the context of field operations. The resulting concept supports the execution of procedures where close collaboration is needed between control room and field operations, e.g. where particular procedure steps are executed from remote control points and others from the control room. The resulting conceptual application for CBPs on handheld devices is developed for mitigating the SA challenges and designing for usability and ease of use.

  18. A conceptual application for computer-based procedures for handheld devices

    International Nuclear Information System (INIS)

    Sofie, Lunde-Hanssen Linda

    2014-01-01

    This paper describes the concepts and proposed design principles for an application for computer-based procedures (CBPs) for field operators in the nuclear domain (so-called handheld procedures). The concept is focused on the field operators' work with procedures and the communication and coordination between field operators and control room operators. The goal is to overcome challenges with shared situation awareness (SA) in a distributed team by providing effective and usable information design. An iterative design method and user-centred design is used for tailoring the concept to the context of field operations. The resulting concept supports the execution of procedures where close collaboration is needed between control room and field operations, e.g. where particular procedure steps are executed from remote control points and others from the control room. The resulting conceptual application for CBPs on handheld devices is developed for mitigating the SA challenges and designing for usability and ease of use

  19. 12 CFR 550.140 - Must I adopt and follow written policies and procedures in exercising fiduciary powers?

    Science.gov (United States)

    2010-01-01

    ... procedures in exercising fiduciary powers? 550.140 Section 550.140 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Exercising Fiduciary Powers § 550.140 Must I adopt and follow written policies and procedures in exercising fiduciary powers? You...

  20. National Environmental Policy Act guidance: A model process

    International Nuclear Information System (INIS)

    Angle, B.M.; Lockhart, V.A.T.; Sema, B.; Tuott, L.C.; Irving, J.S.

    1995-04-01

    The ''Model National Environmental Policy Act (NEPA) Process'' includes: References to regulations, guidance documents, and plans; training programs; procedures; and computer databases. Legislative Acts and reference documents from Congress, US Department of Energy, and Lockheed Idaho Technologies Company provide the bases for conducting NEPA at the Idaho National Engineering Laboratory (INEL). Lockheed Idaho Technologies Company (LITCO) NEPA / Permitting Department, the Contractor Environmental Organization (CEO) is responsible for developing and maintaining LITCO NEPA and permitting policies, guidance, and procedures. The CEO develops procedures to conduct environmental evaluations based on NEPA, Council on Environmental Quality (CEQ) regulations, and DOE guidance. This procedure includes preparation or support of environmental checklists, categorical exclusion determinations, environmental assessment determinations, environmental assessments, and environmental impact statements. In addition, the CEO uses this information to train personnel conducting environmental evaluations at the INEL. Streamlining these procedures fosters efficient use of resources, quality documents, and better decisions on proposed actions

  1. Dynamic virtual machine allocation policy in cloud computing complying with service level agreement using CloudSim

    Science.gov (United States)

    Aneri, Parikh; Sumathy, S.

    2017-11-01

    Cloud computing provides services over the internet and provides application resources and data to the users based on their demand. Base of the Cloud Computing is consumer provider model. Cloud provider provides resources which consumer can access using cloud computing model in order to build their application based on their demand. Cloud data center is a bulk of resources on shared pool architecture for cloud user to access. Virtualization is the heart of the Cloud computing model, it provides virtual machine as per application specific configuration and those applications are free to choose their own configuration. On one hand, there is huge number of resources and on other hand it has to serve huge number of requests effectively. Therefore, resource allocation policy and scheduling policy play very important role in allocation and managing resources in this cloud computing model. This paper proposes the load balancing policy using Hungarian algorithm. Hungarian Algorithm provides dynamic load balancing policy with a monitor component. Monitor component helps to increase cloud resource utilization by managing the Hungarian algorithm by monitoring its state and altering its state based on artificial intelligent. CloudSim used in this proposal is an extensible toolkit and it simulates cloud computing environment.

  2. Computational integration of the phases and procedures of calibration processes for radioprotection

    International Nuclear Information System (INIS)

    Santos, Gleice R. dos; Thiago, Bibiana dos S.; Rocha, Felicia D.G.; Santos, Gelson P. dos; Potiens, Maria da Penha A.; Vivolo, Vitor

    2011-01-01

    This work proceed the computational integration of the processes phases by using only a single computational software, from the entrance of the instrument at the Instrument Calibration Laboratory (LCI-IPEN) to the conclusion of calibration procedures. So, the initial information such as trade mark, model, manufacturer, owner, and the calibration records are digitized once until the calibration certificate emission

  3. On a computational method for modelling complex ecosystems by superposition procedure

    International Nuclear Information System (INIS)

    He Shanyu.

    1986-12-01

    In this paper, the Superposition Procedure is concisely described, and a computational method for modelling a complex ecosystem is proposed. With this method, the information contained in acceptable submodels and observed data can be utilized to maximal degree. (author). 1 ref

  4. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    Science.gov (United States)

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  5. Policy analysis of authorisation procedures for wind energy deployment in Spain

    International Nuclear Information System (INIS)

    Iglesias, Guillermo; Rio, Pablo del; Dopico, Jesus Angel

    2011-01-01

    The aim of this paper is to analyse the administrative procedures for the granting of authorisations for the siting of wind farms in Spain, currently the competency of regional authorities. The analysis reveals some commonalities and differences between the procedures across regions. Furthermore, some aspects regarding these procedures have raised the concern of different stakeholders, including the central government and wind energy investors. A conflict between the interests of the central and regional governments can be observed. Lack of coordination between the different administrative levels and the 'more is better mentality' of regional authorities have led to a significant growth of wind energy requests for the (national) feed-in tariff. In turn, investors have complained about the discretionarity and non-transparency of those procedures and the lack of homogeneity across regions. This is likely to result in delays, uncertainty for investors and higher transaction costs. Although there has been a trend to a model which involves the use of multicriteria bidding procedures with more explicit, objective and precise criteria regarding project selection, the aforementioned problems suggest the need to improve coordination between the different administrative levels. - Highlights: → A conflict between the interests of the central and regional governments in the granting of administrative procedures can be observed. → Lack of coordination between different administrative levels have led to a significant growth of wind energy requests for the (national) feed-in tariff. → The resulting increase in the total costs of wind energy promotion has been a major concern for national policy-makers. → In turn, investors have complained about the discretionarity and non-transparency of those procedures and the lack of homogeneity across regions. → Those problems suggest the need to improve coordination between the different administrative levels.

  6. 75 FR 29996 - Review of MMS NEPA Policies, Practices, and Procedures for OCS Oil and Gas Exploration and...

    Science.gov (United States)

    2010-05-28

    ... Environmental Policy Act (NEPA) policies, practices, and procedures for the Minerals Management Service (MMS... applies NEPA in its management of Outer Continental Shelf oil and gas exploration and development and make recommendations for revisions. The scope of the review is intended to be holistic, i.e. from leasing decisions to...

  7. Implementing Computer-Based Procedures: Thinking Outside the Paper Margins

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna; Bly, Aaron

    2017-06-01

    In the past year there has been increased interest from the nuclear industry in adopting the use of electronic work packages and computer-based procedures (CBPs) in the field. The goal is to incorporate the use of technology in order to meet the Nuclear Promise requirements of reducing costs and improve efficiency and decrease human error rates of plant operations. Researchers, together with the nuclear industry, have been investigating the benefits an electronic work package system and specifically CBPs would have over current paper-based procedure practices. There are several classifications of CBPs ranging from a straight copy of the paper-based procedure in PDF format to a more intelligent dynamic CBP. A CBP system offers a vast variety of improvements, such as context driven job aids, integrated human performance tools (e.g., placekeeping and correct component verification), and dynamic step presentation. The latter means that the CBP system could only display relevant steps based on operating mode, plant status, and the task at hand. The improvements can lead to reduction of the worker’s workload and human error by allowing the work to focus on the task at hand more. A team of human factors researchers at the Idaho National Laboratory studied and developed design concepts for CBPs for field workers between 2012 and 2016. The focus of the research was to present information in a procedure in a manner that leveraged the dynamic and computational capabilities of a handheld device allowing the worker to focus more on the task at hand than on the administrative processes currently applied when conducting work in the plant. As a part of the research the team identified type of work, instructions, and scenarios where the transition to a dynamic CBP system might not be as beneficial as it would for other types of work in the plant. In most cases the decision to use a dynamic CBP system and utilize the dynamic capabilities gained will be beneficial to the worker

  8. LHCb: A Policy System for Grid Management and Monitoring

    CERN Multimedia

    Stagni, F; Sapunov, M

    2010-01-01

    Organizations using a Grid computing model are faced with non-traditional administrative challenges: the heterogeneous nature of the underlying resources requires professionals acting as Grid Administrators. Members of a Virtual Organization (VO) can use a mask composed by services exposed b y local resources. In an ideal world, the more services in a mask, the better. In the real world, the less faulty services, the better: experienced Grid administrators apply procedures for adding and removing services, based on their status, as it is reported by an ever-growing set of monitoring tools. When a procedure is agreed and well-exercised, a formal policy could be derived. For this reason, using the DIRAC framework in the LHCb collaboration, we developed a policy system that can enforce management and operational policies, in a VO-specific fashion. A single policy makes an assessment on the status of a subject, relative to one or more monitoring information. Subjects of the policies are monitored entities of an e...

  9. Policy Implementation of Working Procedures of Information and Documentation Officer at Cimahi City

    Directory of Open Access Journals (Sweden)

    Karina Intan Permatasari

    2015-12-01

    Full Text Available Since one year after the enactment of Public Information Disclosure Rights Number 14 of 2008 in April 2010, all government in Indonesia shall establish Information and Documentation Officer (PPID and all supporting instruments. Cimahi itself had made Cimahi Mayor Regulation No. 4 of 2011 on the Working Procedures and Documentation Information Management Officer at Cimahi in response to the main policy. However, despite being implemented for 3 years, implementation of this policy is not in accordance with UU KIP sought to assess and analyse the factors that cause these obstacles by using the theory of Charles O. Jones who focuses on organizational aspects, aspects of the interpretation and application of aspects of using qualitative research methods.

  10. Computer aided planning of orthopaedic surgeries: the definition of generic planning steps for bone removal procedures.

    Science.gov (United States)

    Putzer, David; Moctezuma, Jose Luis; Nogler, Michael

    2017-11-01

    An increasing number of orthopaedic surgeons are using computer aided planning tools for bone removal applications. The aim of the study was to consolidate a set of generic functions to be used for a 3D computer assisted planning or simulation. A limited subset of 30 surgical procedures was analyzed and verified in 243 surgical procedures of a surgical atlas. Fourteen generic functions to be used in 3D computer assisted planning and simulations were extracted. Our results showed that the average procedure comprises 14 ± 10 (SD) steps with ten different generic planning steps and four generic bone removal steps. In conclusion, the study shows that with a limited number of 14 planning functions it is possible to perform 243 surgical procedures out of Campbell's Operative Orthopedics atlas. The results may be used as a basis for versatile generic intraoperative planning software.

  11. An integrated computer-based procedure for teamwork in digital nuclear power plants.

    Science.gov (United States)

    Gao, Qin; Yu, Wenzhu; Jiang, Xiang; Song, Fei; Pan, Jiajie; Li, Zhizhong

    2015-01-01

    Computer-based procedures (CBPs) are expected to improve operator performance in nuclear power plants (NPPs), but they may reduce the openness of interaction between team members and harm teamwork consequently. To support teamwork in the main control room of an NPP, this study proposed a team-level integrated CBP that presents team members' operation status and execution histories to one another. Through a laboratory experiment, we compared the new integrated design and the existing individual CBP design. Sixty participants, randomly divided into twenty teams of three people each, were assigned to the two conditions to perform simulated emergency operating procedures. The results showed that compared with the existing CBP design, the integrated CBP reduced the effort of team communication and improved team transparency. The results suggest that this novel design is effective to optim team process, but its impact on the behavioural outcomes may be moderated by more factors, such as task duration. The study proposed and evaluated a team-level integrated computer-based procedure, which present team members' operation status and execution history to one another. The experimental results show that compared with the traditional procedure design, the integrated design reduces the effort of team communication and improves team transparency.

  12. Ethics and computing living responsibly in a computerized world

    CERN Document Server

    2001-01-01

    "Ethics and Computing, Second Edition promotes awareness of major issues and accepted procedures and policies in the area of ethics and computing using real-world companies, incidents, products and people." "Ethics and Computing, Second Edition is for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities."--Jacket.

  13. Computer Based Procedures for Field Workers - FY16 Research Activities

    International Nuclear Information System (INIS)

    Oxstrand, Johanna; Bly, Aaron

    2016-01-01

    The Computer-Based Procedure (CBP) research effort is a part of the Light-Water Reactor Sustainability (LWRS) Program, which provides the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants. One of the primary missions of the LWRS program is to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. One area that could yield tremendous savings in increased efficiency and safety is in improving procedure use. A CBP provides the opportunity to incorporate context-driven job aids, such as drawings, photos, and just-in-time training. The presentation of information in CBPs can be much more flexible and tailored to the task, actual plant condition, and operation mode. The dynamic presentation of the procedure will guide the user down the path of relevant steps, thus minimizing time spent by the field worker to evaluate plant conditions and decisions related to the applicability of each step. This dynamic presentation of the procedure also minimizes the risk of conducting steps out of order and/or incorrectly assessed applicability of steps. This report provides a summary of the main research activities conducted in the Computer-Based Procedures for Field Workers effort since 2012. The main focus of the report is on the research activities conducted in fiscal year 2016. The activities discussed are the Nuclear Electronic Work Packages - Enterprise Requirements initiative, the development of a design guidance for CBPs (which compiles all insights gained through the years of CBP research), the facilitation of vendor studies at the Idaho National Laboratory (INL) Advanced Test Reactor (ATR), a pilot study for how to enhance the plant design modification work process, the collection of feedback from a field evaluation study at Plant Vogtle, and path forward to

  14. Computer Based Procedures for Field Workers - FY16 Research Activities

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna [Idaho National Lab. (INL), Idaho Falls, ID (United States); Bly, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    The Computer-Based Procedure (CBP) research effort is a part of the Light-Water Reactor Sustainability (LWRS) Program, which provides the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants. One of the primary missions of the LWRS program is to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. One area that could yield tremendous savings in increased efficiency and safety is in improving procedure use. A CBP provides the opportunity to incorporate context-driven job aids, such as drawings, photos, and just-in-time training. The presentation of information in CBPs can be much more flexible and tailored to the task, actual plant condition, and operation mode. The dynamic presentation of the procedure will guide the user down the path of relevant steps, thus minimizing time spent by the field worker to evaluate plant conditions and decisions related to the applicability of each step. This dynamic presentation of the procedure also minimizes the risk of conducting steps out of order and/or incorrectly assessed applicability of steps. This report provides a summary of the main research activities conducted in the Computer-Based Procedures for Field Workers effort since 2012. The main focus of the report is on the research activities conducted in fiscal year 2016. The activities discussed are the Nuclear Electronic Work Packages – Enterprise Requirements initiative, the development of a design guidance for CBPs (which compiles all insights gained through the years of CBP research), the facilitation of vendor studies at the Idaho National Laboratory (INL) Advanced Test Reactor (ATR), a pilot study for how to enhance the plant design modification work process, the collection of feedback from a field evaluation study at Plant Vogtle, and path forward to

  15. A policy system for Grid Management and Monitoring

    International Nuclear Information System (INIS)

    Stagni, Federico; Santinelli, Roberto

    2011-01-01

    Organizations using a Grid computing model are faced with non-traditional administrative challenges: the heterogeneous nature of the underlying resources requires professionals acting as Grid Administrators. Members of a Virtual Organization (VO) can use a subset of available resources and services in the grid infrastructure and in an ideal world, the more resources are exploited the better. In the real world, the less faulty services, the better: experienced Grid administrators apply procedures for adding and removing services, based on their status, as it is reported by an ever-growing set of monitoring tools. When a procedure is agreed and well-exercised, a formal policy could be derived. For this reason, using the DIRAC framework in the LHCb collaboration, we developed a policy system that can enforce management and operational policies, in a VO-specific fashion. A single policy makes an assessment on the status of a subject, relative to one or more monitoring information. Subjects of the policies are monitored entities of an established Grid ontology. The status of a same entity is evaluated against a number of policies, whose results are then combined by a Policy Decision Point. Such results are enforced in a Policy Enforcing Point, which provides plug-ins for actions, like raising alarms, sending notifications, automatic addition and removal of services and resources from the Grid mask. Policy results are shown in the web portal, and site-specific views are provided also. This innovative system provides advantages in terms of procedures automation, information aggregation and problem solving.

  16. A policy system for Grid Management and Monitoring

    Science.gov (United States)

    Stagni, Federico; Santinelli, Roberto; LHCb Collaboration

    2011-12-01

    Organizations using a Grid computing model are faced with non-traditional administrative challenges: the heterogeneous nature of the underlying resources requires professionals acting as Grid Administrators. Members of a Virtual Organization (VO) can use a subset of available resources and services in the grid infrastructure and in an ideal world, the more resoures are exploited the better. In the real world, the less faulty services, the better: experienced Grid administrators apply procedures for adding and removing services, based on their status, as it is reported by an ever-growing set of monitoring tools. When a procedure is agreed and well-exercised, a formal policy could be derived. For this reason, using the DIRAC framework in the LHCb collaboration, we developed a policy system that can enforce management and operational policies, in a VO-specific fashion. A single policy makes an assessment on the status of a subject, relative to one or more monitoring information. Subjects of the policies are monitored entities of an established Grid ontology. The status of a same entity is evaluated against a number of policies, whose results are then combined by a Policy Decision Point. Such results are enforced in a Policy Enforcing Point, which provides plug-ins for actions, like raising alarms, sending notifications, automatic addition and removal of services and resources from the Grid mask. Policy results are shown in the web portal, and site-specific views are provided also. This innovative system provides advantages in terms of procedures automation, information aggregation and problem solving.

  17. Computational Models Used to Assess US Tobacco Control Policies.

    Science.gov (United States)

    Feirman, Shari P; Glasser, Allison M; Rose, Shyanika; Niaura, Ray; Abrams, David B; Teplitskaya, Lyubov; Villanti, Andrea C

    2017-11-01

    Simulation models can be used to evaluate existing and potential tobacco control interventions, including policies. The purpose of this systematic review was to synthesize evidence from computational models used to project population-level effects of tobacco control interventions. We provide recommendations to strengthen simulation models that evaluate tobacco control interventions. Studies were eligible for review if they employed a computational model to predict the expected effects of a non-clinical US-based tobacco control intervention. We searched five electronic databases on July 1, 2013 with no date restrictions and synthesized studies qualitatively. Six primary non-clinical intervention types were examined across the 40 studies: taxation, youth prevention, smoke-free policies, mass media campaigns, marketing/advertising restrictions, and product regulation. Simulation models demonstrated the independent and combined effects of these interventions on decreasing projected future smoking prevalence. Taxation effects were the most robust, as studies examining other interventions exhibited substantial heterogeneity with regard to the outcomes and specific policies examined across models. Models should project the impact of interventions on overall tobacco use, including nicotine delivery product use, to estimate preventable health and cost-saving outcomes. Model validation, transparency, more sophisticated models, and modeling policy interactions are also needed to inform policymakers to make decisions that will minimize harm and maximize health. In this systematic review, evidence from multiple studies demonstrated the independent effect of taxation on decreasing future smoking prevalence, and models for other tobacco control interventions showed that these strategies are expected to decrease smoking, benefit population health, and are reasonable to implement from a cost perspective. Our recommendations aim to help policymakers and researchers minimize harm and

  18. Computed tomography after radical pancreaticoduodenectomy (Whipple's procedure)

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.L. [Department of Radiology, Ipswich Hospital, Ipswich IP4 5PD (United Kingdom)], E-mail: simon.smith@ipswichhospital.nhs.uk; Hampson, F. [Department of Radiology, Addenbrooke' s Hospital NHS Trust, Cambridge (United Kingdom); Duxbury, M. [Department of Surgery, Royal Infirmary of Edinburgh, Little France, Edinburgh EH16 4SU (United Kingdom); Rae, D.M.; Sinclair, M.T. [Department of Pancreaticobiliary surgery, Ipswich Hospital, Ipswich IP4 5PD (United Kingdom)

    2008-08-15

    Whipple's procedure (radical pancreaticoduodenectomy) is currently the only curative option for patients with periampullary malignancy. The surgery is highly complex and involves multiple anastomoses. Complications are common and can lead to significant postoperative morbidity. Early detection and treatment of complications is vital, and high-quality multidetector computed tomography (MDCT) is currently the best method of investigation. This review outlines the surgical technique and illustrates the range of normal postoperative appearances together with the common complications.

  19. A Review of Cash Management Policies, Procedures and Practices of Mississippi's Institutions of Higher Learning.

    Science.gov (United States)

    Mississippi State Legislature, Jackson. Performance Evaluation and Expenditure Review Committee.

    This report to the Mississippi Legislature presents the findings of a review of the cash management policies, procedures, and practices of the State Board of Trustees of Institutions of Higher Learning (IHL). The methodology involved review of: applicable Mississippi statutes; standards promulgated by the National Association of College and…

  20. 41 CFR 301-75.3 - What governing policies and procedures must we establish related to pre-employment interview travel?

    Science.gov (United States)

    2010-07-01

    ... and procedures must we establish related to pre-employment interview travel? 301-75.3 Section 301-75.3... ALLOWANCES AGENCY RESPONSIBILITIES 75-PRE-EMPLOYMENT INTERVIEW TRAVEL General Rules § 301-75.3 What governing policies and procedures must we establish related to pre-employment interview travel? You must establish...

  1. Design Guidance for Computer-Based Procedures for Field Workers

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna [Idaho National Lab. (INL), Idaho Falls, ID (United States); Le Blanc, Katya [Idaho National Lab. (INL), Idaho Falls, ID (United States); Bly, Aaron [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-09-01

    Nearly all activities that involve human interaction with nuclear power plant systems are guided by procedures, instructions, or checklists. Paper-based procedures (PBPs) currently used by most utilities have a demonstrated history of ensuring safety; however, improving procedure use could yield significant savings in increased efficiency, as well as improved safety through human performance gains. The nuclear industry is constantly trying to find ways to decrease human error rates, especially human error rates associated with procedure use. As a step toward the goal of improving field workers’ procedure use and adherence and hence improve human performance and overall system reliability, the U.S. Department of Energy Light Water Reactor Sustainability (LWRS) Program researchers, together with the nuclear industry, have been investigating the possibility and feasibility of replacing current paper-based procedures with computer-based procedures (CBPs). PBPs have ensured safe operation of plants for decades, but limitations in paper-based systems do not allow them to reach the full potential for procedures to prevent human errors. The environment in a nuclear power plant is constantly changing, depending on current plant status and operating mode. PBPs, which are static by nature, are being applied to a constantly changing context. This constraint often results in PBPs that are written in a manner that is intended to cover many potential operating scenarios. Hence, the procedure layout forces the operator to search through a large amount of irrelevant information to locate the pieces of information relevant for the task and situation at hand, which has potential consequences of taking up valuable time when operators must be responding to the situation, and potentially leading operators down an incorrect response path. Other challenges related to use of PBPs are management of multiple procedures, place-keeping, finding the correct procedure for a task, and relying

  2. Environmental procedures

    International Nuclear Information System (INIS)

    1992-01-01

    The European Bank has pledged in its Agreement to place environmental management at the forefront of its operations to promote sustainable economic development in central and eastern Europe. The Bank's environmental policy is set out in the document titled, Environmental Management: The Bank's Policy Approach. This document, Environmental Procedures, presents the procedures which the European Bank has adopted to implement this policy approach with respect to its operations. The environmental procedures aim to: ensure that throughout the project approval process, those in positions of responsibility for approving projects are aware of the environmental implications of the project, and can take these into account when making decisions; avoid potential liabilities that could undermine the success of a project for its sponsors and the Bank; ensure that environmental costs are estimated along with other costs and liabilities; and identify opportunities for environmental enhancement associated with projects. The review of environmental aspects of projects is conducted by many Bank staff members throughout the project's life. This document defines the responsibilities of the people and groups involved in implementing the environmental procedures. Annexes contain Environmental Management: The Bank's Policy Approach, examples of environmental documentation for the project file and other ancillary information

  3. Notification: Audit of EPA's Adherence to Policies, Procedures and Oversight Controls Pertaining to the Administrator’s Travel

    Science.gov (United States)

    Project #OA-FY17-0382, August 28, 2017. The EPA OIG plans to begin preliminary research on the EPA’s adherence to policies, procedures and oversight controls pertaining to the Administrator’s travel to Oklahoma.

  4. An analytical study of the Q(s, S) policy applied to the joint replenishment problem

    DEFF Research Database (Denmark)

    Nielsen, Christina; Larsen, Christian

    2005-01-01

    be considered supply chain management problems. The paper uses Markov decision theory to work out an analytical solution procedure to evaluate the costs of a particular Q(s,S) policy, and thereby a method for computing the optimal Q(s,S) policy, under the assumption that demands follow a Poisson Process...

  5. An analytical study of the Q(s,S) policy applied on the joint replenishment problem

    DEFF Research Database (Denmark)

    Nielsen, Christina; Larsen, Christian

    2002-01-01

    be considered supply chain management problems. The paper uses Markov decision theory to work out an analytical solution procedure to evaluate the costs of a particular Q(s,S) policy, and thereby a method to compute the optimal Q(s,S) policy, under the assumption that demands follow a Poisson process...

  6. 21 CFR 1404.610 - What procedures does the Office of National Drug Control Policy use in suspension and debarment...

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false What procedures does the Office of National Drug Control Policy use in suspension and debarment actions? 1404.610 Section 1404.610 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) General Principles Relating to Suspension and Debarment...

  7. Management of science policy, sociology of science policy and economics of science policy

    CERN Document Server

    Ruivo, Beatriz

    2017-01-01

    'Management of science policy, sociology of science policy and economics of science policy' is a theoretical essay on the scientific foundation of science policy (formulation, implementation, instruments and procedures). It can be also used as a textbook.

  8. The Development of Computer Policies in Government, Political Parties, and Trade Unions in Norway 1961-1983

    Science.gov (United States)

    Elgsaas, Knut; Hegna, Håvard

    A “Council for Government Electronic Data Processing” was established in 1961. This was the start of development of a common policy for computers and data within the public administration. In 1969-70, computers got on the agenda of political parties and the trade unions. In the course of the seventies and the beginning of the eighties the government, the political parties, and the trade unions established a more comprehensive view of data political questions that we will designate by the term data policy. This paper puts some light on the causes and forces that drove the evolvement of a data policy within these central sectors in Norway. We will also show how various actors of research, trade and industry, and political life influenced the development of data policy and present links between the actors that indicate that they mutually influenced each other.

  9. Report: EPA Needs Policies and Procedures to Manage Public Pesticide Petitions in a Transparent and Efficient Manner

    Science.gov (United States)

    Report #16-P-0019, October 27, 2015. OPP’s lack of policies and procedures to manage public pesticide petitions in a transparent and efficient manner can result in unreasonable delay lawsuits costing the agency time and resources.

  10. Effects of Computer-Based Training on Procedural Modifications to Standard Functional Analyses

    Science.gov (United States)

    Schnell, Lauren K.; Sidener, Tina M.; DeBar, Ruth M.; Vladescu, Jason C.; Kahng, SungWoo

    2018-01-01

    Few studies have evaluated methods for training decision-making when functional analysis data are undifferentiated. The current study evaluated computer-based training to teach 20 graduate students to arrange functional analysis conditions, analyze functional analysis data, and implement procedural modifications. Participants were exposed to…

  11. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    DOE Order 5637.1, ''Classified Computer Security,'' requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, we have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system. 1 tab

  12. A methodology for performing computer security reviews

    International Nuclear Information System (INIS)

    Hunteman, W.J.

    1991-01-01

    This paper reports on DIE Order 5637.1, Classified Computer Security, which requires regular reviews of the computer security activities for an ADP system and for a site. Based on experiences gained in the Los Alamos computer security program through interactions with DOE facilities, the authors have developed a methodology to aid a site or security officer in performing a comprehensive computer security review. The methodology is designed to aid a reviewer in defining goals of the review (e.g., preparation for inspection), determining security requirements based on DOE policies, determining threats/vulnerabilities based on DOE and local threat guidance, and identifying critical system components to be reviewed. Application of the methodology will result in review procedures and checklists oriented to the review goals, the target system, and DOE policy requirements. The review methodology can be used to prepare for an audit or inspection and as a periodic self-check tool to determine the status of the computer security program for a site or specific ADP system

  13. Essays on environmental policy analysis: Computable general equilibrium approaches applied to Sweden

    International Nuclear Information System (INIS)

    Hill, M.

    2001-01-01

    This thesis consists of three essays within the field of applied environmental economics, with the common basic aim of analyzing effects of Swedish environmental policy. Starting out from Swedish environmental goals, the thesis assesses a range of policy-related questions. The objective is to quantify policy outcomes by constructing and applying numerical models especially designed for environmental policy analysis. Static and dynamic multi-sectoral computable general equilibrium models are developed in order to analyze the following issues. The costs and benefits of a domestic carbon dioxide (CO 2 ) tax reform. Special attention is given to how these costs and benefits depend on the structure of the tax system and, furthermore, how they depend on policy-induced changes in 'secondary' pollutants. The effects of allowing for emission permit trading through time when the domestic long-term domestic environmental goal is specified in CO 2 stock terms. The effects on long-term projected economic growth and welfare that are due to damages from emission flow and accumulation of 'local' pollutants (nitrogen oxides and sulfur dioxide), as well as the outcome of environmental policy when costs and benefits are considered in an integrated environmental-economic framework

  14. A Computable OLG Model for Gender and Growth Policy Analysis

    OpenAIRE

    Pierre-Richard Agénor

    2012-01-01

    This paper develops a computable Overlapping Generations (OLG) model for gender and growth policy analysis. The model accounts for human and physical capital accumulation (both public and private), intra- and inter-generational health persistence, fertility choices, and women's time allocation between market work, child rearing, and home production. Bargaining between spouses and gender bias, in the form of discrimination in the work place and mothers' time allocation between daughters and so...

  15. Health adaptation policy for climate vulnerable groups: a 'critical computational linguistics' analysis.

    Science.gov (United States)

    Seidel, Bastian M; Bell, Erica

    2014-11-28

    Many countries are developing or reviewing national adaptation policy for climate change but the extent to which these meet the health needs of vulnerable groups has not been assessed. This study examines the adequacy of such policies for nine known climate-vulnerable groups: people with mental health conditions, Aboriginal people, culturally and linguistically diverse groups, aged people, people with disabilities, rural communities, children, women, and socioeconomically disadvantaged people. The study analyses an exhaustive sample of national adaptation policy documents from Annex 1 ('developed') countries of the United Nations Framework Convention on Climate Change: 20 documents from 12 countries. A 'critical computational linguistics' method was used involving novel software-driven quantitative mapping and traditional critical discourse analysis. The study finds that references to vulnerable groups are relatively little present or non-existent, as well as poorly connected to language about practical strategies and socio-economic contexts, both also little present. The conclusions offer strategies for developing policy that is better informed by a 'social determinants of health' definition of climate vulnerability, consistent with best practice in the literature and global policy prescriptions.

  16. Mapping an Emergent Field of "Computational Education Policy": Policy Rationalities, Prediction and Data in the Age of Artificial Intelligence

    Science.gov (United States)

    Gulson, Kalervo N.; Webb, P. Taylor

    2017-01-01

    Contemporary education policy involves the integration of novel forms of data and the creation of new data platforms, in addition to the infusion of business principles into school governance networks, and intensification of socio-technical relations. In this paper, we examine how "computational rationality" may be understood as…

  17. Library Operations Policies and Procedures, Volume 2. Central Archive for Reusable Defense Software (CARDS)

    Science.gov (United States)

    1994-02-28

    use and customize those policies and procedures applicable to the implementor’s situation. It is not the intent of this manual to restrict the library...improvements. Pare 10 ka•- V •DkI U Release Manager The Release Manager provides franchisees with media copies of existing libraries, as needed. Security...implementors, and potential library franchisees . Security Team The Security Team assists the Security Officer with security analysis. Team members are

  18. Evaluation of Computer-Based Procedure System Prototype

    Energy Technology Data Exchange (ETDEWEB)

    Johanna Oxstrand; Katya Le Blanc; Seth Hays

    2012-09-01

    This research effort is a part of the Light-Water Reactor Sustainability (LWRS) Program, which is a research and development (R&D) program sponsored by Department of Energy (DOE), performed in close collaboration with industry R&D programs, to provide the technical foundations for licensing and managing the long-term, safe, and economical operation of current nuclear power plants. The LWRS program serves to help the U.S. nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. The introduction of advanced technology in existing nuclear power plants may help to manage the effects of aging systems, structures, and components. In addition, the incorporation of advanced technology in the existing LWR fleet may entice the future workforce, who will be familiar with advanced technology, to work for these utilities rather than more newly built nuclear power plants. Advantages are being sought by developing and deploying technologies that will increase safety and efficiency. One significant opportunity for existing plants to increase efficiency is to phase out the paper-based procedures (PBPs) currently used at most nuclear power plants and replace them, where feasible, with computer-based procedures (CBPs). PBPs have ensured safe operation of plants for decades, but limitations in paper-based systems do not allow them to reach the full potential for procedures to prevent human errors. The environment in a nuclear power plant is constantly changing depending on current plant status and operating mode. PBPs, which are static by nature, are being applied to a constantly changing context. This constraint often results in PBPs that are written in a manner that is intended to cover many potential operating scenarios. Hence, the procedure layout forces the operator to search through a large amount of irrelevant information to locate the pieces of information

  19. Practical experimental certification of computational quantum gates using a twirling procedure.

    Science.gov (United States)

    Moussa, Osama; da Silva, Marcus P; Ryan, Colm A; Laflamme, Raymond

    2012-08-17

    Because of the technical difficulty of building large quantum computers, it is important to be able to estimate how faithful a given implementation is to an ideal quantum computer. The common approach of completely characterizing the computation process via quantum process tomography requires an exponential amount of resources, and thus is not practical even for relatively small devices. We solve this problem by demonstrating that twirling experiments previously used to characterize the average fidelity of quantum memories efficiently can be easily adapted to estimate the average fidelity of the experimental implementation of important quantum computation processes, such as unitaries in the Clifford group, in a practical and efficient manner with applicability in current quantum devices. Using this procedure, we demonstrate state-of-the-art coherent control of an ensemble of magnetic moments of nuclear spins in a single crystal solid by implementing the encoding operation for a 3-qubit code with only a 1% degradation in average fidelity discounting preparation and measurement errors. We also highlight one of the advances that was instrumental in achieving such high fidelity control.

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  1. Supporting plant operation through computer-based procedures

    International Nuclear Information System (INIS)

    Martinez, Victor; Medrano, Javier; Mendez, Julio

    2014-01-01

    Digital Systems are becoming more important in controlling and monitoring nuclear power plant operations. The capabilities of these systems provide additional functions as well as support operators in making decisions and avoiding errors. Regarding Operation Support Systems, an important way of taking advantage of these features is using computer-based procedures (CBPs) tools that enhance the plant operation. Integrating digital systems in analogue controls at nuclear power plants in operation becomes an extra challenge, in contrast to the integration of Digital Control Systems in new nuclear power plants. Considering the potential advantages of using this technology, Tecnatom has designed and developed a CBP platform taking currently operating nuclear power plants as its design basis. The result is a powerful tool which combines the advantages of CBPs and the conventional analogue control systems minimizing negative effects during plant operation and integrating operation aid-systems to support operators. (authors)

  2. Integrated Hatchery Operations Team: Policies and Procedures for Columbia Basin Anadromous Salmonid Hatcheries, 1994 Annual Report.

    Energy Technology Data Exchange (ETDEWEB)

    Integrated Hatchery Operations Team (Northwest Power Planning Council, Portland, OR)

    1995-01-01

    This document outlines regional policies and procedures for hatchery operations in the Columbia River Basin. The purpose of these policies is to provide regional guidelines by which all anadromous fish hatcheries will be operated. These policies will be adopted by the fisheries co-managers, and will provide guidance to operate hatcheries in an efficient and biologically sound manner. The hatchery policies presented in this manual are not intended to establish production priorities. Rather, the intent is to guide hatchery operations once production numbers are established. Hatchery operations discussed in this report include broodstock collection, spawning, incubation of eggs, fish rearing and feeding, fish release, equipment maintenance and operations, and personnel training. Decisions regarding production priorities must be provided by fishery managers through a comprehensive plan that addresses both natural and hatchery fish production. The Integrated Hatchery Operations Team is a multi-agency group called for by the Northwest Power Planning Council. This team was directed to develop new basinwide policies for managing and operating all existing and future anadromous fish hatcheries in the Columbia River Basin. The parties pledge to confer with each other and to use their authorities and resources to accomplish these mutually acceptable hatchery practices.

  3. Toward Reproducible Computational Research: An Empirical Analysis of Data and Code Policy Adoption by Journals.

    Directory of Open Access Journals (Sweden)

    Victoria Stodden

    Full Text Available Journal policy on research data and code availability is an important part of the ongoing shift toward publishing reproducible computational science. This article extends the literature by studying journal data sharing policies by year (for both 2011 and 2012 for a referent set of 170 journals. We make a further contribution by evaluating code sharing policies, supplemental materials policies, and open access status for these 170 journals for each of 2011 and 2012. We build a predictive model of open data and code policy adoption as a function of impact factor and publisher and find higher impact journals more likely to have open data and code policies and scientific societies more likely to have open data and code policies than commercial publishers. We also find open data policies tend to lead open code policies, and we find no relationship between open data and code policies and either supplemental material policies or open access journal status. Of the journals in this study, 38% had a data policy, 22% had a code policy, and 66% had a supplemental materials policy as of June 2012. This reflects a striking one year increase of 16% in the number of data policies, a 30% increase in code policies, and a 7% increase in the number of supplemental materials policies. We introduce a new dataset to the community that categorizes data and code sharing, supplemental materials, and open access policies in 2011 and 2012 for these 170 journals.

  4. Toward Reproducible Computational Research: An Empirical Analysis of Data and Code Policy Adoption by Journals.

    Science.gov (United States)

    Stodden, Victoria; Guo, Peixuan; Ma, Zhaokun

    2013-01-01

    Journal policy on research data and code availability is an important part of the ongoing shift toward publishing reproducible computational science. This article extends the literature by studying journal data sharing policies by year (for both 2011 and 2012) for a referent set of 170 journals. We make a further contribution by evaluating code sharing policies, supplemental materials policies, and open access status for these 170 journals for each of 2011 and 2012. We build a predictive model of open data and code policy adoption as a function of impact factor and publisher and find higher impact journals more likely to have open data and code policies and scientific societies more likely to have open data and code policies than commercial publishers. We also find open data policies tend to lead open code policies, and we find no relationship between open data and code policies and either supplemental material policies or open access journal status. Of the journals in this study, 38% had a data policy, 22% had a code policy, and 66% had a supplemental materials policy as of June 2012. This reflects a striking one year increase of 16% in the number of data policies, a 30% increase in code policies, and a 7% increase in the number of supplemental materials policies. We introduce a new dataset to the community that categorizes data and code sharing, supplemental materials, and open access policies in 2011 and 2012 for these 170 journals.

  5. Three-dimensional computer graphics for surgical procedure learning: Web three-dimensional application for cleft lip repair.

    Science.gov (United States)

    Kobayashi, Masahiro; Nakajima, Tatsuo; Mori, Ayako; Tanaka, Daigo; Fujino, Toyomi; Chiyokura, Hiroaki

    2006-05-01

    In surgical procedures for cleft lip, surgeons attempt to use various skin incisions and small flaps to achieve a better and more natural shape postoperatively. They must understand the three-dimensional (3D) structure of the lips. However, they may have difficulty learning the surgical procedures precisely from normal textbooks with two-dimensional illustrations. Recent developments in 3D computed tomography (3D-CT) and laser stereolithography have enabled surgeons to visualize the structures of cleft lips from desired viewpoints. However, this method cannot reflect the advantages offered by specific surgical procedures. To solve this problem, we used the benefits offered by 3D computer graphics (3D-CG) and 3D animation. By using scanning 3D-CT image data of patients with cleft lips, 3D-CG models of the cleft lips were created. Several animations for surgical procedures such as incision designs, rotation of small skin flaps, and sutures were made. This system can recognize the details of an operation procedure clearly from any viewpoint, which cannot be acquired from the usual textbook illustrations. This animation system can be used for developing new skin-flap design, understanding the operational procedure, and using tools in case presentations. The 3D animations can also be uploaded to the World Wide Web for use in teleconferencing.

