WorldWideScience

Sample records for proxy budget assumptions

  1. Impacts of cloud overlap assumptions on radiative budgets and heating fields in convective regions

    Science.gov (United States)

    Wang, XiaoCong; Liu, YiMin; Bao, Qing

    2016-01-01

    Impacts of cloud overlap assumptions on radiative budgets and heating fields are explored with the aid of a cloud-resolving model (CRM), which provided cloud geometry as well as cloud micro and macro properties. Large-scale forcing data to drive the CRM are from TRMM Kwajalein Experiment and the Global Atmospheric Research Program's Atlantic Tropical Experiment field campaigns during which abundant convective systems were observed. The investigated overlap assumptions include those that were traditional and widely used in the past and the one that was recently addressed by Hogan and Illingworth (2000), in which the vertically projected cloud fraction is expressed by a linear combination of maximum and random overlap, with the weighting coefficient depending on the so-called decorrelation length Lcf. Results show that both shortwave and longwave cloud radiative forcings (SWCF/LWCF) are significantly underestimated under maximum (MO) and maximum-random (MRO) overlap assumptions, whereas remarkably overestimated under the random overlap (RO) assumption in comparison with that using CRM inherent cloud geometry. These biases can reach as high as 100 Wm- 2 for SWCF and 60 Wm- 2 for LWCF. By its very nature, the general overlap (GenO) assumption exhibits an encouraging performance on both SWCF and LWCF simulations, with the biases almost reduced by 3-fold compared with traditional overlap assumptions. The superiority of GenO assumption is also manifested in the simulation of shortwave and longwave radiative heating fields, which are either significantly overestimated or underestimated under traditional overlap assumptions. The study also pointed out the deficiency of constant assumption on Lcf in GenO assumption. Further examinations indicate that the CRM diagnostic Lcf varies among different cloud types and tends to be stratified in the vertical. The new parameterization that takes into account variation of Lcf in the vertical well reproduces such a relationship and

  2. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium -- Part 3: Practical considerations, relaxed assumptions, and using tree-ring data to address the amplitude of solar forcing

    National Research Council Canada - National Science Library

    Moberg, A; Sundberg, R; Grudd, H; Hind, A

    2015-01-01

    ... the observations significantly better than the other. The extended framework is applied to a set of simulations driven with forcings for the pre-industrial period 1000-1849 CE and 15 tree-ring-based temperature proxy series...

  3. False assumptions.

    Science.gov (United States)

    Swaminathan, M

    1997-01-01

    Indian women do not have to be told the benefits of breast feeding or "rescued from the clutches of wicked multinational companies" by international agencies. There is no proof that breast feeding has declined in India; in fact, a 1987 survey revealed that 98% of Indian women breast feed. Efforts to promote breast feeding among the middle classes rely on such initiatives as the "baby friendly" hospital where breast feeding is promoted immediately after birth. This ignores the 76% of Indian women who give birth at home. Blaming this unproved decline in breast feeding on multinational companies distracts attention from more far-reaching and intractable effects of social change. While the Infant Milk Substitutes Act is helpful, it also deflects attention from more pressing issues. Another false assumption is that Indian women are abandoning breast feeding to comply with the demands of employment, but research indicates that most women give up employment for breast feeding, despite the economic cost to their families. Women also seek work in the informal sector to secure the flexibility to meet their child care responsibilities. Instead of being concerned about "teaching" women what they already know about the benefits of breast feeding, efforts should be made to remove the constraints women face as a result of their multiple roles and to empower them with the support of families, governmental policies and legislation, employers, health professionals, and the media.

  4. Munchausen syndrome by proxy

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001555.htm Munchausen syndrome by proxy To use the sharing features on this page, please enable JavaScript. Munchausen syndrome by proxy is a mental illness and ...

  5. Verification of uncertainty budgets

    DEFF Research Database (Denmark)

    Heydorn, Kaj; Madsen, B.S.

    2005-01-01

    The quality of analytical results is expressed by their uncertainty, as it is estimated on the basis of an uncertainty budget; little effort is, however, often spent on ascertaining the quality of the uncertainty budget. The uncertainty budget is based on circumstantial or historical data......, and therefore it is essential that the applicability of the overall uncertainty budget to actual measurement results be verified on the basis of current experimental data. This should be carried out by replicate analysis of samples taken in accordance with the definition of the measurand, but representing...... the full range of matrices and concentrations for which the budget is assumed to be valid. In this way the assumptions made in the uncertainty budget can be experimentally verified, both as regards sources of variability that are assumed negligible, and dominant uncertainty components. Agreement between...

  6. Here be web proxies

    DEFF Research Database (Denmark)

    Weaver, Nicholas; Kreibich, Christian; Dam, Martin

    2014-01-01

    HTTP proxies serve numerous roles, from performance enhancement to access control to network censorship, but often operate stealthily without explicitly indicating their presence to the communicating endpoints. In this paper we present an analysis of the evidence of proxying manifest in executions...... of the ICSI Netalyzr spanning 646,000 distinct IP addresses ("clients"). To identify proxies we employ a range of detectors at the transport and application layer, and report in detail on the extent to which they allow us to fingerprint and map proxies to their likely intended uses. We also analyze 17...

  7. Jemen - the Proxy War

    Directory of Open Access Journals (Sweden)

    Magdalena El Ghamari

    2015-12-01

    Full Text Available The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".

  8. Multiverse Assumptions and Philosophy

    OpenAIRE

    James R. Johnson

    2018-01-01

    Multiverses are predictions based on theories. Focusing on each theory’s assumptions is key to evaluating a proposed multiverse. Although accepted theories of particle physics and cosmology contain non-intuitive features, multiverse theories entertain a host of “strange” assumptions classified as metaphysical (outside objective experience, concerned with fundamental nature of reality, ideas that cannot be proven right or wrong) topics such as: infinity, duplicate yous, hypothetical fields, mo...

  9. Using energetic budgets to assess the effects of environmental stress on corals: are we measuring the right things?

    Science.gov (United States)

    Lesser, M. P.

    2013-03-01

    Historically, the response of marine invertebrates to their environment, and environmentally induced stress, has included some measurement of their physiology or metabolism. Eventually, this approach developed into comparative energetics and the construction of energetic budgets. More recently, coral reefs, and scleractinian corals in particular, have suffered significant declines due to climate change-related environmental stress. In addition to a number of physiological, biophysical and molecular measurements to assess "coral health," there has been increased use of energetic approaches that have included the measurement of specific biochemical constituents (i.e., lipid concentrations) as a proxy for energy available to assess the potential outcomes of environmental stress on corals. In reading these studies, there appears to be some confusion between energy budgets and carbon budgets. Additionally, many assumptions regarding proximate biochemical composition, metabolic fuel preferences and metabolic quotients have been made, all of which are essential to construct accurate energy budgets and to convert elemental composition (i.e., carbon) to energy equivalents. Additionally, models of energetics such as the metabolic theory of ecology or dynamic energy budgets are being applied to coral physiology and include several assumptions that are not appropriate for scleractinian corals. As we assess the independent and interactive effects of multiple stressors on corals, efforts to construct quantitative energetic budgets should be a priority component of realistic multifactor experiments that would then improve the use of models as predictors of outcomes related to the effects of environmental change on corals.

  10. Multiverse Assumptions and Philosophy

    Directory of Open Access Journals (Sweden)

    James R. Johnson

    2018-02-01

    Full Text Available Multiverses are predictions based on theories. Focusing on each theory’s assumptions is key to evaluating a proposed multiverse. Although accepted theories of particle physics and cosmology contain non-intuitive features, multiverse theories entertain a host of “strange” assumptions classified as metaphysical (outside objective experience, concerned with fundamental nature of reality, ideas that cannot be proven right or wrong topics such as: infinity, duplicate yous, hypothetical fields, more than three space dimensions, Hilbert space, advanced civilizations, and reality established by mathematical relationships. It is easy to confuse multiverse proposals because many divergent models exist. This overview defines the characteristics of eleven popular multiverse proposals. The characteristics compared are: initial conditions, values of constants, laws of nature, number of space dimensions, number of universes, and fine tuning explanations. Future scientific experiments may validate selected assumptions; but until they do, proposals by philosophers may be as valid as theoretical scientific theories.

  11. Jemen - the Proxy War

    OpenAIRE

    Magdalena El Ghamari

    2015-01-01

    The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occas...

  12. Interrogating Values and Assumptions

    OpenAIRE

    Maudlin, Daniel

    2012-01-01

    Architecture and design students are not necessarily or immediately interested in history. It cannot be assumed that the typological or stylistic evolution of form and ornament over time, or lists of acknowledged masters and their works, will be viewed as having any relevance to a contemporary designer. Teaching architectural history within design forces a reappraisal of assumptions and hitherto unquestioned values. The artist-and-object, art-historical tradition excludes all architectures co...

  13. Molecular proxies for paleoclimatology

    Science.gov (United States)

    Eglinton, Timothy I.; Eglinton, Geoffrey

    2008-10-01

    We summarize the applications of molecular proxies in paleoclimatology. Marine molecular records especially are proving to be of value but certain environmentally persistent compounds can also be measured in lake sediments, loess deposits and ice cores. The fundamentals of this approach are the molecular parameters, the compound abundances and carbon, hydrogen, nitrogen and oxygen isotopic contents which can be derived by the analysis of sediment extracts. These afford proxy measures which can be interpreted in terms of the conditions which control climate and also reflect its operation. We discuss two types of proxy; those of terrigenous and those of aquatic origin, and exemplify their application in the study of marine sediments through the medium of ten case studies based in the Atlantic, Mediterranean and Pacific Oceans, and in Antarctica. The studies are mainly for periods in the present, the Holocene and particularly the last glacial/interglacial, but they also include one study from the Cretaceous. The terrigenous proxies, which are measures of continental vegetation, are based on higher plant leaf wax compounds, i.e. long-chain (circa C 30) hydrocarbons, alcohols and acids. They register the relative contributions of C 3 vs. C 4 type plants to the vegetation in the source areas. The two marine proxies are measures of sea surface temperatures (SST). The longer established one, (U 37K') is based on the relative abundances of C 37 alkenones photosynthesized by unicellular algae, members of the Haptophyta. The newest proxy (TEX 86) is based on C 86 glycerol tetraethers (GDGTs) synthesized in the water column by some of the archaeal microbiota, the Crenarchaeota.

  14. Late Budgets

    DEFF Research Database (Denmark)

    Andersen, Asger Lau; Lassen, David Dreyer; Nielsen, Lasse Holbøll Westh

    The budget forms the legal basis of government spending. If a budget is not in place at the beginning of the fiscal year, planning as well as current spending are jeopardized and government shutdown may result. This paper develops a continuous-time war-of-attrition model of budgeting...

  15. Contextuality under weak assumptions

    Science.gov (United States)

    Simmons, Andrew W.; Wallman, Joel J.; Pashayan, Hakop; Bartlett, Stephen D.; Rudolph, Terry

    2017-03-01

    The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term ‘probabilistic contextuality’, drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a ‘possibilistic’ analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove

  16. BEYOND BUDGETING

    OpenAIRE

    Edo Cvrkalj; Denis Smolar

    2015-01-01

    Traditional budgeting principles, with strictly defined business goals, have been, since 1998, slowly growing into more sophisticated and organization-adjusted alternative budgeting concepts. One of those alternative concepts is the “Beyond budgeting” model with an implemented performance effects measuring process. In order for the model to be practicable, budget planning and control has to be reoriented to the “bottom up” planning and control approach. In today’s modern bus...

  17. Proxy Smart Card Systems

    OpenAIRE

    Cattaneo, Giuseppe; Faruolo, Pompeo; Palazzo, Vincenzo; Visconti, Ivan

    2010-01-01

    International audience; The established legal value of digital signatures and the growing availability of identity-based digital services are progressively extending the use of smart cards to all citizens, opening new challenging scenarios. Among them, motivated by concrete applications, secure and practical delegation of digital signatures is becoming more and more critical. Unfortunately, secure delegation systems proposed so far (e.g., proxy signatures) include various drawbacks for any pr...

  18. Linking assumptions in amblyopia

    Science.gov (United States)

    LEVI, DENNIS M.

    2017-01-01

    Over the last 35 years or so, there has been substantial progress in revealing and characterizing the many interesting and sometimes mysterious sensory abnormalities that accompany amblyopia. A goal of many of the studies has been to try to make the link between the sensory losses and the underlying neural losses, resulting in several hypotheses about the site, nature, and cause of amblyopia. This article reviews some of these hypotheses, and the assumptions that link the sensory losses to specific physiological alterations in the brain. Despite intensive study, it turns out to be quite difficult to make a simple linking hypothesis, at least at the level of single neurons, and the locus of the sensory loss remains elusive. It is now clear that the simplest notion—that reduced contrast sensitivity of neurons in cortical area V1 explains the reduction in contrast sensitivity—is too simplistic. Considerations of noise, noise correlations, pooling, and the weighting of information also play a critically important role in making perceptual decisions, and our current models of amblyopia do not adequately take these into account. Indeed, although the reduction of contrast sensitivity is generally considered to reflect “early” neural changes, it seems plausible that it reflects changes at many stages of visual processing. PMID:23879956

  19. Testing Our Fundamental Assumptions

    Science.gov (United States)

    Kohler, Susanna

    2016-06-01

    Science is all about testing the things we take for granted including some of the most fundamental aspects of how we understand our universe. Is the speed of light in a vacuum the same for all photons regardless of their energy? Is the rest mass of a photon actually zero? A series of recent studies explore the possibility of using transient astrophysical sources for tests!Explaining Different Arrival TimesArtists illustration of a gamma-ray burst, another extragalactic transient, in a star-forming region. [NASA/Swift/Mary Pat Hrybyk-Keith and John Jones]Suppose you observe a distant transient astrophysical source like a gamma-ray burst, or a flare from an active nucleus and two photons of different energies arrive at your telescope at different times. This difference in arrival times could be due to several different factors, depending on how deeply you want to question some of our fundamental assumptions about physics:Intrinsic delayThe photons may simply have been emitted at two different times by the astrophysical source.Delay due to Lorentz invariance violationPerhaps the assumption that all massless particles (even two photons with different energies) move at the exact same velocity in a vacuum is incorrect.Special-relativistic delayMaybe there is a universal speed for massless particles, but the assumption that photons have zero rest mass is wrong. This, too, would cause photon velocities to be energy-dependent.Delay due to gravitational potentialPerhaps our understanding of the gravitational potential that the photons experience as they travel is incorrect, also causing different flight times for photons of different energies. This would mean that Einsteins equivalence principle, a fundamental tenet of general relativity (GR), is incorrect.If we now turn this problem around, then by measuring the arrival time delay between photons of different energies from various astrophysical sources the further away, the better we can provide constraints on these

  20. Innovative Concepts of Budgeting in the Enterprises

    OpenAIRE

    Adam Bąk

    2009-01-01

    The article presents the current concepts of budgeting with the special focus on innovative budgets. It includes the evolution of the budgeting concept starting from the traditional one which was applied in the second half of the 20th Century and assumed the budget as the main tool for the achievement of company’s goals. The next presented method is Better Budgeting. It arouse at the nineties as the resposne for the critics of the traditional method which was accused for the fixed assumptions...

  1. System Budgets

    DEFF Research Database (Denmark)

    Jeppesen, Palle

    1996-01-01

    The lecture note is aimed at introducing system budgets for optical communication systems. It treats optical fiber communication systems (six generations), system design, bandwidth effects, other system impairments and optical amplifiers.......The lecture note is aimed at introducing system budgets for optical communication systems. It treats optical fiber communication systems (six generations), system design, bandwidth effects, other system impairments and optical amplifiers....

  2. DCS Budget Tracking System

    Data.gov (United States)

    Social Security Administration — DCS Budget Tracking System database contains budget information for the Information Technology budget and the 'Other Objects' budget. This data allows for monitoring...

  3. Munchausen syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Jovanović Aleksandar A.

    2005-01-01

    Full Text Available This review deals with bibliography on Munchausen syndrome by proxy (MSbP. The name of this disorder was introduced by English psychiatrist Roy Meadow who pointed to diagnostic difficulties as well as to serious medical and legal connotations of MSbP. MSbP was classified in DSM-IV among criteria sets provided for further study as "factitious disorder by proxy", while in ICD-10, though not explicitly cited, MSbP might be classified as "factitious disorders" F68.1. MSbP is a special form of abuse where the perpetrator induces somatic or mental symptoms of illness in the victim under his/her care and then persistently presents the victims for medical examinations and care. The victim is usually a preschool child and the perpetrator is the child's mother. Motivation for such pathological behavior of perpetrator is considered to be unconscious need to assume sick role by proxy while external incentives such as economic gain are absent. Conceptualization of MSbP development is still in the domain of psychodynamic speculation, its course is chronic and the prognosis is poor considering lack of consistent, efficient and specific treatment. The authors also present the case report of thirty-three year-old mother who had been abusing her nine year-old son both emotionally and physically over the last several years forcing him to, together with her, report to the police, medical and educational institutions that he had been the victim of rape, poisoning and beating by various individuals, especially teaching and medical staff. Mother manifested psychosis and her child presented with impaired cognitive development, emotional problems and conduct disorder.

  4. [Munchausen by proxy syndrome].

    Science.gov (United States)

    Depauw, A; Loas, G; Delhaye, M

    2015-01-01

    The Munchausen syndrome by proxy (MSBP) was first described in 1977 by the English paediatrician Roy Meadow. The MSBP is an extremely complicated diagnosis because of the difficulty in finding the incriminating evidence of its existence and because of the ethical issue it raises for caregivers. Its implications from a medical, psychological and legal point of view raise difficult questions for any professional confronted to it. In this article we will first present the case of a 16-year-old teenager who had been bedridden in hospital for a year, before an atypical form of MSBP was finally diagnosed, after a stay in a child and adolescent psychiatry unit. We will then discuss this case in light of a literature review on the MSBP.

  5. BEYOND BUDGETING

    Directory of Open Access Journals (Sweden)

    Edo Cvrkalj

    2015-12-01

    Full Text Available Traditional budgeting principles, with strictly defined business goals, have been, since 1998, slowly growing into more sophisticated and organization-adjusted alternative budgeting concepts. One of those alternative concepts is the “Beyond budgeting” model with an implemented performance effects measuring process. In order for the model to be practicable, budget planning and control has to be reoriented to the “bottom up” planning and control approach. In today’s modern business surroundings one has to take both present and future opportunities and threats into consideration, by valorizing them in a budget which would allow a company to realize a whole pallet of advantages over the traditional budgeting principles which are presented later in the article. It is essential to emphasize the importance of successfully implementing the new budgeting principles within an organization. If the implementation has been lacking and done without a higher goal in mind, it is easily possible that the process has been implemented without coordination, planning and control framework within the organization itself. Further in the article we present an overview of managerial techniques and instruments within the “Beyond budgeting” model such as balanced scorecard, rolling forecast, dashboard, KPI and other supporting instruments. Lastly we define seven steps for implementing the “Beyond budgeting” model and offer a comparison of “Beyond budgeting” model against traditional budgeting principles which lists twelve reasons why “Beyond budgeting” is better suited to modern and market-oriented organizations. Each company faces those challenges in their own characteristic way but implementing new dynamic planning models will soon become essential for surviving in the market.

  6. A Climate Data Record (CDR) for the global terrestrial water budget: 1984-2010

    Science.gov (United States)

    Zhang, Yu; Pan, Ming; Sheffield, Justin; Siemann, Amanda L.; Fisher, Colby K.; Liang, Miaoling; Beck, Hylke E.; Wanders, Niko; MacCracken, Rosalyn F.; Houser, Paul R.; Zhou, Tian; Lettenmaier, Dennis P.; Pinker, Rachel T.; Bytheway, Janice; Kummerow, Christian D.; Wood, Eric F.

    2018-01-01

    Closing the terrestrial water budget is necessary to provide consistent estimates of budget components for understanding water resources and changes over time. Given the lack of in situ observations of budget components at anything but local scale, merging information from multiple data sources (e.g., in situ observation, satellite remote sensing, land surface model, and reanalysis) through data assimilation techniques that optimize the estimation of fluxes is a promising approach. Conditioned on the current limited data availability, a systematic method is developed to optimally combine multiple available data sources for precipitation (P), evapotranspiration (ET), runoff (R), and the total water storage change (TWSC) at 0.5° spatial resolution globally and to obtain water budget closure (i.e., to enforce P - ET - R - TWSC = 0) through a constrained Kalman filter (CKF) data assimilation technique under the assumption that the deviation from the ensemble mean of all data sources for the same budget variable is used as a proxy of the uncertainty in individual water budget variables. The resulting long-term (1984-2010), monthly 0.5° resolution global terrestrial water cycle Climate Data Record (CDR) data set is developed under the auspices of the National Aeronautics and Space Administration (NASA) Earth System Data Records (ESDRs) program. This data set serves to bridge the gap between sparsely gauged regions and the regions with sufficient in situ observations in investigating the temporal and spatial variability in the terrestrial hydrology at multiple scales. The CDR created in this study is validated against in situ measurements like river discharge from the Global Runoff Data Centre (GRDC) and the United States Geological Survey (USGS), and ET from FLUXNET. The data set is shown to be reliable and can serve the scientific community in understanding historical climate variability in water cycle fluxes and stores, benchmarking the current climate, and

  7. A Climate Data Record (CDR) for the global terrestrial water budget: 1984–2010

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Yu; Pan, Ming; Sheffield, Justin; Siemann, Amanda L.; Fisher, Colby K.; Liang, Miaoling; Beck, Hylke E.; Wanders, Niko; MacCracken, Rosalyn F.; Houser, Paul R.; Zhou, Tian; Lettenmaier, Dennis P.; Pinker, Rachel T.; Bytheway, Janice; Kummerow, Christian D.; Wood, Eric F.