  6. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  7. 41 CFR 301-70.600 - What governing policies and procedures must we establish related to threatened law enforcement...

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false What governing policies and procedures must we establish related to threatened law enforcement/investigative employees? 301-70.600 Section 301-70.600 Public Contracts and Property Management Federal Travel Regulation System TEMPORARY DUTY (TDY) TRAVEL ALLOWANCES AGENCY...

  8. Fair play in energy policy decisions: Procedural fairness, outcome fairness and acceptance of the decision to rebuild nuclear power plants

    International Nuclear Information System (INIS)

    Visschers, Vivianne H.M.; Siegrist, Michael

    2012-01-01

    To raise public acceptance of new energy policies, promoting the fairness of the outcomes and of the decision-making procedure has been suggested. Very few studies have examined the role of fairness in public acceptance of rebuilding nuclear power plants. Therefore, using a large mail survey, we investigated the public’s acceptance of the decision to rebuild nuclear power plants in Switzerland by 2020. The study examined the influence of procedural fairness and outcome fairness on the acceptance of this decision, as well as other factors such as risk perception and benefit perception. Additionally, we investigated the moderating influence of general attitudes towards nuclear power on the relation between fairness and decision acceptance. Results indicated that outcome fairness strongly increased decision acceptance, along with general attitudes towards nuclear power and perceived economic benefits. Procedural fairness had only a small impact on decision acceptance. The influence of fairness on decision acceptance did not seem to depend on general nuclear attitudes. Our findings imply that, in the case of rebuilding nuclear power plants, perceived benefits and outcome fairness are important determinants of acceptance of the decision, while procedural fairness only has a limited impact. - Highlights: ► We investigated the role of fairness in the acceptance of a nuclear policy decision. ► Outcome fairness strongly influenced decision acceptance regarding nuclear power plants. ► The role of procedural fairness was relatively small in this respect. ► Also, nuclear attitudes and perceived economic benefits affected decision acceptance. ► Outcome fairness seems more relevant for decision acceptance than procedural fairness.

  9. Discharge Fee Policy Analysis: A Computable General Equilibrium (CGE) Model of Water Resources and Water Environments

    OpenAIRE

    Guohua Fang; Ting Wang; Xinyi Si; Xin Wen; Yu Liu

    2016-01-01

    To alleviate increasingly serious water pollution and shortages in developing countries, various kinds of policies have been implemented by local governments. It is vital to quantify and evaluate the performance and potential economic impacts of these policies. This study develops a Computable General Equilibrium (CGE) model to simulate the regional economic and environmental effects of discharge fees. Firstly, water resources and water environment factors are separated from the input and out...

  10. Computer-Aided Diagnosis of Solid Breast Lesions Using an Ultrasonic Multi-Feature Analysis Procedure

    Science.gov (United States)

    2011-01-01

    ultrasound. 1. BACKGROUND AND INTRODUCTION Breast cancer affects one of every eight women, it kills one of 29 women in the United States, and is the leading...feature analysis procedure for computer-aided diagnosis of solid breast lesions,” Ultrason Imag, 2010 (In Press). 22. C. B. Shakespeare , personal

  11. Preliminary Investigation of Time Remaining Display on the Computer-based Emergency Operating Procedure

    Science.gov (United States)

    Suryono, T. J.; Gofuku, A.

    2018-02-01

    One of the important thing in the mitigation of accidents in nuclear power plant accidents is time management. The accidents should be resolved as soon as possible in order to prevent the core melting and the release of radioactive material to the environment. In this case, operators should follow the emergency operating procedure related with the accident, in step by step order and in allowable time. Nowadays, the advanced main control rooms are equipped with computer-based procedures (CBPs) which is make it easier for operators to do their tasks of monitoring and controlling the reactor. However, most of the CBPs do not include the time remaining display feature which informs operators of time available for them to execute procedure steps and warns them if the they reach the time limit. Furthermore, the feature will increase the awareness of operators about their current situation in the procedure. This paper investigates this issue. The simplified of emergency operating procedure (EOP) of steam generator tube rupture (SGTR) accident of PWR plant is applied. In addition, the sequence of actions on each step of the procedure is modelled using multilevel flow modelling (MFM) and influenced propagation rule. The prediction of action time on each step is acquired based on similar case accidents and the Support Vector Regression. The derived time will be processed and then displayed on a CBP user interface.

  12. Declining rates of sterilisation reversal procedures in western Australian women from 1990 to 2008: the relationship with age, hospital type and government policy changes.

    Science.gov (United States)

    Jama-Alol, Khadra A; Bremner, Alexandra P; Pereira, Gavin; Stewart, Louise M; Malacova, Eva; Moorin, Rachael; Preen, David B

    2017-11-25

    Female sterilisation is usually performed on an elective basis at perceived family completion, however, around 1-3% of women who have undergone sterilisation elect to undergo sterilisation reversal (SR) at a later stage. The trends in SR rates in Western Australia (WA), proportions of SR procedures between hospital types (public and private), and the effects of Federal Government policies on these trends are unknown. Using records from statutory state-wide data collections of hospital separations and births, we conducted a retrospective descriptive study of all women aged 15-49 years who underwent a SR procedure during the period 1st January 1990 to 31st December 2008 (n = 1868 procedures). From 1991 to 2007 the annual incidence rate of SR procedures per 10,000 women declined from 47.0 to 3.6. Logistic regression modelling showed that from 1997 to 2001 the odds of women undergoing SR in a private hospital as opposed to all other hospitals were 1.39 times higher (95% CI 1.07-1.81) and 7.51 times higher (95% CI 5.46-10.31) from 2002 to 2008. There were significant decreases in SR rates overall and among different age groups after the Federal Government interventions. Rates of SR procedures in WA have declined from 1990 to 2008, particularly following policy changes such as the introduction of private health insurance (PHI) policies. This suggests decisions to undergo SR may be influenced by Federal Government interventions.

  13. Nuclear Waste Fund cash management procedures

    International Nuclear Information System (INIS)

    1988-04-01

    The Nuclear Waste Policy Act if 1982 (NWPA) provided for the Office of Radioactive Waste Management (OCRWM) to adopt financial and accounting methods comparable to those used by private industry, including borrowing and investing authority. This document describes the procedures OCRWM follows to meet its borrowing and investing authority under the NWPA. These procedures are a supplement to, and are, therefore, not intended to supersede, existing Departmental policies and procedures

  14. System of didactic procedures to drive the teaching-learning of the computation in the half school level

    Directory of Open Access Journals (Sweden)

    Isabel Alonso-Berenguer

    2016-09-01

    Full Text Available A system of teaching methods is presented to drive the dynamics of the teaching-learning process of the Computation in the Half School Level, based on an interdisciplinary logic from cognitive nodes. This practical construct was designed using the Systemic-Structural-Functional method and was structured in two procedures, the relative to the appropriation of a computational culture and the concerning to the development of computational thinking, which in turn, are composed of a set of linked actions that are structured logically, that make possible the development of said dynamic. It also has evaluative criteria and patterns of achievement that allow for evaluation of the results obtained. The feasibility and relevance of the system of procedures was validated by conducting a socialization workshop with specialists of territory and through a survey of specialists from other provinces. Its application during the last two years has enabled its improvement.

  15. A New Human-Machine Interfaces of Computer-based Procedure System to Reduce the Team Errors in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Kim, Sa Kil; Sim, Joo Hyun; Lee, Hyun Chul

    2016-01-01

    In this study, we identify the emerging types of team errors, especially, in digitalized control room of nuclear power plants such as the APR-1400 main control room of Korea. Most works in nuclear industry are to be performed by a team of more than two persons. Even though the individual errors can be detected and recovered by the qualified others and/or the well trained team, it is rather seldom that the errors by team could be easily detected and properly recovered by the team itself. Note that the team is defined as two or more people who are appropriately interacting with each other, and the team is a dependent aggregate, which accomplishes a valuable goal. Organizational errors sometimes increase the likelihood of operator errors through the active failure pathway and, at the same time, enhance the possibility of adverse outcomes through defensive weaknesses. We incorporate the crew resource management as a representative approach to deal with the team factors of the human errors. We suggest a set of crew resource management training procedures under the unsafe environments where human errors can have devastating effects. We are on the way to develop alternative interfaces against team error in a condition of using a computer-based procedure system in a digitalized main control room. The computer-based procedure system is a representative feature of digitalized control room. In this study, we will propose new interfaces of computer-based procedure system to reduce feasible team errors. We are on the way of effectiveness test to validate whether the new interface can reduce team errors during operating with a computer-based procedure system in a digitalized control room

  16. A New Human-Machine Interfaces of Computer-based Procedure System to Reduce the Team Errors in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sa Kil; Sim, Joo Hyun; Lee, Hyun Chul [Korea Atomic Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    In this study, we identify the emerging types of team errors, especially, in digitalized control room of nuclear power plants such as the APR-1400 main control room of Korea. Most works in nuclear industry are to be performed by a team of more than two persons. Even though the individual errors can be detected and recovered by the qualified others and/or the well trained team, it is rather seldom that the errors by team could be easily detected and properly recovered by the team itself. Note that the team is defined as two or more people who are appropriately interacting with each other, and the team is a dependent aggregate, which accomplishes a valuable goal. Organizational errors sometimes increase the likelihood of operator errors through the active failure pathway and, at the same time, enhance the possibility of adverse outcomes through defensive weaknesses. We incorporate the crew resource management as a representative approach to deal with the team factors of the human errors. We suggest a set of crew resource management training procedures under the unsafe environments where human errors can have devastating effects. We are on the way to develop alternative interfaces against team error in a condition of using a computer-based procedure system in a digitalized main control room. The computer-based procedure system is a representative feature of digitalized control room. In this study, we will propose new interfaces of computer-based procedure system to reduce feasible team errors. We are on the way of effectiveness test to validate whether the new interface can reduce team errors during operating with a computer-based procedure system in a digitalized control room.

  17. Total reduction of distorted echelle spectrograms - An automatic procedure. [for computer controlled microdensitometer

    Science.gov (United States)

    Peterson, R. C.; Title, A. M.

    1975-01-01

    A total reduction procedure, notable for its use of a computer-controlled microdensitometer for semi-automatically tracing curved spectra, is applied to distorted high-dispersion echelle spectra recorded by an image tube. Microdensitometer specifications are presented and the FORTRAN, TRACEN and SPOTS programs are outlined. The intensity spectrum of the photographic or electrographic plate is plotted on a graphic display. The time requirements are discussed in detail.

  18. Notification: Audit of EPA’s Adherence to Policies, Procedures and Oversight Controls Pertaining to the Administrator’s Travel (2nd notification)

    Science.gov (United States)

    Project #OA-FY17-0382, October 6, 2017 - The EPA OIG plans to expand the scope of preliminary research on the EPA’s adherence to policies, procedures and oversight controls pertaining to the Administrator’s travel.

  19. Actor-Network Procedures

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Ramanujam, R.; Ramaswamy, Srini

    2012-01-01

    In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension

  20. Light Water Reactor Sustainability Program: Computer-based procedure for field activities: results from three evaluations at nuclear power plants

    International Nuclear Information System (INIS)

    2014-01-01

    Nearly all activities that involve human interaction with the systems of a nuclear power plant are guided by procedures. The paper-based procedures (PBPs) currently used by industry have a demonstrated history of ensuring safety; however, improving procedure use could yield tremendous savings in increased efficiency and safety. One potential way to improve procedure-based activities is through the use of computer-based procedures (CBPs). Computer-based procedures provide the opportunity to incorporate context driven job aids, such as drawings, photos, just-in-time training, etc into CBP system. One obvious advantage of this capability is reducing the time spent tracking down the applicable documentation. Additionally, human performance tools can be integrated in the CBP system in such way that helps the worker focus on the task rather than the tools. Some tools can be completely incorporated into the CBP system, such as pre-job briefs, placekeeping, correct component verification, and peer checks. Other tools can be partly integrated in a fashion that reduces the time and labor required, such as concurrent and independent verification. Another benefit of CBPs compared to PBPs is dynamic procedure presentation. PBPs are static documents which limits the degree to which the information presented can be tailored to the task and conditions when the procedure is executed. The CBP system could be configured to display only the relevant steps based on operating mode, plant status, and the task at hand. A dynamic presentation of the procedure (also known as context-sensitive procedures) will guide the user down the path of relevant steps based on the current conditions. This feature will reduce the user's workload and inherently reduce the risk of incorrectly marking a step as not applicable and the risk of incorrectly performing a step that should be marked as not applicable. As part of the Department of Energy's (DOE) Light Water Reactors Sustainability Program

  1. Procedural Audio in Computer Games Using Motion Controllers: An Evaluation on the Effect and Perception

    Directory of Open Access Journals (Sweden)

    Niels Böttcher

    2013-01-01

    Full Text Available A study has been conducted into whether the use of procedural audio affects players in computer games using motion controllers. It was investigated whether or not (1 players perceive a difference between detailed and interactive procedural audio and prerecorded audio, (2 the use of procedural audio affects their motor-behavior, and (3 procedural audio affects their perception of control. Three experimental surveys were devised, two consisting of game sessions and the third consisting of watching videos of gameplay. A skiing game controlled by a Nintendo Wii balance board and a sword-fighting game controlled by a Wii remote were implemented with two versions of sound, one sample based and the other procedural based. The procedural models were designed using a perceptual approach and by alternative combinations of well-known synthesis techniques. The experimental results showed that, when being actively involved in playing or purely observing a video recording of a game, the majority of participants did not notice any difference in sound. Additionally, it was not possible to show that the use of procedural audio caused any consistent change in the motor behavior. In the skiing experiment, a portion of players perceived the control of the procedural version as being more sensitive.

  2. Pollutant Assessments Group procedures manual: Volume 2, Technical procedures

    Energy Technology Data Exchange (ETDEWEB)

    1992-03-01

    This is volume 2 of the manuals that describes the technical procedures currently in use by the Pollution Assessments Group. This manual incorporates new developments in hazardous waste assessment technology and administrative policy. Descriptions of the equipment, procedures and operations of such things as radiation detection, soil sampling, radionuclide monitoring, and equipment decontamination are included in this manual. (MB)

  3. 37 CFR 204.3 - General policy.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false General policy. 204.3 Section 204.3 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PRIVACY ACT: POLICIES AND PROCEDURES § 204.3 General policy. The Copyright Office serves primarily...

  4. National Degree of Computerization: A Context for Evaluating Computer Education Policies in Developing Countries.

    Science.gov (United States)

    Boehm, Barry W.

    Developing countries should take immediate steps to avoid some of the serious problems that are now facing the United States in regard to the pool of trained computer professionals. Problem areas which should be reconciled involve a diverse range of topics from general national policy to salary structures and conversions efforts. By using the…

  5. Regulations and Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    Young, Lydia J. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2011-07-25

    The purpose of the Regulations and Procedures Manual (RPM) is to provide LBNL personnel with a reference to University and Lawrence Berkeley National Laboratory (LBNL or Laboratory) policies and regulations by outlining normal practices and answering most policy questions that arise in the day-to-day operations of Laboratory organizations. Much of the information in this manual has been condensed from detail provided in LBNL procedure manuals, Department of Energy (DOE) directives, and Contract DE-AC02-05CH11231. This manual is not intended, however, to replace any of those documents. RPM sections on personnel apply only to employees who are not represented by unions. Personnel policies pertaining to employees represented by unions may be found in their labor agreements. Questions concerning policy interpretation should be directed to the LBNL organization responsible for the particular policy. A link to the Managers Responsible for RPM Sections is available on the RPM home page. If it is not clear which organization is responsible for a policy, please contact Requirements Manager Lydia Young or the RPM Editor.

  6. EPA and GSA Webinar: E Scrap Management, Computers for Learning and the Federal Green Challenge

    Science.gov (United States)

    EPA and the General Services Administration (GSA) are hosting a webinar on May 2, 2018. Topics will include policies and procedures on E Scrap management, a review of the Computers For Leaning Program, and benefits of joining the Federal Green Challenge.

  7. Selecting, Evaluating and Creating Policies for Computer-Based Resources in the Behavioral Sciences and Education.

    Science.gov (United States)

    Richardson, Linda B., Comp.; And Others

    This collection includes four handouts: (1) "Selection Critria Considerations for Computer-Based Resources" (Linda B. Richardson); (2) "Software Collection Policies in Academic Libraries" (a 24-item bibliography, Jane W. Johnson); (3) "Circulation and Security of Software" (a 19-item bibliography, Sara Elizabeth Williams); and (4) "Bibliography of…

  8. Conflicts of Interest in Clinical Guidelines: Update of U.S. Preventive Services Task Force Policies and Procedures.

    Science.gov (United States)

    Ngo-Metzger, Quyen; Moyer, Virginia; Grossman, David; Ebell, Mark; Woo, Meghan; Miller, Therese; Brummer, Tana; Chowdhury, Joya; Kato, Elisabeth; Siu, Albert; Phillips, William; Davidson, Karina; Phipps, Maureen; Bibbins-Domingo, Kirsten

    2018-01-01

    The U.S. Preventive Services Task Force (USPSTF) provides independent, objective, and scientifically rigorous recommendations for clinical preventive services. A primary concern is to avoid even the appearance of members having special interests that might influence their ability to judge evidence and formulate unbiased recommendations. The conflicts of interest policy for the USPSTF is described, as is the formal process by which best practices were incorporated to update the policy. The USPSTF performed a literature review, conducted key informant interviews, and reviewed conflicts of interest policies of ten similar organizations. Important findings included transparency and public accessibility; full disclosure of financial relationships; disclosure of non-financial relationships (that create the potential for bias and compromise a member's objective judgment); disclosure of family members' conflicts of interests; and establishment of appropriate reporting periods. Controversies in best practices include the threshold of financial disclosures, ease of access to conflicts of interest policies and declarations, vague definition of non-financial biases, and request for family members' conflicts of interests (particularly those that are non-financial in nature). The USPSTF conflicts of interest policy includes disclosures for immediate family members, a clear non-financial conflicts of interest definition, long look-back period and application of the policy to prospective members. Conflicts of interest is solicited from all members every 4 months, formally reviewed, adjudicated, and made publicly available. The USPSTF conflicts of interest policy is publicly available as part of the USPSTF Procedure Manual. A continuous improvement process can be applied to conflicts of interest policies to enhance public trust in members of panels, such as the USPSTF, that produce clinical guidelines and recommendations. Copyright © 2018 American Journal of Preventive Medicine

  9. Introducing a new operational policy : the PIS operational policy

    CSIR Research Space (South Africa)

    Pattinson, T

    2009-01-01

    Full Text Available ; No. of Pages 14 Computers and Chemical Engineering xxx (2009) xxx–xxx Contents lists available at ScienceDirect Computers and Chemical Engineering journa l homepage: www.e lsev ier .com/ locate /compchemeng Introducing a new operational policy...), • Finite Intermediate Storage (FIS), • Unlimited Intermediate Storage (UIS), ARTICLE IN PRESSG ModelCACE-3875; No. of Pages 14 2 T. Pattinson, T. Majozi / Computers and Chemical Engineering xxx (2009) xxx–xxx W situatio ationa polic u CI policie...

  10. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  11. 48 CFR 304.7100 - Policy.

    Science.gov (United States)

    2010-10-01

    ... MATTERS Review and Approval of Proposed Contract Actions 304.7100 Policy. (a) The HCA (non-delegable) shall establish review and approval procedures for proposed contract actions to ensure that— (1) Contractual documents are in conformance with law, established policies and procedures, and sound business...

  12. Computational Modelling in Development of a Design Procedure for Concrete Road

    Directory of Open Access Journals (Sweden)

    B. Novotný

    2000-01-01

    Full Text Available The computational modelling plays a decisive part in development of a new design procedure for concrete pavement by quantifying impacts of individual design factors. In the present paper, the emphasis is placed on the modelling of a structural response of the jointed concrete pavement as a system of interacting rectangular slabs transferring wheel loads into an elastic layered subgrade. The finite element plate analysis is combined with the assumption of a linear contact stress variation over triangular elements of the contact region division. The linking forces are introduced to model the load transfer across the joints. The unknown contact stress nodal intensities as well as unknown linking forces are determined in an iterative way to fulfil slab/foundation and slab/slab contact conditions. The temperature effects are also considered and space is reserved for modelling of inelastic and additional environmental effects. It is pointed out that pavement design should be based on full data of pavement stressing, in contradiction to procedures accounting only for the axle load induced stresses.

  13. Development of Computational Procedure for Assessment of Patient Dose in Multi-Detector Computed Tomography

    International Nuclear Information System (INIS)

    Park, Dong Wook

    2007-02-01

    Technological development to improve the quality and speed with which images are obtained have fostered the growth of frequency and collective effective dose of CT examination. Especially, High-dose x-ray technique of CT has increased in the concern of patient dose. However CTDI and DLP in CT dosimetry leaves something to be desired to evaluate patient dose. And even though the evaluation of effective dose in CT practice is required for comparison with other radiography, it's not sufficient to show any estimation because it's not for medical purpose. Therefore the calculation of effective dose in CT procedure is needed for that purpose. However modelling uncertainties will be due to insufficient information from manufacturing tolerances. Therefore the purpose of this work is development of computational procedure for assessment of patient dose through the experiment for getting essential information in MDCT. In order to obtain exact absorbed dose, normalization factors must be created to relate simulated dose values with CTDI air measurement. The normalization factors applied to the calculation of CTDI 100 using axial scanning and organ effective dose using helical scanning. The calculation of helical scanning was compared with the experiment of Groves et al.(2004). The result has a about factor 2 of the experiment. It seems because AEC is not simulated. In several studies, when AEC applied to a CT examination, approximately 20-30% dose reduction was appeared. Therefore the study of AEC simulation should be added and modified

  14. Regulations and Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    Young, Lydia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2010-09-30

    The purpose of the Regulations and Procedures Manual (RPM) is to provide Laboratory personnel with a reference to University and Lawrence Berkeley National Laboratory policies and regulations by outlining the normal practices and answering most policy questions that arise in the day-to-day operations of Laboratory departments. Much of the information in this manual has been condensed from detail provided in Laboratory procedure manuals, Department of Energy (DOE) directives, and Contract DE-AC02-05CH11231. This manual is not intended, however, to replace any of those documents. The sections on personnel apply only to employees who are not represented by unions. Personnel policies pertaining to employees represented by unions may be found in their labor agreements. Questions concerning policy interpretation should be directed to the department responsible for the particular policy. A link to the Managers Responsible for RPM Sections is available on the RPM home page. If it is not clear which department should be called, please contact the Associate Laboratory Director of Operations.

  15. Computer-assisted preoperative simulation for positioning and fixation of plate in 2-stage procedure combining maxillary advancement by distraction technique and mandibular setback surgery.

    Science.gov (United States)

    Suenaga, Hideyuki; Taniguchi, Asako; Yonenaga, Kazumichi; Hoshi, Kazuto; Takato, Tsuyoshi

    2016-01-01

    Computer-assisted preoperative simulation surgery is employed to plan and interact with the 3D images during the orthognathic procedure. It is useful for positioning and fixation of maxilla by a plate. We report a case of maxillary retrusion by a bilateral cleft lip and palate, in which a 2-stage orthognathic procedure (maxillary advancement by distraction technique and mandibular setback surgery) was performed following a computer-assisted preoperative simulation planning to achieve the positioning and fixation of the plate. A high accuracy was achieved in the present case. A 21-year-old male patient presented to our department with a complaint of maxillary retrusion following bilateral cleft lip and palate. Computer-assisted preoperative simulation with 2-stage orthognathic procedure using distraction technique and mandibular setback surgery was planned. The preoperative planning of the procedure resulted in good aesthetic outcomes. The error of the maxillary position was less than 1mm. The implementation of the computer-assisted preoperative simulation for the positioning and fixation of plate in 2-stage orthognathic procedure using distraction technique and mandibular setback surgery yielded good results. Copyright © 2016 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  16. International Commission on Radiological Protection. History, policies, procedures

    International Nuclear Information System (INIS)

    Lindell, Bo; Dunster, H.J.; Valentin, Jack; )

    2000-01-01

    This report briefly reviews the history, mode of operation, concepts, and current policies of the International Commission on Radiological Protection (ICRP). It touches upon the objectives of the Commission's recommendations, the quantities used, the biological basis of the Commission's policy, the quantitative basis for its risk estimates, the structure of the system of protection, some problems of interpretation and application in that system, and the need for stability, consistency, and clarity in the Commission's recommendations. (author)

  17. Policy and procedures for classification of Class III groundwater at UMTRA Project sites

    International Nuclear Information System (INIS)

    1989-03-01

    The US Environmental Protection Agency (EPA) has recently proposed groundwater regulations for the US Department of Energy's )DOE) Uranium Mill Tailings Remedial Action (UMTRA) Project. These regulations allow the application of supplemental standards at UMTRA Project sites in specific situations. The designation of groundwater as Class III permits the application of supplemental standards. This document discusses a final UMTRA Project policy and procedures for identifying Class III groundwater, including identification of a review area, definition of water quality, quantification of aquifer yield, and identification of methods reasonably employed for public water supply systems. These items, either individually or collectively, need to be investigated in order to determine if groundwaters at UMTRA Project sites are Class III. This document provides a framework for the DOE to determine Class III groundwaters

  18. 44 CFR 1.4 - Policy and procedures.

    Science.gov (United States)

    2010-10-01

    ... economy, and other regulatory actions contemplated for the future. (b) It is the policy of FEMA to provide... include a statement with respect to the impact of the proposed rule on small entities; holding open...

  19. Efficient Procedure to Compute the Microcanonical Volume of Initial Conditions that Lead to Escape Trajectories from a Multidimensional Potential Well

    NARCIS (Netherlands)

    Waalkens, Holger; Burbanks, Andrew; Wiggins, Stephen

    2005-01-01

    A procedure is presented for computing the phase space volume of initial conditions for trajectories that escape or ‘‘react’’ from a multidimensional potential well. The procedure combines a phase space transition state theory, which allows one to construct dividing surfaces that are free of local

  20. Computation of stress intensity factors for nozzle corner cracks by various finite element procedures

    International Nuclear Information System (INIS)

    Broekhoven, M.J.G.

    1975-01-01

    The present study aims at deriving accurate K-factors for a series of 5 elliptical nozzle corner cracks of increasing size by various finite element procedures, using a three-level recursive substructuring scheme to perform the computations in an economic way on an intermediate size computer (IBM 360/65 system). A nozzle on a flat plate has been selected for subsequent experimental verification, this configuration being considered an adequate simulation of a nozzle on a shallow shell. The computations have been performed with the ASKA finite element system using mainly HEXEC-27 (incomplete quartic) elements. The geometry has been subdivided into 5 subnets with a total of 3515 nodal points and 6250 unknowns, two main nets and one hyper net. Each crack front is described by 11 nodal points and all crack front nodes are inserted in the hyper net, which allows for the realization of the successive crack geometries by changing only a relatively small hyper net (615 to 725 unknowns). Output data have been interpreted in terms of K-factors by the global energy method, the displacement method and the stress method. Besides, a stiffness derivative procedure, recently developed at Brown University, which takes full advantage of the finite element formulation to calculate local K-factors, has been applied. Finally it has been investigated whether sufficiently accurate results can be obtained by analyzing a considerably smaller part than one half of the geometry (as strictly required by symmetry considerations), using fixed boundary conditions derived from a far cheaper analysis of the uncracked structure

  1. Increasing the speed of computational fluid dynamics procedure for minimization the nitrogen oxide polution from the premixed atmospheric gas burner

    Directory of Open Access Journals (Sweden)

    Fotev Vasko G.

    2017-01-01

    Full Text Available This article presents innovative method for increasing the speed of procedure which includes complex computational fluid dynamic calculations for finding the distance between flame openings of atmospheric gas burner that lead to minimal NO pollution. The method is based on standard features included in commercial computational fluid dynamic software and shortens computer working time roughly seven times in this particular case.

  2. Policies and Procedures for Foreign Exchange Agencies. First Edition.

    Science.gov (United States)

    Hartman, Donald D.

    The guide details the policy of the Jefferson County (Alabama) Board of Education policy concerning international exchange of students (travel both to and from United States) in elementary and secondary grades. The first section specifies the standards by which the county will evaluate all international exchange agencies concerning structure,…

  3. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  4. Navigation of guidewires and catheters in the body during intervention procedures : A review of computer-based models

    NARCIS (Netherlands)

    Sharei Amarghan, H.; Alderliesten, Tanja; van den Dobbelsteen, J.J.; Dankelman, J.

    2018-01-01

    Guidewires and catheters are used during minimally invasive interventional procedures to traverse in vascular system and access the desired position. Computer models are increasingly being used to predict the behavior of these instruments. This information can be used to choose the right

  5. 12 CFR 612.2165 - Policies and procedures.

    Science.gov (United States)

    2010-01-01

    ..., preserve the integrity and independence of the supervisory process, and prevent the improper use of... employees may purchase any real or personal property of a System institution acquired by such institution... demonstrating compliance with standards-of-conduct decisions and board policy; (12) Establish reporting...

  6. 33 CFR 236.5 - Policy and procedure.

    Science.gov (United States)

    2010-07-01

    ... manage when directly integrated with the implementation or management of the water resource development... created by a water resource development to be recommended for implementation by the Corps of Engineers. (3... DEFENSE WATER RESOURCE POLICIES AND AUTHORITIES: CORPS OF ENGINEERS PARTICIPATION IN IMPROVEMENTS FOR...

  7. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  8. System Requirements Analysis for a Computer-based Procedure in a Research Reactor Facility

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaek Wan; Jang, Gwi Sook; Seo, Sang Moon; Shin, Sung Ki [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    This can address many of the routine problems related to human error in the use of conventional, hard-copy operating procedures. An operating supporting system is also required in a research reactor. A well-made CBP can address the staffing issues of a research reactor and reduce the human errors by minimizing the operator's routine tasks. A CBP for a research reactor has not been proposed yet. Also, CBPs developed for nuclear power plants have powerful and various technical functions to cover complicated plant operation situations. However, many of the functions may not be required for a research reactor. Thus, it is not reasonable to apply the CBP to a research reactor directly. Also, customizing of the CBP is not cost-effective. Therefore, a compact CBP should be developed for a research reactor. This paper introduces high level requirements derived by the system requirements analysis activity as the first stage of system implementation. Operation support tools are under consideration for application to research reactors. In particular, as a full digitalization of the main control room, application of a computer-based procedure system has been required as a part of man-machine interface system because it makes an impact on the operating staffing and human errors of a research reactor. To establish computer-based system requirements for a research reactor, this paper addressed international standards and previous practices on nuclear plants.

  9. Declining rates of sterilization procedures in Western Australian women from 1990 to 2008: the relationship with age, hospital type, and government policy changes.

    Science.gov (United States)

    Jama-Alol, Khadra A; Bremner, Alexandra P; Stewart, Louise M; Kemp-Casey, Anna; Malacova, Eva; Moorin, Rachael; Shirangi, Adeleh; Preen, David B

    2016-09-01

    To describe trends in age-specific incidence rates of female sterilization (FS) procedures in Western Australia and to evaluate the effects of the introduction of government-subsidized contraceptive methods and the implementation of the Australian government's baby bonus policy on FS rates. Population-based retrospective descriptive study. Not applicable. All women ages 15-49 undergoing an FS procedure during the period January 1, 1990, to December 31, 2008 (n = 47,360 procedures). Records from statutory statewide data collections of hospitals separations and births were extracted and linked. Trends in FS procedures and the influence on these trends of the introduction of government policies: subsidization of long-acting reversible contraceptives (Implanon and Mirena) and the Australian baby bonus initiative. The annual incidence rate of FS procedures declined from 756.9 per 100,000 women in 1990 to 155.2 per 100,000 women in 2008. Compared with the period 1990-1994, women ages 30-39 years were 47% less likely (rate ratio [RR] = 0.53; 95% confidence interval [CI], 0.39-0.72) to undergo sterilization during the period 2005-2008. Adjusting for overall trend, there were significant decreases in FS rates after government subsidization of Implanon (RR = 0.89; 95% CI, 0.82-0.97) and Mirena (RR = 0.81; 95% CI, 0.73-0.91) and the introduction of the baby bonus (RR = 0.70; 95% CI, 0.61-0.81). Rates of female sterilization procedures in Western Australia have declined substantially across all age groups in the last two decades. Women's decisions to undergo sterilization procedures may be influenced by government interventions that increase access to long-term reversible contraceptives or encourage childbirth. Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  10. The interplay of ultrasound and computed tomography in the planning and execution of interventional procedures

    International Nuclear Information System (INIS)

    Stafford, S.; Mueller, P.R.

    1987-01-01

    Even in large academic and private settings, where subspecialists abound and diagnostic and interventional radiologists are divided, both physically and philosophically, the interventionalist has emerged from the fluoroscopic suite to participate in the imaging workup of patients referred for precutaneous procedures. This expanded imaging role for the interventionalist is a natural outgrowth of several developments in radiology training. Computed tomography and ultrasound no longer are obscure techniques, understood only by an elite group of academic radiologists in large centers with access to equipment. All residents receive extensive education in these modalities, as imaging is a major part of general radiology. In addition, fellowship programs have been expanded to emphasize organ system training as opposed to ''modality'' training alone. Armed with imaging skills, the interventionalist is able to evaluate the cross-sectional diagnostic images better and to address specific findings and issues with respect to the planned procedure. These specific issues, elucidated by cross-sectional imaging, impact on the planning of interventional procedures addressed in this chapter

  11. Midi-maxi computer interaction in the interpretation of nuclear medicine procedures

    International Nuclear Information System (INIS)

    Schlapper, G.A.

    1977-01-01

    A study of renal function with an Anger Gamma Camera coupled with a Digital Equipment Corporation Gamma-11 System and an IBM System 370 demonstrates the potential of quantitative determinations of physiological function through the application of midi-maxi computer interaction in the interpretation of nuclear medicine procedures. It is shown that radiotracers can provide an opportunity to assess physiological processes of renal function by noninvasively following the path of a tracer as a function of time. Time-activity relationships obtained over seven anatomically defined regions are related to parameters of a seven compartment model employed to describe the renal clearance process. The values obtained for clinically significant parameters agree with known renal pathophysiology. Differentiation of failure of acute, chronic, and obstructive forms is indicated

  12. Report on nuclear industry quality assurance procedures for safety analysis computer code development and use

    International Nuclear Information System (INIS)

    Sheron, B.W.; Rosztoczy, Z.R.

    1980-08-01

    As a result of a request from Commissioner V. Gilinsky to investigate in detail the causes of an error discovered in a vendor Emergency Core Cooling System (ECCS) computer code in March, 1978, the staff undertook an extensive investigation of the vendor quality assurance practices applied to safety analysis computer code development and use. This investigation included inspections of code development and use practices of the four major Light Water Reactor Nuclear Steam Supply System vendors and a major reload fuel supplier. The conclusion reached by the staff as a result of the investigation is that vendor practices for code development and use are basically sound. A number of areas were identified, however, where improvements to existing vendor procedures should be made. In addition, the investigation also addressed the quality assurance (QA) review and inspection process for computer codes and identified areas for improvement

  13. A Systematic Procedure for the Generation of Cost-Minimized Designs

    DEFF Research Database (Denmark)

    Becker, Peter W.; Jarkler, Bjorn

    1972-01-01

    We present a procedure for the generation of cost-minimized designs of circuits and systems. Suppose a designer has decided upon the topology of his product. Also suppose he knows the cost and quality of the different grades of the N components required to implement the product. The designer...... then faces the following problem: How should he proceed to find the combination of grades that will give him the desired manufacturing yield at minimum product cost? We discuss the problem and suggest a policy by which the designer, with a reasonable computational effort, can find a set of ``good...

  14. Bariatric Surgery Procedures

    Science.gov (United States)

    ... Meetings of Interest Online Education Job Board CME Policies CBN Fellowship Certificate Research Grant Program Resources All Resources Approved Procedures Patient Safety Vignettes Dr. Mason Historical Library Governing Documents Guidelines Access and Insurance Position and ...

  15. 12 CFR 563.176 - Interest-rate-risk-management procedures.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interest-rate-risk-management procedures. 563... ASSOCIATIONS-OPERATIONS Financial Management Policies § 563.176 Interest-rate-risk-management procedures... association's management of that risk. (b) The board of directors shall formerly adopt a policy for the...

  16. Misconduct Policies in High-Impact Biomedical Journals

    Science.gov (United States)

    Bosch, Xavier; Hernández, Cristina; Pericas, Juan M.; Doti, Pamela; Marušić, Ana

    2012-01-01

    Background It is not clear which research misconduct policies are adopted by biomedical journals. This study assessed the prevalence and content policies of the most influential biomedical journals on misconduct and procedures for handling and responding to allegations of misconduct. Methods We conducted a cross-sectional study of misconduct policies of 399 high-impact biomedical journals in 27 biomedical categories of the Journal Citation Reports in December 2011. Journal websites were reviewed for information relevant to misconduct policies. Results Of 399 journals, 140 (35.1%) provided explicit definitions of misconduct. Falsification was explicitly mentioned by 113 (28.3%) journals, fabrication by 104 (26.1%), plagiarism by 224 (56.1%), duplication by 242 (60.7%) and image manipulation by 154 (38.6%). Procedures for responding to misconduct were described in 179 (44.9%) websites, including retraction, (30.8%) and expression of concern (16.3%). Plagiarism-checking services were used by 112 (28.1%) journals. The prevalences of all types of misconduct policies were higher in journals that endorsed any policy from editors’ associations, Office of Research Integrity or professional societies compared to those that did not state adherence to these policy-producing bodies. Elsevier and Wiley-Blackwell had the most journals included (22.6% and 14.8%, respectively), with Wiley journals having greater a prevalence of misconduct definition and policies on falsification, fabrication and expression of concern and Elsevier of plagiarism-checking services. Conclusions Only a third of top-ranking peer-reviewed journals had publicly-available definitions of misconduct and less than a half described procedures for handling allegations of misconduct. As endorsement of international policies from policy-producing bodies was positively associated with implementation of policies and procedures, journals and their publishers should standardize their policies globally in order to

  17. Misconduct policies in high-impact biomedical journals.

    Directory of Open Access Journals (Sweden)

    Xavier Bosch

    Full Text Available It is not clear which research misconduct policies are adopted by biomedical journals. This study assessed the prevalence and content policies of the most influential biomedical journals on misconduct and procedures for handling and responding to allegations of misconduct.We conducted a cross-sectional study of misconduct policies of 399 high-impact biomedical journals in 27 biomedical categories of the Journal Citation Reports in December 2011. Journal websites were reviewed for information relevant to misconduct policies.Of 399 journals, 140 (35.1% provided explicit definitions of misconduct. Falsification was explicitly mentioned by 113 (28.3% journals, fabrication by 104 (26.1%, plagiarism by 224 (56.1%, duplication by 242 (60.7% and image manipulation by 154 (38.6%. Procedures for responding to misconduct were described in 179 (44.9% websites, including retraction, (30.8% and expression of concern (16.3%. Plagiarism-checking services were used by 112 (28.1% journals. The prevalences of all types of misconduct policies were higher in journals that endorsed any policy from editors' associations, Office of Research Integrity or professional societies compared to those that did not state adherence to these policy-producing bodies. Elsevier and Wiley-Blackwell had the most journals included (22.6% and 14.8%, respectively, with Wiley journals having greater a prevalence of misconduct definition and policies on falsification, fabrication and expression of concern and Elsevier of plagiarism-checking services.Only a third of top-ranking peer-reviewed journals had publicly-available definitions of misconduct and less than a half described procedures for handling allegations of misconduct. As endorsement of international policies from policy-producing bodies was positively associated with implementation of policies and procedures, journals and their publishers should standardize their policies globally in order to increase public trust in the

  18. Reducing costs while maintaining quality in endovascular neurosurgical procedures.

    Science.gov (United States)

    Kashlan, Osama N; Wilson, Thomas J; Chaudhary, Neeraj; Gemmete, Joseph J; Stetler, William R; Dunnick, N Reed; Thompson, B Gregory; Pandey, Aditya S

    2014-11-01

    As medical costs continue to rise during a time of increasing medical resource utilization, both hospitals and physicians must attempt to limit superfluous health care expenses. Neurointerventional treatment has been shown to be costly, but it is often the best treatment available for certain neuropathologies. The authors studied the effects of 3 policy changes designed to limit the costs of performing neurointerventional procedures at the University of Michigan. The authors retrospectively analyzed the costs of performing neurointerventional procedures during the 6-month periods before and after the implementation of 3 cost-saving policies: 1) the use of an alternative, more economical contrast agent, 2) standardization of coil prices through negotiation with industry representatives to receive economies of scale, and 3) institution of a feedback method to show practitioners the costs of unused products per patient procedure. The costs during the 6-month time intervals before and after implementation were also compared with costs during the most recent 6-month time period. The policy requiring use of a more economical contrast agent led to a decrease in the cost of contrast usage of $42.79 per procedure for the first 6 months after implementation, and $137.09 per procedure for the most current 6-month period, resulting in an estimated total savings of $62,924.31 for the most recent 6-month period. The standardized coil pricing system led to savings of $159.21 per coil after the policy change, and $188.07 per coil in the most recent 6-month period. This yielded total estimated savings of $76,732.56 during the most recent 6-month period. The feedback system for unused items decreased the cost of wasted products by approximately $44.36 per procedure in the 6 months directly after the policy change and by $48.20 per procedure in the most recent 6-month period, leading to total estimated savings of $22,123.80 during the most recent 6-month period. According to

  19. Large-scale automated analysis of news media: a novel computational method for obesity policy research.

    Science.gov (United States)

    Hamad, Rita; Pomeranz, Jennifer L; Siddiqi, Arjumand; Basu, Sanjay

    2015-02-01

    Analyzing news media allows obesity policy researchers to understand popular conceptions about obesity, which is important for targeting health education and policies. A persistent dilemma is that investigators have to read and manually classify thousands of individual news articles to identify how obesity and obesity-related policy proposals may be described to the public in the media. A machine learning method called "automated content analysis" that permits researchers to train computers to "read" and classify massive volumes of documents was demonstrated. 14,302 newspaper articles that mentioned the word "obesity" during 2011-2012 were identified. Four states that vary in obesity prevalence and policy (Alabama, California, New Jersey, and North Carolina) were examined. The reliability of an automated program to categorize the media's framing of obesity as an individual-level problem (e.g., diet) and/or an environmental-level problem (e.g., obesogenic environment) was tested. The automated program performed similarly to human coders. The proportion of articles with individual-level framing (27.7-31.0%) was higher than the proportion with neutral (18.0-22.1%) or environmental-level framing (16.0-16.4%) across all states and over the entire study period (Pnews media was demonstrated. © 2014 The Obesity Society.