    2018-01-01

    Closing the terrestrial water budget is necessary to provide consistent estimates of budget components for understanding water resources and changes over time. Given the lack of in situ observations of budget components at anything but local scale, merging information from multiple data sources (e.g., in situ observation, satellite remote sensing, land surface model, and reanalysis) through data assimilation techniques that optimize the estimation of fluxes is a promising approach. Conditioned on the current limited data availability, a systematic method is developed to optimally combine multiple available data sources for precipitation (P), evapotranspiration (ET), runoff (R), and the total water storage change (TWSC) at 0.5° spatial resolution globally and to obtain water budget closure (i.e., to enforce P-ET-R-TWSC = 0) through a constrained Kalman filter (CKF) data assimilation technique under the assumption that the deviation from the ensemble mean of all data sources for the same budget variable is used as a proxy of the uncertainty in individual water budget variables. The resulting long-term (1984–2010), monthly 0.5° resolution global terrestrial water cycle Climate Data Record (CDR) data set is developed under the auspices of the National Aeronautics and Space Administration (NASA) Earth System Data Records (ESDRs) program. This data set serves to bridge the gap between sparsely gauged regions and the regions with sufficient in situ observations in investigating the temporal and spatial variability in the terrestrial hydrology at multiple scales. The CDR created in this study is validated against in situ measurements like river discharge from the Global Runoff Data Centre (GRDC) and the United States Geological Survey (USGS), and ET from FLUXNET. The data set is shown to be reliable and can serve the scientific community in understanding historical climate variability in water cycle fluxes and stores, benchmarking the

  8. Proxy consent: moral authority misconceived.

    Science.gov (United States)

    Wrigley, A

    2007-09-01

    The Mental Capacity Act 2005 has provided unified scope in the British medical system for proxy consent with regard to medical decisions, in the form of a lasting power of attorney. While the intentions are to increase the autonomous decision making powers of those unable to consent, the author of this paper argues that the whole notion of proxy consent collapses into a paternalistic judgement regarding the other person's best interests and that the new legislation introduces only an advisor, not a proxy with the moral authority to make treatment decisions on behalf of another. The criticism is threefold. First, there is good empirical evidence that people are poor proxy decision makers as regards accurately representing other people's desires and wishes, and this is therefore a pragmatically inadequate method of gaining consent. Second, philosophical theory explaining how we represent other people's thought processes indicates that we are unlikely ever to achieve accurate simulations of others' wishes in making a proxy decision. Third, even if we could accurately simulate other people's beliefs and wishes, the current construction of proxy consent in the Mental Capacity Act means that it has no significant ethical authority to match that of autonomous decision making. Instead, it is governed by a professional, paternalistic, best-interests judgement that undermines the intended role of a proxy decision maker. The author argues in favour of clearly adopting the paternalistic best-interests option and viewing the proxy as solely an advisor to the professional medical team in helping make best-interests judgements.

  9. Private Computing with Untrustworthy Proxies

    NARCIS (Netherlands)

    Gedrojc, B.

    2011-01-01

    The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints.

  10. Maintenance Budgeting.

    Science.gov (United States)

    Smith, J. McCree

    Three methods for the preparation of maintenance budgets are discussed--(1) a traditional method, inconclusive and obsolete, based on gross square footage, (2) the formula approach method based on building classification (wood-frame, masonry-wood, masonry-concrete) with maintenance cost factors for each type plus custodial service rates by type of…

  11. Disastrous assumptions about community disasters

    Energy Technology Data Exchange (ETDEWEB)

    Dynes, R.R. [Univ. of Delaware, Newark, DE (United States). Disaster Research Center

    1995-12-31

    Planning for local community disasters is compounded with erroneous assumptions. Six problematic models are identified: agent facts, big accident, end of the world, media, command and control, administrative. Problematic assumptions in each of them are identified. A more adequate model centered on problem solving is identified. That there is a discrepancy between disaster planning efforts and the actual response experience seems rather universal. That discrepancy is symbolized by the graffiti which predictably surfaces on many walls in post disaster locations -- ``First the earthquake, then the disaster.`` That contradiction is seldom reduced as a result of post disaster critiques, since the most usual conclusion is that the plan was adequate but the ``people`` did not follow it. Another explanation will be provided here. A more plausible explanation for failure is that most planning efforts adopt a number of erroneous assumptions which affect the outcome. Those assumptions are infrequently changed or modified by experience.

  12. Innovative Concepts of Budgeting in the Enterprises

    Directory of Open Access Journals (Sweden)

    Adam Bąk

    2009-01-01

    Full Text Available The article presents the current concepts of budgeting with the special focus on innovative budgets. It includes the evolution of the budgeting concept starting from the traditional one which was applied in the second half of the 20th Century and assumed the budget as the main tool for the achievement of companys goals. The next presented method is Better Budgeting. It arouse at the nineties as the resposne for the critics of the traditional method which was accused for the fixed assumptions which were no longer matching with the fast changing competitive environment. This method assumed the high level of budget preparation as he opposite to the detailed level as well as shorter planning period. The Beyond Budgeting was the most radical method and eliminated budget as the tool supporting the management; the concept has been used from the nineties until today, by more than seventy multinational companies from beyond budgeting round table. However, Beyond Budgeting was also criticised for not being applied in the industrial sector and too theoretical approach. Therefore, Ronald Gleicha from European Business School, established a working group, which icludes the scientists and managers, in order to create by mid of 2009, the new and opitimal method, which is called Modern Budgeting.

  13. Robotic Vehicle Proxy Simulation Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Energid Technologies proposes the development of a digital simulation that can replace robotic vehicles in field studies. This proxy simulation will model the...

  14. The Axioms and Special Assumptions

    Science.gov (United States)

    Borchers, Hans-Jürgen; Sen, Rathindra Nath

    For ease of reference, the axioms, the nontriviality assumptions (3.1.10), the definition of a D-set and the special assumptions of Chaps. 5 and 6 are collected together in the following. The verbal explanations that follow the formal definitions a)-f) of (4.2.1) have been omitted. The entries below are numbered as they are in the text. Recall that βC is the subset of the cone C which, in a D-set, is seen to coincide with the boundary of C after the topology is introduced (Sects. 3.2 and 3.2.1).

  15. Sampling Assumptions in Inductive Generalization

    Science.gov (United States)

    Navarro, Daniel J.; Dry, Matthew J.; Lee, Michael D.

    2012-01-01

    Inductive generalization, where people go beyond the data provided, is a basic cognitive capability, and it underpins theoretical accounts of learning, categorization, and decision making. To complete the inductive leap needed for generalization, people must make a key "sampling" assumption about how the available data were generated.…

  16. The effects of metamorphism on iron mineralogy and the iron speciation redox proxy

    Science.gov (United States)

    Slotznick, Sarah P.; Eiler, John M.; Fischer, Woodward W.

    2018-03-01

    As the most abundant transition metal in the Earth's crust, iron is a key player in the planetary redox budget. Observations of iron minerals in the sedimentary record have been used to describe atmospheric and aqueous redox environments over the evolution of our planet; the most common method applied is iron speciation, a geochemical sequential extraction method in which proportions of different iron minerals are compared to calibrations from modern sediments to determine water-column redox state. Less is known about how this proxy records information through post-depositional processes, including diagenesis and metamorphism. To get insight into this, we examined how the iron mineral groups/pools (silicates, oxides, sulfides, etc.) and paleoredox proxy interpretations can be affected by known metamorphic processes. Well-known metamorphic reactions occurring in sub-chlorite to kyanite rocks are able to move iron between different iron pools along a range of proxy vectors, potentially affecting paleoredox results. To quantify the effect strength of these reactions, we examined mineralogical and geochemical data from two classic localities where Silurian-Devonian shales, sandstones, and carbonates deposited in a marine sedimentary basin with oxygenated seawater (based on global and local biological constraints) have been regionally metamorphosed from lower-greenschist facies to granulite facies: Waits River and Gile Mountain Formations, Vermont, USA and the Waterville and Sangerville-Vassalboro Formations, Maine, USA. Plotting iron speciation ratios determined for samples from these localities revealed apparent paleoredox conditions of the depositional water column spanning the entire range from oxic to ferruginous (anoxic) to euxinic (anoxic and sulfidic). Pyrrhotite formation in samples highlighted problems within the proxy as iron pool assignment required assumptions about metamorphic reactions and pyrrhotite's identification depended on the extraction techniques

  17. Qualitative and Quantitative Sentiment Proxies

    DEFF Research Database (Denmark)

    Zhao, Zeyan; Ahmad, Khurshid

    2015-01-01

    Sentiment analysis is a content-analytic investigative framework for researchers, traders and the general public involved in financial markets. This analysis is based on carefully sourced and elaborately constructed proxies for market sentiment and has emerged as a basis for analysing movements...... and trading volumes. The case study we use is a small market index (Danish Stock Exchange Index, OMXC 20, together with prevailing sentiment in Denmark, to evaluate the impact of sentiment on OMXC 20. Furthermore, we introduce a rather novel and quantitative sentiment proxy, that is the use of the index...

  18. Do unreal assumptions pervert behaviour?

    DEFF Research Database (Denmark)

    Petersen, Verner C.

    After conducting a series of experiments involving economics students Miller concludes: "The experience of taking a course in microeconomics actually altered students' conceptions of the appropriateness of acting in a self-interested manner, not merely their definition of self-interest." Being...... taught the assumptions of neoclassical economics one might become inclined to expect others to act in a self-interested way. This may indicate that the canonical assumptions of economics in turn influence the views of its practitioners for instance in business administration. The management practice...... of Jack Welch may show how this works in practice. He became famous for promoting a system of internal competition, in which employees were divided into a three category ranking with the top 20% being the stars, and the bottom 10% were weeded out. If such a scheme does not force employees to act in a self...

  19. Budgeting for School Media Centers.

    Science.gov (United States)

    Drott, M. Carl

    1978-01-01

    Describes various forms of budgets and discusses concepts in budgeting useful to supervisors of school media centers: line item budgets, capital budgets, creating budgets, the budget calendar, innovations, PPBS (Planning, Programing, Budgeting System), zero-based budgeting, cost-benefit analysis, benefits, benefit guidelines, and budgeting for the…

  20. On testing the missing at random assumption

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2006-01-01

    Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption. In this ......Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption...

  1. Modern Cosmology: Assumptions and Limits

    Science.gov (United States)

    Hwang, Jai-Chan

    2012-06-01

    Physical cosmology tries to understand the Universe at large with its origin and evolution. Observational and experimental situations in cosmology do not allow us to proceed purely based on the empirical means. We examine in which sense our cosmological assumptions in fact have shaped our current cosmological worldview with consequent inevitable limits. Cosmology, as other branches of science and knowledge, is a construct of human imagination reflecting the popular belief system of the era. The question at issue deserves further philosophic discussions. In Whitehead's words, ``philosophy, in one of its functions, is the critic of cosmologies.'' (Whitehead 1925).

  2. Automated Budget System -

    Data.gov (United States)

    Department of Transportation — The Automated Budget System (ABS) automates management and planning of the Mike Monroney Aeronautical Center (MMAC) budget by providing enhanced capability to plan,...

  3. Proxy comparisons for Paleogene sea water temperature reconstructions

    Science.gov (United States)

    de Bar, Marijke; de Nooijer, Lennart; Schouten, Stefan; Ziegler, Martin; Sluijs, Appy; Reichart, Gert-Jan

    2017-04-01

    Several studies have reconstructed Paleogene seawater temperatures, using single- or multi-proxy approaches (e.g. Hollis et al., 2012 and references therein), particularly comparing TEX86 with foraminiferal δ18O and Mg/Ca. Whereas trends often agree relatively well, absolute temperatures can differ significantly between proxies, possibly because they are often applied to (extreme) climate events/transitions (e.g. Sluijs et al., 2011), where certain assumptions underlying the temperature proxies may not hold true. A more general long-term multi-proxy temperature reconstruction, is therefore necessary to validate the different proxies and underlying presumed boundary conditions. Here we apply a multi-proxy approach using foraminiferal calcite and organic proxies to generate a low-resolution, long term (80 Myr) paleotemperature record for the Bass River core (New Jersey, North Atlantic). Oxygen (δ18O), clumped isotopes (Δ47) and Mg/Ca of benthic foraminifera, as well as the organic proxies MBT'-CBT, TEX86H, U37K' index and the LDI were determined on the same sediments. The youngest samples of Miocene age are characterized by a high BIT index (>0.8) and fractional abundance of the C32 1,15-diol (>0.6; de Bar et al., 2016) and the absence of foraminifera, all suggesting high continental input and shallow depths. The older sediment layers (˜30 to 90 Ma) display BIT values and C32 1,15-diol fractional abundances global transition from the Cretaceous to Eocene greenhouse world into the icehouse climate. The TEX86H sea surface temperature (SST) record shows a gradual cooling over time of ˜35 to 20 ˚ C, whereas the δ18O-derived bottom water temperatures (BWTs) decrease from ˜20 to 10 ˚ C, and the Mg/Ca and Δ47-derived BWTs decrease from ˜25 to 15 ˚ C. The absolute temperature difference between the δ18O and Δ47, might be explained by local variations in seawater δ18O composition. Similarly, the difference in Mg/Ca- and δ18O-derived BWTs is likely caused by

  4. Budget Development-More Than $ and Sense.

    Science.gov (United States)

    Camerino, Joseph P.

    2001-01-01

    A significant planning component is establishing a budget forecast for the upcoming year and at least the year following. Bringing a projected budgetary profile to the community and school board early on provides opportunities for discussing certain assumptions, initiatives, and goals that may need examination by district administrators. (MLH)

  5. Munchausen syndrome by proxy: a case report.

    Science.gov (United States)

    Lieder, Holly S; Irving, Sharon Y; Mauricio, Rizalina; Graf, Jeanine M

    2005-01-01

    Munchausen syndrome by proxy is difficult to diagnose unless healthcare providers are astute to its clinical features and management. A case is presented to educate nurses and advanced practice nurses, of the nursing, medical, legal, and social complexities associated with Munchausen syndrome by proxy. This article also provides a brief review of the definition of Munchausen syndrome by proxy, its epidemiology, common features of the perpetrator, implications for healthcare personnel, and the legal and international ramifications of Munchausen syndrome by proxy.

  6. Shareholder Activism Through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholder-initiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  7. Shareholder Activism through the Proxy Process

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper provides evidence on the corporate governance role of shareholderinitiated proxy proposals. Previous studies debate over whether activists use proxy proposals to discipline firms or to simply advance their self-serving agendas, and whether proxy proposals are effective at all in

  8. Budget impact of vildagliptin

    Directory of Open Access Journals (Sweden)

    Orietta Zaniolo

    2008-09-01

    Full Text Available Introduction: to evaluate the impact on the Italian National Health Service (NHS budget of the recent introduction of the DPP-4 inhibitor vildagliptin in combination treatment for NIDDM patients. Methods: NIDDM patients eligible to vildagliptin treatment were identified and quantified based on approved indications and prevalence data review; adequate alternative strategies were identified; direct medical costs associated with competing strategies were calculated according to national practice and prices (drug acquisition, therapeutic monitoring, cost for managing severe adverse events – severe hypoglycemia events, fractures, new heart failure cases and the NHS budgetary impact was estimated according to market penetration assumptions (base-case: 5% and 10% for the first and second year, respectively. Results: patients estimated eligible for vildagliptin in Italy are about 237,500: pts inadequately controlled with metformin monotherapy (166,500, pts inadequately controlled with sulfonylurea monotherapy and intolerant/contraindicated to metformin (70,200, and those inadequately controlled with thiazolidinedione monotherapy (800. Costing and comparing of the vildagliptin-based and competing strategies revealed differences in both directions, depending on patient subgroup. Assuming uniform penetration among identified patient subgroups, vildagliptin introduction is expected to raise NHS costs by 2,750,000 Euro in the first and by 5,500,000 Euro in the second year, respectively representing 1,6% and 3,2% of the estimated total management cost of this patient population. Conclusions: the introduction of vildagliptin in the treatment of Italian NIDDM patients offers a new therapeutic option for three inadequately controlled NIDDM subpopulations; the financial impact on Italian NHS expenditures depends on patient selection and can be expected not to exceed 2-3% of the currently dedicated budget in the first two years.

  9. CDO budgeting

    Science.gov (United States)

    Nesladek, Pavel; Wiswesser, Andreas; Sass, Björn; Mauermann, Sebastian

    2008-04-01

    The Critical dimension off-target (CDO) is a key parameter for mask house customer, affecting directly the performance of the mask. The CDO is the difference between the feature size target and the measured feature size. The change of CD during the process is either compensated within the process or by data correction. These compensation methods are commonly called process bias and data bias, respectively. The difference between data bias and process bias in manufacturing results in systematic CDO error, however, this systematic error does not take into account the instability of the process bias. This instability is a result of minor variations - instabilities of manufacturing processes and changes in materials and/or logistics. Using several masks the CDO of the manufacturing line can be estimated. For systematic investigation of the unit process contribution to CDO and analysis of the factors influencing the CDO contributors, a solid understanding of each unit process and huge number of masks is necessary. Rough identification of contributing processes and splitting of the final CDO variation between processes can be done with approx. 50 masks with identical design, material and process. Such amount of data allows us to identify the main contributors and estimate the effect of them by means of Analysis of variance (ANOVA) combined with multivariate analysis. The analysis does not provide information about the root cause of the variation within the particular unit process, however, it provides a good estimate of the impact of the process on the stability of the manufacturing line. Additionally this analysis can be used to identify possible interaction between processes, which cannot be investigated if only single processes are considered. Goal of this work is to evaluate limits for CDO budgeting models given by the precision and the number of measurements as well as partitioning the variation within the manufacturing process. The CDO variation splits according to

  10. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  11. FY 1996 Congressional budget request: Budget highlights

    Energy Technology Data Exchange (ETDEWEB)

    1995-02-01

    The FY 1996 budget presentation is organized by the Department`s major business lines. An accompanying chart displays the request for new budget authority. The report compares the budget request for FY 1996 with the appropriated FY 1995 funding levels displayed on a comparable basis. The FY 1996 budget represents the first year of a five year plan in which the Department will reduce its spending by $15.8 billion in budget authority and by $14.1 billion in outlays. FY 1996 is a transition year as the Department embarks on its multiyear effort to do more with less. The Budget Highlights are presented by business line; however, the fifth business line, Economic Productivity, which is described in the Policy Overview section, cuts across multiple organizational missions, funding levels and activities and is therefore included in the discussion of the other four business lines.

  12. Measuring SIP proxy server performance

    CERN Document Server

    Subramanian, Sureshkumar V

    2013-01-01

    Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network.SIP Pr

  13. Underlying assumptions of developmental models

    Science.gov (United States)

    Britten, Roy J.

    1998-01-01

    These 10 obvious propositions make a model of the specification of form, intended to expose underlying assumptions of developmental biology for examination and future experimentation. (I) The control of development is by means of local interactions, rather than global control mechanisms. (II) A macromolecule near a specific site will bind by mass action. (III) Starting with a precursor cell, all cells are assembled automatically by specifically binding macromolecules. (IV) At the surface of cells are specific adhesion sites that determine how all cells bind to each other. (V) An organism will assemble automatically from parts (macromolecules, structures, and cells) specified by nuclear control factors. (VI) The nuclear control factors in each cell are from precursor cells and factors derived by signaling from other cells. (VII) The macromolecules that determine specific binding, cell adhesion, and signaling are controlled by nuclear control factors, and in a grand feedback the cell adhesion and signaling systems determine the nuclear factor patterns. (VIII) The embryonic precursor cells for organs, termed “precursor groups,” are linked by adhesion and signaling relationships. (IX) The precursor groups include precursors for regions of an organ and boundary cells between regions having few cell types, growing without additional specific cell-to-cell relationships. (X) Organs are held together by cell adhesion in functional relationships. Thus the form and function of the organism is specified entirely by local control mechanisms. Without global control systems, information for form is in the genes for structural proteins, adhesion molecules, control factors, signaling molecules, and their control regions. PMID:9689087

  14. A Multi-Component Proxy for OH Variability Measured from Space: Evaluation and Evolution

    Science.gov (United States)

    Murray, L. T.; Fiore, A. M.; Valin, L. C.