  20. 41 CFR 109-27.5007-1 - Procedures.

    Science.gov (United States)

    2010-07-01

    ...-INVENTORY MANAGEMENT 27.50-Inventory Management Policies, Procedures, and Guidelines § 109-27.5007-1 Procedures. The following procedures shall be established for taking physical inventory of stocks subjected to quantity controls as well as those under financial control: (a) Completion of a physical inventory...

  1. Policy, Procedures and Standards for Enterprise Information Management

    Science.gov (United States)

    This policy establishes a standard approach for managing information produced by, funded by, or received per regulated reporting and/or federal-wide requirements and subsequently held or cataloged in information management systems by EPA.

  2. Evaluating the efficiency of divestiture policy in promoting competitiveness using an analytical method and agent-based computational economics

    International Nuclear Information System (INIS)

    Rahimiyan, Morteza; Rajabi Mashhadi, Habib

    2010-01-01

    Choosing a desired policy for divestiture of dominant firms' generation assets has been a challenging task and open question for regulatory authority. To deal with this problem, in this paper, an analytical method and agent-based computational economics (ACE) approach are used for ex-ante analysis of divestiture policy in reducing market power. The analytical method is applied to solve a designed concentration boundary problem, even for situations where the cost data of generators are unknown. The concentration boundary problem is the problem of minimizing or maximizing market concentration subject to operation constraints of the electricity market. It is proved here that the market concentration corresponding to operation condition is certainly viable in an interval calculated by the analytical method. For situations where the cost function of generators is available, the ACE is used to model the electricity market. In ACE, each power producer's profit-maximization problem is solved by the computational approach of Q-learning. The power producer using the Q-learning method learns from past experiences to implicitly identify the market power, and find desired response in competing with the rivals. Both methods are applied in a multi-area power system and effects of different divestiture policies on market behavior are analyzed.

  3. Evaluating the efficiency of divestiture policy in promoting competitiveness using an analytical method and agent-based computational economics

    Energy Technology Data Exchange (ETDEWEB)

    Rahimiyan, Morteza; Rajabi Mashhadi, Habib [Department of Electrical Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad (Iran)

    2010-03-15

    Choosing a desired policy for divestiture of dominant firms' generation assets has been a challenging task and open question for regulatory authority. To deal with this problem, in this paper, an analytical method and agent-based computational economics (ACE) approach are used for ex-ante analysis of divestiture policy in reducing market power. The analytical method is applied to solve a designed concentration boundary problem, even for situations where the cost data of generators are unknown. The concentration boundary problem is the problem of minimizing or maximizing market concentration subject to operation constraints of the electricity market. It is proved here that the market concentration corresponding to operation condition is certainly viable in an interval calculated by the analytical method. For situations where the cost function of generators is available, the ACE is used to model the electricity market. In ACE, each power producer's profit-maximization problem is solved by the computational approach of Q-learning. The power producer using the Q-learning method learns from past experiences to implicitly identify the market power, and find desired response in competing with the rivals. Both methods are applied in a multi-area power system and effects of different divestiture policies on market behavior are analyzed. (author)

  4. Evaluation of Revised Computer-Based Procedure System Prototype

    Energy Technology Data Exchange (ETDEWEB)

    Katya Le Blanc; Johanna Oxstrand; Cheradan Fikstad

    2013-01-01

    The nuclear power industry is very procedure driven, i.e. almost all activities that take place at a nuclear power plant are conducted by following procedures. The paper-based procedures (PBPs) currently used by the industry do a good job at keeping the industry safe. However, these procedures are most often paired with methods and tools put in place to anticipate, prevent, and catch errors related to hands-on work. These tools are commonly called human performance tools. The drawback with the current implementation of these tools is that the task of performing one procedure becomes time and labor intensive. For example, concurrent and independent verification of procedure steps are required at times, which essentially means that at least two people have to be actively involved in the task. Even though the current use of PBPs and human performance tools are keeping the industry safe, there is room for improvement. The industry could potentially increase their efficiency and safety by replacing their existing PBPs with CBPs. If implemented correctly, the CBP system could reduce the time and focus spent on using the human performance tools. Some of the tools can be completely incorporated in the CBP system in a manner that the performer does not think about the fact that these tools are being used. Examples of these tools are procedure use and adherence, placekeeping, and peer checks. Other tools can be partly integrated in a fashion that reduce the time and labor they require, such as concurrent and independent verification. The incorporation of advanced technology, such as CBP systems, may help to manage the effects of aging systems, structures, and components. The introduction of advanced technology may also make the existing LWR fleet more attractive to the future workforce, which will be of importance when the future workforce will chose between existing fleet and the newly built nuclear power plants.

  5. SUPPORTING THE INDUSTRY BY DEVELOPING A DESIGN GUIDANCE FOR COMPUTER-BASED PROCEDURES FOR FIELD WORKERS

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna; LeBlanc, Katya

    2017-06-01

    The paper-based procedures currently used for nearly all activities in the commercial nuclear power industry have a long history of ensuring safe operation of the plants. However, there is potential to greatly increase efficiency and safety by improving how the human interacts with the procedures, which can be achieved through the use of computer-based procedures (CBPs). A CBP system offers a vast variety of improvements, such as context driven job aids, integrated human performance tools and dynamic step presentation. As a step toward the goal of improving procedure use performance, the U.S. Department of Energy Light Water Reactor Sustainability Program researchers, together with the nuclear industry, have been investigating the possibility and feasibility of replacing current paper-based procedures with CBPs. The main purpose of the CBP research conducted at the Idaho National Laboratory was to provide design guidance to the nuclear industry to be used by both utilities and vendors. After studying existing design guidance for CBP systems, the researchers concluded that the majority of the existing guidance is intended for control room CBP systems, and does not necessarily address the challenges of designing CBP systems for instructions carried out in the field. Further, the guidance is often presented on a high level, which leaves the designer to interpret what is meant by the guidance and how to specifically implement it. The authors developed a design guidance to provide guidance specifically tailored to instructions that are carried out in the field based.

  6. 10 CFR 11.5 - Policy.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Policy. 11.5 Section 11.5 Energy NUCLEAR REGULATORY COMMISSION CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL General Provisions § 11.5 Policy. It is the policy of the Nuclear Regulatory Commission to carry...

  7. On the additive splitting procedures and their computer realization

    DEFF Research Database (Denmark)

    Farago, I.; Thomsen, Per Grove; Zlatev, Z.

    2008-01-01

    Two additive splitting procedures are defined and studied in this paper. It is shown that these splitting procedures have good stability properties. Some other splitting procedures, which are traditionally used in mathematical models used in many scientific and engineering fields, are sketched. All...

  8. Procedures for Computing Site Seismicity

    Science.gov (United States)

    1994-02-01

    Fourth World Conference on Earthquake Engineering, Santiago, Chile , 1969. Schnabel, P.B., J. Lysmer, and H.B. Seed (1972). SHAKE, a computer program for...This fault system is composed of the Elsinore and Whittier fault zones, Agua Caliente fault, and Earthquake Valley fault. Five recent earthquakes of

  9. Sagittal reconstruction computed tomography in metrizamide cisternography. Useful diagnostic procedure for malformations in craniovertebral junction and posterior fossa

    Energy Technology Data Exchange (ETDEWEB)

    Mochizuki, H.; Okita, N.; Fujii, T.; Yoshioka, M.; Saito, H. (Tohoku Univ., Sendai (Japan). School of Medicine)

    1982-08-01

    We studied the sagittal reconstruction technique in computed tomography with metrizamide. Ten ml of metrizamide, 170 mg iodine/ml in concentration, were injected by lumbar puncture. After diffusion of the injected metrizamide, axial computed tomograms were taken by thin slice width (5 mm) with overlapped technique. Then electrical sagittal reconstruction was carried out by optioned software. Injection of metrizamide, non-ionic water soluble contrast media, made clear contrasts among bone, brain parenchyma and cerebrospinal fluid with computed tomography. Sagittal reconstruction technique could reveal more precise details and accurate anatomical relations than ordinary axial computed tomography. This technique was applied on 3 cases (Arnold-Chiari malformation, large cisterna magna and partial agenesis cerebellar vermis), which demonstrated a useful diagnostic procedure for abnormalities of craniovertebral junction and posterior fossa. The adverse reactions of metrizamide were negligible in our series.

  10. Cone-beam computed tomography imaging: therapeutic staff dose during chemoembolisation procedure

    International Nuclear Information System (INIS)

    Paul, Jijo; Vogl, Thomas J; Chacko, Annamma; Mbalisike, Emmanuel C

    2014-01-01

    Cone-beam computed tomography (CBCT) imaging is an important requirement to perform real-time therapeutic image-guided procedures on patients. The purpose of this study is to estimate the personal-dose-equivalent and annual-personal-dose from CBCT imaging during transarterial chemoembolisation (TACE). Therapeutic staff doses (therapeutic and assistant physician) were collected during 200 patient (65  ±  15 years, range: 40–86) CBCT examinations over six months. Absorbed doses were assessed using thermo-luminescent dosimeters during patient hepatic TACE therapy. We estimated personal-dose-equivalent (PDE) and annual-personal-dose (APD) from absorbed dose based on international atomic energy agency protocol. APD for therapeutic procedure was calculated (therapeutic physician: 5.6 mSv; assistant physician: 5.08 mSv) based on institutional work load. Regarding PDE, the hands of the staff members received a greater dose compared to other anatomical locations (therapeutic physician: 56 mSv, 72 mSv; assistant physician: 12 mSv, 14 mSv). Annual radiation doses to the eyes and hands of the staff members were lower compared to the prescribed limits by the International Commission on Radiological Protection (ICRP). PDE and APD of both therapeutic staff members were within the recommended ICRP-103 annual limit. Dose to the assistant physician was lower than the dose to the therapeutic physician during imaging. Annual radiation doses to eye-lenses and hands of both staff members were lower than prescribed limits. (paper)

  11. Policy revision in health enterprise information security: P3WG final report

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2003-05-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.

  12. A study on the alternative option for nuclear policy

    International Nuclear Information System (INIS)

    Choi, J. W.; Choi, H. J.; Lee, J. Y.; Cho, D. K.; Jeon, K. S.; Park, S. W.; Hahn, D. H.; Yoon, J. S.; Lee, K. S.

    2008-02-01

    Since a decision-making by intuitive judgement under uncertain future conditions can not select an optimum alternative, reaching an agreement for alternatives between experts requires a development of several scientific opinion collection methodologies and performing these methodologies. Therefore, opinion collection for all points related to the nuclear energy, public hearing induction related researches and the acts, procedure, etc. performed in developed countries such as U.S, U.K, France, etc. are reviewed and analyzed in this research. And after the analysis of domestic spent nuclear fuel management plan, Task Force Team composed of experts in several related areas is organized to suggest strategies and directions which are necessary for making a national policy. Beside, Task Force Team selects an optimum technical alternative by the analysis and comparison in depth between these technical alternatives to establish the policy direction. They also established the procedures such as opinion collecting, etc. through policy conference and forum and suggested the technical data related nuclear policy which supports the nuclear policy conference. Results from this research are expected to decrease the trial and error that has been occurred in the present policy-making procedure such as radioactive waste repository related procedure and contribute for socio-cultural stability. Moreover, opinion collection plan for developing a nuclear policy alternative is expected to contribute for making a nuclear policy in the nuclear policy conference so that the nuclear technology will be enhanced more

  13. A study on the alternative option for nuclear policy

    Energy Technology Data Exchange (ETDEWEB)

    Choi, J. W.; Choi, H. J.; Lee, J. Y.; Cho, D. K.; Jeon, K. S.; Park, S. W.; Hahn, D. H.; Yoon, J. S.; Lee, K. S. [KAERI, Daejeon (Korea, Republic of)

    2008-02-15

    Since a decision-making by intuitive judgement under uncertain future conditions can not select an optimum alternative, reaching an agreement for alternatives between experts requires a development of several scientific opinion collection methodologies and performing these methodologies. Therefore, opinion collection for all points related to the nuclear energy, public hearing induction related researches and the acts, procedure, etc. performed in developed countries such as U.S, U.K, France, etc. are reviewed and analyzed in this research. And after the analysis of domestic spent nuclear fuel management plan, Task Force Team composed of experts in several related areas is organized to suggest strategies and directions which are necessary for making a national policy. Beside, Task Force Team selects an optimum technical alternative by the analysis and comparison in depth between these technical alternatives to establish the policy direction. They also established the procedures such as opinion collecting, etc. through policy conference and forum and suggested the technical data related nuclear policy which supports the nuclear policy conference. Results from this research are expected to decrease the trial and error that has been occurred in the present policy-making procedure such as radioactive waste repository related procedure and contribute for socio-cultural stability. Moreover, opinion collection plan for developing a nuclear policy alternative is expected to contribute for making a nuclear policy in the nuclear policy conference so that the nuclear technology will be enhanced more.

  14. 77 FR 44174 - Procedures for Safety Investigations

    Science.gov (United States)

    2012-07-27

    ... of safety investigations. The rule is intended to state clearly the Board's policy and procedures for... statutory authority, when appropriate, following standard safety investigation policies, practices, and... has adhered to the regulatory philosophy and the applicable principles of regulation as set forth in...

  15. 49 theses on energy policy

    International Nuclear Information System (INIS)

    Michaelis, H.

    1977-01-01

    The theses presented refer to the following subjects: 1) economic growth and energy consumption, 2) energy policy and primary energies, 3) nuclear energy, 4) licensing procedures, 5) administrative problems, 6) international integration of energy policy, and 7) long-term forecasts. (GG) [de

  16. Reduction of radiation doses in leg lengthening procedures by means of audit and computed tomography scanogram techniques

    International Nuclear Information System (INIS)

    Romanowski, C.A.J.; Sprigg, A.; Underwood, A.C.

    1994-01-01

    Children with congenital bone dysplasias may benefit from leg lengthening procedures. Such procedures, by necessity, require frequent and regular imaging. It is necessary to minimize the total radiation dose to these patients, and particularly the dose to the gonads. In the present study, the films of 13 patients who had completed leg lengthening procedures were reviewed. The number of films was assessed together with the use of appropriate gonad shielding. In a second part of the study, thermoluminescent dosemeter measurements of radiation doses to a phantom were made for both plain radiographs (with and without gonad protection) and computed tomography (CT) scanograms. The results show that audit plays an important role in assessing radiographic practice with respect to accurate placement of gonad protection and confirm that a significant dose reduction can be accomplished by careful use of this lead shielding. Dose reduction can also be achieved by using alternative radiographic techniques such as CT scanograms. (author)

  17. Corporate Policies and Procedures on Advertising & Promotion. Report of the Sub-Council on Advertising and Promotion of the National Business Council for Consumer Affairs.

    Science.gov (United States)

    National Business Council for Consumer Affairs, Washington, DC.

    This report is the result of efforts to encourage thoughtful individual corporate action in maintaining up-to-date internal policies and procedures relating to the functions of advertising and promotion. Information for the report was gathered by sending letters to the chief executives of major national advertisers requesting a personal review of…

  18. Computational and Statistical Models: A Comparison for Policy Modeling of Childhood Obesity

    Science.gov (United States)

    Mabry, Patricia L.; Hammond, Ross; Ip, Edward Hak-Sing; Huang, Terry T.-K.

    As systems science methodologies have begun to emerge as a set of innovative approaches to address complex problems in behavioral, social science, and public health research, some apparent conflicts with traditional statistical methodologies for public health have arisen. Computational modeling is an approach set in context that integrates diverse sources of data to test the plausibility of working hypotheses and to elicit novel ones. Statistical models are reductionist approaches geared towards proving the null hypothesis. While these two approaches may seem contrary to each other, we propose that they are in fact complementary and can be used jointly to advance solutions to complex problems. Outputs from statistical models can be fed into computational models, and outputs from computational models can lead to further empirical data collection and statistical models. Together, this presents an iterative process that refines the models and contributes to a greater understanding of the problem and its potential solutions. The purpose of this panel is to foster communication and understanding between statistical and computational modelers. Our goal is to shed light on the differences between the approaches and convey what kinds of research inquiries each one is best for addressing and how they can serve complementary (and synergistic) roles in the research process, to mutual benefit. For each approach the panel will cover the relevant "assumptions" and how the differences in what is assumed can foster misunderstandings. The interpretations of the results from each approach will be compared and contrasted and the limitations for each approach will be delineated. We will use illustrative examples from CompMod, the Comparative Modeling Network for Childhood Obesity Policy. The panel will also incorporate interactive discussions with the audience on the issues raised here.

  19. Public policy, rationality and reason

    Directory of Open Access Journals (Sweden)

    Rodolfo Canto Sáenz

    2015-07-01

    Full Text Available This work suggests the incorporation of practical reason in the design, implementation and evaluation of public policies, alongside instrumental rationality. It takes two proposals that today point in this direction: Rawls distinction between reasonable (practical reason and rational (instrumental reason and what this author calls the CI Procedure (categorical imperative procedure and Habermas model of deliberative democracy. The main conclusion is that the analysis of public policies can not be limited to rather narrow limits of science, but requires the contribution of political and moral philosophy.

  20. 48 CFR 2832.903 - Policy.

    Science.gov (United States)

    2010-10-01

    ... 2832.903 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General Contracting Requirements CONTRACT FINANCING Prompt Payment 2832.903 Policy. The HCA is responsible for promulgating policies and procedures to implement FAR 32.9 and to ensure that, when specifying due dates, full consideration will be...

  1. Procedural Rhetoric and Undocumented Migrants: Playing the Debate over Immigration Reform

    Directory of Open Access Journals (Sweden)

    Osvaldo Cleger

    2015-04-01

    Full Text Available The main purpose of this article is to analyze how a representative selection of computer games, set mostly in a Latin American context or at the US-Mexico border, are capable of mounting arguments about immigration policy by making good or poor uses of what Ian Bogost has conceptualized as “procedural rhetoric” (Bogost 2007. In other words, my goal in this article is to explore to what extent videogames can be effectively persuasive in the way they manage to create a computational representation of the experience of migrating, and its associated consequences, independently of the legal or illegal status of such displacements. This article revises current research on procedural representation to offer a detailed analysis of a representative selection of digital games dealing with this particular issue (Border Patrol, Tropico (I-IV, ICED!, Rescate: Alicia Croft, and Papers, Please. Finally, I will show how two commercial games produced mostly for entertainment purposes (such as Tropico and Papers, Please can be more effective at mounting a procedural argument and, plausibly, at influencing players’ opinions on a particular issue than a “serious game” (such as ICED!. Based on this analysis, I propose to move beyond this distinction between entertaining and serious to focus on what is particular about videogames in general, that can make them into more efficient tools to disseminate ideas and provide players with more opportunities for experiential learning.

  2. 48 CFR 323.7100 - Policy.

    Science.gov (United States)

    2010-10-01

    ... ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Green Purchasing Requirements 323.7100 Policy. (a) The HHS guidelines and procedures for “green... Program Managers, are responsible for establishing the necessary local procedures and appropriate training...

  3. Comprehensive optimisation of China’s energy prices, taxes and subsidy policies based on the dynamic computable general equilibrium model

    International Nuclear Information System (INIS)

    He, Y.X.; Liu, Y.Y.; Du, M.; Zhang, J.X.; Pang, Y.X.

    2015-01-01

    Highlights: • Energy policy is defined as a complication of energy price, tax and subsidy policies. • The maximisation of total social benefit is the optimised objective. • A more rational carbon tax ranges from 10 to 20 Yuan/ton under the current situation. • The optimal coefficient pricing is more conducive to maximise total social benefit. - Abstract: Under the condition of increasingly serious environmental pollution, rational energy policy plays an important role in the practical significance of energy conservation and emission reduction. This paper defines energy policies as the compilation of energy prices, taxes and subsidy policies. Moreover, it establishes the optimisation model of China’s energy policy based on the dynamic computable general equilibrium model, which maximises the total social benefit, in order to explore the comprehensive influences of a carbon tax, the sales pricing mechanism and the renewable energy fund policy. The results show that when the change rates of gross domestic product and consumer price index are ±2%, ±5% and the renewable energy supply structure ratio is 7%, the more reasonable carbon tax ranges from 10 to 20 Yuan/ton, and the optimal coefficient pricing mechanism is more conducive to the objective of maximising the total social benefit. From the perspective of optimising the overall energy policies, if the upper limit of change rate in consumer price index is 2.2%, the existing renewable energy fund should be improved

  4. 32 CFR 191.6 - Procedures.

    Science.gov (United States)

    2010-07-01

    .... (7) Develop procedures for and implement a program to eliminate sexual harassment in Component work places, consistent with DoD Policy on Sexual Harassment memorandums, and to ensure compliance with the...

  5. Computer incident response and forensics team management conducting a successful incident response

    CERN Document Server

    Johnson, Leighton

    2013-01-01

    Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components. Provides readers with a complete handbook on computer incident response from the perspective of forensics team management Identify the key steps to completing a successful computer incident response investigation Defines the qualities necessary to become a succ...

  6. Micro Declared Language Policy or Not?: Language-Policy-Like Statements in the Rules of Procedure of the Rwandan Parliament

    Science.gov (United States)

    Gafaranga, Joseph; Niyomugabo, Cyprien; Uwizeyimana, Valentin

    2013-01-01

    An invitation to integrate macro and micro level analyses has been extended to researchers as this integration is felt to be the way forward for language policy research (Ricento, Ideology, politics and language policies: Focus on english, John Benjamins, Amsterdam, 2000). In turn, the notion of 'micro' in language policy has been specified as…

  7. THE COMPUTER SYSTEM PROVIDES A SIMPLER QUALITY SERVICES IN THE CUSTOMS PROCEDURE

    Directory of Open Access Journals (Sweden)

    Stanka Preskar

    2013-10-01

    Full Text Available With Slovenia joining the EU the need for higher quality and faster transit transport of goods through customs procedures has increased. This paper presents the recent logistics approach, which allows a better link between transportation and freight forwarding. Modern computer programs used by forwarding companies have contributed to this. Forwarder companies may have a role of organizer or a place using the transport services of customs clearance of goods at the entry / exit to / from the European Union. Each type of transport has a role to play, but gets even stronger when combined under one category. This is a multimodal transport. As an example we use logistic work in a logistic company. Here the work is divided in to transit of goods, customs clearance of goods, but also touching the law and the ranking of goods by tariff codes.

  8. European Union Climate Change Policy: in the nexus of internal policy-making and itnernational negotiations

    OpenAIRE

    Cao, Hui

    2012-01-01

    The aim of the dissertation is to examine the European Union s climate policy in the nexus of domestic policy-making and international negotiations. I firstly test the EU s internal climate policy-making by applying the rational choice institutionalism on the model of institution and preference affect EU s policy outcomes and conclude that: as the EU has a convergent preference, the EU s unique decision-making procedure, the entrepreneurship and EU s membership had been driving EU s climate...

  9. Comparison of different computer-assisted evaluation procedures of thallium-201 myocardial scintigrammes in the diagnosis of coronary diseases

    International Nuclear Information System (INIS)

    Traurig, G.D.

    1981-01-01

    The aim of this investigation was to compare five different methods of evaluation of myocardial scintiscanning with each other as to their value in the diagnosis of coronary diseases, and to work out recommendations for routine diagnostics. Coronary angiography and ventriculography were used as methods of reference. In two evaluation procedures the scintigrammes, upon computer processing, were judged by the investigator according to optical criteria, three further evaluation methods were predominantly computer-oriented and were to provide semiquantitative results less influenced by the investigator's subjectivity. A further aim of the investigation consisted in verifying the author's own results and comparing them with the literature. (orig.) [de

  10. Portal circulation following the Warren procedure. Long-term follow-up by computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Gostner, P; Fugazzola, C; Martin, F; Marzoli, G P

    1986-06-01

    Computed tomography with contrast injection was carried out in 18 patients who had undergone a Warren procedure for portal hypertension due to cirrhosis of the liver more than five years previously. The results show that it is not possible to drain only a part of the venous portal territory. The portal circulation does not consist of two portions, with different pressure relationships. Pressure difference across the splenorenal anastomosis is greater than that into the mediastinal veins. Postoperative development of a hepatofugal circulation continues for a long period and is not confined to the early phase only. This phenomenon is, however, not uniform. In particular, there are variations in the extent of the collateral circulation and in the maintenance of liver blood flow.

  11. 37 CFR 204.5 - Procedures for requesting access to records.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Procedures for requesting access to records. 204.5 Section 204.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PRIVACY ACT: POLICIES AND PROCEDURES § 204.5 Procedures for...

  12. Procedure generation and verification

    International Nuclear Information System (INIS)

    Sheely, W.F.

    1986-01-01

    The Department of Energy has used Artificial Intelligence of ''AI'' concepts to develop two powerful new computer-based techniques to enhance safety in nuclear applications. The Procedure Generation System, and the Procedure Verification System, can be adapted to other commercial applications, such as a manufacturing plant. The Procedure Generation System can create a procedure to deal with the off-normal condition. The operator can then take correct actions on the system in minimal time. The Verification System evaluates the logic of the Procedure Generator's conclusions. This evaluation uses logic techniques totally independent of the Procedure Generator. The rapid, accurate generation and verification of corrective procedures can greatly reduce the human error, possible in a complex (stressful/high stress) situation

  13. Procedural Memory: Computer Learning in Control Subjects and in Parkinson’s Disease Patients

    Directory of Open Access Journals (Sweden)

    C. Thomas-Antérion

    1996-01-01

    Full Text Available We used perceptual motor tasks involving the learning of mouse control by looking at a Macintosh computer screen. We studied 90 control subjects aged between sixteen and seventy-five years. There was a significant time difference between the scales of age but improvement was the same for all subjects. We also studied 24 patients with Parkinson's disease (PD. We observed an influence of age and also of educational levels. The PD patients had difficulties of learning in all tests but they did not show differences in time when compared to the control group in the first learning session (Student's t-test. They learned two or four and a half times less well than the control group. In the first test, they had some difficulty in initiating the procedure and learned eight times less well than the control group. Performances seemed to be heterogeneous: patients with only tremor (seven and patients without treatment (five performed better than others but learned less. Success in procedural tasks for the PD group seemed to depend on the capacity to initiate the response and not on the development of an accurate strategy. Many questions still remain unanswered, and we have to study different kinds of implicit memory tasks to differentiate performance in control and basal ganglia groups.

  14. Requirements for Computer Based-Procedures for Nuclear Power Plant Field Operators. Results from a Qualitative Study

    International Nuclear Information System (INIS)

    Le Blanc, Katya; Oxstrand, J.H.; Waicosky, T.

    2012-01-01

    Although computer-based procedures (CBPs) have been investigated as a way to enhance operator performance on procedural tasks in the nuclear industry for almost thirty years, they are not currently widely deployed at United States utilities. One of the barriers to the wide scale deployment of CBPs is the lack of operational experience with CBPs that could serve as a sound basis for justifying the use of CBPs for nuclear utilities. Utilities are hesitant to adopt CBPs because of concern over potential costs of implementation, and concern over regulatory approval. Regulators require a sound technical basis for the use of any procedure at the utilities; without operating experience to support the use CBPs, it is difficult to establish such a technical basis. In an effort to begin the process of developing a technical basis for CBPs, researchers at Idaho National Laboratory are partnering with industry to explore CBPs with the objective of defining requirements for CBPs and developing an industry-wide vision and path forward for the use of CBPs. This paper describes the results from a qualitative study aimed at defining requirements for CBPs to be used by field operators and maintenance technicians. (author)

  15. New Procedures for the Management of Computer Accounts

    CERN Multimedia

    2006-01-01

    In today's computing environment where there is a permanent threat of computer security incidents, it is vitally important to control who has access to CERN's computing infrastructure. To obtain a computer account people are already required to be registered at CERN but until now the closing of accounts has relied on an annual review carried out by the group administrators. This process is now being automated and linked into the CERN registration database. The account review will run permanently and trigger action both when an account is unused and when a person's contract is soon to end. Advance warning of actions to be taken will be sent to both users and their supervisors: when an account has been unused for 6 months the account will be blocked. A year later, after a second warning, the account will be deleted; when a person's association with CERN comes to an end (based on the 'end date' in the official registration database) their computer accounts will be blocked. For most members of the personnel t...

  16. New Procedures for the Management of Computer Accounts

    CERN Multimedia

    2006-01-01

    In today's computing environment where there is a permanent threat of computer security incidents, it is vitally important to control who has access to CERN's computing infrastructure. To obtain a computer account it is already required that people be registered at CERN but up till now closing of accounts has relied on an annual review carried out by the group administrators. This process is now being automated and linked into the CERN registration database. The account review will run permanently and trigger action both when an account is unused and when a person's contract is soon to end. Advance warning of actions to be taken will be sent to both users and their supervisors: when an account has been unused for 6 months the account will be blocked. A year later, after a second warning, the account will be deleted; when a person's association with CERN comes to an end (based on the 'end date' in the official registration database) their computer accounts will be blocked. For most members of the personnel...

  17. 48 CFR 1804.470-2 - Policy.

    Science.gov (United States)

    2010-10-01

    ...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...

  18. Manual on service business for policy research

    International Nuclear Information System (INIS)

    1999-01-01

    The contents of this book are summary of service business for policy research : conception classification and ways of service business for policy research, propel procedure of service business for policy research on system of committee, management, choice, contract, evaluation and post management, related regulation on service business for policy research : management regulation on service business for policy research, guide of evaluation for service business for policy research, estimation standard of policy research cost, law arrangement of national contract, required document on service business for policy research, and application manual for PRISM.

  19. 48 CFR 227.7202-1 - Policy.

    Science.gov (United States)

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  20. Federated Tensor Factorization for Computational Phenotyping

    Science.gov (United States)

    Kim, Yejin; Sun, Jimeng; Yu, Hwanjo; Jiang, Xiaoqian

    2017-01-01

    Tensor factorization models offer an effective approach to convert massive electronic health records into meaningful clinical concepts (phenotypes) for data analysis. These models need a large amount of diverse samples to avoid population bias. An open challenge is how to derive phenotypes jointly across multiple hospitals, in which direct patient-level data sharing is not possible (e.g., due to institutional policies). In this paper, we developed a novel solution to enable federated tensor factorization for computational phenotyping without sharing patient-level data. We developed secure data harmonization and federated computation procedures based on alternating direction method of multipliers (ADMM). Using this method, the multiple hospitals iteratively update tensors and transfer secure summarized information to a central server, and the server aggregates the information to generate phenotypes. We demonstrated with real medical datasets that our method resembles the centralized training model (based on combined datasets) in terms of accuracy and phenotypes discovery while respecting privacy. PMID:29071165

  1. Policies and strategies for radioactive waste management

    International Nuclear Information System (INIS)

    2009-01-01

    (organizational, technical and legislative), and on future needs and waste arisings. The technical procedures proposed for the waste types in the country should be politically, technically and economically feasible. When selecting a set of technological procedures, an appropriate end point must be identified, usually a suitable disposal option. The steps in formulating and implementing the strategy include selecting the technological procedures, allocating the responsibility for implementing the identified procedures, establishing supervisory mechanisms and developing implementation plans. Policies and strategies may need to be updated because of new national circumstances (legislative changes, plans for new nuclear facilities), new international agreements and/or experience obtained with the original policy and strategy. The lead in making changes should be taken by the body responsible for the initial formulation of the policy (government) and strategy (waste management organization); but all relevant parties in the country should be involved and consulted in this process. (author)

  2. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  3. The computation of equating errors in international surveys in education.

    Science.gov (United States)

    Monseur, Christian; Berezner, Alla

    2007-01-01

    Since the IEA's Third International Mathematics and Science Study, one of the major objectives of international surveys in education has been to report trends in achievement. The names of the two current IEA surveys reflect this growing interest: Trends in International Mathematics and Science Study (TIMSS) and Progress in International Reading Literacy Study (PIRLS). Similarly a central concern of the OECD's PISA is with trends in outcomes over time. To facilitate trend analyses these studies link their tests using common item equating in conjunction with item response modelling methods. IEA and PISA policies differ in terms of reporting the error associated with trends. In IEA surveys, the standard errors of the trend estimates do not include the uncertainty associated with the linking step while PISA does include a linking error component in the standard errors of trend estimates. In other words, PISA implicitly acknowledges that trend estimates partly depend on the selected common items, while the IEA's surveys do not recognise this source of error. Failing to recognise the linking error leads to an underestimation of the standard errors and thus increases the Type I error rate, thereby resulting in reporting of significant changes in achievement when in fact these are not significant. The growing interest of policy makers in trend indicators and the impact of the evaluation of educational reforms appear to be incompatible with such underestimation. However, the procedure implemented by PISA raises a few issues about the underlying assumptions for the computation of the equating error. After a brief introduction, this paper will describe the procedure PISA implemented to compute the linking error. The underlying assumptions of this procedure will then be discussed. Finally an alternative method based on replication techniques will be presented, based on a simulation study and then applied to the PISA 2000 data.

  4. 7 CFR 1737.41 - Procedure for obtaining approval.

    Science.gov (United States)

    2010-01-01

    ... RUS financing. (3) The proposed interim financing presents unacceptable loan security risks to RUS, or..., DEPARTMENT OF AGRICULTURE PRE-LOAN POLICIES AND PROCEDURES COMMON TO INSURED AND GUARANTEED TELECOMMUNICATIONS LOANS Interim Financing of Construction of Telephone Facilities § 1737.41 Procedure for obtaining...

  5. PRINCIPLES AND PROCEDURES ON FISCAL

    Directory of Open Access Journals (Sweden)

    Morar Ioan Dan

    2011-07-01

    Full Text Available Fiscal science advertise in most analytical situations, while the principles reiterated by specialists in the field in various specialized works The two components of taxation, the tax system relating to the theoretical and the practical procedures relating to tax are marked by frequent references and invocations of the underlying principles to tax. This paper attempts a return on equity fiscal general vision as a principle often invoked and used to justify tax policies, but so often violated the laws fiscality . Also want to emphasize the importance of devising procedures to ensure fiscal equitable treatment of taxpayers. Specific approach of this paper is based on the notion that tax equity is based on equality before tax and social policies of the executive that would be more effective than using the other tax instruments. I want to emphasize that if the scientific approach to justify the unequal treatment of the tax law is based on the various social problems of the taxpayers, then deviates from the issue of tax fairness justification explaining the need to promote social policies usually more attractive to taxpayers. Modern tax techniques are believed to be promoted especially in order to ensure an increasing level of high efficiency at the expense of the taxpayers obligations to ensure equality before the law tax. On the other hand, tax inequities reaction generates multiple recipients from the first budget plan, but finalities unfair measures can not quantify and no timeline for the reaction, usually not known. But while statistics show fluctuations in budgetary revenues and often find in literature reviews and analysis relevant to a connection between changes in government policies, budget execution and outcome. The effects of inequality on tax on tax procedures and budgetary revenues are difficult to quantify and is among others to this work. Providing tax equity without combining it with the principles of discrimination and neutrality

  6. 16 CFR 1.1 - Policy.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Policy. 1.1 Section 1.1 Commercial Practices FEDERAL TRADE COMMISSION ORGANIZATION, PROCEDURES AND RULES OF PRACTICE GENERAL PROCEDURES Industry... substantial or novel question of fact or law and there is no clear Commission or court precedent; or (2) The...

  7. Procedures for Computing Transonic Flows for Control of Adaptive Wind Tunnels. Ph.D. Thesis - Technische Univ., Berlin, Mar. 1986

    Science.gov (United States)

    Rebstock, Rainer

    1987-01-01

    Numerical methods are developed for control of three dimensional adaptive test sections. The physical properties of the design problem occurring in the external field computation are analyzed, and a design procedure suited for solution of the problem is worked out. To do this, the desired wall shape is determined by stepwise modification of an initial contour. The necessary changes in geometry are determined with the aid of a panel procedure, or, with incident flow near the sonic range, with a transonic small perturbation (TSP) procedure. The designed wall shape, together with the wall deflections set during the tunnel run, are the input to a newly derived one-step formula which immediately yields the adapted wall contour. This is particularly important since the classical iterative adaptation scheme is shown to converge poorly for 3D flows. Experimental results obtained in the adaptive test section with eight flexible walls are presented to demonstrate the potential of the procedure. Finally, a method is described to minimize wall interference in 3D flows by adapting only the top and bottom wind tunnel walls.

  8. 48 CFR 1503.500-71 - Procedures.

    Science.gov (United States)

    2010-10-01

    ... for: (1) A written code of business ethics and conduct and an ethics training program for all employees; (2) Periodic reviews of company business practices, procedures, policies and internal controls...

  9. Innovative procedure for computer-assisted genioplasty: three-dimensional cephalometry, rapid-prototyping model and surgical splint.