    2014-12-01

    Observed changes in the decay rate of methyl chloroform (MCF; CH3CCl3) have been the traditional top-down constraint for variability in tropospheric abundances of the hydroxyl radical (OH), and thereby the oxidative capacity of the atmosphere. However, as atmospheric MCF concentrations approach detection limits following its ban under the Montréal Protocol, it is necessary to identify new proxies for global OH and its variability. We present here a novel proxy for tropospheric OH using convolved observations of total and tropospheric columns of ozone, water vapor, NO2, and CO, available from the Aura and Aqua satellites in the NASA Earth Observing System constellation. Derived from photochemical steady-state assumptions, the satellite proxy generates spatiotemporally coherent monthly percent anomalies in column OH for Oct. 2004 through Sept. 2012. We demonstrate that the temporal evolution of the globally integrated signal is statistically consistent with changes inferred by the MCF decay rate during this period. The magnitude of interannual variability in the satellite OH proxy is smaller than that from MCF, more consistent with global chemical transport models (CTMs). We evaluate the proxy by comparing to 9-year hind-cast simulations of the GEOS-Chem global CTM driven by MERRA reanalysis meteorology at 2° x 2.5° horizontal resolution, and find that the satellite proxy correlates with the airmass-weighted tropospheric monthly mean OH anomalies (R = 0.6; n = 96 months). The satellite proxy and model simulations indicate regional-scale coherent OH anomalies for many regions and seasons; where discrepancies occur, we highlight possible causes. We present a source attribution of the spatial and temporal patterns in the satellite OH proxy, informed by the individual components of the satellite proxy, a series of zero-emission sensitivity simulations with GEOS-Chem, and independent proxies for major modes of climate variability.

  15. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

    Directory of Open Access Journals (Sweden)

    Lili Zhang

    2014-01-01

    Full Text Available A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS and the inhomogeneous small integer solution problem (ISIS. Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.

  16. A Proxy Outcome Approach for Causal Effect in Observational Studies: A Simulation Study

    Directory of Open Access Journals (Sweden)

    Wenbin Liang

    2014-01-01

    Full Text Available Background. Known and unknown/unmeasured risk factors are the main sources of confounding effects in observational studies and can lead to false observations of elevated protective or hazardous effects. In this study, we investigate an alternative approach of analysis that is operated on field-specific knowledge rather than pure statistical assumptions. Method. The proposed approach introduces a proxy outcome into the estimation system. A proxy outcome possesses the following characteristics: (i the exposure of interest is not a cause for the proxy outcome; (ii causes of the proxy outcome and the study outcome are subsets of a collection of correlated variables. Based on these two conditions, the confounding-effect-driven association between the exposure and proxy outcome can then be measured and used as a proxy estimate for the effects of unknown/unmeasured confounders on the outcome of interest. Performance of this approach is tested by a simulation study, whereby 500 different scenarios are generated, with the causal factors of a proxy outcome and a study outcome being partly overlapped under low-to-moderate correlations. Results. The simulation results demonstrate that the conventional approach only led to a correct conclusion in 21% of the 500 scenarios, as compared to 72.2% for the alternative approach. Conclusion. The proposed method can be applied in observational studies in social science and health research that evaluates the health impact of behaviour and mental health problems.

  17. Beyond Zero Based Budgeting.

    Science.gov (United States)

    Ogden, Daniel M., Jr.

    1978-01-01

    Suggests that the most practical budgeting system for most managers is a formalized combination of incremental and zero-based analysis because little can be learned about most programs from an annual zero-based budget. (Author/IRT)

  18. Fiscal Year 2015 Budget

    Data.gov (United States)

    Montgomery County of Maryland — This dataset includes the Fiscal Year 2015 Council-approved operating budget for Montgomery County. The dataset does not include revenues and detailed agency budget...

  19. Between Bedside and Budget

    NARCIS (Netherlands)

    J.L.T. Blank; E. Eggink

    1998-01-01

    Original title: Tussen bed en budget. The report Between bedside and budget (Tussen bed en budget) describes an extensive empirical study of the efficiency of general and university hospitals in the Netherlands. A policy summary recaps the main findings of the study. Those findings

  20. Library Budget Primer.

    Science.gov (United States)

    Warner, Alice Sizer

    1993-01-01

    Discusses the advantages and disadvantages of six types of budgets commonly used by many different kinds of libraries. The budget types covered are lump-sum; formula; line or line-item; program; performance or function; and zero-based. Accompanying figures demonstrate the differences between four of the budget types. (three references) (KRN)

  1. Novel Quantum Proxy Signature without Entanglement

    Science.gov (United States)

    Xu, Guang-bao

    2015-08-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  2. Munchausen Syndrome by Proxy: Identification and Intervention

    Science.gov (United States)

    Walk, Alexandra; Davies, Susan C.

    2010-01-01

    This article discusses the Munchausen syndrome by proxy (MSBP), also known as "factitious disorder by proxy" (FDBP) and fabricated and/or induced illness, which is a mental illness in which a person lies about the physical or mental well-being of a person he/she is responsible for. Most often the dynamic transpires between a mother and her child.…

  3. Understanding the Budget Process

    Directory of Open Access Journals (Sweden)

    Mesut Yalvaç

    2000-03-01

    Full Text Available Many different budgeting techniques can be used in libraries, and some combination of these will be appropriate for almost any individual situation. Li-ne-item, program, performance, formula, variable, and zero-base budgets all have features that may prove beneficial in the preparation of a budget. Budgets also serve a variety of functions, providing for short-term and long-term financial planning as well as for cash management over a period of time. Short-term plans are reflected in the operating budget, while long-term plans are reflected in the capital budget. Since the time when cash is available to an organization does not usually coincide with the time that disbursements must be made, it is also important to carefully plan for the inflow and outflow of funds by means of a cash budget.      During the budget process an organization selects its programs and activities by providing the necessary funding; the library, along with others in the organization, must justify its requests. Because of the cyclical nature of the budget process, it is possible continually to gather information and evaluate alternatives for the next budget period so that the library may achieve its maximum potential for service to its patrons.

  4. The relevance of ''theory rich'' bridge assumptions

    NARCIS (Netherlands)

    Lindenberg, S

    1996-01-01

    Actor models are increasingly being used as a form of theory building in sociology because they can better represent the caul mechanisms that connect macro variables. However, actor models need additional assumptions, especially so-called bridge assumptions, for filling in the relatively empty

  5. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Science.gov (United States)

    Pyrina, Maria; Wagner, Sebastian; Zorita, Eduardo

    2017-10-01

    Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs) of the North Atlantic (NA) Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE) setup using state-of-the-art climate models (CMIP5 Earth system models) and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR) are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica islandica can

  6. Pseudo-proxy evaluation of climate field reconstruction methods of North Atlantic climate based on an annually resolved marine proxy network

    Directory of Open Access Journals (Sweden)

    M. Pyrina

    2017-10-01

    Full Text Available Two statistical methods are tested to reconstruct the interannual variations in past sea surface temperatures (SSTs of the North Atlantic (NA Ocean over the past millennium based on annually resolved and absolutely dated marine proxy records of the bivalve mollusk Arctica islandica. The methods are tested in a pseudo-proxy experiment (PPE setup using state-of-the-art climate models (CMIP5 Earth system models and reanalysis data from the COBE2 SST data set. The methods were applied in the virtual reality provided by global climate simulations and reanalysis data to reconstruct the past NA SSTs using pseudo-proxy records that mimic the statistical characteristics and network of Arctica islandica. The multivariate linear regression methods evaluated here are principal component regression and canonical correlation analysis. Differences in the skill of the climate field reconstruction (CFR are assessed according to different calibration periods and different proxy locations within the NA basin. The choice of the climate model used as a surrogate reality in the PPE has a more profound effect on the CFR skill than the calibration period and the statistical reconstruction method. The differences between the two methods are clearer for the MPI-ESM model due to its higher spatial resolution in the NA basin. The pseudo-proxy results of the CCSM4 model are closer to the pseudo-proxy results based on the reanalysis data set COBE2. Conducting PPEs using noise-contaminated pseudo-proxies instead of noise-free pseudo-proxies is important for the evaluation of the methods, as more spatial differences in the reconstruction skill are revealed. Both methods are appropriate for the reconstruction of the temporal evolution of the NA SSTs, even though they lead to a great loss of variance away from the proxy sites. Under reasonable assumptions about the characteristics of the non-climate noise in the proxy records, our results show that the marine network of Arctica

  7. Comparative Interpretation of Classical and Keynesian Fiscal Policies (Assumptions, Principles and Primary Opinions

    Directory of Open Access Journals (Sweden)

    Engin Oner

    2015-06-01

    Full Text Available Adam Smith being its founder, in the Classical School, which gives prominence to supply and adopts an approach of unbiased finance, the economy is always in a state of full employment equilibrium. In this system of thought, the main philosophy of which is budget balance, that asserts that there is flexibility between prices and wages and regards public debt as an extraordinary instrument, the interference of the state with the economic and social life is frowned upon. In line with the views of the classical thought, the classical fiscal policy is based on three basic assumptions. These are the "Consumer State Assumption", the assumption accepting that "Public Expenditures are Always Ineffectual" and the assumption concerning the "Impartiality of the Taxes and Expenditure Policies Implemented by the State". On the other hand, the Keynesian School founded by John Maynard Keynes, gives prominence to demand, adopts the approach of functional finance, and asserts that cases of underemployment equilibrium and over-employment equilibrium exist in the economy as well as the full employment equilibrium, that problems cannot be solved through the invisible hand, that prices and wages are strict, the interference of the state is essential and at this point fiscal policies have to be utilized effectively.Keynesian fiscal policy depends on three primary assumptions. These are the assumption of "Filter State", the assumption that "public expenditures are sometimes effective and sometimes ineffective or neutral" and the assumption that "the tax, debt and expenditure policies of the state can never be impartial". 

  8. Entropy Budget for Hawking Evaporation

    Directory of Open Access Journals (Sweden)

    Ana Alonso-Serrano

    2017-07-01

    Full Text Available Blackbody radiation, emitted from a furnace and described by a Planck spectrum, contains (on average an entropy of 3 . 9 ± 2 . 5 bits per photon. Since normal physical burning is a unitary process, this amount of entropy is compensated by the same amount of “hidden information” in correlations between the photons. The importance of this result lies in the posterior extension of this argument to the Hawking radiation from black holes, demonstrating that the assumption of unitarity leads to a perfectly reasonable entropy/information budget for the evaporation process. In order to carry out this calculation, we adopt a variant of the “average subsystem” approach, but consider a tripartite pure system that includes the influence of the rest of the universe, and which allows “young” black holes to still have a non-zero entropy; which we identify with the standard Bekenstein entropy.

  9. 7 CFR 3402.14 - Budget and budget narrative.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Budget and budget narrative. 3402.14 Section 3402.14 Agriculture Regulations of the Department of Agriculture (Continued) COOPERATIVE STATE RESEARCH, EDUCATION... budget narrative. Applicants must prepare the Budget, Form CSREES-2004, and a budget narrative...

  10. How Symmetrical Assumptions Advance Strategic Management Research

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Hallberg, Hallberg

    2014-01-01

    application domains of the theory. We argue that assumptional symmetry leads to theoretical advancement by promoting the development of theory with greater falsifiability and stronger ontological grounding. Thus, strategic management theory may be advanced by systematically searching for asymmetrical...

  11. New proxy replacement algorithm for multimedia streaming

    Science.gov (United States)

    Wong, Hau Ling; Lo, Kwok-Tung

    2001-11-01

    Proxy servers play an important role in between servers and clients in various multimedia systems on the Internet. Since proxy servers do not have an infinite-capacity cache for keeping all the continuous media data, the challenge for the replacement policy is to determine which streams should be cached or removed from the proxy server. In this paper, a new proxy replacement algorithm, named the Least Popular Used (LPU) caching algorithm, is proposed for layered encoded multimedia streams in the Internet. The LPU method takes both the short-term and long-term popularity of the video into account in determining the replacement policy. Simulation evaluation shows that our proposed scheme achieves better results than some existing methods in term of the cache efficiency and replacement frequency under both static and dynamic access environments.

  12. 78 FR 70987 - Proxy Advisory Firm Roundtable

    Science.gov (United States)

    2013-11-27

    ... of proxy advisory firm use by investment advisers and institutional investors and potential changes... Special Counsel, Division of Investment Management, at 202-551-6700, or Raymond Be, Special Counsel...

  13. A serial Munchausen syndrome by proxy

    National Research Council Canada - National Science Library

    Esra Unal; Volkan Unal; Ali Gul; Mustafa Celtek; Behzat Diken; Ibrahim Balcioglu

    2017-01-01

    Munchausen syndrome by proxy (MSBP) is a form of child abuse that describes children whose parents or caregivers invent illness stories and substantiate the stories by fabricating false physical signs...

  14. Seizures and Munchausen Syndrome by Proxy

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2002-05-01

    Full Text Available The prevalence, morbidity and mortality, diagnosis and management of cases of fabricated seizures and child abuse (Munchausen syndrome by proxy (MSbp are assessed by pediatricians at the University of Wales College of Medicine, Cardiff, UK.

  15. Munchausen Syndrome by Proxy: A Clinical Vignette

    Science.gov (United States)

    Zylstra, Robert G.; Miller, Karl E.; Stephens, Walter E.

    2000-01-01

    Munchausen syndrome by proxy is the act of one person fabricating or inducing an illness in another to meet his or her own emotional needs through the treatment process. The diagnosis is poorly understood and controversial. We report here the case of a 6-year-old boy who presented with possible pneumonia, nausea, vomiting, and diarrhea and whose mother was suspected of Munchausen syndrome by proxy. PMID:15014581

  16. PENGELOLAAN JARINGAN INTERNET DENGAN PROXY WINGATE

    Directory of Open Access Journals (Sweden)

    Titin Winarti

    2005-01-01

    Full Text Available Proxy adalah bagian dari protokol yang berfungsi sebagai link untuk host tunggal atau sebagai link untuk beberapa host antarajaringan dan jaringan lain. Proxy wingate adalah software yang digunakan untuk berbagi koneksi internet melalui satu alamat IPyang terintegrasi ke internet.

  17. Multimedia Budget Presentations.

    Science.gov (United States)

    Hughes, Jonathon T.; Rodabaugh, Karl

    This book provides an overview of the potential of multimedia budget proposals. The text reviews the fundamentals of multimedia, emphasizing how it improves communication by using multiple levels of input. A process for analyzing many of the budget decisions that must be made, as adapted from Robert Finney's five-step process of "Gap…

  18. Web proxy auto discovery for the WLCG

    CERN Document Server

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  19. Preparing the operating budget.

    Science.gov (United States)

    Williams, R B

    1983-12-01

    The process of preparing a hospital pharmacy budget is presented. The desired characteristics of a budget and the process by which it is developed and approved are described. Fixed, flexible, and zero-based budget types are explained, as are the major components of a well-developed budget: expense, workload, productivity, revenue, and capital equipment and other expenditures. Specific methods for projecting expenses and revenues, based on historical data, are presented along with a discussion of variables that must be considered in order to achieve an accurate and useful budget. The current shift in emphasis away from revenue capture toward critical analysis of pharmacy costs underscores the importance of budgetary analysis for hospital pharmacy managers.

  20. Why budget accountability fails? The elusive links between parliaments and audit agencies in the oversight of the budget

    Directory of Open Access Journals (Sweden)

    CARLOS SANTISO

    2015-09-01

    Full Text Available ABSTRACTParliaments and audit agencies have critical and complementary roles in the oversight of the budget and the enforcement of government accountability. Yet, the nexus between parliaments and audit agencies is one of the weakest links in the accountability chain, generating an accountability gap in the budget process. This articles analyses the interactions between parliaments and audit agencies in the oversight of government finances during the latter stages of the budget process. Using proxies to evaluate the quality of those linkages, such as the follow-up to audit findings and the discharge of government, it shows important dysfunctions in the interactions between parliaments and audit agencies due to a combination of technical capacity constraints and political economy disincentives. It suggests that the effective functioning of the system of checks and balances in public budgeting critically hinges on the agility of the linkages between accountability institutions. As such, the failure of budget accountability is due to systemic dysfunctions in the systems of accountability, rather than the failure of an individual accountability institution acting in isolation. In addition, the effectiveness of the horizontal accountability architecture depends on the political economy incentives shaping the budget process, which are generated by the interactions between the choice of institutional design and budget rules, with the degree of political competition and electoral rules.

  1. Inferring climate variability from skewed proxy records

    Science.gov (United States)

    Emile-Geay, J.; Tingley, M.

    2013-12-01

    Many paleoclimate analyses assume a linear relationship between the proxy and the target climate variable, and that both the climate quantity and the errors follow normal distributions. An ever-increasing number of proxy records, however, are better modeled using distributions that are heavy-tailed, skewed, or otherwise non-normal, on account of the proxies reflecting non-normally distributed climate variables, or having non-linear relationships with a normally distributed climate variable. The analysis of such proxies requires a different set of tools, and this work serves as a cautionary tale on the danger of making conclusions about the underlying climate from applications of classic statistical procedures to heavily skewed proxy records. Inspired by runoff proxies, we consider an idealized proxy characterized by a nonlinear, thresholded relationship with climate, and describe three approaches to using such a record to infer past climate: (i) applying standard methods commonly used in the paleoclimate literature, without considering the non-linearities inherent to the proxy record; (ii) applying a power transform prior to using these standard methods; (iii) constructing a Bayesian model to invert the mechanistic relationship between the climate and the proxy. We find that neglecting the skewness in the proxy leads to erroneous conclusions and often exaggerates changes in climate variability between different time intervals. In contrast, an explicit treatment of the skewness, using either power transforms or a Bayesian inversion of the mechanistic model for the proxy, yields significantly better estimates of past climate variations. We apply these insights in two paleoclimate settings: (1) a classical sedimentary record from Laguna Pallcacocha, Ecuador (Moy et al., 2002). Our results agree with the qualitative aspects of previous analyses of this record, but quantitative departures are evident and hold implications for how such records are interpreted, and

  2. Life Support Baseline Values and Assumptions Document

    Science.gov (United States)

    Anderson, Molly S.; Ewert, Michael K.; Keener, John F.

    2018-01-01

    The Baseline Values and Assumptions Document (BVAD) provides analysts, modelers, and other life support researchers with a common set of values and assumptions which can be used as a baseline in their studies. This baseline, in turn, provides a common point of origin from which many studies in the community may depart, making research results easier to compare and providing researchers with reasonable values to assume for areas outside their experience. This document identifies many specific physical quantities that define life support systems, serving as a general reference for spacecraft life support system technology developers.

  3. Cooperative Proxy Caching for Wireless Base Stations

    Directory of Open Access Journals (Sweden)

    James Z. Wang

    2007-01-01

    Full Text Available This paper proposes a mobile cache model to facilitate the cooperative proxy caching in wireless base stations. This mobile cache model uses a network cache line to record the caching state information about a web document for effective data search and cache space management. Based on the proposed mobile cache model, a P2P cooperative proxy caching scheme is proposed to use a self-configured and self-managed virtual proxy graph (VPG, independent of the underlying wireless network structure and adaptive to the network and geographic environment changes, to achieve efficient data search, data cache and date replication. Based on demand, the aggregate effect of data caching, searching and replicating actions by individual proxy servers automatically migrates the cached web documents closer to the interested clients. In addition, a cache line migration (CLM strategy is proposed to flow and replicate the heads of network cache lines of web documents associated with a moving mobile host to the new base station during the mobile host handoff. These replicated cache line heads provide direct links to the cached web documents accessed by the moving mobile hosts in the previous base station, thus improving the mobile web caching performance. Performance studies have shown that the proposed P2P cooperative proxy caching schemes significantly outperform existing caching schemes.

  4. FY 1997 congressional budget request: Budget highlights

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This is an overview of the 1997 budget request for the US DOE. The topics of the overview include a policy overview, the budget by business line, business lines by organization, crosswalk from business line to appropriation, summary by appropriation, energy supply research and development, uranium supply and enrichment activities, uranium enrichment decontamination and decommissioning fund, general science and research, weapons activities, defense environmental restoration and waste management, defense nuclear waste disposal, departmental administration, Office of the Inspector General, power marketing administrations, Federal Energy Regulatory commission, nuclear waste disposal fund, fossil energy research and development, naval petroleum and oil shale reserves, energy conservation, economic regulation, strategic petroleum reserve, energy information administration, clean coal technology and a Department of Energy Field Facilities map.

  5. Role of budget impact in drug reimbursement decisions.

    Science.gov (United States)

    Cohen, Joshua Parsons; Stolk, Elly; Niezen, Maartje

    2008-04-01

    There are three known criteria that underlie drug reimbursement decisions: therapeutic value, cost-effectiveness, and burden of disease. However, evidence from recent reimbursement decisions in several jurisdictions points to residual, unexplained variables, among which is budget impact. Budget impact refers to the total costs that drug reimbursement and use entail with respect to one part of the health care system, pharmaceutical care, or to the entire health care system, taking into account the possible reallocation of resources across budgets or sectors of the health care system. The economic and equity rationale for carrying out budget impact analyses is opportunity cost, or benefits forgone, measured in terms of utility or equitable distribution, by using resources in one way rather than another. In other words, by choosing to draw down the budget in one way, decision makers forgo other opportunities to use the same resources. Under a set of unrealistic assumptions, cost-effectiveness analysis accounts for opportunity cost while conveying to the decision maker the price of maximizing health gains, subject to a budget or resource constraint. However, the underlying assumptions are implausible, particularly in the context of pharmaceutical care. Moreover, budget impact analysis is more useful to the decision maker than cost-effectiveness analysis if the objective is not to maximize health gains subject to a budget or resource constraint, but to reduce variance in health gains. With respect to equitable distribution, budget impact analyses lay bare the individuals or groups who lose out - those who bear the opportunity cost of spending resources in accordance with one decision rule rather than another.