    Science.gov (United States)

    Olszewski, R; Tranduy, K; Reychler, H

    2010-07-01

    The authors present a new procedure of computer-assisted genioplasty. They determined the anterior, posterior and inferior limits of the chin in relation to the skull and face with the newly developed and validated three-dimensional cephalometric planar analysis (ACRO 3D). Virtual planning of the osteotomy lines was carried out with Mimics (Materialize) software. The authors built a three-dimensional rapid-prototyping multi-position model of the chin area from a medical low-dose CT scan. The transfer of virtual information to the operating room consisted of two elements. First, the titanium plates on the 3D RP model were pre-bent. Second, a surgical guide for the transfer of the osteotomy lines and the positions of the screws to the operating room was manufactured. The authors present the first case of the use of this model on a patient. The postoperative results are promising, and the technique is fast and easy-to-use. More patients are needed for a definitive clinical validation of this procedure. Copyright 2010 International Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. Moderation of Policy-Making? : Science and Technology Policy Evaluation Beyond Impact Measurement—the Case of Germany

    NARCIS (Netherlands)

    Kuhlmann, Stefan

    1998-01-01

    In the field of science and technology policies, for the most part, evaluation procedures are utilized as a way of measuring the scientific and technological quality or the socio-economic impacts of publicly funded research. Beyond this practice, could evaluation procedures be used as a medium for

  12. Emission computed tomography

    International Nuclear Information System (INIS)

    Budinger, T.F.; Gullberg, G.T.; Huesman, R.H.

    1979-01-01

    This chapter is devoted to the methods of computer assisted tomography for determination of the three-dimensional distribution of gamma-emitting radionuclides in the human body. The major applications of emission computed tomography are in biological research and medical diagnostic procedures. The objectives of these procedures are to make quantitative measurements of in vivo biochemical and hemodynamic functions

  13. The concept of the conservative operating policy

    International Nuclear Information System (INIS)

    Idita, S.A.

    1997-01-01

    In the context of the nuclear operating environment, the conservative operating policy is one that promotes a culture of moderation and caution. This policy requires compliance with the intent of the Reactor Operation Licence (ROL) and adherence with the limitations stipulated in the facility Operating Policies and Principles (OPP). While ROL is the document prescribing the laws governing the operation and maintenance the OPP are the statements defining the boundaries within which the facility will be operated. A conservative operating policy, that is well understood by all plant facility personnel provides assurance that plant operation and maintenance will be carried out in compliance with approved operating and maintenance procedures. In an abnormal plant operating situation where OPP's may be challenged, the provision of 'Abnormal Plant Operating Procedures' (APOP's) will stipulate actions designed to return the plant to a condition where normal procedures can be followed i.e. acceptably within OPP limitations. When in a NPP an operating scenario will develop where the the situation is not covered by normal approved operating procedures a conservative operating policy will empower the duty Shift Supervisor (SS) to initiate actions that will move the plant in the 'safe direction'. The paper enumerates the decisions which the SS has to make in order to ensure that the reactor power is correctly controlled, the reactor fuel remains cooled and the radioactivity remains contained. It is stressed that a corporate operating policy will be of little use if its existence is known only by corporate management. To be effective, and to be instrumental in the promotion of a facility safety culture, the conservative operating philosophy must be known about and fully understood by all personnel working at a nuclear facility. It is up to management to 'get the word out' and lead by example. (author)

  14. 48 CFR 215.402 - Pricing policy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Pricing policy. 215.402... OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 215.402 Pricing policy. Follow the procedures at PGI 215.402 when conducting cost or price analysis, particularly...

  15. Right and Goods: Procedural Liberalism and Educational Policy

    Science.gov (United States)

    Johnston, James Scott

    2007-01-01

    In this essay, James Scott Johnston asks what sort of liberalism is best for the educational systems of early twenty-first century, late capitalistic democratic nations, looking at the procedural liberalism extant. Two major models are John Rawls's Justice as Fairness and Jurgen Habermas's Communicative Action. Both owe their foundational…

  16. Student Non-Academic Discipline Procedures at Canadian Universities.

    Science.gov (United States)

    Williams, Tom; Schiralli, Martin

    1993-01-01

    Surveyed nonacademic disciplinary procedures in 50 Canadian universities through interviews and examination of written policies and procedures. Compared and contrasted such aspects as (1) authority for adjudicating and resolving cases; (2) scope of review mechanisms (just students or entire university community); (3) appeal process; (4) nature of…

  17. Computer Simulation Model to Train Medical Personnel on Glucose Clamp Procedures.

    Science.gov (United States)

    Maghoul, Pooya; Boulet, Benoit; Tardif, Annie; Haidar, Ahmad

    2017-10-01

    A glucose clamp procedure is the most reliable way to quantify insulin pharmacokinetics and pharmacodynamics, but skilled and trained research personnel are required to frequently adjust the glucose infusion rate. A computer environment that simulates glucose clamp experiments can be used for efficient personnel training and development and testing of algorithms for automated glucose clamps. We built 17 virtual healthy subjects (mean age, 25±6 years; mean body mass index, 22.2±3 kg/m 2 ), each comprising a mathematical model of glucose regulation and a unique set of parameters. Each virtual subject simulates plasma glucose and insulin concentrations in response to intravenous insulin and glucose infusions. Each virtual subject provides a unique response, and its parameters were estimated from combined intravenous glucose tolerance test-hyperinsulinemic-euglycemic clamp data using the Bayesian approach. The virtual subjects were validated by comparing their simulated predictions against data from 12 healthy individuals who underwent a hyperglycemic glucose clamp procedure. Plasma glucose and insulin concentrations were predicted by the virtual subjects in response to glucose infusions determined by a trained research staff performing a simulated hyperglycemic clamp experiment. The total amount of glucose infusion was indifferent between the simulated and the real subjects (85±18 g vs. 83±23 g; p=NS) as well as plasma insulin levels (63±20 mU/L vs. 58±16 mU/L; p=NS). The virtual subjects can reliably predict glucose needs and plasma insulin profiles during hyperglycemic glucose clamp conditions. These virtual subjects can be used to train personnel to make glucose infusion adjustments during clamp experiments. Copyright © 2017 Diabetes Canada. Published by Elsevier Inc. All rights reserved.

  18. Hanford general employee training: Computer-based training instructor's manual

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    The Computer-Based Training portion of the Hanford General Employee Training course is designed to be used in a classroom setting with a live instructor. Future references to this course'' refer only to the computer-based portion of the whole. This course covers the basic Safety, Security, and Quality issues that pertain to all employees of Westinghouse Hanford Company. The topics that are covered were taken from the recommendations and requirements for General Employee Training as set forth by the Institute of Nuclear Power Operations (INPO) in INPO 87-004, Guidelines for General Employee Training, applicable US Department of Energy orders, and Westinghouse Hanford Company procedures and policy. Besides presenting fundamental concepts, this course also contains information on resources that are available to assist students. It does this using Interactive Videodisk technology, which combines computer-generated text and graphics with audio and video provided by a videodisk player.

  19. Identification of the Procedural Accidents During Root Canal Preparation Using Digital Intraoral Radiography and Cone Beam Computed Tomography

    OpenAIRE

    Csinszka K.-Ivácson A.-; Maria Monea Adriana; Monica Monea; Mihai Pop; Angela Borda

    2016-01-01

    Crown or root perforation, ledge formation, fractured instruments and perforation of the roots are the most important accidents which appear during endodontic therapy. Our objective was to evaluate the value of digital intraoral periapical radiographs compared to cone beam computed tomography images (CBCT) used to diagnose some procedural accidents. Material and methods: Eleven extracted molars were used in this study. A total of 18 perforations and 13 ledges were created artifically and 10 i...

  20. Parents, siblings and grandparents in the Neonatal Intensive Care Unit. A survey of policies in eight European countries

    DEFF Research Database (Denmark)

    Greisen, Gorm; Mirante, Nadia; Haumont, Dominique

    2009-01-01

    OBJECTIVE: To describe policies towards family visiting in Neonatal Intensive Care Units (NICU) and compare findings with those of a survey carried out 10 years earlier. METHODS: A questionnaire on early developmental care practices was mailed to 362 units in eight European countries (Sweden...... medical rounds and procedures followed the same pattern. A composite visiting score was computed using all the variables related to family visiting. Lower median values and larger variability were obtained for the southern countries, indicating more restrictive attitudes and lack of national policy....... CONCLUSIONS: The presence of parents and other family members in European NICUs has improved over a 10-year period. Several barriers, however, are still in place, particularly in the South European countries....

  1. Computational model for dosimetric purposes in dental procedures

    International Nuclear Information System (INIS)

    Kawamoto, Renato H.; Campos, Tarcisio R.

    2013-01-01

    This study aims to develop a computational model for dosimetric purposes the oral region, based on computational tools SISCODES and MCNP-5, to predict deterministic effects and minimize stochastic effects caused by ionizing radiation by radiodiagnosis. Based on a set of digital information provided by computed tomography, three-dimensional voxel model was created, and its tissues represented. The model was exported to the MCNP code. In association with SICODES, we used the Monte Carlo N-Particle Transport Code (MCNP-5) method to play the corresponding interaction of nuclear particles with human tissues statistical process. The study will serve as a source of data for dosimetric studies in the oral region, providing deterministic effect and minimize the stochastic effect of ionizing radiation

  2. Developing and Institutionalising Supply Chain Management Procedures: A Case Study of the Eastern Cape Dept of Roads and Public Works

    Directory of Open Access Journals (Sweden)

    Vukile Dlova

    2014-03-01

    Full Text Available This article presents findings from a case study research in the Eastern Cape Department of Roads and Public Works. It systematically investigates why public institutions fail to implement their Supply Change Management (SCM policies and procedures. The article provides a clear context for the researchand explains why policies and procedures are vital for organisations. It also illustrateshow policies and procedures are a meansto effective supply chain systems and describes the research method, population and sample. Findings based on the set outcriteria for good institutionalisation of policies and procedures showed that although SCM policies and procedures areprovided to employees and they were aware of the existence of theseinstruments, there was very little participation of employees in the development and review of these policies.  Based on the findings of the research, a key recommendation is that practitioners, are involved in the day to day implementation of the SCM process in public institutions, should also be involved in the development processes of SCM policies and procedures. The research also argues that for public institutions to be effective and efficient, clear departmental guidelines should be simple and straight forward language should be used so as to avoid different interpretations by implementers. These two critical points will contribute to the effective and efficient development and institutionalization of SCM policies and procedures in government institutions.

  3. Space Geodesy Project Information and Configuration Management Procedure

    Science.gov (United States)

    Merkowitz, Stephen M.

    2016-01-01

    This plan defines the Space Geodesy Project (SGP) policies, procedures, and requirements for Information and Configuration Management (CM). This procedure describes a process that is intended to ensure that all proposed and approved technical and programmatic baselines and changes to the SGP hardware, software, support systems, and equipment are documented.

  4. Computer-assisted preoperative simulation for positioning and fixation of plate in 2-stage procedure combining maxillary advancement by distraction technique and mandibular setback surgery

    Directory of Open Access Journals (Sweden)

    Hideyuki Suenaga

    2016-01-01

    Conclusion: The implementation of the computer-assisted preoperative simulation for the positioning and fixation of plate in 2-stage orthognathic procedure using distraction technique and mandibular setback surgery yielded good results.

  5. 48 CFR 49.108-3 - Settlement procedure.

    Science.gov (United States)

    2010-10-01

    ... MANAGEMENT TERMINATION OF CONTRACTS General Principles 49.108-3 Settlement procedure. (a) Contractors shall settle with subcontractors in general conformity with the policies and principles relating to settlement...

  6. On the risk to low doses (<100 mSv) of ionizing radiation during medical imaging procedures - IOMP policy statement

    International Nuclear Information System (INIS)

    Pradhan, A.S.

    2013-01-01

    The science committee of International Organization for Medical Physics (IOMP) developed a policy statement on the predictions of radiation-induced cancers and cancer deaths in patients exposed to low doses (<100 mSv) of ionizing radiation during medical imaging; this statement has been approved by the IOMP council. In order to attract the attention of medical physicists, an editorial (1) titled 'Risk of Medical Imaging' that includes the said statement has recently been published in Medical Physics journal of American Association of Physicists in Medicine (AAPM). As stated, IOMP represents 80 national and 6 regional medical physics organizations and 18,000 medical physicists worldwide. The IOMP affiliated bodies/organizations in different countries (such as Association of Medical Physicists of India, AMPI) have been encouraged to reproduce the IOMP statement in their journals/newsletters for the benefit of larger community of medical physicists. The IOMP statement is reproduced below (readers may also go through the supportive literature listed in references). It is hoped that this policy statement will have some deterrent influence on the continued propagation of unproven risk related to medical imaging procedures conducted with small doses.

  7. The evidence-policy divide: a 'critical computational linguistics' approach to the language of 18 health agency CEOs from 9 countries.

    Science.gov (United States)

    Bell, Erica; Seidel, Bastian M

    2012-10-30

    There is an emerging body of literature suggesting that the evidence-practice divide in health policy is complex and multi-factorial but less is known about the processes by which health policy-makers use evidence and their views about the specific features of useful evidence. This study aimed to contribute to understandings of how the most influential health policy-makers view useful evidence, in ways that help explore and question how the evidence-policy divide is understood and what research might be supported to help overcome this divide. A purposeful sample of 18 national and state health agency CEOs from 9 countries was obtained. Participants were interviewed using open-ended questions that asked them to define specific features of useful evidence. The analysis involved two main approaches 1)quantitative mapping of interview transcripts using Bayesian-based computational linguistics software 2)qualitative critical discourse analysis to explore the nuances of language extracts so identified. The decision-making, conclusions-oriented world of policy-making is constructed separately, but not exclusively, by policy-makers from the world of research. Research is not so much devalued by them as described as too technical- yet at the same time not methodologically complex enough to engage with localised policy-making contexts. It is not that policy-makers are negative about academics or universities, it is that they struggle to find complexity-oriented methodologies for understanding their stakeholder communities and improving systems. They did not describe themselves as having a more positive role in solving this challenge than academics. These interviews do not support simplistic definitions of policy-makers and researchers as coming from two irreconcilable worlds. They suggest that qualitative and quantitative research is valued by policy-makers but that to be policy-relevant health research may need to focus on building complexity-oriented research methods for

  8. National Environmental Policy Act (NEPA) Compliance Guide, Sandia National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Hansen, R.P. [Hansen Environmental Consultants, Englewood, CO (United States)

    1995-08-01

    This report contains a comprehensive National Environmental Policy Act (NEPA) Compliance Guide for the Sandia National Laboratories. It is based on the Council on Environmental Quality (CEQ) NEPA regulations in 40 CFR Parts 1500 through 1508; the US Department of Energy (DOE) N-EPA implementing procedures in 10 CFR Part 102 1; DOE Order 5440.1E; the DOE ``Secretarial Policy Statement on the National Environmental Policy Act`` of June 1994- Sandia NEPA compliance procedures-, and other CEQ and DOE guidance. The Guide includes step-by-step procedures for preparation of Environmental Checklists/Action Descriptions Memoranda (ECL/ADMs), Environmental Assessments (EAs), and Environmental Impact Statements (EISs). It also includes sections on ``Dealing With NEPA Documentation Problems`` and ``Special N-EPA Compliance Issues.``

  9. Adapting a Markov Monte Carlo simulation model for forecasting the number of Coronary Artery Revascularisation Procedures in an era of rapidly changing technology and policy

    Directory of Open Access Journals (Sweden)

    Knuiman Matthew

    2008-06-01

    Full Text Available Abstract Background Treatments for coronary heart disease (CHD have evolved rapidly over the last 15 years with considerable change in the number and effectiveness of both medical and surgical treatments. This period has seen the rapid development and uptake of statin drugs and coronary artery revascularization procedures (CARPs that include Coronary Artery Bypass Graft procedures (CABGs and Percutaneous Coronary Interventions (PCIs. It is difficult in an era of such rapid change to accurately forecast requirements for treatment services such as CARPs. In a previous paper we have described and outlined the use of a Markov Monte Carlo simulation model for analyzing and predicting the requirements for CARPs for the population of Western Australia (Mannan et al, 2007. In this paper, we expand on the use of this model for forecasting CARPs in Western Australia with a focus on the lack of adequate performance of the (standard model for forecasting CARPs in a period during the mid 1990s when there were considerable changes to CARP technology and implementation policy and an exploration and demonstration of how the standard model may be adapted to achieve better performance. Methods Selected key CARP event model probabilities are modified based on information relating to changes in the effectiveness of CARPs from clinical trial evidence and an awareness of trends in policy and practice of CARPs. These modified model probabilities and the ones obtained by standard methods are used as inputs in our Markov simulation model. Results The projected numbers of CARPs in the population of Western Australia over 1995–99 only improve marginally when modifications to model probabilities are made to incorporate an increase in effectiveness of PCI procedures. However, the projected numbers improve substantially when, in addition, further modifications are incorporated that relate to the increased probability of a PCI procedure and the reduced probability of a CABG

  10. Adapting a Markov Monte Carlo simulation model for forecasting the number of coronary artery revascularisation procedures in an era of rapidly changing technology and policy.

    Science.gov (United States)

    Mannan, Haider R; Knuiman, Matthew; Hobbs, Michael

    2008-06-25

    Treatments for coronary heart disease (CHD) have evolved rapidly over the last 15 years with considerable change in the number and effectiveness of both medical and surgical treatments. This period has seen the rapid development and uptake of statin drugs and coronary artery revascularization procedures (CARPs) that include Coronary Artery Bypass Graft procedures (CABGs) and Percutaneous Coronary Interventions (PCIs). It is difficult in an era of such rapid change to accurately forecast requirements for treatment services such as CARPs. In a previous paper we have described and outlined the use of a Markov Monte Carlo simulation model for analyzing and predicting the requirements for CARPs for the population of Western Australia (Mannan et al, 2007). In this paper, we expand on the use of this model for forecasting CARPs in Western Australia with a focus on the lack of adequate performance of the (standard) model for forecasting CARPs in a period during the mid 1990s when there were considerable changes to CARP technology and implementation policy and an exploration and demonstration of how the standard model may be adapted to achieve better performance. Selected key CARP event model probabilities are modified based on information relating to changes in the effectiveness of CARPs from clinical trial evidence and an awareness of trends in policy and practice of CARPs. These modified model probabilities and the ones obtained by standard methods are used as inputs in our Markov simulation model. The projected numbers of CARPs in the population of Western Australia over 1995-99 only improve marginally when modifications to model probabilities are made to incorporate an increase in effectiveness of PCI procedures. However, the projected numbers improve substantially when, in addition, further modifications are incorporated that relate to the increased probability of a PCI procedure and the reduced probability of a CABG procedure stemming from changed CARP preference

  11. Gender Instruments, Laws, Policies and Guidelines: A Tool for Human Resource Managers in Kenya

    OpenAIRE

    Catherine Kathure Kaimenyi; Anne Ngeretha

    2014-01-01

    The need for effective workplace policies and procedures has never been more important in today’s changing workplace. This is driven by changes to legislation, regulation and codes. Organizations policies must be in line with the national laws, procedures and policies, and since nations subscribe to various international laws and guidelines, these should accordingly be integrated in organization policies. Through a review of existing literature, this study examines important legislations that...

  12. Static and dynamic buckling of large thin shells. (Design procedure, computation tools. Physical understanding of the mechanisms)

    International Nuclear Information System (INIS)

    Combescure, A.

    1986-04-01

    During the last ten years, the French Research Institute for Nuclear Energy (Commissariat a l'Energie Atomique) achieved many theoretical as well as experimental studies for designing the first large size pool type fast breeder reactor. Many of the sensitive parts of this reactor are thin shells subjected to high temperatures and loads. Special care has been given to buckling, because it often governs design. Most of the thin shells structures of the french breeder reactor are axisymmetric. However, imperfections have to be accounted for. In order to keep the advantage of an axisymmetric analysis (low computational costs), a special element has been implemented and used with considerable success in the recent years. This element (COMU) is described in the first chapter, its main features are: either non axisymmetric imperfection or non axisymmetric load, large displacement, non linear material behaviour, computational costs about ten times cheaper than the equivalent three dimensional analysis. This paper based on a careful comparison between experimental and computational results, obtained with the COMU, will analyse three problems: First: design procedure against buckling of thin shells structures subjected to primary loads; Second: static post buckling; Third: buckling under seismic loads [fr

  13. The radiation protective devices for interventional procedures using computed tomography

    International Nuclear Information System (INIS)

    Iida, Hiroji; Chabatake, Mitsuhiro; Shimizu, Mitsuru; Tamura, Sakio

    2002-01-01

    A scattered dose and a surface dose from phantom measurements during interventional procedures with computed tomography (IVR-CT) were evaluated. To reduce the personnel exposure in IVR-CT, the new protective devices were developed and its effect evaluated. Two radiation protection devices were experimentally made using a lead vinyl sheet with lead equivalent 0.125 mmPb. The first device is a lead curtain which shields the space of CT-gantry and phantom for the CT examination. The second device is a lead drape which shields on the phantom surface adjacent to the scanning plane for the CT-fluoroscopy. Scattered dose and phantom surface dose were measured with an abdominal phantom during Cine-CT (130 kV, 150 mA, 5 seconds, 10 mm section thickness). They were measured by using ionization chamber dosimeter. They were measured with and without a lead curtain and a lead drape. Scattered dose rate was measured at distance of 50-150 cm from the scanning plane. And, surface dose was measured at distance of 4-21 cm from the scanning plane on the phantom. On operator's standing position, scattered dose rates were from 8.4 to 11.6 μGy/sec at CT examination. The lead curtain and the lead drape reduced scattered dose rate at distance of 50 cm from the scanning plane by 66% and 58.3% respectively. Surface dose rate were 118 μGy/sec at distance of 5 cm from the scanning plane at CT-fluoroscopy. The lead drape reduced the surface dose by 60.5%. High scattered exposure to personnel may occur during interventional procedures using CT. They were considerably reduced during CT-arteriography by attaching the lead curtain in CT equipment. And they were substantially reduced during CT-fluoroscopy by placing the lead drape adjacent to the scanning plane, in addition, operator's hand would be protected from unnecessary radiation scattered by phantom. It was suggested that the scattered exposure to personnel could be sufficiently reduced by using radiation protection devices in IVR-CT. The

  14. 76 FR 213 - National Environmental Policy Act Implementing Procedures

    Science.gov (United States)

    2011-01-03

    ... due to, for example, a threatened violation of applicable environmental, safety, and health... legally enforceable rights, benefits, or responsibilities, substantive or procedural, not otherwise... failed in indoor tests. Whether the explosives or propellants were tested indoors or outdoors, the...

  15. 42 CFR 137.287 - What is the National Environmental Policy Act (NEPA)?

    Science.gov (United States)

    2010-10-01

    ... Process § 137.287 What is the National Environmental Policy Act (NEPA)? The NEPA is a procedural law that... and documenting the environmental impact of their actions. NEPA establishes a comprehensive policy for... procedures of the Act. CEQ regulations (40 CFR 1500-1508) establish three levels of environmental review...

  16. Environmental Impact Assessment: A Procedure.

    Science.gov (United States)

    Stover, Lloyd V.

    Prepared by a firm of consulting engineers, this booklet outlines the procedural "whys and hows" of assessing environmental impact, particularly for the construction industry. Section I explores the need for environmental assessment and evaluation to determine environmental impact. It utilizes a review of the National Environmental Policy Act and…

  17. Analytical Procedures for Testability.

    Science.gov (United States)

    1983-01-01

    Beat Internal Classifications", AD: A018516. "A System of Computer Aided Diagnosis with Blood Serum Chemistry Tests and Bayesian Statistics", AD: 786284...6 LIST OF TALS .. 1. Truth Table ......................................... 49 2. Covering Problem .............................. 93 3. Primary and...quential classification procedure in a coronary care ward is evaluated. In the toxicology field "A System of Computer Aided Diagnosis with Blood Serum

  18. NRC Enforcement Policy Review, July 1995-July 1997

    International Nuclear Information System (INIS)

    Lieberman, J.; Pedersen, R.M.

    1998-04-01

    On June 30, 1995, the Nuclear Regulatory Commission (NRC) issued a complete revision of its General Statement of Policy and Procedure for Enforcement Action (Enforcement Policy) (60 FR 34381). In approving the 1995 revision to the Enforcement Policy, the Commission directed the staff to perform a review of its implementation of the Policy after approximately 2 years of experience and to consider public comments. This report represents the results of that review

  19. Load/resource matching for period-of-record computer simulation

    International Nuclear Information System (INIS)

    Lindsey, E.D. Jr.; Robbins, G.E. III

    1991-01-01

    The Southwestern Power Administration (Southwestern), an agency of the Department of Energy, is responsible for marketing the power and energy produced at Federal hydroelectric power projects developed by the U.S. Army Corps of Engineers in the southwestern United States. This paper reports that in order to maximize benefits from limited resources, to evaluate proposed changes in the operation of existing projects, and to determine the feasibility and marketability of proposed new projects, Southwestern utilizes a period-of-record computer simulation model created in the 1960's. Southwestern is constructing a new computer simulation model to take advantage of changes in computers, policy, and procedures. Within all hydroelectric power reservoir systems, the ability of the resources to match the load demand is critical and presents complex problems. Therefore, the method used to compare available energy resources to energy load demands is a very important aspect of the new model. Southwestern has developed an innovative method which compares a resource duration curve with a load duration curve, adjusting the resource duration curve to make the most efficient use of the available resources

  20. Development and testing of computer aided start-up procedures for U-235 enrichment separation nozzle cascades

    International Nuclear Information System (INIS)

    Hein, H.; Schuette, R.; Steinhaus, H.

    1978-09-01

    In industrial scale separation nozzle cascades measured data acquisition and process control will be performed by on-line computer systems. To develop the necessary measurement and monitoring techniques, on-line control of the ten stage pilot plant by the WANG 2200 miniature computer system was tested. On-line data processing at the same time has reduced the number of measurements because a large number of operating data which cannot be measured directly can be obtained from a reduced number of measurements by calculation from the material balances in the gas dynamics network of the enrichment cascade. This is performed on-line by means of a cascade monitoring code which produces diagrams of the deviations of major operating parameters from their set values and thus offers to cascade operators an improved picture of the present status of a cascade, thereby facilitating the detection of causes of defects. The graphic representation chosen for this purpose and the performance of the system in practical operation is explained by an example of cascade adjustment and by a few selected examples of cascade fault conditions. Calculation of the quantities derived at all stages from the pressure (po) and concentration (No) readings requires that the individual flow characteristics of the separation nozzles are known. Alos the compressor characteristics have to be determined. Since the monitoring computer in calculating the cascade status utilizes these component characteristics in current enrichment operation, routinely establishing and plotting these two characteristics is also attributed to the computer system (start-up procedures). (orig.) 891 HP [de

  1. Function Allocation in Complex Socio-Technical Systems: Procedure usage in nuclear power and the Context Analysis Method for Identifying Design Solutions (CAMIDS) Model

    Science.gov (United States)

    Schmitt, Kara Anne

    This research aims to prove that strict adherence to procedures and rigid compliance to process in the US Nuclear Industry may not prevent incidents or increase safety. According to the Institute of Nuclear Power Operations, the nuclear power industry has seen a recent rise in events, and this research claims that a contributing factor to this rise is organizational, cultural, and based on peoples overreliance on procedures and policy. Understanding the proper balance of function allocation, automation and human decision-making is imperative to creating a nuclear power plant that is safe, efficient, and reliable. This research claims that new generations of operators are less engaged and thinking because they have been instructed to follow procedures to a fault. According to operators, they were once to know the plant and its interrelations, but organizationally more importance is now put on following procedure and policy. Literature reviews were performed, experts were questioned, and a model for context analysis was developed. The Context Analysis Method for Identifying Design Solutions (CAMIDS) Model was created, verified and validated through both peer review and application in real world scenarios in active nuclear power plant simulators. These experiments supported the claim that strict adherence and rigid compliance to procedures may not increase safety by studying the industry's propensity for following incorrect procedures, and when it directly affects the outcome of safety or security of the plant. The findings of this research indicate that the younger generations of operators rely highly on procedures, and the organizational pressures of required compliance to procedures may lead to incidents within the plant because operators feel pressured into following the rules and policy above performing the correct actions in a timely manner. The findings support computer based procedures, efficient alarm systems, and skill of the craft matrices. The solution to

  2. Fiscal policy surveillance in the enlarged European Union: Procedural checks or simple arithmetic?

    NARCIS (Netherlands)

    Groenendijk, Nico; Batten, Jonathan A.; Kearney, Colm

    2006-01-01

    In its recommendation on the 2004 update of the Broad Economic Policy Guidelines (BEPGs), the European Commission (2004) issued country-specific recommendations for fiscal policy in the Central and Eastern European (CEE) countries that have recently joined the European Union (EU) (henceforth the

  3. Intraarticular Sacroiliac Joint Injection Under Computed Tomography Fluoroscopic Guidance: A Technical Note to Reduce Procedural Time and Radiation Dose

    International Nuclear Information System (INIS)

    Paik, Nam Chull

    2016-01-01

    PurposeA technique for computed tomography fluoroscopy (CTF)-guided intraarticular (IA) sacroiliac joint (SIJ) injection was devised to limit procedural time and radiation dose.MethodsOur Institutional Review Board approved this retrospective analysis and waived the requirement for informed consent. Overall, 36 consecutive diagnostic or therapeutic IA SIJ injections (unilateral, 20; bilateral, 16) performed in 34 patients (female, 18; male, 16) with a mean age of 45.5 years (range 20–76 years) under CTF guidance were analyzed, assessing technical success (i.e., IA contrast spread), procedural time, and radiation dose.ResultsAll injections were successful from a technical perspective and were free of serious complications. Respective median procedural times and effective doses of SIJ injection were as follows: unilateral, 5.28 min (range 3.58–8.00 min) and 0.11 millisievert (mSv; range 0.07–0.24 mSv); and bilateral, 6.72 min (range 4.17–21.17 min) and 0.11 mSv (range 0.09–0.51 mSv).ConclusionsGiven the high rate of technical success achieved in limited time duration and with little radiation exposure, CTF-guided IA SIJ injection is a practical and low-risk procedure.

  4. Intraarticular Sacroiliac Joint Injection Under Computed Tomography Fluoroscopic Guidance: A Technical Note to Reduce Procedural Time and Radiation Dose

    Energy Technology Data Exchange (ETDEWEB)

    Paik, Nam Chull, E-mail: pncspine@gmail.com [Arumdaun Wooldul Spine Hospital, Department of Radiology (Korea, Republic of)

    2016-07-15

    PurposeA technique for computed tomography fluoroscopy (CTF)-guided intraarticular (IA) sacroiliac joint (SIJ) injection was devised to limit procedural time and radiation dose.MethodsOur Institutional Review Board approved this retrospective analysis and waived the requirement for informed consent. Overall, 36 consecutive diagnostic or therapeutic IA SIJ injections (unilateral, 20; bilateral, 16) performed in 34 patients (female, 18; male, 16) with a mean age of 45.5 years (range 20–76 years) under CTF guidance were analyzed, assessing technical success (i.e., IA contrast spread), procedural time, and radiation dose.ResultsAll injections were successful from a technical perspective and were free of serious complications. Respective median procedural times and effective doses of SIJ injection were as follows: unilateral, 5.28 min (range 3.58–8.00 min) and 0.11 millisievert (mSv; range 0.07–0.24 mSv); and bilateral, 6.72 min (range 4.17–21.17 min) and 0.11 mSv (range 0.09–0.51 mSv).ConclusionsGiven the high rate of technical success achieved in limited time duration and with little radiation exposure, CTF-guided IA SIJ injection is a practical and low-risk procedure.

  5. Drug Testing in Schools: Implications for Policy.

    Science.gov (United States)

    Bozeman, William C.; And Others

    1987-01-01

    Public concern about substance abuse, fueled by political and media attention, is causing school administrators to consider a variety of approaches beyond traditional drug education. No procedures, methods, or rules regarding drug testing should be established in the absence of clear school board policy, and no policy decisions should be made…

  6. Requirements for Control Room Computer-Based Procedures for use in Hybrid Control Rooms

    Energy Technology Data Exchange (ETDEWEB)

    Le Blanc, Katya Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States); Oxstrand, Johanna Helene [Idaho National Lab. (INL), Idaho Falls, ID (United States); Joe, Jeffrey Clark [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-05-01

    Many plants in the U.S. are currently undergoing control room modernization. The main drivers for modernization are the aging and obsolescence of existing equipment, which typically results in a like-for-like replacement of analogue equipment with digital systems. However, the modernization efforts present an opportunity to employ advanced technology that would not only extend the life, but enhance the efficiency and cost competitiveness of nuclear power. Computer-based procedures (CBPs) are one example of near-term advanced technology that may provide enhanced efficiencies above and beyond like for like replacements of analog systems. Researchers in the LWRS program are investigating the benefits of advanced technologies such as CBPs, with the goal of assisting utilities in decision making during modernization projects. This report will describe the existing research on CBPs, discuss the unique issues related to using CBPs in hybrid control rooms (i.e., partially modernized analog control rooms), and define the requirements of CBPs for hybrid control rooms.

  7. Procedures minimally invasive image-guided

    International Nuclear Information System (INIS)

    Mora Guevara, Alejandro

    2011-01-01

    A literature review focused on minimally invasive procedures, has been performed at the Department of Radiology at the Hospital Calderon Guardia. A multidisciplinary team has been raised for decision making. The materials, possible complications and the available imaging technique such as ultrasound, computed tomography, magnetic resonance imaging, have been determined according to the procedure to be performed. The revision has supported medical interventions didactically enjoying the best materials, resources and conditions for a successful implementation of procedures and results [es

  8. Assessing Patient Participation in Health Policy Decision-Making in Cyprus

    Directory of Open Access Journals (Sweden)

    Kyriakos Souliotis

    2016-08-01

    Full Text Available Although the importance of patient participation in the design and evaluation of health programs and services is well-documented, there is scarcity of research with regard to patient association (PA participation in health policy decision-making processes. To this end, the present study aimed to validate further a previously developed instrument as well as to investigate the degree of PA participation in health policy decision-making in Cyprus. A convenient sample of 114 patients-members of patients associations took part in the study. Participants were recruited from an umbrella organization, the Pancyprian Federation of Patient Associations and Friends (PFPA. PA participation in health policy decision-making was assessed with the Health Democracy Index (HDI, an original 8-item tool. To explore its psychometric properties, Cronbach α was computed as regards to its internal consistency, while its convergent validity was tested against a self-rated question enquiring about the degree of PA participation in health policy decision-making. The findings revealed that the HDI has good internal consistency and convergent validity. Furthermore, PAs were found to participate more in consultations in health-related organizations and the Ministry of Health (MoH as well as in reforms or crucial decisions in health policy. Lower levels were documented with regard to participation in hospital boards, ethics committees in clinical trials and health technology assessment (HTA procedures. Overall, PA participation levels were found to be lower than the mid-point of the scale. Targeted interventions aiming to facilitate patients’ involvement in health policy decision-making processes and to increase its impact are greatly needed in Cyprus.

  9. Assessing Patient Participation in Health Policy Decision-Making in Cyprus.

    Science.gov (United States)

    Souliotis, Kyriakos; Agapidaki, Eirini; Peppou, Lily Evangelia; Tzavara, Chara; Samoutis, George; Theodorou, Mamas

    2016-06-20

    Although the importance of patient participation in the design and evaluation of health programs and services is well-documented, there is scarcity of research with regard to patient association (PA) participation in health policy decision-making processes. To this end, the present study aimed to validate further a previously developed instrument as well as to investigate the degree of PA participation in health policy decision-making in Cyprus. A convenient sample of 114 patients-members of patients associations took part in the study. Participants were recruited from an umbrella organization, the Pancyprian Federation of Patient Associations and Friends (PFPA). PA participation in health policy decision-making was assessed with the Health Democracy Index (HDI), an original 8-item tool. To explore its psychometric properties, Cronbach α was computed as regards to its internal consistency, while its convergent validity was tested against a self-rated question enquiring about the degree of PA participation in health policy decision-making. The findings revealed that the HDI has good internal consistency and convergent validity. Furthermore, PAs were found to participate more in consultations in health-related organizations and the Ministry of Health (MoH) as well as in reforms or crucial decisions in health policy. Lower levels were documented with regard to participation in hospital boards, ethics committees in clinical trials and health technology assessment (HTA) procedures. Overall, PA participation levels were found to be lower than the mid-point of the scale. Targeted interventions aiming to facilitate patients' involvement in health policy decision-making processes and to increase its impact are greatly needed in Cyprus. © 2016 by Kerman University of Medical Sciences.

  10. Ensuring due process in the IACUC and animal welfare setting: considerations in developing noncompliance policies and procedures for institutional animal care and use committees and institutional officials.

    Science.gov (United States)

    Hansen, Barbara C; Gografe, Sylvia; Pritt, Stacy; Jen, Kai-Lin Catherine; McWhirter, Camille A; Barman, Susan M; Comuzzie, Anthony; Greene, Molly; McNulty, Justin A; Michele, Daniel Eugene; Moaddab, Naz; Nelson, Randall J; Norris, Karen; Uray, Karen D; Banks, Ron; Westlund, Karin N; Yates, Bill J; Silverman, Jerald; Hansen, Kenneth D; Redman, Barbara

    2017-10-01

    Every institution that is involved in research with animals is expected to have in place policies and procedures for the management of allegations of noncompliance with the Animal Welfare Act and the U.S. Public Health Service Policy on the Humane Care and Use of Laboratory Animals. We present here a model set of recommendations for institutional animal care and use committees and institutional officials to ensure appropriate consideration of allegations of noncompliance with federal Animal Welfare Act regulations that carry a significant risk or specific threat to animal welfare. This guidance has 3 overarching aims: 1 ) protecting the welfare of research animals; 2 ) according fair treatment and due process to an individual accused of noncompliance; and 3 ) ensuring compliance with federal regulations. Through this guidance, the present work seeks to advance the cause of scientific integrity, animal welfare, and the public trust while recognizing and supporting the critical importance of animal research for the betterment of the health of both humans and animals.-Hansen, B. C., Gografe, S., Pritt, S., Jen, K.-L. C., McWhirter, C. A., Barman, S. M., Comuzzie, A., Greene, M., McNulty, J. A., Michele, D. E., Moaddab, N., Nelson, R. J., Norris, K., Uray, K. D., Banks, R., Westlund, K. N., Yates, B. J., Silverman, J., Hansen, K. D., Redman, B. Ensuring due process in the IACUC and animal welfare setting: considerations in developing noncompliance policies and procedures for institutional animal care and use committees and institutional officials. © FASEB.

  11. Policy and Strategies for Environmental Remediation

    International Nuclear Information System (INIS)

    2015-01-01

    out in the policy statement. For its formulation, detailed information is needed on the current situation in the country (organizational, technical and legislative). The technical solutions proposed for the remediation of sites in the country need to be politically, technically and economically feasible. When selecting a set of technological procedures, an appropriate end point must be identified, usually a suitable end state. The steps in formulating and implementing the strategy include selecting the technical procedures, allocating the responsibility for implementing the identified procedures, establishing supervisory mechanisms and developing implementation plans. The policy and strategies may need to be updated because of new national circumstances (legislative changes, plans for new nuclear facilities), new international agreements and/or experience obtained with the original policy and strategies. The lead in making changes is to be taken by the body responsible for the initial formulation of the policy (government) and strategy, but all relevant parties in the country are to be involved and consulted in this process

  12. Policy, inquiries, and the courts

    International Nuclear Information System (INIS)

    Jowell, J.

    1982-01-01

    In relation to nuclear power policy, two objectives of a liberal democracy are examined: the accountability of the decision-maker to the public; and the efficient and effective implementation of management policy. The places of Parliament, administrative law, planning constraints and the public enquiry are discussed, with special reference to legal aspects of the procedure at the public enquiry to ensure that it is as fair and effective as possible. (U.K.)

  13. International Organisations and Transnational Education Policy

    DEFF Research Database (Denmark)

    Moutsios, Stavros

    2009-01-01

    This paper focuses on the World Bank/IMF (International Monetary Fund), the OECD (Organisation for Economic Cooperation and Development) and the WTO (World Trade Organisation) as institutions of transnational policy making. They are all at present making education policies which are decisively...... shaping current directions and developments in national education systems. The paper reviews the enhanced role of these institutions in producing education policies and investigates the ideological basis as well as the processes through which these policies are made. It is argued that decisions are taken...... largely through asymmetric, non-democratic and opaque procedures. It is also argued that the proposed policies purport to serve the principles of relentless economic competition. Taking into account similar policies and initiatives, the paper concludes that we are experiencing not only...

  14. 22 CFR 95.3 - Procedures.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Procedures. 95.3 Section 95.3 Foreign Relations... torture are made or the issue is otherwise brought to the Department's attention, appropriate policy and... Secretary as to whether or not to sign the surrender warrant. (b) Based on the resulting analysis of...

  15. Standard operating procedure for computing pangenome trees

    DEFF Research Database (Denmark)

    Snipen, L.; Ussery, David

    2010-01-01

    We present the pan-genome tree as a tool for visualizing similarities and differences between closely related microbial genomes within a species or genus. Distance between genomes is computed as a weighted relative Manhattan distance based on gene family presence/absence. The weights can be chose...

  16. Management of Virtual Machine as an Energy Conservation in Private Cloud Computing System

    Directory of Open Access Journals (Sweden)

    Fauzi Akhmad

    2016-01-01

    Full Text Available Cloud computing is a service model that is packaged in a base computing resources that can be accessed through the Internet on demand and placed in the data center. Data center architecture in cloud computing environments are heterogeneous and distributed, composed of a cluster of network servers with different capacity computing resources in different physical servers. The problems on the demand and availability of cloud services can be solved by fluctuating data center cloud through abstraction with virtualization technology. Virtual machine (VM is a representation of the availability of computing resources that can be dynamically allocated and reallocated on demand. In this study the consolidation of VM as energy conservation in Private Cloud Computing Systems with the target of process optimization selection policy and migration of the VM on the procedure consolidation. VM environment cloud data center to consider hosting a type of service a particular application at the instance VM requires a different level of computing resources. The results of the use of computing resources on a VM that is not balanced in physical servers can be reduced by using a live VM migration to achieve workload balancing. A practical approach used in developing OpenStack-based cloud computing environment by integrating Cloud VM and VM Placement selection procedure using OpenStack Neat VM consolidation. Following the value of CPU Time used as a fill to get the average value in MHz CPU utilization within a specific time period. The average value of a VM’s CPU utilization in getting from the current CPU_time reduced by CPU_time from the previous data retrieval multiplied by the maximum frequency of the CPU. The calculation result is divided by the making time CPU_time when it is reduced to the previous taking time CPU_time multiplied by milliseconds.

  17. Evaluating the impact of the administrative procedure and the landscape policy on grid connected PV systems (GCPVS) on-floor in Spain in the period 2004–2008: To which extent a limiting factor?

    International Nuclear Information System (INIS)

    Hoz, Jordi de la; Martín, Helena; Martins, Blanca; Matas, José; Miret, Jaume

    2013-01-01

    The growth of the Spanish photovoltaic (PV) sector in the period 2004–2008 rendered Spain a prominent place among top worldwide countries. Yet, this growth was rather uneven across the different Spanish regions which raised the interest on the drivers ultimately effecting these disparities. Especially controversial were the arguments about the influence of the administrative procedure and the landscape policy on the development of GCPVS on-floor. This study therefore discloses both two elements and evaluates their impact in a group of PV prominent Spanish regions and Catalonia, the latter used as a benchmark because of its comprehensive and stringent regulation on landscape protection, which was accused by the PV industry of thwarting the development of the GCPVS on-floor. Both quantitative and qualitative analyses were carried out. In particular two indexes were elaborated to determine the consistency of the arguments pointing to the landscape protection policy as a decisive barrier to GCPVS growth. First, when the analysis is made in relative terms, the ranking of PV prominent regions changes and many of the differences vanish. Second, rather than the preeminence of a landscape protection policy what really matters for GCPVS on-floor growth is the administrative procedure and the processing enabling its implementation. - Highlights: • The study of PV evolution relative to land availability bends regional differences. • Regions with lower administrative complexity are likely to have better PV ratios. • Landscape protection policy is not per se a barrier to GCPVS on-floor growth. • The administrative procedure was not proven a tool of energy planning in Catalonia. • Pointing the drivers of PV regional differences demands a keen analysis of data

  18. Agricultural pricing policy in Kenya : scope and impact

    NARCIS (Netherlands)

    Meilink, H.A.

    1985-01-01

    Reviews the findings of available studies and reports thought to be of relevance to policy makers. A discussion of the institutional framework, of criteria used in price-setting procedures, and of scope and objectives of the agricultural pricing policies is folowed by an examination of what these

  19. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  20. Tobacco Town: Computational Modeling of Policy Options to Reduce Tobacco Retailer Density.

    Science.gov (United States)

    Luke, Douglas A; Hammond, Ross A; Combs, Todd; Sorg, Amy; Kasman, Matt; Mack-Crane, Austen; Ribisl, Kurt M; Henriksen, Lisa

    2017-05-01

    To identify the behavioral mechanisms and effects of tobacco control policies designed to reduce tobacco retailer density. We developed the Tobacco Town agent-based simulation model to examine 4 types of retailer reduction policies: (1) random retailer reduction, (2) restriction by type of retailer, (3) limiting proximity of retailers to schools, and (4) limiting proximity of retailers to each other. The model examined the effects of these policies alone and in combination across 4 different types of towns, defined by 2 levels of population density (urban vs suburban) and 2 levels of income (higher vs lower). Model results indicated that reduction of retailer density has the potential to decrease accessibility of tobacco products by driving up search and purchase costs. Policy effects varied by town type: proximity policies worked better in dense, urban towns whereas retailer type and random retailer reduction worked better in less-dense, suburban settings. Comprehensive retailer density reduction policies have excellent potential to reduce the public health burden of tobacco use in communities.

  1. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  2. OSE inspection of computer security: Review

    International Nuclear Information System (INIS)

    Jaehne, E.M.

    1987-01-01

    The inspection process within the Department of Energy (DOE) serves the function of analyzing and reporting on the performance of security measures and controls in specific areas at sites throughout DOE. Three aspects of this process are discussed based on experience in computer security: Policy basis of performance inspections; Role and form of standards and criteria in inspections; and Conducting an inspection using the standards and criteria. Inspections are based on DOE and other applicable policy in each area. These policy statements have a compliance orientation in which the paper trail is often more clearly discernible than the security intention. The relationship of policy to performance inspections is discussed. To facilitate bridging the gap between the paper trail and the security intention defined by policy, standards and criteria were developed in each area. The consensus process and structure of the resulting product for computer security are discussed. Standards and criteria are inspection tools that support the site in preparing for an inspection and the inspector in conducting one. They form a systematic approach that facilitates consistency in the analysis and reporting of inspection results. Experience using the computer security standards and criteria is discussed

  3. Computational intelligence in economic games and policy design

    NARCIS (Netherlands)

    Dawid, H.; Poutré, La J.A.; Yao, X.

    2008-01-01

    Developing CI techniques for economic games and policies is a very promising and fast-growing field. Several interesting multi-disciplinary subfields exist, which require researchers of various disciplines to collaborate with each other and contribute to the advances of knowledge in this emerging

  4. Identification of the Procedural Accidents During Root Canal Preparation Using Digital Intraoral Radiography and Cone Beam Computed Tomography

    Directory of Open Access Journals (Sweden)

    Csinszka K.-Ivácson A.-

    2016-09-01

    Full Text Available Crown or root perforation, ledge formation, fractured instruments and perforation of the roots are the most important accidents which appear during endodontic therapy. Our objective was to evaluate the value of digital intraoral periapical radiographs compared to cone beam computed tomography images (CBCT used to diagnose some procedural accidents. Material and methods: Eleven extracted molars were used in this study. A total of 18 perforations and 13 ledges were created artifically and 10 instruments were fractured in the root canals. Digital intraoral periapical radiographs from two angles and CBCT scans were made with the teeth fixed in position. The images were evaluated and the number of detected accidents were stated in percentages. Statistical analysis was performed using the chi square-test. Results: On digital periapical radiographs the evaluators identified 12 (66.66% perforations, 10 (100 % separated instruments and 10 (76.9% created ledges. The CBCT scans made possible the recognition of 17 (94.66 % perforations, 9 (90 % separated instruments and 13 (100% ledges. The totally recognized accidental procedures showed significant differences between the two groups. (p<0.05 Conclusion: Digital periapical radiographs are the most common imaging modalities used during endodontic treatments. Though, the CBCT allows a better identification of the procedural accidents.

  5. 78 FR 47047 - Proposed Policy for Discontinuance of Certain Instrument Approach Procedures

    Science.gov (United States)

    2013-08-02

    ... the cancellation of certain Non-directional Beacon (NDB) and Very High Frequency (VHF) Omnidirectional... approach procedures. The FAA proposes specific criteria to guide the identification and selection of... selection of potential NDB and VOR procedures for cancellation. Once the criteria are established and the...

  6. Public computing options for individuals with cognitive impairments: survey outcomes.

    Science.gov (United States)

    Fox, Lynn Elizabeth; Sohlberg, McKay Moore; Fickas, Stephen; Lemoncello, Rik; Prideaux, Jason

    2009-09-01

    To examine availability and accessibility of public computing for individuals with cognitive impairment (CI) who reside in the USA. A telephone survey was administered as a semi-structured interview to 145 informants representing seven types of public facilities across three geographically distinct regions using a snowball sampling technique. An Internet search of wireless (Wi-Fi) hotspots supplemented the survey. Survey results showed the availability of public computer terminals and Internet hotspots was greatest in the urban sample, followed by the mid-sized and rural cities. Across seven facility types surveyed, libraries had the highest percentage of access barriers, including complex queue procedures, login and password requirements, and limited technical support. University assistive technology centres and facilities with a restricted user policy, such as brain injury centres, had the lowest incidence of access barriers. Findings suggest optimal outcomes for people with CI will result from a careful match of technology and the user that takes into account potential barriers and opportunities to computing in an individual's preferred public environments. Trends in public computing, including the emergence of widespread Wi-Fi and limited access to terminals that permit auto-launch applications, should guide development of technology designed for use in public computing environments.

  7. Report from the Committee of Visitors on its Review of the Processes and Procedures used to Manage the Theory and Computations Program, Fusion Energy Sciences Advisory Committee

    International Nuclear Information System (INIS)

    2004-01-01

    A Committee of Visitors (COV) was formed to review the procedures used by the Office of Fusion Energy Sciences to manage its Theory and Computations program. The COV was pleased to conclude that the research portfolio supported by the OFES Theory and Computations Program was of very high quality. The Program supports research programs at universities, research industries, and national laboratories that are well regarded internationally and address questions of high relevance to the DOE. A major change in the management of the Theory and Computations program over the past few years has been the introduction of a system of comparative peer review to guide the OFES Theory Team in selecting proposals for funding. The COV was impressed with the success of OFES in its implementation of comparative peer review and with the quality of the reviewers chosen by the OFES Theory Team. The COV concluded that the competitive peer review process has improved steadily over the three years that it has been in effect and that it has improved both the fairness and accountability of the proposal review process. While the COV commends OFES in its implementation of comparative review, the COV offers the following recommendations in the hope that they will further improve the comparative peer review process: The OFES should improve the consistency of peer reviews. We recommend adoption of a results-oriented scoring system in their guidelines to referees (see Appendix II), a greater use of review panels, and a standard format for proposals; The OFES should further improve the procedures and documentation for proposal handling. We recommend that the folders documenting funding decisions contain all the input from all of the reviewers, that OFES document their rationale for funding decisions which are at variance with the recommendation of the peer reviewers, and that OFES provide a Summary Sheet within each folder; The OFES should better communicate the procedures used to determine funding

  8. Methods for testing the logical structure of plant procedure documents

    International Nuclear Information System (INIS)

    Horne, C.P.; Colley, R.; Fahley, J.M.

    1990-01-01

    This paper describes an ongoing EPRI project to investigate computer based methods to improve the development, maintenance, and verification of plant operating procedures. This project began as an evaluation of the applicability of structured software analysis methods to operating procedures. It was found that these methods offer benefits, if procedures are transformed to a structured representation to make them amenable to computer analysis. The next task was to investigate methods to transform procedures into a structured representation. The use of natural language techniques to read and compile the procedure documents appears to be viable for this purpose and supports conformity to guidelines. The final task was to consider possibilities of automated verification methods for procedures. Methods to help verify procedures were defined and information requirements specified. These methods take the structured representation of procedures as input. The software system being constructed in this project is called PASS, standing for Procedures Analysis Software System

  9. WIMSD4 Version 101 and cataloged procedure

    International Nuclear Information System (INIS)

    Roth, M.J.; Taubman, C.J.; Lawrence, J.H.

    1982-06-01

    The changes made to WIMSD4 to produce Version 101 on the Harwell IBM 3033 and the Winfrith ICL 2976 computers are summarised. A detailed description of the amended catalogued procedure for executing WIMSD4 on the Harwell Computer is given. (author)

  10. Writing ourselves into a web of obedience: a nursing policy analysis.

    Science.gov (United States)

    Bail, Kasia; Cook, Robert; Gardner, Anne; Grealish, Laurie

    2009-11-01

    Nursing work is governed by a web of overarching documents from professional bodies, registration bodies, and individual health care organisations. The focus for these documents is to maintain high standards and protect patients and organisations from unnecessary risk. The presentation of the nurse within these documents has important implications for the ability of nurses to function as autonomous professionals. How the role of the nurse is situated in hospital procedural policy, and more specifically how these presentations of the nurse define, limit, and enable nursing practice is the focus of this paper. A combination of random and purposive sampling of the nursing policies of one tertiary level hospital was utilised to collect policy documents for thematic content analysis. The study was completed in a tertiary level health institution, in one Australian jurisdiction with a population of approximately 500,000 people. This health institution employs over 4000 people and admitted 49,000 patients in the 2004-2005 financial year. An inductive approach, which utilised theoretical and contextual comprehension of the nursing policies, informed the collation of coded data which determined the themes of the study. Analysis consisted of coding of particular words, textual structure and theory content. Practice was presented in the nursing procedural policies in two themes, called 'lingering tradition' and 'bureaucratic template'. The discourse of hospital procedural policy situates the nurse as obedient to organisational requirements by limiting practice to a performance of actions without explicit recognition of professional autonomy. This sets up a puzzling contradiction between performance expectations from the employing organisation and the nursing profession. Writing hospital policy in the discourse of procedural directives reduces nurses' ability to act as autonomous, critically thinking professionals, with implications for patient safety, nurse autonomy and the

  11. Policy Implementation: Implications for Evaluation

    Science.gov (United States)

    DeGroff, Amy; Cargo, Margaret

    2009-01-01

    Policy implementation reflects a complex change process where government decisions are transformed into programs, procedures, regulations, or practices aimed at social betterment. Three factors affecting contemporary implementation processes are explored: networked governance, sociopolitical context and the democratic turn, and new public…

  12. Participation in European water policy

    NARCIS (Netherlands)

    J.A. van Ast (Jacko); S.P. Boot (Sander Paul)

    2003-01-01

    textabstractThis paper considers the possibilities for interactive policy-making in European water management. In the new European Water Framework Directive, public information and consultation are major elements in the procedure (process) that leads to River Basin Management Plans. In general,

  13. 29 CFR 1990.111 - General statement of regulatory policy.

    Science.gov (United States)

    2010-07-01

    ... CARCINOGENS The Osha Cancer Policy § 1990.111 General statement of regulatory policy. (a) This part establishes the criteria and procedures under which substances will be regulated by OSHA as potential... case-by-case basis in the rulemaking proceedings on individual substances. Any permissible exposure...

  14. 32 CFR 37.400 - Must I use competitive procedures to award TIAs?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Must I use competitive procedures to award TIAs? 37.400 Section 37.400 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD... competitive procedures to award TIAs? DoD policy is to award TIAs using merit-based, competitive procedures...

  15. Feedback control policies employed by people using intracortical brain-computer interfaces

    Science.gov (United States)

    Willett, Francis R.; Pandarinath, Chethan; Jarosiewicz, Beata; Murphy, Brian A.; Memberg, William D.; Blabe, Christine H.; Saab, Jad; Walter, Benjamin L.; Sweet, Jennifer A.; Miller, Jonathan P.; Henderson, Jaimie M.; Shenoy, Krishna V.; Simeral, John D.; Hochberg, Leigh R.; Kirsch, Robert F.; Bolu Ajiboye, A.

    2017-02-01

    Objective. When using an intracortical BCI (iBCI), users modulate their neural population activity to move an effector towards a target, stop accurately, and correct for movement errors. We call the rules that govern this modulation a ‘feedback control policy’. A better understanding of these policies may inform the design of higher-performing neural decoders. Approach. We studied how three participants in the BrainGate2 pilot clinical trial used an iBCI to control a cursor in a 2D target acquisition task. Participants used a velocity decoder with exponential smoothing dynamics. Through offline analyses, we characterized the users’ feedback control policies by modeling their neural activity as a function of cursor state and target position. We also tested whether users could adapt their policy to different decoder dynamics by varying the gain (speed scaling) and temporal smoothing parameters of the iBCI. Main results. We demonstrate that control policy assumptions made in previous studies do not fully describe the policies of our participants. To account for these discrepancies, we propose a new model that captures (1) how the user’s neural population activity gradually declines as the cursor approaches the target from afar, then decreases more sharply as the cursor comes into contact with the target, (2) how the user makes constant feedback corrections even when the cursor is on top of the target, and (3) how the user actively accounts for the cursor’s current velocity to avoid overshooting the target. Further, we show that users can adapt their control policy to decoder dynamics by attenuating neural modulation when the cursor gain is high and by damping the cursor velocity more strongly when the smoothing dynamics are high. Significance. Our control policy model may help to build better decoders, understand how neural activity varies during active iBCI control, and produce better simulations of closed-loop iBCI movements.

  16. Emotion Monitoring – Verification of Physiological Characteristics Measurement Procedures

    OpenAIRE

    Landowska Agnieszka

    2014-01-01

    This paper concerns measurement procedures on an emotion monitoring stand designed for tracking human emotions in the Human-Computer Interaction with physiological characteristics. The paper addresses the key problem of physiological measurements being disturbed by a motion typical for human-computer interaction such as keyboard typing or mouse movements. An original experiment is described, that aimed at practical evaluation of measurement procedures performed at the emotion monitoring stand...

  17. Radiological protection procedures for industrial applications of computed radiography

    International Nuclear Information System (INIS)

    Aquino, Josilto Oliveira de

    2009-03-01

    Due to its very particular characteristics, industrial radiography is responsible for roughly half of the relevant accidents in nuclear industry, in developed as well as in developing countries, according to the International Atomic Energy Agency (IAEA). Thus, safety and radiological protection in industrial gamma radiography have been receiving especial treatment by regulatory authorities of most Member States. The main objective of the present work was to evaluate, from the radioprotection point of view, the main advantages of computed radiography (CR) for filmless industrial radiography. In order to accomplish this, both techniques, i.e. conventional and filmless computed radiography were evaluated and compared through practical studies. After the studies performed at the present work it was concluded that computed radiography significantly reduces the inherent doses, reflecting in smaller restricted areas and costs, with consequent improvement in radiological protection and safety. (author)

  18. Condensation of pure and near-azeotropic refrigerants in microfin tubes: A new computational procedure

    Energy Technology Data Exchange (ETDEWEB)

    Cavallini, A; Del Col, D; Mancin, S; Rossetto, L [Dipartimento di Fisica Tecnica, University of Padova, Via Venezia 1, Padova 35131 (Italy)

    2009-01-15

    Microfin tubes are widely used in air cooled and water cooled heat exchangers for heat pump and refrigeration applications during condensation or evaporation of refrigerants. In order to design heat exchangers and to optimize heat transfer surfaces, accurate procedures for computing pressure drops and heat transfer coefficients are necessary. This paper presents a new simple model for the prediction of the heat transfer coefficient to be applied to condensation in horizontal microfin tubes of halogenated and natural refrigerants, pure fluids or nearly azeotropic mixtures. The updated model accounts for refrigerant physical properties, two-phase flow patterns in microfin tubes and geometrical characteristics of the tubes. It is validated against a data bank of 3115 experimental heat transfer coefficients measured in different independent laboratories all over the world including diverse inside tube geometries and different condensing refrigerants among which R22, R134a, R123, R410A and CO{sub 2}. (author)

  19. The importance of trust in computer security

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2014-01-01

    The computer security community has traditionally regarded security as a “hard” property that can be modelled and formally proven under certain simplifying assumptions. Traditional security technologies assume that computer users are either malicious, e.g. hackers or spies, or benevolent, competent...... and well informed about the security policies. Over the past two decades, however, computing has proliferated into all aspects of modern society and the spread of malicious software (malware) like worms, viruses and botnets have become an increasing threat. This development indicates a failure in some...... of the fundamental assumptions that underpin existing computer security technologies and that a new view of computer security is long overdue. In this paper, we examine traditionalmodels, policies and mechanisms of computer security in order to identify areas where the fundamental assumptions may fail. In particular...

  20. School Safety Policies With Emphasis on Physical Education, Athletics and Recreation.

    Science.gov (United States)

    American Association for Health, Physical Education, and Recreation, Washington, DC.

    This booklet outlines principles of hazard control, school accident problems, and the need for guidelines and policies. Suggested general school safety policies, guidelines for courses in safety education and for the provision of facilities and supplies, policies for the administration of first aid and emergency care, and procedures for reporting…

  1. Human factors evaluation of remote afterloading brachytherapy. Supporting analyses of human-system interfaces, procedures and practices, training and organizational practices and policies. Volume 3

    International Nuclear Information System (INIS)

    Callan, J.R.; Kelly, R.T.; Quinn, M.L.

    1995-07-01

    A human factors project on the use of nuclear by-product material to treat cancer using remotely operated afterloaders was undertaken by the Nuclear Regulatory Commission. The purpose of the project was to identify factors that contribute to human error in the system for remote afterloading brachytherapy (RAB). This report documents the findings from the second, third, fourth, and fifth phases of the project, which involved detailed analyses of four major aspects of the RAB system linked to human error: human-system interfaces; procedures and practices; training practices and policies; and organizational practices and policies, respectively. Findings based on these analyses provided factual and conceptual support for the final phase of this project, which identified factors leading to human error in RAB. The impact of those factors on RAB performance was then evaluated and prioritized in terms of safety significance, and alternative approaches for resolving safety significant problems were identified and evaluated

  2. Human factors evaluation of remote afterloading brachytherapy. Supporting analyses of human-system interfaces, procedures and practices, training and organizational practices and policies. Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    Callan, J.R.; Kelly, R.T.; Quinn, M.L. [Pacific Science & Engineering Group, San Diego, CA (United States)] [and others

    1995-07-01

    A human factors project on the use of nuclear by-product material to treat cancer using remotely operated afterloaders was undertaken by the Nuclear Regulatory Commission. The purpose of the project was to identify factors that contribute to human error in the system for remote afterloading brachytherapy (RAB). This report documents the findings from the second, third, fourth, and fifth phases of the project, which involved detailed analyses of four major aspects of the RAB system linked to human error: human-system interfaces; procedures and practices; training practices and policies; and organizational practices and policies, respectively. Findings based on these analyses provided factual and conceptual support for the final phase of this project, which identified factors leading to human error in RAB. The impact of those factors on RAB performance was then evaluated and prioritized in terms of safety significance, and alternative approaches for resolving safety significant problems were identified and evaluated.

  3. 3. Procedures and Recursion

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 1; Issue 6. Algorithms Procedures and Recursion. R K Shyamasundar. Series Article Volume 1 ... Author Affiliations. R K Shyamasundar1. Computer Science Group, Tata Institute of Fundamental Research, Homi Bhabha Road Mumbai 400 005, India.

  4. Discharge Fee Policy Analysis: A Computable General Equilibrium (CGE Model of Water Resources and Water Environments

    Directory of Open Access Journals (Sweden)

    Guohua Fang

    2016-09-01

    Full Text Available To alleviate increasingly serious water pollution and shortages in developing countries, various kinds of policies have been implemented by local governments. It is vital to quantify and evaluate the performance and potential economic impacts of these policies. This study develops a Computable General Equilibrium (CGE model to simulate the regional economic and environmental effects of discharge fees. Firstly, water resources and water environment factors are separated from the input and output sources of the National Economic Production Department. Secondly, an extended Social Accounting Matrix (SAM of Jiangsu province is developed to simulate various scenarios. By changing values of the discharge fees (increased by 50%, 100% and 150%, three scenarios are simulated to examine their influence on the overall economy and each industry. The simulation results show that an increased fee will have a negative impact on Gross Domestic Product (GDP. However, waste water may be effectively controlled. Also, this study demonstrates that along with the economic costs, the increase of the discharge fee will lead to the upgrading of industrial structures from a situation of heavy pollution to one of light pollution which is beneficial to the sustainable development of the economy and the protection of the environment.

  5. Big Data for Public Health Policy-Making: Policy Empowerment.

    Science.gov (United States)

    Mählmann, Laura; Reumann, Matthias; Evangelatos, Nikolaos; Brand, Angela

    2018-04-04

    Digitization is considered to radically transform healthcare. As such, with seemingly unlimited opportunities to collect data, it will play an important role in the public health policy-making process. In this context, health data cooperatives (HDC) are a key component and core element for public health policy-making and for exploiting the potential of all the existing and rapidly emerging data sources. Being able to leverage all the data requires overcoming the computational, algorithmic, and technological challenges that characterize today's highly heterogeneous data landscape, as well as a host of diverse regulatory, normative, governance, and policy constraints. The full potential of big data can only be realized if data are being made accessible and shared. Treating research data as a public good, creating HDC to empower citizens through citizen-owned health data, and allowing data access for research and the development of new diagnostics, therapies, and public health policies will yield the transformative impact of digital health. The HDC model for data governance is an arrangement, based on moral codes, that encourages citizens to participate in the improvement of their own health. This then enables public health institutions and policymakers to monitor policy changes and evaluate their impact and risk on a population level. © 2018 S. Karger AG, Basel.

  6. Internal Control Organization Procedure

    OpenAIRE

    Radu Dorin Lenghel

    2013-01-01

    Internal control represents the totality of policies and procedures adopted by management, which contribute: to the fulfilment of managerial objectives, to the prevention and detection of frauds or errors, to the accuracy and exhaustiveness of accounting entries, as well as to the preparation in due course of financial accounting information. Internal control represents a managerial instrument which assures the fulfilment of objectives of the entity, being an ongoing process in which administ...

  7. A baseline-free procedure for transformation models under interval censorship.

    Science.gov (United States)

    Gu, Ming Gao; Sun, Liuquan; Zuo, Guoxin

    2005-12-01

    An important property of Cox regression model is that the estimation of regression parameters using the partial likelihood procedure does not depend on its baseline survival function. We call such a procedure baseline-free. Using marginal likelihood, we show that an baseline-free procedure can be derived for a class of general transformation models under interval censoring framework. The baseline-free procedure results a simplified and stable computation algorithm for some complicated and important semiparametric models, such as frailty models and heteroscedastic hazard/rank regression models, where the estimation procedures so far available involve estimation of the infinite dimensional baseline function. A detailed computational algorithm using Markov Chain Monte Carlo stochastic approximation is presented. The proposed procedure is demonstrated through extensive simulation studies, showing the validity of asymptotic consistency and normality. We also illustrate the procedure with a real data set from a study of breast cancer. A heuristic argument showing that the score function is a mean zero martingale is provided.

  8. 22 CFR 161.2 - Policy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Policy. 161.2 Section 161.2 Foreign Relations... environmental review procedures with the Department's decisionmaking process; (d) Invite and facilitate, when appropriate, Federal, State and local governmental authorities and public involvement in decisions which...

  9. THE STAGES OF ACCOUNTING POLICIES FORMATION

    OpenAIRE

    Kafka, Sofiia

    2017-01-01

    In the article the research of the existing scientists’ approaches to the procedure of the company accounting policy formation have been done, their critical analysis has been made, the major groups of issues and problems raised in scientific works have been found out, and those ones, which require the further up-to- date refinement, have been identified: the formation of the stages in projecting of the accounting policy in accordance with requirements of legislation. For the purposes of stud...

  10. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  11. 42 CFR 50.404 - What disputes are covered by these procedures?

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false What disputes are covered by these procedures? 50.404 Section 50.404 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS POLICIES OF GENERAL APPLICABILITY Public Health Service Grant Appeals Procedure § 50.404 What disputes are...

  12. EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

    Directory of Open Access Journals (Sweden)

    Sergio Mauricio Martínez Monterrubio

    2015-01-01

    Full Text Available The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

  13. EMRlog method for computer security for electronic medical records with logic and data mining.

    Science.gov (United States)

    Martínez Monterrubio, Sergio Mauricio; Frausto Solis, Juan; Monroy Borja, Raúl

    2015-01-01

    The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

  14. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  15. Healthcare Policy Statement on the Utility of Coronary Computed Tomography for Evaluation of Cardiovascular Conditions and Preventive Healthcare: From the Health Policy Working Group of the Society of Cardiovascular Computed Tomography.

    Science.gov (United States)

    Slim, Ahmad M; Jerome, Scott; Blankstein, Ron; Weigold, Wm Guy; Patel, Amit R; Kalra, Dinesh K; Miller, Ryan; Branch, Kelley; Rabbat, Mark G; Hecht, Harvey; Nicol, Edward D; Villines, Todd C; Shaw, Leslee J

    The rising cost of healthcare is prompting numerous policy and advocacy discussions regarding strategies for constraining growth and creating a more efficient and effective healthcare system. Cardiovascular imaging is central to the care of patients at risk of, and living with, heart disease. Estimates are that utilization of cardiovascular imaging exceeds 20 million studies per year. The Society of Cardiovascular CT (SCCT), alongside Rush University Medical Center, and in collaboration with government agencies, regional payers, and industry healthcare experts met in November 2016 in Chicago, IL to evaluate obstacles and hurdles facing the cardiovascular imaging community and how they can contribute to efficacy while maintaining or even improving outcomes and quality. The summit incorporated inputs from payers, providers, and patients' perspectives, providing a platform for all voices to be heard, allowing for a constructive dialogue with potential solutions moving forward. This article outlines the proceedings from the summit, with a detailed review of past hurdles, current status, and potential solutions as we move forward in an ever-changing healthcare landscape. Copyright © 2017 Society of Cardiovascular Computed Tomography. All rights reserved.

  16. Beyond the drugs : non-pharmacological strategies to optimize procedural care in children

    NARCIS (Netherlands)

    Leroy, Piet L.; Costa, Luciane R.; Emmanouil, Dimitris; van Beukering, Alice; Franck, Linda S.

    2016-01-01

    Purpose of review Painful and/or stressful medical procedures mean a substantial burden for sick children. There is good evidence that procedural comfort can be optimized by a comprehensive comfort-directed policy containing the triad of non-pharmacological strategies (NPS) in all cases, timely or

  17. Core on-line monitoring and computerized procedures systems

    International Nuclear Information System (INIS)

    Gangloff, W.C.

    1986-01-01

    The availability of operating nuclear power plants has been affected significantly by the difficulty people have in coping with the complexity of the plants and the operating procedures. Two ways to use modern computer technology to ease the burden of coping are discussed in this paper, an on-line core monitoring system with predictive capability and a computerized procedures system using live plant data. These systems reduce human errors by presenting information rather than simply data, using the computer to manipulate the data, but leaving the decisions to the plant operator

  18. THE STAGES OF ACCOUNTING POLICIES FORMATION

    Directory of Open Access Journals (Sweden)

    Sofiia Kafka

    2017-03-01

    Full Text Available In the article the research of the existing scientists’ approaches to the procedure of the company accounting policy formation have been done, their critical analysis has been made, the major groups of issues and problems raised in scientific works have been found out, and those ones, which require the further up-to- date refinement, have been identified: the formation of the stages in projecting of the accounting policy in accordance with requirements of legislation. For the purposes of study the methods of analysis and synthesis, systematic approach to study the process of developing the company accounting policy and logical method and simulation to systematize the information support of the processes mentioned have been used. As a result, a comprehensive approach to the formation of accounting policy has been worked out, the author's vision of the stages in projecting of the accounting policy and their contents has been also proposed and disclosed in details. Key words: accounting policy, accounting, elements of accounting policy, information support, financial position, simulation, reliable information.  

  19. Computed Tomography (CT) -- Sinuses

    Medline Plus

    Full Text Available ... are the limitations of CT of the Sinuses? What is CT (Computed Tomography) of the Sinuses? Computed ... nasal cavity by small openings. top of page What are some common uses of the procedure? CT ...

  20. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  1. Multilateral negotiations over climate change policy

    Energy Technology Data Exchange (ETDEWEB)

    Costa Pinto, L.M.; Harrison, G.W. [Universidade do Minho, Braga (Portugal). Nucleo de Investigacao em Microeconomia Aplicada, Departmento de Economia

    2000-07-01

    Negotiations in the real world have many features that tend to be ignored in policy modelling. They are often multilateral, involving many negotiating parties with preferences over outcomes that can differ substantially. They are also often multi-dimensional, in the sense that several policies are negotiated over simultaneously. Trade negotiations are a prime example, as are negotiations over environmental policies to abate CO{sub 2}. The authors demonstrate how one can formally model this type of negotiation process. They use a policy-oriented computable general equilibrium model to generate preference functions which are then used in a formal multilateral bargaining game. The case study is on climate change policy, but the main contribution is to demonstrate how one can integrate formal economic models of the impacts of policies with formal bargaining models of the negotiations over those policies. 8 refs., 2 figs., 6 tabs.

  2. Radiation control standards and procedures

    Energy Technology Data Exchange (ETDEWEB)

    1956-12-14

    This manual contains the Radiation Control Standards'' and Radiation Control Procedures'' at Hanford Operations which have been established to provide the necessary control radiation exposures within Irradiation Processing Department. Provision is also made for including, in the form of Bulletins'', other radiological information of general interest to IPD personnel. The purpose of the standards is to establish firm radiological limits within which the Irradiation Processing Department will operate, and to outline our radiation control program in sufficient detail to insure uniform and consistent application throughout all IPD facilities. Radiation Control Procedures are intended to prescribe the best method of accomplishing an objective within the limitations of the Radiation Control Standards. A procedure may be changed at any time provided the suggested changes is generally agreeable to management involved, and is consistent with department policies and the Radiation Control Standards.

  3. Tablets: A Survey of Circulation Policies at Academic Libraries

    Science.gov (United States)

    Derr, Janice; Tolppanen, Bradley P.

    2015-01-01

    This article presents the results of a Web-based survey regarding the circulation of tablets in academic libraries. The survey, which was completed by 61 respondents, identifies the most common circulation policies and procedures used. These results will help other academic institutions develop their own policy or update existing ones. Areas of…

  4. Renewable Energy Policy Fact sheet - Slovenia

    International Nuclear Information System (INIS)

    2017-07-01

    The EurObserv'ER policy profiles give a snapshot of the renewable energy policy in the EU Member States. In Slovenia, electricity from renewable sources is promoted through a feed-in tariff (so called 'guaranteed purchase') and a premium tariff (so called 'operating premium'), both granted through a tender procedure. Renewable energy sources for heating purposes are promoted mainly through loans on concessional terms and subsidies. The main incentive for renewable energy use in transport are tax exemptions and subsidies

  5. 31 CFR 50.72 - Establishment of Federal Terrorism Policy Surcharge.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Establishment of Federal Terrorism... TERRORISM RISK INSURANCE PROGRAM Recoupment and Surcharge Procedures § 50.72 Establishment of Federal Terrorism Policy Surcharge. (a) Treasury will establish the Federal Terrorism Policy Surcharge based on the...

  6. 48 CFR 3004.470-2 - Policy.

    Science.gov (United States)

    2010-10-01

    ... unclassified information. MD 4300.1, entitled Information Technology Systems Security, and the DHS Sensitive Systems Handbook, prescribe the policies and procedures on security for Information Technology resources... 3004.470-2 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY...

  7. The Devil Is in the Details: Development of Policy and Procedure in the Battle River Project

    Science.gov (United States)

    Gleddie, Doug L.

    2012-01-01

    Objective: Guidelines from a variety of jurisdictions for the health-promoting schools (HPS) approach include healthy school policy as a critical element. Research also supports the importance of policy; however, there seems to be a lack of information on how to develop and implement policy. The article examines the processes involved in one…

  8. DCE. Future IHEP's computing environment

    International Nuclear Information System (INIS)

    Zheng Guorui; Liu Xiaoling

    1995-01-01

    IHEP'S computing environment consists of several different computing environments established on IHEP computer networks. In which, the BES environment supported HEP computing is the main part of IHEP computing environment. Combining with the procedure of improvement and extension of BES environment, the authors describe development of computing environments in outline as viewed from high energy physics (HEP) environment establishment. The direction of developing to distributed computing of the IHEP computing environment based on the developing trend of present distributed computing is presented

  9. Computational and experimental methods for enclosed natural convection

    International Nuclear Information System (INIS)

    Larson, D.W.; Gartling, D.K.; Schimmel, W.P. Jr.

    1977-10-01

    Two computational procedures and one optical experimental procedure for studying enclosed natural convection are described. The finite-difference and finite-element numerical methods are developed and several sample problems are solved. Results obtained from the two computational approaches are compared. A temperature-visualization scheme using laser holographic interferometry is described, and results from this experimental procedure are compared with results from both numerical methods

  10. PC based temporary shielding administrative procedure (TSAP)

    International Nuclear Information System (INIS)

    Olsen, D.E.; Pederson, G.E.; Hamby, P.N.

    1995-01-01

    A completely new Administrative Procedure for temporary shielding was developed for use at Commonwealth Edison's six nuclear stations. This procedure promotes the use of shielding, and addresses industry requirements for the use and control of temporary shielding. The importance of an effective procedure has increased since more temporary shielding is being used as ALARA goals become more ambitious. To help implement the administrative procedure, a personal computer software program was written to incorporate the procedural requirements. This software incorporates the useability of a Windows graphical user interface with extensive help and database features. This combination of a comprehensive administrative procedure and user friendly software promotes the effective use and management of temporary shielding while ensuring that industry requirements are met

  11. PC based temporary shielding administrative procedure (TSAP)

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, D.E.; Pederson, G.E. [Sargent & Lundy, Chicago, IL (United States); Hamby, P.N. [Commonwealth Edison Co., Downers Grove, IL (United States)

    1995-03-01

    A completely new Administrative Procedure for temporary shielding was developed for use at Commonwealth Edison`s six nuclear stations. This procedure promotes the use of shielding, and addresses industry requirements for the use and control of temporary shielding. The importance of an effective procedure has increased since more temporary shielding is being used as ALARA goals become more ambitious. To help implement the administrative procedure, a personal computer software program was written to incorporate the procedural requirements. This software incorporates the useability of a Windows graphical user interface with extensive help and database features. This combination of a comprehensive administrative procedure and user friendly software promotes the effective use and management of temporary shielding while ensuring that industry requirements are met.

  12. A Proposal of Indicators and Policy Framework for Innovation Benchmark in Europe

    OpenAIRE

    García Manjón, Juan Vicente

    2010-01-01

    The implementation of innovation policies has been adopted at European level from a common perspective. The European Council (2000) established open methods of coordination (OMC) in order to gain mutual understanding and achieving greater convergence on innovation policies, constituting a benchmarking procedure. However, the development of benchmarking analysis for innovation policies faces two major inconveniences: the lack of accepted innovation policy frameworks and the existence of sui...