  6. A New Approach in Public Budgeting: Citizens' Budget

    Science.gov (United States)

    Bilge, Semih

    2015-01-01

    Change and transformation in the understanding and definition of citizenship has led to the emergence of citizen-oriented public service approach. This approach also raised a new term and concept in the field of public budgeting because of the transformation in the processes of public budgeting: citizens' budget. The citizens' budget which seeks…

  7. Landscape Water Budget Tool

    Science.gov (United States)

    WaterSense created the Water Budget Tool as one option to help builders, landscape professionals, and irrigation professionals certified by a WaterSense labeled program meet the criteria specified in the WaterSense New Home Specification.

  8. Budget and Actuals

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — This dataset contains the Town's Year-to-Date Budget and Actuals for Fiscal Years 2016, 2017, and 2018. Fiscal years run from July 1 to June 30. The data comes from...

  9. Budget Automation System

    Data.gov (United States)

    U.S. Environmental Protection Agency — BAS is the central Agency system used to integrate strategic planning, annual planning, budgeting and financial management. BAS contains resource (dollars and FTE),...

  10. Women and Budget Deficits

    OpenAIRE

    Signe Krogstrup; Sébastien Wälti

    2007-01-01

    If women have different economic preferences than men, then female economic and political empowerment is likely to change policy and household decisions, and in turn macroeconomic outcomes. We test the hypothesis that female enfranchisement leads to lower government budget deficits due gender differences in preferences over fiscal outcomes. Estimating the impact of women's vote on budget deficits in a differences-in-differences regression for Swiss cantonal panel data, we find that including ...

  11. Questioning Assumptions about Portfolio-Based Assessment.

    Science.gov (United States)

    Hamp-Lyons, Liz; Condon, William

    1993-01-01

    Reviews basic concepts and history of portfolio assessment as a useful means of evaluating student writing. Considers insights gained from the use of portfolio assessment. Questions five assumptions underlying portfolio assessment and suggests ways of working with portfolios that take into account new insights and perspectives. (HB)

  12. 10 CFR 436.14 - Methodological assumptions.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Methodological assumptions. 436.14 Section 436.14 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION FEDERAL ENERGY MANAGEMENT AND PLANNING PROGRAMS Methodology and... period is as follows: (1) For evaluating and ranking alternative retrofits for an existing Federal...

  13. Evaluating model assumptions in item response theory

    NARCIS (Netherlands)

    Tijmstra, J.

    2013-01-01

    This dissertation deals with the evaluation of model assumptions in the context of item response theory. Item response theory, also known as modern test theory, provides a statistical framework for the measurement of psychological constructs that cannot by observed directly, such as intelligence or

  14. Mexican-American Cultural Assumptions and Implications.

    Science.gov (United States)

    Carranza, E. Lou

    The search for presuppositions of a people's thought is not new. Octavio Paz and Samuel Ramos have both attempted to describe the assumptions underlying the Mexican character. Paz described Mexicans as private, defensive, and stoic, characteristics taken to the extreme in the "pachuco." Ramos, on the other hand, described Mexicans as…

  15. Assumptions of Multiple Regression: Correcting Two Misconceptions

    Science.gov (United States)

    Williams, Matt N.; Gomez Grajales, Carlos Alberto; Kurkiewicz, Dason

    2013-01-01

    In 2002, an article entitled "Four assumptions of multiple regression that researchers should always test" by Osborne and Waters was published in "PARE." This article has gone on to be viewed more than 275,000 times (as of August 2013), and it is one of the first results displayed in a Google search for "regression…

  16. BOLD Noise Assumptions in fMRI

    NARCIS (Netherlands)

    Wink, Alle Meije; Roerdink, Jos B.T.M.

    2006-01-01

    This paper discusses the assumption of Gaussian noise in the blood-oxygenation-dependent (BOLD) contrast for functional MRI (fMRI). In principle, magnitudes in MRI images follow a Rice distribution. We start by reviewing differences between Rician and Gaussian noise. An analytic expression is

  17. Extracurricular Business Planning Competitions: Challenging the Assumptions

    Science.gov (United States)

    Watson, Kayleigh; McGowan, Pauric; Smith, Paul

    2014-01-01

    Business planning competitions [BPCs] are a commonly offered yet under-examined extracurricular activity. Given the extent of sceptical comment about business planning, this paper offers what the authors believe is a much-needed critical discussion of the assumptions that underpin the provision of such competitions. In doing so it is suggested…

  18. Artificial Intelligence: Underlying Assumptions and Basic Objectives.

    Science.gov (United States)

    Cercone, Nick; McCalla, Gordon

    1984-01-01

    Presents perspectives on methodological assumptions underlying research efforts in artificial intelligence (AI) and charts activities, motivations, methods, and current status of research in each of the major AI subareas: natural language understanding; computer vision; expert systems; search, problem solving, planning; theorem proving and logic…

  19. Critically Challenging Some Assumptions in HRD

    Science.gov (United States)

    O'Donnell, David; McGuire, David; Cross, Christine

    2006-01-01

    This paper sets out to critically challenge five interrelated assumptions prominent in the (human resource development) HRD literature. These relate to: the exploitation of labour in enhancing shareholder value; the view that employees are co-contributors to and co-recipients of HRD benefits; the distinction between HRD and human resource…

  20. Leakage-resilient cryptography from minimal assumptions

    DEFF Research Database (Denmark)

    Hazay, Carmit; López-Alt, Adriana; Wee, Hoeteck

    2013-01-01

    results under specific assumptions. As a building block of independent interest, we study a notion of weak hash-proof systems in the public-key and symmetric-key settings. While these inherit some of the interesting security properties of standard hash-proof systems, we can instantiate them under general...

  1. 47 CFR 214.3 - Assumptions.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Assumptions. 214.3 Section 214.3 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL PROCEDURES FOR THE USE AND..., will have authority to make new or revised assignments of radio frequencies in accordance with...

  2. A statistical proxy for sulphuric acid concentration

    Directory of Open Access Journals (Sweden)

    S. Mikkonen

    2011-11-01

    Full Text Available Gaseous sulphuric acid is a key precursor for new particle formation in the atmosphere. Previous experimental studies have confirmed a strong correlation between the number concentrations of freshly formed particles and the ambient concentrations of sulphuric acid. This study evaluates a body of experimental gas phase sulphuric acid concentrations, as measured by Chemical Ionization Mass Spectrometry (CIMS during six intensive measurement campaigns and one long-term observational period. The campaign datasets were measured in Hyytiälä, Finland, in 2003 and 2007, in San Pietro Capofiume, Italy, in 2009, in Melpitz, Germany, in 2008, in Atlanta, Georgia, USA, in 2002, and in Niwot Ridge, Colorado, USA, in 2007. The long term data were obtained in Hohenpeissenberg, Germany, during 1998 to 2000. The measured time series were used to construct proximity measures ("proxies" for sulphuric acid concentration by using statistical analysis methods. The objective of this study is to find a proxy for sulfuric acid that is valid in as many different atmospheric environments as possible. Our most accurate and universal formulation of the sulphuric acid concentration proxy uses global solar radiation, SO2 concentration, condensation sink and relative humidity as predictor variables, yielding a correlation measure (R of 0.87 between observed concentration and the proxy predictions. Interestingly, the role of the condensation sink in the proxy was only minor, since similarly accurate proxies could be constructed with global solar radiation and SO2 concentration alone. This could be attributed to SO2 being an indicator for anthropogenic pollution, including particulate and gaseous emissions which represent sinks for the OH radical that, in turn, is needed for the formation of sulphuric acid.

  3. Web Proxy Auto Discovery for the WLCG

    Science.gov (United States)

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  4. BUDGET AND PUBLIC DEBT

    Directory of Open Access Journals (Sweden)

    Morar Ioan Dan

    2014-12-01

    Full Text Available The issue of public budgeting is an important issue for public policy of the state, for the simple reason that no money from the state budget can not promote public policy. Budgetary policy is official government Doctrine vision mirror and also represents a starting point for other public policies, which in turn are financed by the public budget. Fiscal policy instruments at its disposal handles the public sector in its structure, and the private sector. Tools such as grant, budgetary allocation, tax, welfare under various forms, direct investments and not least the state aid is used by the state through their budgetary policies to directly and indirectly infuence sector, and the private. Fiscal policies can be grouped according to the structure of the public sector in these components, namely fiscal policy, budgeting and resource allocation policies for financing the budget deficit. An important issue is the financing of the budget deficit budgetary policies. There are two funding possibilities, namely, the higher taxes or more axles site and enter the second call to public loans. Both options involve extra effort from taxpayers in the current fiscal year when they pay higher taxes or a future period when public loans will be repaid. We know that by virtue of "fiscal pact" structural deficits of the member countries of the EU are limited by the European Commission, according to the macro structural stability and budget of each Member State. This problem tempers to some extent the governments of the Member States budgetary appetite, but does not solve the problem of chronic budget deficits. Another issue addressed in this paper is related to the public debt, the absolute amount of its relative level of public datoriri, about the size of GDP, public debt financing and its repayment sources. Sources of public debt issuance and monetary impact on the budget and monetary stability are variables that must underpin the justification of budgetary

  5. Munchausen Syndrome by Proxy: Medical Diagnostic Criteria.

    Science.gov (United States)

    Rosenberg, Donna Andrea

    2003-01-01

    Medical diagnostic criteria for Munchausen Syndrome by Proxy (a persistent fabrication by one individual of illness in another) are presented. Since the strength of the known facts may vary from case to case, diagnostic criteria are given for a definitive diagnosis, a possible diagnosis, an inconclusive determination, and the definitely excluded…

  6. Munchausen Syndrome by Proxy: Evaluation and Treatment.

    Science.gov (United States)

    Parnell, Teresa F.; Day, Deborah O.

    Munchausen Syndrome by Proxy (MSBP) is characterized by a significant caretaker, usually a mother, deliberately inducing and/or falsely reporting illness in a child. The potentially fatal outcome of undetected MSBP makes the understanding of this syndrome gravely important. Early detection and effective intervention can be accomplished through the…

  7. Munchausen Syndrome by Proxy: Social Work's Role.

    Science.gov (United States)

    Mercer, Susan O.; Perdue, Jeanette D.