  13. GWAS with longitudinal phenotypes : performance of approximate procedures

    NARCIS (Netherlands)

    Sikorska, Karolina; Mostafavi, Nahid; Uitterlinden, André; Rivadeneira, Fernando; Eilers, Paul HC; Lesaffre, Emmanuel

    2015-01-01

    Analysis of genome-wide association studies with longitudinal data using standard procedures, such as linear mixed model (LMM) fitting, leads to discouragingly long computation times. There is a need to speed up the computations significantly. In our previous work (Sikorska et al: Fast linear mixed

  14. GWAS with longitudinal phenotypes: Performance of approximate procedures

    NARCIS (Netherlands)

    K. Sikorska (Karolina); N.M. Montazeri (Nahid Mostafavi); A.G. Uitterlinden (André); F. Rivadeneira Ramirez (Fernando); P.H.C. Eilers (Paul); E.M.E.H. Lesaffre (Emmanuel)

    2015-01-01

    textabstractAnalysis of genome-wide association studies with longitudinal data using standard procedures, such as linear mixed model (LMM) fitting, leads to discouragingly long computation times. There is a need to speed up the computations significantly. In our previous work (Sikorska et al: Fast

  15. An approach to computing marginal land use change carbon intensities for bioenergy in policy applications

    International Nuclear Information System (INIS)

    Wise, Marshall; Hodson, Elke L.; Mignone, Bryan K.; Clarke, Leon; Waldhoff, Stephanie; Luckow, Patrick

    2015-01-01

    Accurately characterizing the emissions implications of bioenergy is increasingly important to the design of regional and global greenhouse gas mitigation policies. Market-based policies, in particular, often use information about carbon intensity to adjust relative deployment incentives for different energy sources. However, the carbon intensity of bioenergy is difficult to quantify because carbon emissions can occur when land use changes to expand production of bioenergy crops rather than simply when the fuel is consumed as for fossil fuels. Using a long-term, integrated assessment model, this paper develops an approach for computing the carbon intensity of bioenergy production that isolates the marginal impact of increasing production of a specific bioenergy crop in a specific region, taking into account economic competition among land uses. We explore several factors that affect emissions intensity and explain these results in the context of previous studies that use different approaches. Among the factors explored, our results suggest that the carbon intensity of bioenergy production from land use change (LUC) differs by a factor of two depending on the region in which the bioenergy crop is grown in the United States. Assumptions about international land use policies (such as those related to forest protection) and crop yields also significantly impact carbon intensity. Finally, we develop and demonstrate a generalized method for considering the varying time profile of LUC emissions from bioenergy production, taking into account the time path of future carbon prices, the discount rate and the time horizon. When evaluated in the context of power sector applications, we found electricity from bioenergy crops to be less carbon-intensive than conventional coal-fired electricity generation and often less carbon-intensive than natural-gas fired generation. - Highlights: • Modeling methodology for assessing land use change emissions from bioenergy • Use GCAM

  16. 37 CFR 201.26 - Recordation of documents pertaining to computer shareware and donation of public domain computer...

    Science.gov (United States)

    2010-07-01

    ... pertaining to computer shareware and donation of public domain computer software. 201.26 Section 201.26... GENERAL PROVISIONS § 201.26 Recordation of documents pertaining to computer shareware and donation of public domain computer software. (a) General. This section prescribes the procedures for submission of...

  17. Transthoracic Adrenal Biopsy Procedure Using Artificial Carbon Dioxide Pneumothorax as Outpatient Procedure

    Energy Technology Data Exchange (ETDEWEB)

    Favelier, Sylvain [CHU (University Hospital), Department of Radiology (France); Guiu, Severine [Georges-Francois Leclerc Cancer Center, Department of Oncology (France); Cherblanc, Violaine; Cercueil, Jean-Pierre; Krause, Denis; Guiu, Boris, E-mail: boris.guiu@chu-dijon.fr [CHU (University Hospital), Department of Radiology (France)

    2013-08-01

    Many routes have been described for percutaneous adrenal gland biopsy. They require either a complex non-axial path or a long hydrodissection or even pass through an organ thereby increasing complications. We describe here an approach using an artificially-induced carbon dioxide (CO{sub 2}) pneumothorax, performed as an outpatient procedure in a 57-year-old woman. Under local anaesthesia, 200 ml of CO{sub 2} was injected in the pleural space through a Veress needle under computed tomography fluoroscopy, to clear the lung parenchyma from the biopsy route. Using this technique, transthoracic adrenal biopsy can be performed under simple local anaesthesia as an safely outpatient procedure.

  18. Efficient and robust relaxation procedures for multi-component mixtures including phase transition

    International Nuclear Information System (INIS)

    Han, Ee; Hantke, Maren; Müller, Siegfried

    2017-01-01

    We consider a thermodynamic consistent multi-component model in multi-dimensions that is a generalization of the classical two-phase flow model of Baer and Nunziato. The exchange of mass, momentum and energy between the phases is described by additional source terms. Typically these terms are handled by relaxation procedures. Available relaxation procedures suffer from efficiency and robustness resulting in very costly computations that in general only allow for one-dimensional computations. Therefore we focus on the development of new efficient and robust numerical methods for relaxation processes. We derive exact procedures to determine mechanical and thermal equilibrium states. Further we introduce a novel iterative method to treat the mass transfer for a three component mixture. All new procedures can be extended to an arbitrary number of inert ideal gases. We prove existence, uniqueness and physical admissibility of the resulting states and convergence of our new procedures. Efficiency and robustness of the procedures are verified by means of numerical computations in one and two space dimensions. - Highlights: • We develop novel relaxation procedures for a generalized, thermodynamically consistent Baer–Nunziato type model. • Exact procedures for mechanical and thermal relaxation procedures avoid artificial parameters. • Existence, uniqueness and physical admissibility of the equilibrium states are proven for special mixtures. • A novel iterative method for mass transfer is introduced for a three component mixture providing a unique and admissible equilibrium state.

  19. 24 CFR 7.1 - Policy.

    Science.gov (United States)

    2010-04-01

    ... Discrimination in Employment Act of 1967 (ADEA) (29 U.S.C. 621 et seq.); the Equal Pay Act of 1963 (29 U.S.C... Urban Development Office of the Secretary, Department of Housing and Urban Development EQUAL EMPLOYMENT OPPORTUNITY; POLICY, PROCEDURES AND PROGRAMS Equal Employment Opportunity Without Regard to Race, Color...

  20. 18 CFR 725.2 - Policy.

    Science.gov (United States)

    2010-04-01

    ...) Reduce the risk of flood loss; (d) Promote the use of nonstructural loss reduction methods to reduce the risk of flood loss; (e) Minimize the impact of floods on human health, safety and welfare; (f) Minimize... its procedures for implementing the National Environmental Policy Act. The Council shall take action...

  1. 16 CFR 2.4 - Investigational policy.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Investigational policy. 2.4 Section 2.4 Commercial Practices FEDERAL TRADE COMMISSION ORGANIZATION, PROCEDURES AND RULES OF PRACTICE NONADJUDICATIVE... compulsory processes provided for by law. [45 FR 36341, May 29, 1980] ...

  2. Improving the efficiency of aerodynamic shape optimization procedures

    Science.gov (United States)

    Burgreen, Greg W.; Baysal, Oktay; Eleshaky, Mohamed E.

    1992-01-01

    The computational efficiency of an aerodynamic shape optimization procedure which is based on discrete sensitivity analysis is increased through the implementation of two improvements. The first improvement involves replacing a grid point-based approach for surface representation with a Bezier-Bernstein polynomial parameterization of the surface. Explicit analytical expressions for the grid sensitivity terms are developed for both approaches. The second improvement proposes the use of Newton's method in lieu of an alternating direction implicit (ADI) methodology to calculate the highly converged flow solutions which are required to compute the sensitivity coefficients. The modified design procedure is demonstrated by optimizing the shape of an internal-external nozzle configuration. A substantial factor of 8 decrease in computational time for the optimization process was achieved by implementing both of the design improvements.

  3. Influence of radioactive sources discretization in the Monte Carlo computational simulations of brachytherapy procedures: a case study on the procedures for treatment of prostate cancer

    International Nuclear Information System (INIS)

    Barbosa, Antonio Konrado de Santana; Vieira, Jose Wilson; Costa, Kleber Souza Silva; Lima, Fernando Roberto de Andrade

    2011-01-01

    Radiotherapy computational simulation procedures using Monte Carlo (MC) methods have shown to be increasingly important to the improvement of cancer fighting strategies. One of the biases in this practice is the discretization of the radioactive source in brachytherapy simulations, which often do not match with a real situation. This study had the aim to identify and to measure the influence of radioactive sources discretization in brachytherapy MC simulations when compared to those that do not present discretization, using prostate brachytherapy with Iodine-125 radionuclide as model. Simulations were carried out with 108 events with both types of sources to compare them using EGSnrc code associated to MASH phantom in orthostatic and supine positions with some anatomic adaptations. Significant alterations were found, especially regarding bladder, rectum and the prostate itself. It can be concluded that there is a need to discretized sources in brachytherapy simulations to ensure its representativeness. (author)

  4. Simulating Policy Processes through Electronic Mail.

    Science.gov (United States)

    Flynn, John P.

    1987-01-01

    Focuses on the use of electronic mail for teaching and learning about social welfare policy processes and compares electronic mail as a simulation medium to more structured computer applications. (Author)

  5. Policy Process Editor for P3BM Software

    Science.gov (United States)

    James, Mark; Chang, Hsin-Ping; Chow, Edward T.; Crichton, Gerald A.

    2010-01-01

    A computer program enables generation, in the form of graphical representations of process flows with embedded natural-language policy statements, input to a suite of policy-, process-, and performance-based management (P3BM) software. This program (1) serves as an interface between users and the Hunter software, which translates the input into machine-readable form; and (2) enables users to initialize and monitor the policy-implementation process. This program provides an intuitive graphical interface for incorporating natural-language policy statements into business-process flow diagrams. Thus, the program enables users who dictate policies to intuitively embed their intended process flows as they state the policies, reducing the likelihood of errors and reducing the time between declaration and execution of policy.

  6. The ICC’s Witness Protection Measures Through the Lens of Policy-Oriented Jurisprudence

    OpenAIRE

    Kayuni, Steven William

    2015-01-01

    The protection of witnesses from intimidation or harm has become a firmly entrenched part of modern criminal justice systems. The ICC’s decisionmaking with regard to procedural and non-procedural protective measures has on one hand reinforced the integrity and success of the judicial process, while on the other, led to numerous interpretational and applicability challenges of both policy and law. This article aims at designating policy-oriented jurisprudence as a possible theoretical approach...

  7. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  8. Dialogic Spaces: A Critical Policy Development Perspective of Educational Leadership Qualifications

    Science.gov (United States)

    Smith, Déirdre; Kelly, Darron; Allard, Carson

    2017-01-01

    The critical exploration of policy development processes employed to construct leadership qualifications is the focus of this inquiry. This exploration is made through specific application of the necessary conditions of Habermasian "practical discourse" to current dialogic procedures used to develop policies for principal, supervisory…

  9. Political motives in climate and energy policy

    Energy Technology Data Exchange (ETDEWEB)

    Bruvoll, Annegrete; Dalen, Hanne Marit; Larsen, Bodil M.

    2012-07-01

    Standard economic theory provides clear guidance on the design of cost-efficient policy in the presence of imperfect markets and externalities. However, observed policies reveal extensive discrepancies between principles and practise. Based on interviews with core politicians from the Norwegian parliament, we investigate causes for the lack of cost efficiency in climate and energy policy. We find that politicians agree with the notion of cost efficiency in principle, but rather than ascribing efficient instruments directed at specific policy goals, they include concerns for industrial and regional development, income distribution and employment in the environmental policy design. Lacking insight in the functioning of economic instruments and perceptions of a non-binding budget constraint also violate the requirements for efficient policy decisions. The findings point to the role of economists and social scientists to communicate the functioning of complex instruments. Improved compensation procedures could help reduce the politicians' incentives to undermine efficiency in order to avoid unwanted distributional effects.(Author)

  10. The ACEGES laboratory for energy policy: Exploring the production of crude oil

    International Nuclear Information System (INIS)

    Voudouris, Vlasios; Stasinopoulos, Dimitrios; Rigby, Robert; Di Maio, Carlo

    2011-01-01

    An agent-based computational laboratory for exploratory energy policy by means of controlled computational experiments is proposed. It is termed the ACEGES (agent-based computational economics of the global energy system). In particular, it is shown how agent-based modelling and simulation can be applied to understand better the challenging outlook for oil production by accounting for uncertainties in resource estimates, demand growth, production growth and peak/decline point. The approach emphasises the idea that the oil system is better modelled not as black-box abode of 'the invisible hand' but as a complex system whose macroscopic explananda emerges from the interactions of its constituent components. Given the estimated volumes of oil originally present before any extraction, simulations show that on average the world peak of crude oil production may happen in the broad vicinity of the time region between 2008 and 2027. Using the proposed petroleum market diversity, the market diversity weakness rapidly towards the peak year. - Highlights: → Development of oil scenarios using computational experiments. → Support of energy policy using agent-based modelling and simulation. → Demonstration of the agent-based computational economics of the global energy system (ACEGES) policy-support tool. → Energy policy by means of evidence-based forward-looking probabilistic forecasts.

  11. FID Statutes, Rules of Procedures, Terms of Reference.

    Science.gov (United States)

    International Federation for Documentation, The Hague (Netherlands).

    Following a brief historical chronology of the International Federation for Documentation (FID), the organization's statutes are presented in the original French text and in English. The rules of procedures outline membership policy, conduct of technical bodies, FID conferences, publications, and regional commissions. Terms of reference are…

  12. Cloud Computing in the EU Policy Sphere

    NARCIS (Netherlands)

    Sluijs, J.P.J.B.; Larouche, P.; Sauter, W.

    2011-01-01

    Cloud computing is a new development that is based on the premise that data and applications are stored centrally and can be accessed through the Internet. Our Article sets up a broad analysis of how the emergence of clouds relates to European law. We single out European competition law, network

  13. Corporate Social Media Use Policy: Meeting Business and Ethical Responsibilities

    OpenAIRE

    Gotterbarn , Don

    2012-01-01

    Part 5: Section 4: Citizens’ Involvement, Citizens’ Rights and ICT; International audience; Rapidly developing social media technology has made obsolete many corporate computer use policies. New types of policies need to be developed which address the blurring of the distinction between corporate and personal computing. The gradual change in whose smart technology is used, and how it is used in the service of employers needs to be controlled to promote possible positive effects for the employ...

  14. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  15. Balancing Exploration, Uncertainty Representation and Computational Time in Many-Objective Reservoir Policy Optimization

    Science.gov (United States)

    Zatarain-Salazar, J.; Reed, P. M.; Quinn, J.; Giuliani, M.; Castelletti, A.

    2016-12-01

    As we confront the challenges of managing river basin systems with a large number of reservoirs and increasingly uncertain tradeoffs impacting their operations (due to, e.g. climate change, changing energy markets, population pressures, ecosystem services, etc.), evolutionary many-objective direct policy search (EMODPS) solution strategies will need to address the computational demands associated with simulating more uncertainties and therefore optimizing over increasingly noisy objective evaluations. Diagnostic assessments of state-of-the-art many-objective evolutionary algorithms (MOEAs) to support EMODPS have highlighted that search time (or number of function evaluations) and auto-adaptive search are key features for successful optimization. Furthermore, auto-adaptive MOEA search operators are themselves sensitive to having a sufficient number of function evaluations to learn successful strategies for exploring complex spaces and for escaping from local optima when stagnation is detected. Fortunately, recent parallel developments allow coordinated runs that enhance auto-adaptive algorithmic learning and can handle scalable and reliable search with limited wall-clock time, but at the expense of the total number of function evaluations. In this study, we analyze this tradeoff between parallel coordination and depth of search using different parallelization schemes of the Multi-Master Borg on a many-objective stochastic control problem. We also consider the tradeoff between better representing uncertainty in the stochastic optimization, and simplifying this representation to shorten the function evaluation time and allow for greater search. Our analysis focuses on the Lower Susquehanna River Basin (LSRB) system where multiple competing objectives for hydropower production, urban water supply, recreation and environmental flows need to be balanced. Our results provide guidance for balancing exploration, uncertainty, and computational demands when using the EMODPS

  16. Considerations When Including Students with Disabilities in Test Security Policies. NCEO Policy Directions. Number 23

    Science.gov (United States)

    Lazarus, Sheryl; Thurlow, Martha

    2015-01-01

    Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…

  17. Computer simulation games in population and education.

    Science.gov (United States)

    Moreland, R S

    1988-01-01

    Computer-based simulation games are effective training tools that have several advantages. They enable players to learn in a nonthreatening manner and develop strategies to achieve goals in a dynamic environment. They also provide visual feedback on the effects of players' decisions, encourage players to explore and experiment with options before making final decisions, and develop players' skills in analysis, decision making, and cooperation. 2 games have been developed by the Research Triangle Institute for public-sector planning agencies interested in or dealing with developing countries. The UN Population and Development Game teaches players about the interaction between population variables and the national economy and how population policies complement other national policies, such as education. The BRIDGES Education Planning Game focuses on the effects education has on national policies. In both games, the computer simulates the reactions of a fictional country's socioeconomic system to players' decisions. Players can change decisions after seeing their effects on a computer screen and thus can improve their performance in achieving goals.

  18. The Next Step in Deployment of Computer Based Procedures For Field Workers: Insights And Results From Field Evaluations at Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna; Le Blanc, Katya L.; Bly, Aaron

    2015-02-01

    The paper-based procedures currently used for nearly all activities in the commercial nuclear power industry have a long history of ensuring safe operation of the plants. However, there is potential to greatly increase efficiency and safety by improving how the human operator interacts with the procedures. One way to achieve these improvements is through the use of computer-based procedures (CBPs). A CBP system offers a vast variety of improvements, such as context driven job aids, integrated human performance tools (e.g., placekeeping, correct component verification, etc.), and dynamic step presentation. The latter means that the CBP system could only display relevant steps based on operating mode, plant status, and the task at hand. A dynamic presentation of the procedure (also known as context-sensitive procedures) will guide the operator down the path of relevant steps based on the current conditions. This feature will reduce the operator’s workload and inherently reduce the risk of incorrectly marking a step as not applicable and the risk of incorrectly performing a step that should be marked as not applicable. The research team at the Idaho National Laboratory has developed a prototype CBP system for field workers, which has been evaluated from a human factors and usability perspective in four laboratory studies. Based on the results from each study revisions were made to the CBP system. However, a crucial step to get the end users' (e.g., auxiliary operators, maintenance technicians, etc.) acceptance is to put the system in their hands and let them use it as a part of their everyday work activities. In the spring 2014 the first field evaluation of the INL CBP system was conducted at a nuclear power plant. Auxiliary operators conduct a functional test of one out of three backup air compressors each week. During the field evaluation activity, one auxiliary operator conducted the test with the paper-based procedure while a second auxiliary operator

  19. 48 CFR 39.101 - Policy.

    Science.gov (United States)

    2010-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... environmental assessment of personal computer products (see 23.705). (2) When developing an acquisition strategy... information technology security policies and requirements, including use of common security configurations...

  20. International Development Research Centre Corporate Policy Travel

    International Development Research Centre (IDRC) Digital Library (Canada)

    André Lavoie

    put in place procedures to issue advances to employees entitled to receive them; ... recover Canadian tax credits where expense reports include Canadian ... Any instances of abuse, fraud, or non-compliance with the IDRC travel policy will be ...

  1. HuRECA: Human Reliability Evaluator for Computer-based Control Room Actions

    International Nuclear Information System (INIS)

    Kim, Jae Whan; Lee, Seung Jun; Jang, Seung Cheol

    2011-01-01

    As computer-based design features such as computer-based procedures (CBP), soft controls (SCs), and integrated information systems are being adopted in main control rooms (MCR) of nuclear power plants, a human reliability analysis (HRA) method capable of dealing with the effects of these design features on human reliability is needed. From the observations of human factors engineering verification and validation experiments, we have drawn some major important characteristics on operator behaviors and design-related influencing factors (DIFs) from the perspective of human reliability. Firstly, there are new DIFs that should be considered in developing an HRA method for computer-based control rooms including especially CBP and SCs. In the case of the computer-based procedure rather than the paper-based procedure, the structural and managerial elements should be considered as important PSFs in addition to the procedural contents. In the case of the soft controllers, the so-called interface management tasks (or secondary tasks) should be reflected in the assessment of human error probability. Secondly, computer-based control rooms can provide more effective error recovery features than conventional control rooms. Major error recovery features for computer-based control rooms include the automatic logic checking function of the computer-based procedure and the information sharing feature of the general computer-based designs

  2. 77 FR 3102 - Procedures for Implementing the National Environmental Policy Act

    Science.gov (United States)

    2012-01-23

    ..., organizational changes, and procurement of routine goods and services. (ii) Issuance of procedural rules, manuals... routine data collection and analysis activities. (vi) Preparation and dissemination of information, including document mailings, publications, classroom materials, conferences, speaking engagements, Web sites...

  3. Computer methods in general relativity: algebraic computing

    CERN Document Server

    Araujo, M E; Skea, J E F; Koutras, A; Krasinski, A; Hobill, D; McLenaghan, R G; Christensen, S M

    1993-01-01

    Karlhede & MacCallum [1] gave a procedure for determining the Lie algebra of the isometry group of an arbitrary pseudo-Riemannian manifold, which they intended to im- plement using the symbolic manipulation package SHEEP but never did. We have recently finished making this procedure explicit by giving an algorithm suitable for implemen- tation on a computer [2]. Specifically, we have written an algorithm for determining the isometry group of a spacetime (in four dimensions), and partially implemented this algorithm using the symbolic manipulation package CLASSI, which is an extension of SHEEP.

  4. Automatic procedures for computing complete configuration geometry from individual component descriptions

    Science.gov (United States)

    Barger, Raymond L.; Adams, Mary S.

    1994-01-01

    Procedures are derived for developing a complete airplane surface geometry starting from component descriptions. The procedures involve locating the intersection lines of adjacent components and omitting any regions for which part of one surface lies within the other. The geometry files utilize the wave-drag (Harris) format, and output files are written in Hess format. Two algorithms are used: one, if both intersecting surfaces have airfoil cross sections; the other, if one of the surfaces has circular cross sections. Some sample results in graphical form are included.

  5. Understanding policy persistence-The case of police drug detection dog policy in NSW, Australia.

    Science.gov (United States)

    Hughes, Caitlin E; Ritter, Alison; Lancaster, Kari; Hoppe, Robert

    2017-06-01

    Significant research attention has been given to understanding the processes of drug policy reform. However, there has been surprisingly little analysis of the persistence of policy in the face of opposition and evidence of ineffectiveness. In this article we analysed just such a case - police drug detection dog policy in NSW, Australia. We sought to identify factors which may account for the continuation of this policy, in spite of counter-evidence and concerted advocacy. The analysis was conducted using the Advocacy Coalition Framework (ACF). We collated documents relating to NSW drug detection dog policy from 1995 to 2016, including parliamentary records (NSW Parliament Hansard), government and institutional reports, legislation, police procedures, books, media, and academic publications. Texts were then read, coded and classified against the core dimensions of the ACF, including subsystem actors and coalitions, their belief systems and resources and venues employed for policy debate. Three coalitions were identified as competing in the policy subsystem: security/law and order, civil liberties and harm reduction. Factors that aided policy stability were the continued dominance of the security/law and order coalition since they introduced the drug dog policy; a power imbalance enabling the ruling coalition to limit when and where the policy was discussed; and a highly adversarial policy subsystem. In this context even technical knowledge that dogs infringed civil liberties and increased risks of overdose were readily downplayed, leading to only incremental changes in implementation rather than policy cessation or wholesale revision. The analysis provides new insights into why the accumulation of new evidence and advocacy efforts can be insufficient to drive significant policy change. It poses a challenge for the evidence-based paradigm suggesting that in highly adversarial policy subsystems new evidence is unlikely to generate policy change without broader

  6. Automating sensitivity analysis of computer models using computer calculus

    International Nuclear Information System (INIS)

    Oblow, E.M.; Pin, F.G.

    1985-01-01

    An automated procedure for performing sensitivity analyses has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with ''direct'' and ''adjoint'' sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies. 24 refs., 2 figs

  7. Automating sensitivity analysis of computer models using computer calculus

    International Nuclear Information System (INIS)

    Oblow, E.M.; Pin, F.G.

    1986-01-01

    An automated procedure for performing sensitivity analysis has been developed. The procedure uses a new FORTRAN compiler with computer calculus capabilities to generate the derivatives needed to set up sensitivity equations. The new compiler is called GRESS - Gradient Enhanced Software System. Application of the automated procedure with direct and adjoint sensitivity theory for the analysis of non-linear, iterative systems of equations is discussed. Calculational efficiency consideration and techniques for adjoint sensitivity analysis are emphasized. The new approach is found to preserve the traditional advantages of adjoint theory while removing the tedious human effort previously needed to apply this theoretical methodology. Conclusions are drawn about the applicability of the automated procedure in numerical analysis and large-scale modelling sensitivity studies

  8. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  9. Open-Source Java for Teaching Computational Physics

    Science.gov (United States)

    Wolfgang, Christian; Gould, Harvey; Gould, Joshua; Tobochnik, Jan

    2001-11-01

    The switch from procedural to object-oriented (OO) programming has produced dramatic changes in professional software design. OO techniques have not, however, been widely adopted in computational physics. Although most physicists are familiar with procedural languages such as Fortran, few physicists have formal training in computer science and few therefore have made the switch to OO programming. The continued use of procedural languages in education is due, in part, to the lack of up-to-date curricular materials that combine current computational physics research topics with an OO framework. This talk describes an Open-Source curriculum development project to produce such material. Examples will be presented that show how OO techniques can be used to encapsulate the relevant Physics, the analysis, and the associated numerical methods.

  10. Emotion Monitoring – Verification of Physiological Characteristics Measurement Procedures

    Directory of Open Access Journals (Sweden)

    Landowska Agnieszka

    2014-12-01

    Full Text Available This paper concerns measurement procedures on an emotion monitoring stand designed for tracking human emotions in the Human-Computer Interaction with physiological characteristics. The paper addresses the key problem of physiological measurements being disturbed by a motion typical for human-computer interaction such as keyboard typing or mouse movements. An original experiment is described, that aimed at practical evaluation of measurement procedures performed at the emotion monitoring stand constructed at GUT. Different locations of sensors were considered and evaluated for suitability and measurement precision in the Human- Computer Interaction monitoring. Alternative locations (ear lobes and forearms for skin conductance, blood volume pulse and temperature sensors were proposed and verified. Alternative locations proved correlation with traditional locations as well as lower sensitiveness to movements like typing or mouse moving, therefore they can make a better solution for monitoring the Human-Computer Interaction.

  11. Human factors evaluation of teletherapy: Human-system interfaces and procedures. Volume 3

    International Nuclear Information System (INIS)

    Kaye, R.D.; Henriksen, K.; Jones, R.; Morisseau, D.S.; Serig, D.I.

    1995-07-01

    A series of human factors evaluations was undertaken to better understand the contributing factors to human error in the teletherapy environment. Teletherapy is a multidisciplinary methodology for treating cancerous tissue through selective exposure to an external beam of ionizing radiation. The principal sources of radiation are a radioactive isotope, typically cobalt60 (Co-60), or a linear accelerator device capable of producing very high energy x-ray and electron beams. A team of human factors specialists conducted site visits to radiation oncology departments at community hospitals, university centers, and free-standing clinics. In addition, a panel of radiation oncologists, medical physicists, and radiation technologists served as subject matter experts. A function and task analysis was initially performed to guide subsequent evaluations in the areas of user-system interfaces, procedures, training and qualifications, and organizational policies and practices. The present report focuses on an evaluation of the human-system interfaces in relation to the treatment machines and supporting equipment (e.g., simulators, treatment planning computers, control consoles, patient charts) found in the teletherapy environment. The report also evaluates operating, maintenance and emergency procedures and practices involved in teletherapy. The evaluations are based on the function and task analysis and established human engineering guidelines, where applicable

  12. Human factors evaluation of teletherapy: Human-system interfaces and procedures. Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    Kaye, R.D.; Henriksen, K.; Jones, R. [Hughes Training, Inc., Falls Church, VA (United States); Morisseau, D.S.; Serig, D.I. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Systems Technology

    1995-07-01

    A series of human factors evaluations was undertaken to better understand the contributing factors to human error in the teletherapy environment. Teletherapy is a multidisciplinary methodology for treating cancerous tissue through selective exposure to an external beam of ionizing radiation. The principal sources of radiation are a radioactive isotope, typically cobalt60 (Co-60), or a linear accelerator device capable of producing very high energy x-ray and electron beams. A team of human factors specialists conducted site visits to radiation oncology departments at community hospitals, university centers, and free-standing clinics. In addition, a panel of radiation oncologists, medical physicists, and radiation technologists served as subject matter experts. A function and task analysis was initially performed to guide subsequent evaluations in the areas of user-system interfaces, procedures, training and qualifications, and organizational policies and practices. The present report focuses on an evaluation of the human-system interfaces in relation to the treatment machines and supporting equipment (e.g., simulators, treatment planning computers, control consoles, patient charts) found in the teletherapy environment. The report also evaluates operating, maintenance and emergency procedures and practices involved in teletherapy. The evaluations are based on the function and task analysis and established human engineering guidelines, where applicable.

  13. New staff contract policy

    CERN Document Server

    HR Department

    2006-01-01

    Following discussion at TREF and on the recommendation of the Finance Committee, Council approved a new staff contract policy, which became effective on 1 January 2006. Its application is covered by a new Administrative Circular No. 2 (Rev. 3) 'Recruitment, appointment and possible developments regarding the contractual position of staff members'. The revised circular replaces the previous Circulars No. 9 (Rev. 3) 'Staff contracts' and No. 2 (Rev. 2) 'Guidelines and procedures concerning recruitment and probation period for staff members'. The main features of the new contract policy are as follows: The new policy provides chances for long-term employment for all staff recruits staying for four years without distinguishing between those assigned to long-term or short-term activities when joining CERN. In addition, it presents a number of simplifications for the award of ICs. There are henceforth only 2 types of contract: Limited Duration (LD) contracts for all recruitment and Indefinite Contracts (IC) for...

  14. Tax policy at the outskirts of EU

    DEFF Research Database (Denmark)

    Vesterø Jensen, Carsten; Nielsen, Søren Bo

    2003-01-01

    of Greenland's tax system, the paper's special focus will be on the corporate tax systemand its interplay with personal taxation, as well on as the system of import duties. In particular, wecarry out computations of effective marginal and average corporate tax rates, as well as average effectivetax burdens...... on consumption, labour income and capital income, and compare these to similarmeasures for EU countries. In addition, we outline how Greenland's economic policy in other areasinterferes with tax policy. Especially fishery regulation, management of government-owned companies,and housing policy have major...

  15. COPMA-III - Intelligent handling of existing procedures

    International Nuclear Information System (INIS)

    Hulsund, John-Einar; Jung, Yeonsub; Nilsen, Svein

    1999-04-01

    This report describes how COPMA-III makes it possible to enhance old procedures without having to change much of their original layout. By means of COPMA-III one can insert into the old procedure text tags that describe the 'meaning' of the various textual elements in the procedure. Those tags can be made invisible to the person using the procedure, but the computer is able to inspect the tags and give appropriate assistance in carrying through the procedure. Previous versions of COPMA required a reformulation and most often a re-structuring of the procedures before taking them into use. A fixed set of instructions and a fixed procedure structure made the computerised procedure different from the original procedure (in most cases). This is no more so in COPMA-III. By means of small procedural elements (microelements), it is possible to configure the COPMA-III system to fit the set of instructions and the procedure structure that is being used in the old procedure system. This report describes an example case, starting with an old procedure, goes through a set of working steps and ends up with a procedure having exactly the same appearance as the old procedure, but having assistance from the COPMA-III system in executing the procedure (author) (ml)

  16. 3rd ICTs and Society Meeting; Paper Session - Inequalities: social, economic, political; Paper 1: Information Society Policies 2.0. A Critical Analysis of the Potential and Pit-falls of Social Computing & Informatics in the Light of E-inclusion

    Directory of Open Access Journals (Sweden)

    Pieter Verdegem

    2010-06-01

    Full Text Available In this paper we reflect on how research and policies can and/or should help in the development of a sustainable information society for all. More specifically, we critically investigate how social computing & informatics can entail both potential and pitfalls, especially with regard to the difficult relationship between digital and social inclusion. First of all, traditional information society policies are scrutinized. Furthermore, we point at the existence of digital inequalities and we reflect briefly on policy intervention on this (e-inclusion. In addition, we also evaluate the raise of social computing & informatics. Finally, attention is given to the challenge of how research can contribute to the participation of all in the information society.

  17. The impact of monetary policy on New Zealand business cycles and inflation variability

    OpenAIRE

    Nathan McLellan; Robert A Buckle; Kunhong Kim

    2004-01-01

    This paper uses the open economy structural VAR model developed in Buckle, Kim, Kirkham, McLellan and Sharma (2002) to evaluate the impact of monetary policy on New Zealand business cycles and inflation variability and the output/inflation variability trade-off. The model includes a forward-looking Taylor Rule to identify monetary policy and the impact of monetary policy is evaluated by deriving a monetary policy index using a procedure suggested by Dungey and Pagan (2000). Monetary policy ha...

  18. Sexual Harassment in Public Schools: Policy Design, Policy Implementation, and the Perceptions of Employees Participating in Investigations

    Science.gov (United States)

    Bratge, Katrina

    2009-01-01

    This study of two cases of sexual harassment investigates employee perceptions and organizational characteristics associated with policy and implementation procedures in two public school districts in New York State which experienced different outcomes to litigation in response to formal complaints of sexual harassment. Using documentary evidence…

  19. Nuclear power and public policy

    International Nuclear Information System (INIS)

    Shrader-Frechette, K.S.

    1980-01-01

    The authors' purpose is to raise some of the social, political, and ethical issues which for so long have been ignored in making government assessments of nuclear power. In particular she asks whether current policy (governing admissible releases of radioactivity during electricity generation) is based on sound ethical premises. She argues that it is ethically reprehensible to generate long-lived nuclear wastes without knowing whether they can be safety stored. An ethical and methodological assessment of public policy is presented based on the presupposition that a core melt accident is improbable. It is then argued that the alleged cost-effectiveness of fission generated electricity is based on economical methodology which is both illogical and unethical. Finally, an outline of the sorts of policy-making procedures which ought to be followed in dealing with nuclear technology is given. (Auth.)

  20. Techniques for analyzing the impacts of certain electric-utility ratemaking and regulatory-policy concepts. Regulatory laws and policies. [State by state

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-08-01

    This report is a legal study prepared to provide a review of the substantive and procedural laws of each regulatory jurisdiction that may affect implementation of the PURPA standards, and to summarize the current state of consideration and implementation of policies and rate designs similar or identical to the PURPA standards by state regulatory agencies and nonregulated utilities. This report is divided into three sections. The first section, the Introduction, summarizes the standards promulgated by PURPA and the results of the legal study. The second section, State Regulatory Law and Procedure, summarizes for each state or other ratemaking jurisdiction: (1) general constitutional and statutory provisions affecting utility rates and conditions of service; (2) specific laws or decisions affecting policy or rate design issues covered by PURPA standards; and (3) statutes and decisions governing administrative procedures, including judicial review. A chart showing actions taken on the policy and rate design issues addressed by PURPA is also included for each jurisdiction, and citations to relevant authorities are presented for each standard. State statutes or decisions that specifically define a state standard similar or identical to a PURPA standard, or that refer to one of the three PURPA objectives, are noted. The third section, Nonregulated Electric Utilities, summarizes information available on nonregulated utilities, i.e., publicly or cooperatively owned utilities which are specifically exempted from state regulation by state law.

  1. Diagnostic imaging procedure volume in the United States

    International Nuclear Information System (INIS)

    Johnson, J.L.; Abernathy, D.L.

    1983-01-01

    Comprehensive data on 1979 and 1980 diagnostic imaging procedure volume were collected from a stratified random sample of U.S. short-term general-care hospitals and private practices of radiologists, cardiologists, obstetricians/gynecologists, orthopedic surgeons, and neurologists/neurosurgeons. Approximately 181 million imaging procedures (within the study scope) were performed in 1980. Despite the rapidly increasing use of newer imaging methods, plain film radiography (140.3 million procedures) and contrast studies (22.9 million procedures) continue to comprise the vast majority of diagnostic imaging volume. Ultrasound, computed tomography, nuclear medicine, and special procedures make up less than 10% of total diagnostic imaging procedures. Comparison of the data from this study with data from an earlier study indicates that imaging procedure volume in hospitals expanded at an annual growth rate of almost 8% from 1973 to 1980

  2. 7 CFR 1735.94 - Final approval and closing procedure.

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Requirements for All Acquisitions and Mergers § 1735.94 Final approval and closing procedure. (a) Legal documents relating to the acquisition or merger, including copies of required franchises, commission orders...

  3. Critical Emergency Medicine Procedural Skills: A Comparative Study of Methods for Teaching and Assessment.

    Science.gov (United States)

    Chapman, Dane M.; And Others

    Three critical procedural skills in emergency medicine were evaluated using three assessment modalities--written, computer, and animal model. The effects of computer practice and previous procedure experience on skill competence were also examined in an experimental sequential assessment design. Subjects were six medical students, six residents,…

  4. School Library Policy and Legal Opinions of Texas Public School Principals and Certified Librarians

    Directory of Open Access Journals (Sweden)

    Andrew Shupala

    2006-09-01

    Full Text Available This study involved a survey of the attitudes of Texas public school principals and certified librarians, perceptions andexperiences with regard to school library policy for media selection, and procedures for responding to complaints againstlibrary media. Analysis of the data included a methodology of mixed-methods explanatory design. Selection of the principalsand certified librarians was proportionate and stratified according to the state's 20 Education Service Centerregions. Of the 1,036 independent school districts that employed the state population of 10,014 principals and certifiedlibrarians, 275 independent school districts (26.5 percent allowed participation in the survey. Although random samplingof the state population had not been possible, the demographic and employment characteristics of the study samplewere comparable to those of the state population. Two key findings were (a that the legal opinions of principals andcertified librarians were useful predictors of their opinions of library media selection policy and complaint proceduresand (b that the principals' appreciation of selection policy and complaint procedures sometimes differed from the librarians'because of the principals' different legal perspective of library selection policy and complaint procedures.

  5. Evaluation of the UF/NCI hybrid computational phantoms for use in organ dosimetry of pediatric patients undergoing fluoroscopically guided cardiac procedures

    Science.gov (United States)

    Marshall, Emily L.; Borrego, David; Tran, Trung; Fudge, James C.; Bolch, Wesley E.

    2018-03-01

    Epidemiologic data demonstrate that pediatric patients face a higher relative risk of radiation induced cancers than their adult counterparts at equivalent exposures. Infants and children with congenital heart defects are a critical patient population exposed to ionizing radiation during life-saving procedures. These patients will likely incur numerous procedures throughout their lifespan, each time increasing their cumulative radiation absorbed dose. As continued improvements in long-term prognosis of congenital heart defect patients is achieved, a better understanding of organ radiation dose following treatment becomes increasingly vital. Dosimetry of these patients can be accomplished using Monte Carlo radiation transport simulations, coupled with modern anatomical patient models. The aim of this study was to evaluate the performance of the University of Florida/National Cancer Institute (UF/NCI) pediatric hybrid computational phantom library for organ dose assessment of patients that have undergone fluoroscopically guided cardiac catheterizations. In this study, two types of simulations were modeled. A dose assessment was performed on 29 patient-specific voxel phantoms (taken as representing the patient’s true anatomy), height/weight-matched hybrid library phantoms, and age-matched reference phantoms. Two exposure studies were conducted for each phantom type. First, a parametric study was constructed by the attending pediatric interventional cardiologist at the University of Florida to model the range of parameters seen clinically. Second, four clinical cardiac procedures were simulated based upon internal logfiles captured by a Toshiba Infinix-i Cardiac Bi-Plane fluoroscopic unit. Performance of the phantom library was quantified by computing both the percent difference in individual organ doses, as well as the organ dose root mean square values for overall phantom assessment between the matched phantoms (UF/NCI library or reference) and the patient

  6. The Evolution of Computer Based Learning Software Design: Computer Assisted Teaching Unit Experience.

    Science.gov (United States)

    Blandford, A. E.; Smith, P. R.

    1986-01-01

    Describes the style of design of computer simulations developed by Computer Assisted Teaching Unit at Queen Mary College with reference to user interface, input and initialization, input data vetting, effective display screen use, graphical results presentation, and need for hard copy. Procedures and problems relating to academic involvement are…

  7. Fibonacci’s Computation Methods vs Modern Algorithms

    Directory of Open Access Journals (Sweden)

    Ernesto Burattini

    2013-12-01

    Full Text Available In this paper we discuss some computational procedures given by Leonardo Pisano Fibonacci in his famous Liber Abaci book, and we propose their translation into a modern language for computers (C ++. Among the other we describe the method of “cross” multiplication, we evaluate its computational complexity in algorithmic terms and we show the output of a C ++ code that describes the development of the method applied to the product of two integers. In a similar way we show the operations performed on fractions introduced by Fibonacci. Thanks to the possibility to reproduce on a computer, the Fibonacci’s different computational procedures, it was possible to identify some calculation errors present in the different versions of the original text.

  8. Quantum Computing: Pro and Con

    OpenAIRE

    Preskill, John

    1997-01-01

    I assess the potential of quantum computation. Broad and important applications must be found to justify construction of a quantum computer; I review some of the known quantum algorithms and consider the prospects for finding new ones. Quantum computers are notoriously susceptible to making errors; I discuss recently developed fault-tolerant procedures that enable a quantum computer with noisy gates to perform reliably. Quantum computing hardware is still in its infancy; I comment on the spec...

  9. 7 CFR 982.40 - Marketing policy and volume regulation.

    Science.gov (United States)

    2010-01-01

    ... the declared policy of the act, it shall compute and announce an inshell trade demand for that year... 7 Agriculture 8 2010-01-01 2010-01-01 false Marketing policy and volume regulation. 982.40 Section 982.40 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING...

  10. A CFD-based aerodynamic design procedure for hypersonic wind-tunnel nozzles

    Science.gov (United States)

    Korte, John J.

    1993-01-01

    A new procedure which unifies the best of current classical design practices, computational fluid dynamics (CFD), and optimization procedures is demonstrated for designing the aerodynamic lines of hypersonic wind-tunnel nozzles. The new procedure can be used to design hypersonic wind tunnel nozzles with thick boundary layers where the classical design procedure has been shown to break down. An efficient CFD code, which solves the parabolized Navier-Stokes (PNS) equations using an explicit upwind algorithm, is coupled to a least-squares (LS) optimization procedure. A LS problem is formulated to minimize the difference between the computed flow field and the objective function, consisting of the centerline Mach number distribution and the exit Mach number and flow angle profiles. The aerodynamic lines of the nozzle are defined using a cubic spline, the slopes of which are optimized with the design procedure. The advantages of the new procedure are that it allows full use of powerful CFD codes in the design process, solves an optimization problem to determine the new contour, can be used to design new nozzles or improve sections of existing nozzles, and automatically compensates the nozzle contour for viscous effects as part of the unified design procedure. The new procedure is demonstrated by designing two Mach 15, a Mach 12, and a Mach 18 helium nozzles. The flexibility of the procedure is demonstrated by designing the two Mach 15 nozzles using different constraints, the first nozzle for a fixed length and exit diameter and the second nozzle for a fixed length and throat diameter. The computed flow field for the Mach 15 least squares parabolized Navier-Stokes (LS/PNS) designed nozzle is compared with the classically designed nozzle and demonstrates a significant improvement in the flow expansion process and uniform core region.

  11. ORNL-PWR BDHT analysis procedure: an overview

    International Nuclear Information System (INIS)

    Cliff, S.B.

    1978-01-01

    The key computer programs currently used by the analysis procedure of the ORNL-PWR Blowdown Heat Transfer Separate Effects Program are overviewed with particular emphasis placed on their interrelationships. The major modeling and calculational programs, COBRA, ORINC, ORTCAL, PINSIM, and various versions of RELAP4, are summarized and placed into the perspective of the procedure. The supportive programs, REDPLT, ORCPLT, BDHTPLOT, OXREPT, and OTOCI, and their uses are described

  12. Regenerative Needs Following Alveolar Ridge Preservation Procedures in Compromised and Noncompromised Extraction Sockets: A Cone Beam Computed Tomography Study.

    Science.gov (United States)

    Koutouzis, Theofilos; Lipton, David

    2016-01-01

    The aim of this study was to evaluate the necessity for additional regenerative procedures following healing of compromised and noncompromised extraction sockets with alveolar ridge preservation procedures through the use of virtual implant imaging software. The cohort was comprised of 87 consecutive patients subjected to a single maxillary tooth extraction with an alveolar ridge preservation procedure for subsequent implant placement. Patients were divided into two main groups based on the integrity of the buccal bone plate following teeth extraction. Patients in the compromised socket (CS) group (n = 52) had partial or complete buccal bone plate loss, and patients in the noncompromised socket (NCS) group (n = 35) exhibited no bone loss of their socket walls following tooth extraction. Following 4 to 6 months of healing, all patients had a cone beam computed tomography (CBCT) study. Root-formed implants were placed virtually in an ideal prosthetic position. The number of implants per group and location (anterior, premolar, molar) exhibiting exposed buccal implant surface was calculated. In the CS group, 5 out of 19 anterior implants (26.3%), 4 out of 14 premolar implants (28.5%), and 7 out of 19 molar implants (36.8%) had exposed buccal surfaces. In the NCS group, 4 out of 9 anterior implants (44.4%), 2 out of 9 premolar implants (22.2%), and 4 out of 17 molar implants (23.5%) had exposed buccal surfaces. There were no statistically significant differences for intragroup and intergroup comparisons (χ² test, P > .05). This study failed to find statistically significant differences in the frequency of implants with exposed buccal surfaces placed virtually, following treatment of compromised and noncompromised sockets. A high proportion (22% to 44%) of sites had implants that potentially needed additional regenerative procedures.

  13. Implementing a Paid Leave Policy for Graduate Students at UW - Madison: The Student Perspective

    Science.gov (United States)

    Gosnell, Natalie M.

    2013-01-01

    In 2010 the University of Wisconsin - Madison Astronomy Department developed and implemented a departmental paid leave policy for our graduate students, even though the university lacks a campus-wide policy and cannot provide institutional funding for such programs. This policy includes 12 weeks of paid leave in event of a medical emergency or chronic medical condition, as well as paid parental leave for both male and female graduate research assistants. (The policy in its entirety can be found at http://www.astro.wisc.edu/grad-students/policies-procedures/medical-and-family-leave-policy.) This is the first of two presentations describing our policy implementation using a "bottom-up" approach, beginning with the graduate students. I will present the perspective of the graduate students who led the effort and will discuss the steps we took to put our policy in place, from the conception of the plan to the full implementation. These steps included identifying faculty allies, becoming knowledgeable about university policies and resources, involving department staff, and anticipating procedural and bureaucratic hurdles in order to come up with creative solutions in advance. Although each individual institution and department's path to implementing a similar plan will be unique, we hope the methods used to implement our policy at UW - Madison may serve as an example.

  14. Hand-held electronic data collection and procedure environment

    International Nuclear Information System (INIS)

    Kennedy, E.; Doniz, K.

    1996-01-01

    As part of a CANDU Owners Group project, AECL has developed a hand-held electronic data collection and procedure environment. Integral to this environment is the C omputerized Procedure Engine . The development of the CPE allows operators, maintainers, and technical support staff to execute virtually any type of station procedure on a general-purpose PC-compatible hand-held computer. There are several advantages to using the computerized procedures: less paper use and handling, reduction in human error, reduction in rework in the field, an increase in procedural compliance, and immediate availability of data to download to databases and plant information systems. The paper describes: the advantages of using computerized procedures, why early forms of computerized procedures were inadequate, the features that the C omputerized Procedure Engine o ffers to the user, the streamlined life cycle of a computerized procedure, and field experience. The paper concludes that computerized procedures are ready for pilot applications at stations. (author)

  15. Systematic control of large computer programs

    International Nuclear Information System (INIS)

    Goedbloed, J.P.; Klieb, L.

    1986-07-01

    A package of CCL, UPDATE, and FORTRAN procedures is described which facilitates the systematic control and development of large scientific computer programs. The package provides a general tool box for this purpose which contains many conveniences for the systematic administration of files, editing, reformating of line printer output files, etc. In addition, a small number of procedures is devoted to the problem of structured development of a large computer program which is used by a group of scientists. The essence of the method is contained in three procedures N, R, and X for the creation of a new UPDATE program library, its revision, and execution, resp., and a procedure REVISE which provides a joint editor - UPDATE session which combines the advantages of the two systems, viz. speed and rigor. (Auth.)

  16. Negotiating Narratives, Accessing Asylum: Evaluating Language Policy as Multi-Level Practice, Beliefs and Management

    Science.gov (United States)

    Smith-Khan, Laura

    2017-01-01

    Theories of language policy increasingly emphasise focusing on the specific contexts in which language management occurs. In government settings, policy seeks to shape how individuals interact with officials. Australian asylum procedure is an area where policy aims at tight control. I examine how communication is managed in this setting, in which…

  17. Development of critical digital review procedure

    International Nuclear Information System (INIS)

    Huang Huiwen; Liao Benching; Tseng Maosheng; Chung Hsianghan; Cheng Tsungchieh; Chen Minghuei

    2011-01-01

    This paper describes the critical digital review (CDR) procedure, which was developed by Institute of Nuclear Energy Research (INER), and sponsored by Taiwan Power Company (TPC). A preliminary CDR application experience which was performed by INER, is also described in this paper. Currently, CDR becomes one of the policies for digital Instrumentation and Control (I and C) system replacement in TPC. The contents of this CDR procedure include: Scope, Responsibility, Operation Procedure, Operation Flow Chart, CDR review items. The 'CDR Review Items' chapter proposes optional review items, including the comparison of the design change, Software Verification and Validation (SV and V), Failure Mode and Effects Analysis (FMEA), Evaluation of Watchdog Timer, Evaluation of Electromagnetic Compatibility (EMC), Evaluation of Grounding for System/Component, Seismic Evaluation, HFE Evaluation, Witness and Inspection, Lessons Learnt from the Digital I and C Failure Events. Since CDR has become a TPC policy, Chin Shan Nuclear Power Plant (NPP) performed the CDR practice of Automatic Voltage Regulator (AVR) digital I and C replacement, even though the project had been on the half way. The major review items of this CDR were: the comparison of the design change, SV and V, FMEA, Evaluation of Watchdog Timer, Evaluation of Electromagnetic Compatibility (EMC), Evaluation of Grounding for System/ Component, Witness and Inspection, Lessons Learnt from the Digital I and C Failure Events. The experience of the CDR showed the importance of preparation of the documents by the vendor. This means the communication with the vendors for the bid preparation is crucial. (author)

  18. Intellectual capital disclosure and dividend policy

    DEFF Research Database (Denmark)

    Nielsen, Christian; Farooq, Omar

    2015-01-01

    The purpose of this article is to document the relationship between intellectual capital disclosure and dividend policies of biotechnology firms listed on the Copenhagen Stock Exchange during the period between 2001 and 2010. The firms’ intellectual capital disclosures were computed from the annual...... financial reports, while data on dividend policies was retrieved from Worldscope. This paper defines dividend policies by three variables: (1) Dividend payout ratio, (2) Decision to pay dividend, and (3) Increase in dividend payout. The results show that firms with higher intellectual capital disclosures...... not only have high payout ratios, but also have a greater likelihood of increasing and paying dividends. Our findings are consistent with our hypothesis that lower information asymmetries of firms with high intellectual capital disclosure lead to more favourable dividend policies. In opposition...

  19. 75 FR 42612 - Energy Conservation Program for Consumer Products: Test Procedure for Microwave Ovens

    Science.gov (United States)

    2010-07-22

    ... Conservation Program for Consumer Products: Test Procedure for Microwave Ovens AGENCY: Office of Energy... (NOPR) in which DOE proposed test procedures for microwave ovens under the Energy Policy and Conservation Act (EPCA) to measure standby mode and off mode power use by microwave ovens. To address issues...

  20. ISASS Policy Statement – Lumbar Artificial Disc

    Science.gov (United States)

    Garcia, Rolando

    2015-01-01

    Purpose The primary goal of this Policy Statement is to educate patients, physicians, medical providers, reviewers, adjustors, case managers, insurers, and all others involved or affected by insurance coverage decisions regarding lumbar disc replacement surgery. Procedures This Policy Statement was developed by a panel of physicians selected by the Board of Directors of ISASS for their expertise and experience with lumbar TDR. The panel's recommendation was entirely based on the best evidence-based scientific research available regarding the safety and effectiveness of lumbar TDR. PMID:25785243

  1. Is Educational Policy Making Rational--and What Would that Mean, Anyway?

    Science.gov (United States)

    Bredo, Eric

    2009-01-01

    In "Moderating the Debate: Rationality and the Promise of American Education," Michael Feuer raises concerns about the consequences of basing educational policy on the model of rational choice drawn from economics. Policy making would be better and more realistic, he suggests, if it were based on a newer procedural model drawn from cognitive…

  2. 47 CFR 1.959 - Computation of average terrain elevation.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Computation of average terrain elevation. 1.959 Section 1.959 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Wireless Radio Services Applications and Proceedings Application Requirements and Procedures § 1.959 Computation of average terrain elevation. Except a...

  3. Policy to Foster Civility and Support a Healthy Academic Work Environment.

    Science.gov (United States)

    Clark, Cynthia M; Ritter, Katy

    2018-06-01

    Incivility in academic workplaces can have detrimental effects on individuals, teams, departments, and the campus community at large. Alternately, healthy academic workplaces generate heightened levels of employee satisfaction, engagement, and morale. This article describes the development and implementation of a comprehensive, legally defensible policy related to workplace civility and the establishment of a healthy academic work environment. A detailed policy exemplar is included to provide a structure for fostering a healthy academic work environment, a fair, consistent, confidential procedure for defining and addressing workplace incivility, a mechanism for reporting and subsequent investigation of uncivil acts if indicated, and ways to foster civility and respectful workplace behavior. The authors detail a step-by-step procedure and an incremental approach to address workplace incivility and reward policy adherence. [J Nurs Educ. 2018;57(6):325-331.]. Copyright 2018, SLACK Incorporated.

  4. FFTF fuel pin design procedure verification for transient operation

    International Nuclear Information System (INIS)

    Baars, R.E.

    1975-05-01

    The FFTF design procedures for evaluating fuel pin transient performance are briefly reviewed, and data where available are compared with design procedure predictions. Specifically, burst conditions derived from Fuel Cladding Transient Tester (FCTT) tests and from ANL loss-of-flow tests are compared with burst pressures computed using the design procedure upon which the cladding integrity limit was based. Failure times are predicted using the design procedure for evaluation of rapid reactivity insertion accidents, for five unterminated TREAT experiments in which well characterized fuel failures were deliberately incurred. (U.S.)

  5. DOE program guide for universities and other research groups. Part I. DOE Research and Development Programs; Part II. DOE Procurement and Assistance Policies/Procedures

    Energy Technology Data Exchange (ETDEWEB)

    1980-03-01

    This guide addresses the DOE responsibility for fostering advanced research and development of all energy resources, both current and potential. It is intended to provide, in a single publication, all the fundamental information needed by an institution to develop a potential working relationship with DOE. Part I describes DOE research and development programs and facilities, and identifies areas of additional research needs and potential areas for new research opportunities. It also summarizes budget data and identifies the DOE program information contacts for each program. Part II provides researchers and research administrators with an introduction to the DOE administrative policies and procedures for submission and evaluation of proposals and the administration of resulting grants, cooperative agreements, and research contracts. (RWR)

  6. A computer controlled tele-cobalt unit

    International Nuclear Information System (INIS)

    Brace, J.A.

    1982-01-01

    A computer controlled cobalt treatment unit was commissioned for treating patients in January 1980. Initially the controlling computer was a minicomputer, but now the control of the therapy unit is by a microcomputer. The treatment files, which specify the movement and configurations necessary to deliver the prescribed dose, are produced on the minicomputer and then transferred to the microcomputer using minitape cartridges. The actual treatment unit is based on a standard cobalt unit with a few additional features e.g. the drive motors can be controlled either by the computer or manually. Since the treatment unit is used for both manual and automatic treatments, the operational procedure under computer control is made to closely follow the manual procedure for a single field treatment. The necessary safety features which protect against human, hardware and software errors as well as the advantages and disadvantages of computer controlled radiotherapy are discussed

  7. A computational procedure for the dynamics of flexible beams within multibody systems. Ph.D. Thesis Final Technical Report

    Science.gov (United States)

    Downer, Janice Diane

    1990-01-01

    The dynamic analysis of three dimensional elastic beams which experience large rotational and large deformational motions are examined. The beam motion is modeled using an inertial reference for the translational displacements and a body-fixed reference for the rotational quantities. Finite strain rod theories are then defined in conjunction with the beam kinematic description which accounts for the effects of stretching, bending, torsion, and transverse shear deformations. A convected coordinate representation of the Cauchy stress tensor and a conjugate strain definition is introduced to model the beam deformation. To treat the beam dynamics, a two-stage modification of the central difference algorithm is presented to integrate the translational coordinates and the angular velocity vector. The angular orientation is then obtained from the application of an implicit integration algorithm to the Euler parameter/angular velocity kinematical relation. The combined developments of the objective internal force computation with the dynamic solution procedures result in the computational preservation of total energy for undamped systems. The present methodology is also extended to model the dynamics of deployment/retrieval of the flexible members. A moving spatial grid corresponding to the configuration of a deployed rigid beam is employed as a reference for the dynamic variables. A transient integration scheme which accurately accounts for the deforming spatial grid is derived from a space-time finite element discretization of a Hamiltonian variational statement. The computational results of this general deforming finite element beam formulation are compared to reported results for a planar inverse-spaghetti problem.

  8. Computer information systems framework

    International Nuclear Information System (INIS)

    Shahabuddin, S.

    1989-01-01

    Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)

  9. Air Pollution Policy in Europe. Quantifying the Interaction with Greenhouse Gases and Climate Change Policies

    Energy Technology Data Exchange (ETDEWEB)

    Bollen, J. [CPB Netherlands Bureau for Economic Policy Analysis, Den Haag (Netherlands); Brink, C. [Netherlands Environmental Assessment Agency PBL, Den Haag (Netherlands)

    2012-10-15

    In this study the Computable General Equilibrium Model called WorldScan is used to analyse interactions between European air pollution policies and policies aimed at addressing climate change. WorldScan incorporates the emissions of both greenhouse gases (CO2, N2O and CH4) and air pollutants (SO2, NOx, NH3 and PM2.5). WorldScan has been extended with equations that enable the simulation of end-of-pipe measures that remove pollutants without affecting the emission-producing activity itself. Air pollution policy will depend on end-of-pipe controls for not more than 50%, thus also at least 50% of the required emission reduction will come from changes in the use of energy through efficiency improvements, fuel switching and other structural changes in the economy. Greenhouse gas emissions thereby decrease which renders climate change policies less costly. Our results show that carbon prices will fall, but not more than 33%, although they could drop to zero when the EU agrees on a more stringent air pollution policy.

  10. An Adaptive Procedure for Task Scheduling Optimization in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Pham Phuoc Hung

    2015-01-01

    Full Text Available Nowadays, mobile cloud computing (MCC has emerged as a new paradigm which enables offloading computation-intensive, resource-consuming tasks up to a powerful computing platform in cloud, leaving only simple jobs to the capacity-limited thin client devices such as smartphones, tablets, Apple’s iWatch, and Google Glass. However, it still faces many challenges due to inherent problems of thin clients, especially the slow processing and low network connectivity. So far, a number of research studies have been carried out, trying to eliminate these problems, yet few have been found efficient. In this paper, we present an enhanced architecture, taking advantage of collaboration of thin clients and conventional desktop or laptop computers, known as thick clients, particularly aiming at improving cloud access. Additionally, we introduce an innovative genetic approach for task scheduling such that the processing time is minimized, while considering network contention and cloud cost. Our simulation shows that the proposed approach is more cost-effective and achieves better performance compared with others.

  11. Developing a DSR-HNS policy making framework for electric energy systems

    International Nuclear Information System (INIS)

    Meyar-Naimi, H.; Vaez-Zadeh, S.

    2012-01-01

    Sustainable Development (SD) has played a major role as a foundation of several policy making frameworks developed mainly by international organizations. In this paper, some critical points regarding the origination and formulation of the SD concept are discussed. It is argued that the SD concerns with selected sectors and regions rather than the whole society and all regions of the world. To tackle these shortcomings, the conventional definition of SD is extended in this paper according to a broad philosophy of harmonizing key aspects of human, nature and systems performances over generations. Based on this extended definition, an improved Driving Force–State–Response (DSR-HNS) policy making framework is introduced. The main contribution is the modeling of the state block by human, nature and systems components to design overall and coherent policies. A procedure using the framework is also elaborated to monitor the current policies and design new ones, which provides a dynamic, nonlinear, feedback controlled policy making practice, not accommodated by existing policy making frameworks. Finally, a case study is presented to evaluate the effectiveness of the modified framework and the proposed model. The study assesses Iran's electric power generation system from sustainability point of view and develops new policies. - Highlights: ► Some critical points regarding the Sustainable Development (SD) concept are discussed. ► Based on this extended definition, a policy making framework is introduced. ► A policy making procedure based on the framework is elaborated. ► A case study is presented to evaluate the effectiveness of the modified framework. ► New policies are developed for Iran's power generation system.

  12. 75 FR 36062 - Notice of Enforcement Policy Symposium on Combating Counterfeiting in the 21st Century

    Science.gov (United States)

    2010-06-24

    ... second panel on criminal procedure will involve a discussion of enforcement policy involving the... Enforcement Policy Symposium on Combating Counterfeiting in the 21st Century AGENCY: United States Patent and... United States Government enforcement policy regarding counterfeit goods involving health and safety...

  13. 76 FR 12825 - Energy Conservation Program for Consumer Products: Test Procedure for Microwave Ovens

    Science.gov (United States)

    2011-03-09

    ... Conservation Program for Consumer Products: Test Procedure for Microwave Ovens AGENCY: Office of Energy.... Department of Energy (DOE) is amending its test procedures for microwave ovens under the Energy Policy and Conservation Act (EPCA) to provide for the measurement of standby mode and off mode power use by microwave...

  14. How to Bill Your Computer Services.

    Science.gov (United States)

    Dooskin, Herbert P.

    1981-01-01

    A computer facility billing procedure should be designed so that the full costs of a computer center operation are equitably charged to the users. Design criteria, costing methods, and management's role are discussed. (Author/MLF)

  15. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl

    2006-01-01

    In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures that for......In the trust-structure framework for trust management, principals specify their trusting relationships in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for such policies, and provide a suitable denotational semantics. The semantics ensures...... that for any collection of policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  16. 29 CFR 1913.10 - Rules of agency practice and procedure concerning OSHA access to employee medical records.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Rules of agency practice and procedure concerning OSHA... PRACTICE AND PROCEDURE CONCERNING OSHA ACCESS TO EMPLOYEE MEDICAL RECORDS § 1913.10 Rules of agency practice and procedure concerning OSHA access to employee medical records. (a) General policy. OSHA access...

  17. Renewable energy. From marginal to mainstream. Policy Brief

    Energy Technology Data Exchange (ETDEWEB)

    Veum, K.C.; Uslu, A.; De Coninck, H.C. [ECN Policy Studies, Petten (Netherlands)

    2013-04-15

    This policy brief aims to instigate a debate on the broader enabling conditions required to move renewable energy from marginal shares in the European energy system to a mainstream role. It does so by posing seven key questions related to public movement, the political-industrial complex, resources and sustainability, grids and markets, finance, legal procedures and overall policy. These questions require short- to medium-term attention to keep a long-term renewable energy system within the realm of possibilities. This policy brief also provides ECN's initial reflections on how these key questions could be addressed, and indicates which relevant expertise it can bring to the table.

  18. Children in Need of Protection: Reporting Policies in Ontario School Boards

    Science.gov (United States)

    Shewchuk, Samantha

    2014-01-01

    A clear, well defined policy can help empower school personnel to make informed decisions on how to handle cases of suspected child abuse. This article presents an analysis of (N = 64) school board child abuse reporting policies and procedures in Ontario and explored what training, resources, and support school boards state they will provide to…

  19. Radiation doses in pediatric computed tomography procedures: challenges facing new technologies

    International Nuclear Information System (INIS)

    Cotelo, E.; Padilla, M.; Dibarboure, L.

    2008-01-01

    Despite the fact that in recent years an increasing number of radiologists and radiological technologists have been applying radiation dose optimization techniques in paediatric Computed Tomography (CT) examinations, dual and multi -slice CT (MSCT) scanners present a new challenge in Radiation Protection (RP). While on one hand these scanners are provided with Automatic Exposure Control (AEC) devices, dose reduction modes and dose estimation software, on the other hand Quality Control (QC) tests and CT Kerma Index (C) measurements and patient dose estimation present specific difficulties and require changes or adaptations of traditional QC protocols. This implies a major challenge in most developing countries where Quality Assurance Programmes (QAP) have not been implemented yet and there is a shortage in the number of medical physicists This paper analyses clinical and technical protocols as well as patient doses in 204 CT body procedures performed in 154 children. The investigation was carried out in a paediatric reference hospital of Uruguay, where are performed an average of 450 paediatric CT examinations per month in a sole CT dual scanner. Besides, C VOL reported from the scanner display was registered in order to be related with the same dosimetric quantity derived from technical parameters and C values published on tables. Results showed that not all the radiologists applied the same protocol in similar clinical situations delivering unnecessary patient dose with no significant differences in image quality. Moreover, it was found that dose reduction modes represent a drawback in order to estimate patient dose when mA changes according to tissue attenuation, in most cases in each rotation. The study concluded on the importance of QAP that must include education on RP of radiologists and technologists, as well as in the need of medical physicists to perform QC tests and patient dose estimations and measurements. (author)

  20. ACCOUNTING POLICIES OF COMPANIES IN THE FRAMEWORK OF IFRS

    Directory of Open Access Journals (Sweden)

    B. Zasadnyi

    2014-09-01

    Full Text Available The article investigates the nature of the accounting policies as a set of principles, approaches, methods, forms and procedures used for the purpose of accounting and reporting. Accounting policies are an important step in the organization of accounting, where the subject is the management of a company and the object is the system of accounting and reporting, and are designed to provide users with information needed to make effective managerial decisions. For resident companies applying IFRS for financial reporting, we suggest the structure for a document on accounting policies, which allows to take into account all the key points of accounting policy and, if necessary, can be expanded. In addition, we define the main factors that influence the development of accounting policies in the framework of IFRS.

  1. Impact of monetary policy on the volatility of stock market in pakistan

    OpenAIRE

    Abdul Qayyum; Saba Anwa

    2010-01-01

    This paper addresses the linkages between the monetary policy and the stock market in Pakistan. The estimation technique employed includes Engle Granger two step procedure and the bivariate EGARCH method. The results indicate that any change in the monetary policy stance have a significant impact on the volatility of the stock market. Thus contributing to the ongoing debate in the monetary policy rule literature regarding the proactive and reactive approach.

  2. Software For Computer-Aided Design Of Control Systems

    Science.gov (United States)

    Wette, Matthew

    1994-01-01

    Computer Aided Engineering System (CAESY) software developed to provide means to evaluate methods for dealing with users' needs in computer-aided design of control systems. Interpreter program for performing engineering calculations. Incorporates features of both Ada and MATLAB. Designed to be flexible and powerful. Includes internally defined functions, procedures and provides for definition of functions and procedures by user. Written in C language.

  3. Monitoring techniques and alarm procedures for CMS Services and Sites in WLCG

    International Nuclear Information System (INIS)

    Molina-Perez, J; Sciabà, A; Magini, N; Bonacorsi, D; Gutsche, O; Flix, J; Kreuzer, P; Fajardo, E; Boccali, T; Klute, M; Gomes, D; Kaselis, R; Butenas, I; Du, R; Wang, W

    2012-01-01

    The CMS offline computing system is composed of roughly 80 sites (including most experienced T3s) and a number of central services to distribute, process and analyze data worldwide. A high level of stability and reliability is required from the underlying infrastructure and services, partially covered by local or automated monitoring and alarming systems such as Lemon and SLS; the former collects metrics from sensors installed on computing nodes and triggers alarms when values are out of range, the latter measures the quality of service and warns managers when service is affected. CMS has established computing shift procedures with personnel operating worldwide from remote Computing Centers, under the supervision of the Computing Run Coordinator at CERN. This dedicated 24/7 computing shift personnel is contributing to detect and react timely on any unexpected error and hence ensure that CMS workflows are carried out efficiently and in a sustained manner. Synergy among all the involved actors is exploited to ensure the 24/7 monitoring, alarming and troubleshooting of the CMS computing sites and services. We review the deployment of the monitoring and alarming procedures, and report on the experience gained throughout the first two years of LHC operation. We describe the efficiency of the communication tools employed, the coherent monitoring framework, the proactive alarming systems and the proficient troubleshooting procedures that helped the CMS Computing facilities and infrastructure to operate at high reliability levels.

  4. Monitoring techniques and alarm procedures for CMS services and sites in WLCG

    Energy Technology Data Exchange (ETDEWEB)

    Molina-Perez, J. [UC, San Diego; Bonacorsi, D. [Bologna U.; Gutsche, O. [Fermilab; Sciaba, A. [CERN; Flix, J. [Madrid, CIEMAT; Kreuzer, P. [CERN; Fajardo, E. [Andes U., Bogota; Boccali, T. [INFN, Pisa; Klute, M. [MIT; Gomes, D. [Rio de Janeiro State U.; Kaselis, R. [Vilnius U.; Du, R. [Beijing, Inst. High Energy Phys.; Magini, N. [CERN; Butenas, I. [Vilnius U.; Wang, W. [Beijing, Inst. High Energy Phys.

    2012-01-01

    The CMS offline computing system is composed of roughly 80 sites (including most experienced T3s) and a number of central services to distribute, process and analyze data worldwide. A high level of stability and reliability is required from the underlying infrastructure and services, partially covered by local or automated monitoring and alarming systems such as Lemon and SLS, the former collects metrics from sensors installed on computing nodes and triggers alarms when values are out of range, the latter measures the quality of service and warns managers when service is affected. CMS has established computing shift procedures with personnel operating worldwide from remote Computing Centers, under the supervision of the Computing Run Coordinator at CERN. This dedicated 24/7 computing shift personnel is contributing to detect and react timely on any unexpected error and hence ensure that CMS workflows are carried out efficiently and in a sustained manner. Synergy among all the involved actors is exploited to ensure the 24/7 monitoring, alarming and troubleshooting of the CMS computing sites and services. We review the deployment of the monitoring and alarming procedures, and report on the experience gained throughout the first two years of LHC operation. We describe the efficiency of the communication tools employed, the coherent monitoring framework, the proactive alarming systems and the proficient troubleshooting procedures that helped the CMS Computing facilities and infrastructure to operate at high reliability levels.

  5. A surrogate based multistage-multilevel optimization procedure for multidisciplinary design optimization

    NARCIS (Netherlands)

    Yao, W.; Chen, X.; Ouyang, Q.; Van Tooren, M.

    2011-01-01

    Optimization procedure is one of the key techniques to address the computational and organizational complexities of multidisciplinary design optimization (MDO). Motivated by the idea of synthetically exploiting the advantage of multiple existing optimization procedures and meanwhile complying with

  6. Systematic procedure for identifying the five main ossification stages of the medial clavicular epiphysis using computed tomography: a practical proposal for forensic age diagnostics.

    Science.gov (United States)

    Wittschieber, Daniel; Schulz, Ronald; Pfeiffer, Heidi; Schmeling, Andreas; Schmidt, Sven

    2017-01-01

    In forensic age estimations of living individuals, computed tomography of the clavicle is widely used for determining the age of majority. To this end, the degree of ossification of the medial clavicular epiphysis can be determined by means of two classification systems complementing each other: a 5-stage system and an additional 6-stage system that further sub-classifies the stages 2 and 3. In recent years, practical experience and new data revealed that difficulties and even wrong stage determinations may occur especially when following the short descriptions of the fundamental 5-stage system only. Based on current literature, this article provides a systematic procedure for identifying the five main ossification stages by listing important preconditions and presenting an algorithm that is comprised of four specific questions. Each question is accompanied by comprehensive and detailed descriptions which specify the criteria used for differentiation. The information is subdivided into "single-slice view" and "multi-slice view." In addition, illustrative case examples and schematic drawings facilitate application of the procedure in forensic practice. The pitfalls associated with the criteria of stage determination will be discussed in detail. Eventually, two general rules will be inferred to assign correct ossification stages of the medial clavicular epiphysis by means of computed tomography.

  7. Safety analysis procedures for PHWR

    International Nuclear Information System (INIS)

    Min, Byung Joo; Kim, Hyoung Tae; Yoo, Kun Joong

    2004-03-01

    The methodology of safety analyses for CANDU reactors in Canada, a vendor country, uses a combination of best-estimate physical models and conservative input parameters so as to minimize the uncertainty of the plant behavior predictions. As using the conservative input parameters, the results of the safety analyses are assured the regulatory requirements such as the public dose, the integrity of fuel and fuel channel, the integrity of containment and reactor structures, etc. However, there is not the comprehensive and systematic procedures for safety analyses for CANDU reactors in Korea. In this regard, the development of the safety analyses procedures for CANDU reactors is being conducted not only to establish the safety analyses system, but also to enhance the quality assurance of the safety assessment. In the first phase of this study, the general procedures of the deterministic safety analyses are developed. The general safety procedures are covered the specification of the initial event, selection of the methodology and accident sequences, computer codes, safety analysis procedures, verification of errors and uncertainties, etc. Finally, These general procedures of the safety analyses are applied to the Large Break Loss Of Coolant Accident (LBLOCA) in Final Safety Analysis Report (FSAR) for Wolsong units 2, 3, 4

  8. On the design of flight-deck procedures

    Science.gov (United States)

    Degani, Asaf; Wiener, Earl L.

    1994-01-01

    In complex human-machine systems, operations, training, and standardization depend on a elaborate set of procedures which are specified and mandated by the operational management of the organization. The intent is to provide guidance to the pilots, to ensure a logical, efficient, safe, and predictable means of carrying out the mission objectives. In this report the authors examine the issue of procedure use and design from a broad viewpoint. The authors recommend a process which we call 'The Four P's:' philosophy, policies, procedures, and practices. We believe that if an organization commits to this process, it can create a set of procedures that are more internally consistent, less confusing, better respected by the flight crews, and that will lead to greater conformity. The 'Four-P' model, and the guidelines for procedural development in appendix 1, resulted from cockpit observations, extensive interviews with airline management and pilots, interviews and discussion at one major airframe manufacturer, and an examination of accident and incident reports. Although this report is based on airline operations, we believe that the principles may be applicable to other complex, high-risk systems, such as nuclear power production, manufacturing process control, space flight, and military operations.

  9. An Operational Semantics for Trust Policies

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian

    2005-01-01

    In the trust-structure model of trust management, principals specify their trusting relationships with other principals in terms of trust policies. In their paper on trust structures, Carbone et al. present a language for trust policies, and provide a suitable denotational semantics. The semantics...... ensures that for any collection of trust policies, there is always a unique global trust-state, compatible with all the policies, specifying everyone's degree of trust in everyone else. However, as the authors themselves point out, the language lacks an operational model: the global trust-state is a well......-defined mathematical object, but it is not clear how principals can actually compute it. This becomes even more apparent when one considers the intended application environment: vast numbers of autonomous principals, distributed and possibly mobile. We provide a compositional operational semantics for a language...

  10. A new preparedness policy for EMS logistics.

    Science.gov (United States)

    Lee, Seokcheon

    2017-03-01

    Response time in emergency medical services (EMS) is defined as the interval for an ambulance to arrive the scene after receipt of a 911 call. When several ambulances are available upon the receipt of a new call, a decision of selecting an ambulance has to be made in an effort to reduce response time. Dispatching the closest unit available is commonly used in practice; however, recently the Preparedness policy was designed that is in a simplistic form yet being capable of securing a long-term efficiency. This research aims to improve the Preparedness policy, resolving several critical issues inherent in the current form of the policy. The new Preparedness policy incorporates a new metric of preparedness based on the notion of centrality and involves a tuning parameter, weight on preparedness, which has to be appropriately chosen according to operational scenario. Computational experiment shows that the new policy significantly improves the former policy robustly in various scenarios.

  11. Policy efficiency in the field of food sustainability. The adjusted food agriculture and nutrition index.

    Science.gov (United States)

    Agovino, Massimiliano; Cerciello, Massimiliano; Gatto, Andrea

    2018-07-15

    This work introduces a revised version of the Food Sustainability Index, proposed by the Economist Intelligence Unit and the Barilla Center for Food and Nutrition in 2016. Our Adjusted Food Sustainability Index features two important advantages: 1) it employs the Mazziotta-Pareto method to compute weights, hence granting an objective aggregation criterion and 2) it does not take policy variables into account, thus focusing on the status quo. The policy variables are aggregated into the Policy Index, measuring the quality of the food sustainability policies. We compute the two indices for 25 countries worldwide, then we use the Data Envelopment Analysis to evaluate policy efficiency. Our results show that country-level variation in policy efficiency is wide and policies affect food sustainability significantly, especially when they target nutritional challenges. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Developing site-specific interactive environmental management tools: An exciting method of communicating training, procedures, and other information

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckels, J.M.

    1999-07-01

    Environmental managers are faced with numerous programs that must be communicated throughout their organizations. Among these are regulatory training programs, internal environmental policy, regulatory guidance/procedures and internal guidance/procedures. Traditional methods of delivering this type of information are typically confined to written materials and classroom training. There are many challenges faced by environmental managers with these traditional approaches including: determining if recipients of written plans or procedures are reading and comprehending the information; scheduling training sessions to reach all affected people across multiple schedules/shifts; and maintaining adequate training records. In addition, current trends toward performance-based or competency-based training requires a more consistent method of measuring and documenting performance. The use of interactive computer applications to present training or procedural information is a new and exciting tool for delivering environmental information to employees. Site-specific pictures, text, sound, and even video can be combined with multimedia software to create informative and highly interactive applications. Some of the applications that can be produced include integrated environmental training, educational pieces, and interactive environmental procedures. They can be executed from a CD-ROM, hard drive, network or a company Intranet. Collectively, the authors refer to these as interactive environmental management tools (IEMTs). This paper focuses on site-specific, interactive training as an example of an IEMT. Interactive training not only delivers a highly effective message, but can also be designed to focus on site-specific environmental issues that are unique to each company. Interactive training also lends itself well to automated record keeping functions and to reaching all affected employees.

  13. Computational electromagnetic-aerodynamics

    CERN Document Server

    Shang, Joseph J S

    2016-01-01

    Presents numerical algorithms, procedures, and techniques required to solve engineering problems relating to the interactions between electromagnetic fields, fluid flow, and interdisciplinary technology for aerodynamics, electromagnetics, chemical-physics kinetics, and plasmadynamics This book addresses modeling and simulation science and technology for studying ionized gas phenomena in engineering applications. Computational Electromagnetic-Aerodynamics is organized into ten chapters. Chapter one to three introduce the fundamental concepts of plasmadynamics, chemical-physics of ionization, classical magnetohydrodynamics, and their extensions to plasma-based flow control actuators, high-speed flows of interplanetary re-entry, and ion thrusters in space exploration. Chapter four to six explain numerical algorithms and procedures for solving Maxwell’s equation in the time domain for computational electromagnetics, plasma wave propagation, and the time-dependent c mpressible Navier-Stokes equation for aerodyn...

  14. Integrating research evidence and physical activity policy making

    DEFF Research Database (Denmark)

    Aro, Arja R.; Bertram, Maja; Hämäläinen, Riitta-Maija

    2016-01-01

    Evidence shows that regular physical activity is enhanced by supporting environment. Studies are needed to integrate research evidence into health enhancing, cross-sector physical activity (HEPA) policy making. This article presents the rationale, study design, measurement procedures...... and the initial results of the first phase of six European countries in a five-year research project (2011-2016), REsearch into POlicy to enhance Physical Activity (REPOPA). REPOPA is programmatic research; it consists of linked studies; the first phase studied the use of evidence in 21 policies in implementation...... to learn more in depth from the policy making process and carried out 86 qualitative stakeholder interviews. The second, ongoing phase builds on the central findings of the first phase in each country; it consists of two sets of interventions: game simulations to study cross-sector collaboration...

  15. 12 CFR 347.120 - Computation of investment amounts.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Computation of investment amounts. 347.120... GENERAL POLICY INTERNATIONAL BANKING § 347.120 Computation of investment amounts. In computing the amount that may be invested in any foreign organization under §§ 347.117 through 347.119, any investments held...

  16. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  17. Towards a strategy for the introduction of information and computer literacy (ICL) courses

    NARCIS (Netherlands)

    Plomp, T.; Carleer, G.J.

    1987-01-01

    An important goal of the national policy on computers in education in the Netherlands is the familiarization of all citizens with information technology. This policy was a plea for some basic education in information and computer literacy. In the beginning of the implementation of this basic

  18. Pilot Study: Impact of Computer Simulation on Students' Economic Policy Performance. Pilot Study.

    Science.gov (United States)

    Domazlicky, Bruce; France, Judith

    Fiscal and monetary policies taught in macroeconomic principles courses are concepts that might require both lecture and simulation methods. The simulation models, which apply the principles gleened from comparative statistics to a dynamic world, may give students an appreciation for the problems facing policy makers. This paper is a report of a…

  19. The update of the accounting procedures in Agricultural Cooperatives.

    Directory of Open Access Journals (Sweden)

    Rafael Enrique Viña Echevarría

    2014-06-01

    Full Text Available As part of the implementation of Internal Control in Agricultural Cooperatives from the standards established by the General Controller of the Republic, and the harmonization of accounting procedures Cuban Accounting Standards, It is need to update the accounting procedure manuals to guide and regulate the flows, times and registration basis, considering the current legislation, being these the purpose of the discussion in this investigation. The results focused on organizational dynamics of cooperatives, serving the agricultural cooperative sector and its relation to internal control and accounting management guidelines based on economic and social policy of the Party and the Revolution, as well as updating the procedure manuals. It even showed limitations in the application of internal control procedures and accounting according to the current regulations in Cuba, expressing the need to continue its development.

  20. Δt tuneup procedure for the LAMPF 805-MHz linac

    International Nuclear Information System (INIS)

    Crandall, K.R.

    1976-05-01

    An important part of tuning the LAMPF accelerator is the adjustment of the phases and amplitudes in the 805-MHz linac. The technique used is called the Δt procedure because of the time-of-flight measurements that are required. The theory behind the Δt procedure, a brief description of the hardware, and a description of the many computer programs that have been written to implement the procedure are presented

  1. COGEMA's employment and training policy for its foreign subsidiaries

    International Nuclear Information System (INIS)

    Hamani, A.

    2002-01-01

    COGEMA has actively pursued a policy of employing country nationals for its foreign subsidiaries in Niger, Gabon, Canada and Kazakhstan. The process of replacing foreign staff by nationals in Niger is first described, detailing the personnel management objectives and procedures, the main difficulties encountered, the current situation and the lessons to take from this experience. COGEMA's policies and ways applied in other countries to increase the proportions of nationals are then presented. (author)

  2. 37 CFR 204.4 - Procedure for notification of the existence of records pertaining to individuals.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Procedure for notification of the existence of records pertaining to individuals. 204.4 Section 204.4 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PRIVACY ACT: POLICIES AND...

  3. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  4. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  5. A procedure to compute equilibrium concentrations in multicomponent systems by Gibbs energy minimization on spreadsheets

    International Nuclear Information System (INIS)

    Lima da Silva, Aline; Heck, Nestor Cesar

    2003-01-01

    Equilibrium concentrations are traditionally calculated with the help of equilibrium constant equations from selected reactions. This procedure, however, is only useful for simpler problems. Analysis of the equilibrium state in a multicomponent and multiphase system necessarily involves solution of several simultaneous equations, and, as the number of system components grows, the required computation becomes more complex and tedious. A more direct and general method for solving the problem is the direct minimization of the Gibbs energy function. The solution for the nonlinear problem consists in minimizing the objective function (Gibbs energy of the system) subjected to the constraints of the elemental mass-balance. To solve it, usually a computer code is developed, which requires considerable testing and debugging efforts. In this work, a simple method to predict equilibrium composition in multicomponent systems is presented, which makes use of an electronic spreadsheet. The ability to carry out these calculations within a spreadsheet environment shows several advantages. First, spreadsheets are available 'universally' on nearly all personal computers. Second, the input and output capabilities of spreadsheets can be effectively used to monitor calculated results. Third, no additional systems or programs need to be learned. In this way, spreadsheets can be as suitable in computing equilibrium concentrations as well as to be used as teaching and learning aids. This work describes, therefore, the use of the Solver tool, contained in the Microsoft Excel spreadsheet package, on computing equilibrium concentrations in a multicomponent system, by the method of direct Gibbs energy minimization. The four phases Fe-Cr-O-C-Ni system is used as an example to illustrate the method proposed. The pure stoichiometric phases considered in equilibrium calculations are: Cr 2 O 3 (s) and FeO C r 2 O 3 (s). The atmosphere consists of O 2 , CO e CO 2 constituents. The liquid iron

  6. 12 CFR 908.27 - Computing time.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Computing time. 908.27 Section 908.27 Banks and... PRACTICE AND PROCEDURE IN HEARINGS ON THE RECORD General Rules § 908.27 Computing time. (a) General rule. In computing any period of time prescribed or allowed by this subpart, the date of the act or event...

  7. Developing the next generation of diverse computer scientists: the need for enhanced, intersectional computing identity theory

    Science.gov (United States)

    Rodriguez, Sarah L.; Lehman, Kathleen

    2017-10-01

    This theoretical paper explores the need for enhanced, intersectional computing identity theory for the purpose of developing a diverse group of computer scientists for the future. Greater theoretical understanding of the identity formation process specifically for computing is needed in order to understand how students come to understand themselves as computer scientists. To ensure that the next generation of computer scientists is diverse, this paper presents a case for examining identity development intersectionally, understanding the ways in which women and underrepresented students may have difficulty identifying as computer scientists and be systematically oppressed in their pursuit of computer science careers. Through a review of the available scholarship, this paper suggests that creating greater theoretical understanding of the computing identity development process will inform the way in which educational stakeholders consider computer science practices and policies.

  8. ORNL: PWR-BDHT analysis procedure, a preliminary overview

    International Nuclear Information System (INIS)

    Cliff, S.B.

    1978-01-01

    The computer programs currently used in the analysis of the ORNL-PWR Blowdown Heat Transfer Separate-Effects Program are overviewed. The current linkages and relationships among the programs are given along with general comments about the future directions of some of these programs. The overview is strictly from the computer science point of view with only minimal information concerning the engineering aspects of the analysis procedure

  9. Explaining citizens’ perceptions of international climate-policy relevance

    International Nuclear Information System (INIS)

    Schleich, Joachim; Faure, Corinne

    2017-01-01

    This paper empirically analyses the antecedents of citizens’ perceptions of the relevance of international climate policy. Its use of representative surveys in the USA, China and Germany controls for different environmental attitudes and socio-economic factors between countries. The findings of the micro-econometric analysis suggest that the perceived relevance of international climate policy is positively affected by its perceived effectiveness, approval of the key topics discussed at international climate conferences, and environmental attitudes, but is not affected by perceived procedural justice. A higher level of perceived trust in international climate policy was positively related to perceived relevance in the USA and in China, but not in Germany. Citizens who felt that they were well informed and that their position was represented at climate summits were more likely to perceive international climate policy as relevant in China in particular. Generally, the results show only weak evidence of socio-demographic effects. - Highlights: • Perceptions of climate-policy relevance increase with perceptions of effectiveness. • In China and the USA, trust increases perceptions of climate-policy relevance. • Environmental attitudes are related to perceptions of climate-policy relevance. • In China, well-informed citizens perceive climate policy as more relevant. • Socio-demographics only weakly affect perceptions of climate-policy relevance.

  10. On the development and use of farm models for policy impact assessment in the European Union – A review

    NARCIS (Netherlands)

    Reidsma, Pytrik; Janssen, Sander; Jansen, Jacques; Ittersum, van Martin K.

    2018-01-01

    Farm models are potentially relevant tools for policy impact assessment. Governments and international organizations use impact assessment (IA) as an ex-ante policy process and procedure to evaluate impacts of policy options as part of the introduction of new policies. IA is increasingly used. This

  11. Efficient Reanalysis Procedures in Structural Topology Optimization

    DEFF Research Database (Denmark)

    Amir, Oded

    This thesis examines efficient solution procedures for the structural analysis problem within topology optimization. The research is motivated by the observation that when the nested approach to structural optimization is applied, most of the computational effort is invested in repeated solutions...... on approximate reanalysis. For cases where memory limitations require the utilization of iterative equation solvers, we suggest efficient procedures based on alternative termination criteria for such solvers. These approaches are tested on two- and three-dimensional topology optimization problems including...

  12. Addressing the Challenges in Tonsillectomy Research to Inform Health Care Policy: A Review.

    Science.gov (United States)

    Mandavia, Rishi; Schilder, Anne G M; Dimitriadis, Panagiotis A; Mossialos, Elias

    2017-09-01

    Eighty-five percent of investment in medical research has been wasted, with lack of effect on clinical practice and policy. There is increasing effort to improve the likelihood of research being used to influence clinical practice and policy. Tonsillectomy is one of the most common otorhinolaryngologic surgical procedures, and its frequency, cost, and morbidity create a clear need for evidence-based guidelines and policy. The first systematic review on tonsillectomy was conducted 40 years ago and highlighted the lack of definitive evidence for the procedure. Since that study, the body of evidence has still not been able to sufficiently inform policy. This review provides an overview of the key challenges in research to inform tonsillectomy policy and recommendations to help bridge the evidence-policy gap. The challenges in using research to inform policy can be summarized as 4 main themes: (1) non-policy-focused evidence and lack of available evidence, (2) quality of evidence, (3) communication of research findings, and (4) coordinating time frames. Researchers and decision makers should be aware of the limitations of research designs and conflicts of interest that can undermine policy decisions. Researchers must work with decision makers and patients throughout the research process to identify areas of unmet need and political priority, align research and policy time frames, and disseminate research findings. Incentives for researchers should be reorganized to promote dissemination of findings. It is important to consider why evidence gaps in tonsillectomy research have not been addressed during the past 40 years despite considerable investment in time and resources. These findings and recommendations will help produce research that is more responsive to policy gaps and more likely to result in policy changes.

  13. COMPUTER-ASSISTED ACCOUNTING

    Directory of Open Access Journals (Sweden)

    SORIN-CIPRIAN TEIUŞAN

    2009-01-01

    Full Text Available What is computer-assisted accounting? Where is the place and what is the role of the computer in the financial-accounting activity? What is the position and importance of the computer in the accountant’s activity? All these are questions that require scientific research in order to find the answers. The paper approaches the issue of the support granted to the accountant to organize and manage the accounting activity by the computer. Starting from the notions of accounting and computer, the concept of computer-assisted accounting is introduced, it has a general character and it refers to the accounting performed with the help of the computer or using the computer to automate the procedures performed by the person who is doing the accounting activity; this is a concept used to define the computer applications of the accounting activity. The arguments regarding the use of the computer to assist accounting targets the accounting informatization, the automating of the financial-accounting activities and the endowment with modern technology of the contemporary accounting.

  14. Measuring Efficacy of Information Security Policies : A Case Study of UAE based company

    OpenAIRE

    Qureshi, Muhammad Sohail

    2012-01-01

    Nowadays information security policies are operative in many organizations. Currently few organizations take the pain of verifying the efficacy of these policies. Different standards and procedures exist about methods of measuring efficacy of information security policies. Choosing and implementing them depends mainly on the key performance indicators (KPIs) and key risk indicators (KRIs) of any particular organization. This thesis is a case study of an organization in United Arab Emirates (U...

  15. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges

    Science.gov (United States)

    Panico, Russell T., Jr.

    2016-01-01

    This dissertation evaluated campus violence threat assessment policy and procedure implementation at the community college level of higher education. The importance of this topic was to provide a manageable and collaborative initiative for leadership at institutions of higher learning to identify, develop, implement, and evaluate a policy that can…

  16. State-age-dependent maintenance policies for deteriorating systems with Erlang sojourn time distributions

    International Nuclear Information System (INIS)

    Yeh, R.H.

    1997-01-01

    This paper investigates state-age-dependent maintenance policies for multistate deteriorating systems with Erlang sojourn time distributions. Since Erlang distributions are serial combinations of exponential phases, the deteriorating process can be modeled by a multi-phase Markovian model and hence easily analyzed. Based on the Markovian model, the optimal phase-dependent inspection and replacement policy can be obtained by using a policy improvement algorithm. However, since phases are fictitious and can not be identified by inspections, two procedures are developed to construct state-age-dependent policies based on the optimal phase-dependent policy. The properties of the constructed state-age-dependent policies are further investigated and the performance of the policy is evaluated through a numerical example

  17. Standard interface files and procedures for reactor physics codes. Version IV

    International Nuclear Information System (INIS)

    O'Dell, R.D.

    1977-09-01

    Standards, procedures, and recommendations of the Committee on Computer Code Coordination for promoting the exchange of reactor physics codes are updated to Version IV status. Standards and procedures covering general programming, program structure, standard interface files, and file management and handling subroutines are included

  18. Towards an Analysis of the Policies That Shape Public Education: Setting the Context for School Leadership

    Science.gov (United States)

    Bell, Les; Stevenson, Howard

    2015-01-01

    The environment in which school leaders and teachers work is shaped by educational policy. Policy is, in turn, derived from the dominant political ideologies at any particular time. The interrelationship between ideology and policy shapes both the overall organization of education and the operational practices and procedures of staff in schools…

  19. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2003-01-01

    Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security...

  20. "Life" and Education Policy: Intervention, Augmentation and Computation

    Science.gov (United States)

    Gulson, Kalervo N.; Webb, P. Taylor

    2018-01-01

    In this paper, we are interested in the notion of multiple ways of thinking, knowing and transforming life, namely an increasing capacity to intervene in "life" as a "molecular biopolitics," and the changing ways in which "life" can be understood computationally. We identify and speculate on the ways different ideas…

  1. Tendencies in applied policy research

    DEFF Research Database (Denmark)

    Jensen, Sophie Danneris; Jensen, Tanja Dall

    2018-01-01

    incentives to the more vulnerable groups of unemployed individuals; of New Public Management (NMP) focused on increasing efficiency and lowering expenditures through performance measurement and standardization of procedures, and; of evidence based policy research (EBPR) that seek to support policy efforts...... of existing research around these three strands and outline an alternative approach to conducting research that capture the complexities of the field of long-term unemployment and support meaningful application of research in practice. Specifically we introduce the concept of relational causality as a tool...... to understanding and facilitating knowledge production and application. We provide three cases from different international contexts to exemplify how this can be done and conclude by discussing the normative implications of doing research within a highly politicised area....

  2. The styles of the Finnish nuclear waste policy

    International Nuclear Information System (INIS)

    Kojo, Matti

    2010-09-01

    The Finnish government determined the aims and schedule for nuclear waste management in 1983. Nearly three decades later spent nuclear fuel (SNF) management is approaching the construction licensing phase of the repository, on schedule. The parliamentary decision on the final disposal of SNF was taken almost unanimously in 2001. The location of the SNF facility was chosen at the same time. The smoothness of this raises questions about the main factors behind the progress in Finland. The aim of the paper is to analyse the Finnish nuclear waste policy from the point of view of policy style. In the paper policy style is defined as 'the interaction between (a) the government's approach to problem-solving and (b) the relationship between government and the other actors in policy process'. According to this definition by Richardson, Gustafsson and Jordan, the focus of style is both on policymaking and on implementation. The policy style approach is used to identify the standard operating procedures of Finnish nuclear waste policy. The paper aims to contribute to the discussion on the formation of national nuclear waste policy and its institutions by analysing the Finnish case

  3. Random Numbers and Quantum Computers

    Science.gov (United States)

    McCartney, Mark; Glass, David

    2002-01-01

    The topic of random numbers is investigated in such a way as to illustrate links between mathematics, physics and computer science. First, the generation of random numbers by a classical computer using the linear congruential generator and logistic map is considered. It is noted that these procedures yield only pseudo-random numbers since…

  4. A surrogate based multistage-multilevel optimization procedure for multidisciplinary design optimization

    OpenAIRE

    Yao, W.; Chen, X.; Ouyang, Q.; Van Tooren, M.

    2011-01-01

    Optimization procedure is one of the key techniques to address the computational and organizational complexities of multidisciplinary design optimization (MDO). Motivated by the idea of synthetically exploiting the advantage of multiple existing optimization procedures and meanwhile complying with the general process of satellite system design optimization in conceptual design phase, a multistage-multilevel MDO procedure is proposed in this paper by integrating multiple-discipline-feasible (M...

  5. On Realism of Architectural Procedural Models

    Czech Academy of Sciences Publication Activity Database

    Beneš, J.; Kelly, T.; Děchtěrenko, Filip; Křivánek, J.; Müller, P.

    2017-01-01

    Roč. 36, č. 2 (2017), s. 225-234 ISSN 0167-7055 Grant - others:AV ČR(CZ) StrategieAV21/14 Program:StrategieAV Institutional support: RVO:68081740 Keywords : realism * procedural modeling * architecture Subject RIV: IN - Informatics, Computer Science OBOR OECD: Cognitive sciences Impact factor: 1.611, year: 2016

  6. The Change to Administrative Computing in Schools.

    Science.gov (United States)

    Brown, Daniel J.

    1984-01-01

    Describes a study of the process of school office automation which focuses on personnel reactions to administrative computing, what users view as advantages and disadvantages of the automation, perceived barriers and facilitators of the change to automation, school personnel view of long term effects, and implications for school computer policy.…

  7. Employment-related administrative roentgenograms: characteristics of policy formulation and current practice

    International Nuclear Information System (INIS)

    Gift, D.A.; Harris, G.I.; Gard, J.W.; Alexander, G.P.; Potchen, E.J.

    1983-01-01

    A significant proportion of diagnostic medical procedures are used in response to public or private policy rather than in response to an individual patient-physician interaction. We have studied the system whereby such policies are developed and implemented in the case of employment-related chest and lumbar spine roentgenograms, which were found to account for about 11% of the total use of diagnostic radiographs in the state of Michigan. We observed that factors influencing formulation of policy are diverse and largely nonmedical, organizational policies developed in similar environments are often very dissimilar and are highly subject to external influence, and perceptions of policy success and examination utility are typically subjective and uncertain. It is concluded that considerable opportunity exists to enhance the efficacy of such radiographic examinations through leverage provided by their policy-driven nature

  8. Technical and surgical aspects of the sphenopalatine ganglion (SPG) microstimulator insertion procedure

    DEFF Research Database (Denmark)

    Assaf, A T; Hillerup, S; Rostgaard, J

    2016-01-01

    into the pterygopalatine fossa (PPF) is presented herein. Technical aspects include detailed descriptions of the preoperative planning using computed tomography or cone beam computed tomography scans for presurgical digital microstimulator insertion into the patient-specific anatomy and intraoperative verification......), and removal (n=5). This SPG microstimulator insertion procedure has sequelae comparable to other oral cavity procedures including tooth extractions, sinus surgery, and dental implant placement. Twenty-five of 29 subjects (86%) completing a self-assessment questionnaire indicated that the surgical effects were...

  9. State Tuition, Fees, and Financial Assistance Policies: For Public Colleges and Universities, 2010-11

    Science.gov (United States)

    Bell, Allison C.; Carnahan, Julie; L'Orange, Hans P.

    2011-01-01

    This report, "State Tuition, Fees, and Financial Assistance Policies for Public Colleges and Universities: 2010-11", examines the philosophies, policies, and procedures that influence decision-making regarding public college and university tuition, student fees, and student financial aid programs. This report also provides information…

  10. Student Perceived Importance and Correlations of Selected Computer Literacy Course Topics

    Science.gov (United States)

    Ciampa, Mark

    2013-01-01

    Traditional college-level courses designed to teach computer literacy are in a state of flux. Today's students have high rates of access to computing technology and computer ownership, leading many policy decision makers to conclude that students already are computer literate and thus computer literacy courses are dinosaurs in a modern digital…

  11. Implications of the UK NHS consent policy for nuclear medicine practice.

    Science.gov (United States)

    Greaves, Claire D; Tindale, Wendy B

    2005-02-01

    To comply with government policy on consent, the Sheffield Teaching Hospitals (STH) National Health Service (NHS) Trust introduced a new consent policy in February 2002. Verbal or written consent (depending on the level of risk) must be obtained prior to each study. The patient must be fully informed and given time to reach a decision. Consideration needs to be given to the following: to whom, when and how to provide such information and obtain consent. Each study type and patient circumstance needs to be classified according to risk. Consideration of the risks resulted in a local policy in which written consent is required for the following: therapeutic procedures, studies on pregnant women, studies in which pregnancy needs to be avoided, research procedures, cardiac stress for myocardial perfusion scintigraphy and intrathecal administration. Patient information leaflets have been updated with new information about the study and any risks. Information is now available for both patients and hospital staff. Compliance with the consent policy in a service department provides logistic challenges, but it is possible to fully inform patients in advance about their treatment, allowing them to give informed consent.

  12. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  13. New High: A Future-Oriented Study of American Drug Policy

    Science.gov (United States)

    2017-12-01

    physical health , leading to a decrease in morbidity and mortality from obesity. Nootropics on pharmacy shelves combat hunger, low energy, and...office of the future. 14. SUBJECT TERMS futures, megatrends, emerging technologies, drug policy, public health , war on drugs, forecasting, behavioral... health , scenarios, trends, innovation, regulation, policy, artificial intelligence, brain-computer interface, neural stimulation, nootropics

  14. Optimal Repair And Replacement Policy For A System With Multiple Components

    Science.gov (United States)

    2016-06-17

    increases. A future research direction is to develop efficient heuristic methods that can produce near-optimal policy with much less computational...decision variables represent the long-run fraction of time for each state- action pair. The objective function is the linear combination of long-run...exists an optimal policy. To find this policy we solve the linear program. The solution shows that for each state only one state-action pair, represented

  15. Fully implicit, coupled procedures in computational fluid dynamics an engineer's resource book

    CERN Document Server

    Mazhar, Zeka

    2016-01-01

    This book introduces a new generation of superfast algorithms for the treatment of the notoriously difficult velocity-pressure coupling problem in incompressible fluid flow solutions. It provides all the necessary details for the understanding and implementation of the procedures. The derivation and construction of the fully-implicit, block-coupled, incomplete decomposition mechanism are given in a systematic, but easy fashion. Worked-out solutions are included, with comparisons and discussions. A complete program code is included for faster implementation of the algorithm. A brief literature review of the development of the classical solution procedures is included as well. .

  16. Helicopter Flight Procedures for Community Noise Reduction

    Science.gov (United States)

    Greenwood, Eric

    2017-01-01

    A computationally efficient, semiempirical noise model suitable for maneuvering flight noise prediction is used to evaluate the community noise impact of practical variations on several helicopter flight procedures typical of normal operations. Turns, "quick-stops," approaches, climbs, and combinations of these maneuvers are assessed. Relatively small variations in flight procedures are shown to cause significant changes to Sound Exposure Levels over a wide area. Guidelines are developed for helicopter pilots intended to provide effective strategies for reducing the negative effects of helicopter noise on the community. Finally, direct optimization of flight trajectories is conducted to identify low noise optimal flight procedures and quantify the magnitude of community noise reductions that can be obtained through tailored helicopter flight procedures. Physically realizable optimal turns and approaches are identified that achieve global noise reductions of as much as 10 dBA Sound Exposure Level.

  17. Evolutionary computation for reinforcement learning

    NARCIS (Netherlands)

    Whiteson, S.; Wiering, M.; van Otterlo, M.

    2012-01-01

    Algorithms for evolutionary computation, which simulate the process of natural selection to solve optimization problems, are an effective tool for discovering high-performing reinforcement-learning policies. Because they can automatically find good representations, handle continuous action spaces,

  18. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  19. Spatial planning procedures and property prices: The role of expectations

    NARCIS (Netherlands)

    Cotteleer, G.; Peerlings, J.

    2011-01-01

    The objective of this paper is to show if, and to what extent, spatial planning procedures affect residential property prices. To answer this question we used data on residential property prices from an area in the Netherlands called Midden-Delfland. In this area policy plans and decisions on the

  20. The Impact of Quality Assurance Initiatives and Workplace Policies and Procedures on HIV/AIDS-Related Stigma Experienced by Patients and Nurses in Regions with High Prevalence of HIV/AIDS.

    Science.gov (United States)

    Hewko, Sarah J; Cummings, Greta G; Pietrosanu, Matthew; Edwards, Nancy

    2018-02-23

    Stigma is commonly experienced by people living with HIV/AIDS and by those providing care to HIV/AIDS patients. Few intervention studies have explored the impact of workplace policies and/or quality improvement on stigma. We examine the contribution of health care workplace policies, procedures and quality assurance initiatives, and self- and peer-assessed individual nurse practices, to nurse-reported HIV/AIDS-stigma practices toward patients living with HIV/AIDS and nurses in health care settings. Our sample of survey respondents (n = 1157) included managers (n = 392) and registered/enrolled nurses (n = 765) from 29 facilities in 4 countries (South Africa, Uganda, Jamaica, Kenya). This is one of the first studies in LMIC countries to use hierarchical linear modeling to examine the contributions of organizational and individual factors to HIV/AIDS stigma. Based on our results, we argue that organizational interventions explicitly targeting HIV/AIDS stigma are required to reduce the incidence, prevalence and morbidity of HIV/AIDS.

  1. Air pollution policy in Europe: Quantifying the interaction with greenhouse gases and climate change policies

    International Nuclear Information System (INIS)

    Bollen, Johannes; Brink, Corjan

    2014-01-01

    This paper uses the computable general equilibrium model WorldScan to analyse interactions between EU's air pollution and climate change policies. Covering the entire world and seven EU countries, WorldScan simulates economic growth in a neo-classical recursive dynamic framework, including emissions and abatement of greenhouse gases (CO 2 , N 2 O and CH 4 ) and air pollutants (SO 2 , NO x , NH 3 and PM 2.5 ). Abatement includes the possibility of using end-of-pipe control options that remove pollutants without affecting the emission-producing activity itself. This paper analyses several variants of EU's air pollution policies for the year 2020. Air pollution policy will depend on end-of-pipe controls for not more than two thirds, thus also at least one third of the required emission reduction will come from changes in the use of energy through efficiency improvements, fuel switching and other structural changes in the economy. Greenhouse gas emissions thereby decrease, which renders climate change policies less costly. Our results show that carbon prices will fall, and may even drop to zero when the EU agrees on a more stringent air pollution policy. - Highlights: • This paper models bottom-up emission control in top-down CGE model. • We analyse interactions between air pollution and climate policies in Europe. • Structural changes induced by stringent air policies may make EU-ETS market obsolete

  2. South Dakota Department of Education Data Access Policy

    Science.gov (United States)

    South Dakota Department of Education, 2015

    2015-01-01

    The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…

  3. Constructivism in the Art Classroom: Praxis and Policy

    Science.gov (United States)

    Thompson, Christine Marmé

    2015-01-01

    Constructivist thought and practice connect easily with forms of art education that emphasize choice and student agency. This article traces the contemporary forms of constructivism that vie with more structured pedagogical approaches in American schools and recommends policies and procedures that may preserve the qualities of constructivist…

  4. Evaluation in the Transnational "Management by Projects" Policies

    Science.gov (United States)

    Heikkinen, Anja

    2004-01-01

    There is a supranational tendency in educational governance towards a "management by projects" policy, which substitutes democratic procedures and norm-based control in the materialisation of educational justice. The organisational level becomes crucial for the management of education and the pressure to conceive education as a…

  5. Interactive stereotaxic teleassistance of remote experts during arthroscopic procedures.

    Science.gov (United States)

    Wagner, Arne; Undt, Gerhard; Schicho, Kurt; Wanschitz, Felix; Watzinger, Franz; Murakami, Kenichiro; Czerny, Christian; Ewers, Rolf

    2002-01-01

    This article describes the technical setup for stereotaxic telesurgical assistance for arthroscopic procedures. It also outlines the current state, limitations, and feasibility of this technical development. Teleassistance or teleconsultation implemented in endoscopic or arthroscopic procedures have not yet been reported. In this study, 7 computer-assisted arthroscopies of the temporomandibular joint were supported by extramural experts via interactive stereotaxic teleconsultation from distant locations. The external experts were supplied with close to real-time video, audio, and stereotaxic navigation data directly from the operation site. This setup allows the surgeons and external experts to interactively determine portals, target structures, and instrument positions relative to the patient's anatomy and to discuss any step of the procedures. Optoelectronic tracking interfaced to computer- based navigation technology allowed precise positioning of instruments for single or multiple temporomandibular joint punctures. The average error of digitizing probe measurements was 1.3 mm (range, 0.0 to 2.5 mm) and the average standard deviation was 0.7 mm (range, 0.4 to 0.9 mm). Evaluation of the reliability and accuracy of this technique suggests that it is sufficient for controlled navigation, even inside the small temporomandibular joint, a fact that encourages further applications for arthroscopy in general. The minimum requirement for high-quality video transmission for teleassisted procedures are integrated services digital network (ISDN) connections. Conventional ISDN-based videoconferencing can be combined with computer-aided intraoperative navigation. Transmission control protocol/internet protocol (TCP/IP)-based stereotaxic teleassistance data transmission via ATM or satellite seem to be promising techniques to considerably improve the field of arthroscopy.

  6. Procedure for the use of the code SAGAPO-A and auxiliary programs

    International Nuclear Information System (INIS)

    Cevolani, S.

    1981-06-01

    This paper describes the procedure developed in order to optimize the use of the computer code SAGAPO-A for the thermo-fluid-dynamic analysis of gas cooled fuel element bundles. The first item of this procedure concerns the dynamic dimensioning of the code, having as target the optimization of the computer storage requirement. The second item concerns the graphical output: the results of the calculation are plotted together with the experimental results, in order to allow an immediate evaluation of the calculation. (orig.) [de

  7. 32 CFR 292.4 - Specific policy.

    Science.gov (United States)

    2010-07-01

    ... INFORMATION ACT PROGRAM DEFENSE INTELLIGENCE AGENCY (DIA) FREEDOM OF INFORMATION ACT § 292.4 Specific policy... of source and object codes, regardless of medium are not agency records. (This does not include the... existing computer program or printout for retrieval of the requested information. (c) The prior application...

  8. State Token Petri Net modeling method for formal verification of computerized procedure including operator's interruptions of procedure execution flow

    International Nuclear Information System (INIS)

    Kim, Yun Goo; Seong, Poong Hyun

    2012-01-01

    The Computerized Procedure System (CPS) is one of the primary operating support systems in the digital Main Control Room. The CPS displays procedure on the computer screen in the form of a flow chart, and displays plant operating information along with procedure instructions. It also supports operator decision making by providing a system decision. A procedure flow should be correct and reliable, as an error would lead to operator misjudgement and inadequate control. In this paper we present a modeling for the CPS that enables formal verification based on Petri nets. The proposed State Token Petri Nets (STPN) also support modeling of a procedure flow that has various interruptions by the operator, according to the plant condition. STPN modeling is compared with Coloured Petri net when they are applied to Emergency Operating Computerized Procedure. A converting program for Computerized Procedure (CP) to STPN has been also developed. The formal verification and validation methods of CP with STPN increase the safety of a nuclear power plant and provide digital quality assurance means that are needed when the role and function of the CPS is increasing.

  9. 75 FR 42579 - Energy Conservation Program for Consumer Products: Test Procedure for Microwave Ovens; Repeal of...

    Science.gov (United States)

    2010-07-22

    ... provided in paragraph (i)(2) of this section, for each basic model of conventional cooking tops, and... the cooking efficiency test procedure for microwave ovens under the Energy Policy and Conservation Act (EPCA). DOE has determined that the microwave oven test procedure to measure the cooking efficiency does...

  10. Development of public inquiry procedures in relation to proposals for nuclear installations in the United Kingdom

    International Nuclear Information System (INIS)

    Bell, B.H.J.; Lines, R.

    1983-01-01

    Following a description of the procedures followed for formal investigations on matters of public policy in the UK, this paper reviews public enquiry procedures regarding nuclear site licences and gives specific examples of such enquiries (Windscale, Sizewell), showing how the system has evolved over the years. (NEA) [fr

  11. The Impact of Fiscal Policy on Poverty in Ethiopia: A Computable ...

    African Journals Online (AJOL)

    Daniel

    study investigates the economy-wide impacts of these fiscal policy changes on poverty. ... of the World Bank and the International Monetary Fund in the 1990s and ..... factors of production (labor, land, livestock and capital), 7 institutions (an.

  12. Drug Policy in Cyprus

    Directory of Open Access Journals (Sweden)

    George Charalambous

    2012-01-01

    Full Text Available Background: The provision of pharmaceutical drugs is of enormous significance in our lives. Notable progress made inthe domain of Public Health, combined with a general increase in the standard of living, has had a direct impact on thediscovery of new drugs and cures and has shifted pharmaceutical policies further in line with the current needs of boththe country’s health system and, its population.Aim: This research aims to both shed light on and analyse the current state of pharmaceutical policy in Cyprus, as well asto try to seek out its weaknesses, making suggestions, where possible, as to how to keep these to the minimum.Results, and Conclusions: The lack of both high level research and major industrial facilities relating to the discovery ofnew pharmaceutical drugs in Cyprus, has hindered the effectiveness of pharmaceutical policy in general domains such ascontrol over the circulation and production of pharmaceutical products in the country, their pricing and distribution andthe monitoring of our drug supplies. The lack of transparency in a number of pharmaceutical procedures, and ofinformation on drugs does not enhance the industry’s reliability, but rather exacerbates an underlying feeling of insecurityrelating to it among the population.

  13. Optimum equipment maintenance/replacement policy. Part 2: Markov decision approach

    Science.gov (United States)

    Charng, T.

    1982-01-01

    Dynamic programming was utilized as an alternative optimization technique to determine an optimal policy over a given time period. According to a joint effect of the probabilistic transition of states and the sequence of decision making, the optimal policy is sought such that a set of decisions optimizes the long-run expected average cost (or profit) per unit time. Provision of an alternative measure for the expected long-run total discounted costs is also considered. A computer program based on the concept of the Markov Decision Process was developed and tested. The program code listing, the statement of a sample problem, and the computed results are presented.

  14. Bio-inspired computation in unmanned aerial vehicles

    CERN Document Server

    Duan, Haibin

    2014-01-01

    Bio-inspired Computation in Unmanned Aerial Vehicles focuses on the aspects of path planning, formation control, heterogeneous cooperative control and vision-based surveillance and navigation in Unmanned Aerial Vehicles (UAVs) from the perspective of bio-inspired computation. It helps readers to gain a comprehensive understanding of control-related problems in UAVs, presenting the latest advances in bio-inspired computation. By combining bio-inspired computation and UAV control problems, key questions are explored in depth, and each piece is content-rich while remaining accessible. With abundant illustrations of simulation work, this book links theory, algorithms and implementation procedures, demonstrating the simulation results with graphics that are intuitive without sacrificing academic rigor. Further, it pays due attention to both the conceptual framework and the implementation procedures. The book offers a valuable resource for scientists, researchers and graduate students in the field of Control, Aeros...

  15. Replacement strategy for obsolete plant computers

    International Nuclear Information System (INIS)

    Schaefer, J.P.

    1985-01-01

    The plant computers of the first generation of larger nuclear power plants are reaching the end of their useful life time with respect to the hardware. The software would be no reason for a system exchange but new tasks for the supervisory computer system, availability questions of maintenance personnel and spare parts and the demand for improved operating procedures for the computer users have stimulated the considerations on how to exchange a computer system in a nuclear power plant without extending plant outage times due to exchange works. In the Federal Republic of Germany the planning phase of such backfitting projects is well under way, some projects are about to be implemented. The base for these backfitting projects is a modular supervisory computer concept which has been designated for the new line of KWU PWR's. The main characteristic of this computer system is the splitting of the system into a data acquisition level and a data processing level. This principle allows an extension of the processing level or even repeated replacements of the processing computers. With the existing computer system still in operation the new system can be installed in a step-by-step procedure. As soon as the first of the redundant process computers of the data processing level is in operation and the data link to the data acquisition computers is established the old computer system can be taken out of service. Then the back-up processing computer can be commissioned to complete the new system. (author)

  16. An exact solution procedure for multi-item two-echelon spare parts inventory control problem with batch ordering in the central warehouse

    NARCIS (Netherlands)

    Topan, E.; Bayindir, Z.P.; Tan, T.

    2009-01-01

    We consider a multi-item two-echelon inventory system in which the central warehouse operates under a (Q; R) policy, and the local warehouses implement basestock policy. An exact solution procedure is proposed to find the inventory control policy parameters that minimize the system-wide inventory

  17. Efficient multigrid computation of steady hypersonic flows

    NARCIS (Netherlands)

    Koren, B.; Hemker, P.W.; Murthy, T.K.S.

    1991-01-01

    In steady hypersonic flow computations, Newton iteration as a local relaxation procedure and nonlinear multigrid iteration as an acceleration procedure may both easily fail. In the present chapter, same remedies are presented for overcoming these problems. The equations considered are the steady,

  18. 75 FR 26183 - Procedures for Transportation Workplace Drug and Alcohol Testing Programs

    Science.gov (United States)

    2010-05-11

    ... 2105-AE01 Procedures for Transportation Workplace Drug and Alcohol Testing Programs AGENCY: Office of...: For program issues, Bohdan Baczara, Office of Drug and Alcohol Policy and Compliance, 1200 New Jersey... of Federal Regulations, as follows: [[Page 26184

  19. A Collaboratively-Derived Science-Policy Research Agenda

    Science.gov (United States)

    Sutherland, William J.; Bellingan, Laura; Bellingham, Jim R.; Blackstock, Jason J.; Bloomfield, Robert M.; Bravo, Michael; Cadman, Victoria M.; Cleevely, David D.; Clements, Andy; Cohen, Anthony S.; Cope, David R.; Daemmrich, Arthur A.; Devecchi, Cristina; Anadon, Laura Diaz; Denegri, Simon; Doubleday, Robert; Dusic, Nicholas R.; Evans, Robert J.; Feng, Wai Y.; Godfray, H. Charles J.; Harris, Paul; Hartley, Sue E.; Hester, Alison J.; Holmes, John; Hughes, Alan; Hulme, Mike; Irwin, Colin; Jennings, Richard C.; Kass, Gary S.; Littlejohns, Peter; Marteau, Theresa M.; McKee, Glenn; Millstone, Erik P.; Nuttall, William J.; Owens, Susan; Parker, Miles M.; Pearson, Sarah; Petts, Judith; Ploszek, Richard; Pullin, Andrew S.; Reid, Graeme; Richards, Keith S.; Robinson, John G.; Shaxson, Louise; Sierra, Leonor; Smith, Beck G.; Spiegelhalter, David J.; Stilgoe, Jack; Stirling, Andy; Tyler, Christopher P.; Winickoff, David E.; Zimmern, Ron L.

    2012-01-01

    The need for policy makers to understand science and for scientists to understand policy processes is widely recognised. However, the science-policy relationship is sometimes difficult and occasionally dysfunctional; it is also increasingly visible, because it must deal with contentious issues, or itself becomes a matter of public controversy, or both. We suggest that identifying key unanswered questions on the relationship between science and policy will catalyse and focus research in this field. To identify these questions, a collaborative procedure was employed with 52 participants selected to cover a wide range of experience in both science and policy, including people from government, non-governmental organisations, academia and industry. These participants consulted with colleagues and submitted 239 questions. An initial round of voting was followed by a workshop in which 40 of the most important questions were identified by further discussion and voting. The resulting list includes questions about the effectiveness of science-based decision-making structures; the nature and legitimacy of expertise; the consequences of changes such as increasing transparency; choices among different sources of evidence; the implications of new means of characterising and representing uncertainties; and ways in which policy and political processes affect what counts as authoritative evidence. We expect this exercise to identify important theoretical questions and to help improve the mutual understanding and effectiveness of those working at the interface of science and policy. PMID:22427809

  20. Program package for the computation of lenses and deflectors

    International Nuclear Information System (INIS)

    Lencova, B.; Wisselink, G.

    1990-01-01

    In this paper a set of computer programs for the design of electrostatic and magnetic electron lenses and for the design of multipoles for electron microscopy and lithography is described. The two-dimensional field computation is performed by the finite-element method. In order to meet the high demands on accuracy, the programs include the use of a variable step in the fine mesh made with an automeshing procedure, improved methods for coefficient evaluation, a fast solution procedure for the linear equations, and modified algorithms for computation of multipoles and electrostatic lenses. They allow for a fast and accurate computation of electron optical elements. For the input and modification of data, and for presentation of results, graphical menu driven programs written for personal computers are used. For the computation of electron optical properties axial fields are used. (orig.)