    1993-01-01

    Describes Munchausen syndrome by proxy, diagnosis used to describe variation of child abuse whereby parent or adult caregiver fabricates medical history or induces symptoms in child, or both, resulting in unnecessary examinations, treatments, hospitalizations, and even death. Reviews assessment procedures, provides case studies, and describes…

  8. Munchausen Syndrome by Proxy: A Family Affair.

    Science.gov (United States)

    Mehl, Albert L.; And Others

    1990-01-01

    The article reports on a case of Munchausen syndrome by proxy in which chronic illicit insulin was administered to a one-year-old child by her mother. Factitious illnesses continued despite psychiatric intervention. Retrospective review of medical records suggested 30 previous episodes of factitious illness within the family. (DB)

  9. The Syndrome of Munchausen by Proxy.

    Science.gov (United States)

    Jones, David P. H.

    1994-01-01

    This editorial introduces two articles on Munchausen by Proxy syndrome (the induction of an appearance or state of physical ill health in a child, by the caretaker, and the child's subsequent presentation to health professionals for diagnosis and/or treatment). The severity of the caretaker's psychological disturbance and the serious effects on…

  10. Improving Internet Archive Service through Proxy Cache.

    Science.gov (United States)

    Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming

    2003-01-01

    Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…

  11. On distributional assumptions and whitened cosine similarities

    DEFF Research Database (Denmark)

    Loog, Marco

    2008-01-01

    Recently, an interpretation of the whitened cosine similarity measure as a Bayes decision rule was proposed (C. Liu, "The Bayes Decision Rule Induced Similarity Measures,'' IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 6, pp. 1086-1090, June 2007. This communication makes...... the observation that some of the distributional assumptions made to derive this measure are very restrictive and, considered simultaneously, even inconsistent....

  12. Critically challenging some assumptions in HRD

    OpenAIRE

    O'Donnell, D.; McGuire, David; Cross, C

    2006-01-01

    peer-reviewed This paper sets out to critically challenge five inter-related assumptions prominent in the HRD literature. These relate to: the exploitation of labour in enhancing shareholder value; the view that employees are co-contributors to and co-recipients of HRD benefits; the distinction between HRD and HRM; the relationship between HRD and unitarism; and, the relationship between HRD and organisational and learning cultures. From a critical modernist perspective, it ...

  13. Questioning ten common assumptions about peatlands

    Directory of Open Access Journals (Sweden)

    University of Leeds Peat Club:

    2017-07-01

    Full Text Available Peatlands have been widely studied in terms of their ecohydrology, carbon dynamics, ecosystem services and palaeoenvironmental archives. However, several assumptions are frequently made about peatlands in the academic literature, practitioner reports and the popular media which are either ambiguous or in some cases incorrect. Here we discuss the following ten common assumptions about peatlands: 1. the northern peatland carbon store will shrink under a warming climate; 2. peatlands are fragile ecosystems; 3. wet peatlands have greater rates of net carbon accumulation; 4. different rules apply to tropical peatlands; 5. peat is a single soil type; 6. peatlands behave like sponges; 7. Sphagnum is the main ‘ecosystem engineer’ in peatlands; 8. a single core provides a representative palaeo-archive from a peatland; 9. water-table reconstructions from peatlands provide direct records of past climate change; and 10. restoration of peatlands results in the re-establishment of their carbon sink function. In each case we consider the evidence supporting the assumption and, where appropriate, identify its shortcomings or ways in which it may be misleading.

  14. Political Budget Cycles

    DEFF Research Database (Denmark)

    Aaskoven, Lasse; Lassen, David Dreyer

    2017-01-01

    The political budget cycle—how elections affect government fiscal policy—is one of the most studied subjects in political economy and political science. The key theoretical question is whether incumbent governments can time or structure public finances in ways that improve their chances...... on political budget cycles have recently focused on conditions under which such cycles are likely to obtain. Much recent research focuses on subnational settings, allowing comparisons of governments in similar institutional environments, and a consensus on the presences of cycles in public finances......—and in the reporting of public finances—is beginning to emerge....

  15. Limiting assumptions in molecular modeling: electrostatics.

    Science.gov (United States)

    Marshall, Garland R

    2013-02-01

    Molecular mechanics attempts to represent intermolecular interactions in terms of classical physics. Initial efforts assumed a point charge located at the atom center and coulombic interactions. It is been recognized over multiple decades that simply representing electrostatics with a charge on each atom failed to reproduce the electrostatic potential surrounding a molecule as estimated by quantum mechanics. Molecular orbitals are not spherically symmetrical, an implicit assumption of monopole electrostatics. This perspective reviews recent evidence that requires use of multipole electrostatics and polarizability in molecular modeling.

  16. Kinetic energy budget details

    Indian Academy of Sciences (India)

    Abstract. This paper presents the detailed turbulent kinetic energy budget and higher order statistics of flow behind a surface-mounted rib with and without superimposed acoustic excitation. Pattern recognition technique is used to determine the large-scale structure magnitude. It is observed that most of the turbulence ...

  17. Reforming the EU Budget

    DEFF Research Database (Denmark)

    Citi, Manuele

    The marginal involvement of the EU in redistributive policies and its limited fiscal resources have led to a lack of attention to the EU budget and its determinants. In this paper I analyse an original dataset containing yearly data on the main macrocategories of expenditure and how they have...

  18. Integrated Budget Office Toolbox

    Science.gov (United States)

    Rushing, Douglas A.; Blakeley, Chris; Chapman, Gerry; Robertson, Bill; Horton, Allison; Besser, Thomas; McCarthy, Debbie

    2010-01-01

    The Integrated Budget Office Toolbox (IBOT) combines budgeting, resource allocation, organizational funding, and reporting features in an automated, integrated tool that provides data from a single source for Johnson Space Center (JSC) personnel. Using a common interface, concurrent users can utilize the data without compromising its integrity. IBOT tracks planning changes and updates throughout the year using both phasing and POP-related (program-operating-plan-related) budget information for the current year, and up to six years out. Separating lump-sum funds received from HQ (Headquarters) into separate labor, travel, procurement, Center G&A (general & administrative), and servicepool categories, IBOT creates a script that significantly reduces manual input time. IBOT also manages the movement of travel and procurement funds down to the organizational level and, using its integrated funds management feature, helps better track funding at lower levels. Third-party software is used to create integrated reports in IBOT that can be generated for plans, actuals, funds received, and other combinations of data that are currently maintained in the centralized format. Based on Microsoft SQL, IBOT incorporates generic budget processes, is transportable, and is economical to deploy and support.

  19. Budgeting and Finance

    NARCIS (Netherlands)

    F.K.M. van Nispen tot Pannerden (Frans)

    2012-01-01

    textabstractThe Call for a Budgetary Theory: The appeal of Valdimer Key for a budgetary theory marks the interest in public budgeting in modern history. He clearly referred to a normative theory, raising the question: ‘on what basis shall it be decided to allocate X dollars to activity A instead of

  20. Zero-Based Budgeting.

    Science.gov (United States)

    Wichowski, Chester

    1979-01-01

    The zero-based budgeting approach is designed to achieve the greatest benefit with the fewest undesirable consequences. Seven basic steps make up the zero-based decision-making process: (1) identifying program goals, (2) classifying goals, (3) identifying resources, (4) reviewing consequences, (5) developing decision packages, (6) implementing a…

  1. Budgeting Academic Space

    Science.gov (United States)

    Harris, Watson

    2011-01-01

    There are many articles about space management, including those that discuss space calculations, metrics, and categories. Fewer articles discuss the space budgeting processes used by administrators to allocate space. The author attempts to fill this void by discussing her administrative experiences with Middle Tennessee State University's (MTSU)…

  2. Surrogate Decision Makers and Proxy Ownership: Challenges of Privacy Management in Health Care Decision Making

    Science.gov (United States)

    Bute, Jennifer J.; Petronio, Sandra; Torke, Alexia M.

    2016-01-01

    This study explored the communicative experiences of surrogates who served as decision makers for patients who were unable to convey health information and choices about treatment options. Drawing on assumptions from communication privacy management theory (Petronio, 2002), 35 surrogates were interviewed to explore how they navigated the role of guardian of patients’ private health information while the patient was hospitalized. This research determined that surrogates are not only guardians and thereby co-owners of the patients’ private health information, they actually served in a “proxy ownership” role. Surrogates described obstacles to both obtaining and sharing private health information about the patient, suggesting that their rights as legitimate co-owners of the patients’ information were not fully acknowledged by the medical teams. Surrogates also described challenges in performing the proxy ownership role when they were not fully aware of the patient's wishes. Theoretical and practical implications of these challenges are discussed. PMID:25175060

  3. Legal requirements governing proxy voting in Denmark

    DEFF Research Database (Denmark)

    Werlauff, Erik

    2008-01-01

    The requirements in Danish company law concerning proxy voting in companies whose shares have been accepted for listing on a regulated market have been successively tightened in recent years, and corporate governance principles have also led to the introduction of several requirements concerning...... proxy holders. A thorough knowledge of these requirements is important not only for the listed companies but also for their advisers and investors in Denmark and abroad. This article considers these requirements as well as the additional requirements which will derive from Directive 2007....../36 on the exercise of shareholders' rights in listed companies, which must be implemented by 3 August 2009. It is pointed out that companies may provide with advantage in their articles of association for both the existing and the forthcoming requirements at this early stage....

  4. Observable Proxies For 26 Al Enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Fryer, Christopher L [Los Alamos National Laboratory; Young, Patrick A [Los Alamos National Laboratory; Ellinger, Carola I [ASU; Arnett, William D [UNIV ARIZONA

    2008-01-01

    We consider the cospatial production of elements in supernova explosions to find observationally detectable proxies for enhancement of {sup 26}Al in supernova ejecta and stellar systems. Using four progenitors we explore a range of 1D explosions at different energies and an asymmetric 3D explosion. We find that the most reliable indicator of the presence of {sup 26}Al in unmixed ejecta is a very low S/Si ratio ({approx} 0.05). Production of N in O/S/Si-rich regions is also indicative. The biologically important element P is produced at its highest abundance in the same regions. Proxies should be detectable in supernova ejecta with high spatial resolution multi wavelength observations, but the small absolute abundance of material injected into a proto-planetary disk makes detection unlikely in existing or forming stellar/planetary systems.

  5. Non-destructive foraminiferal paleoclimatic proxies: A brief insight

    Digital Repository Service at National Institute of Oceanography (India)

    Saraswat, R.

    Non-Destructive Foraminiferal Paleoclimatic Proxies: A Brief Insight The knowledge of past climate can help us to understand imminent climatic changes. Oceans are the vast archives of past climate. Various indirect techniques termed as proxies...

  6. The Budget as a Management Tool: Zero Base Budgeting, Panacea ...

    African Journals Online (AJOL)

    To the extent that zero base budgeting plans, executes and controls, it serves as a management tool. Nigeria's budgeting has been incremental, overly politicized and not carried out by experts, but merely based on benchmark price and quota of daily oil production. Factors militating against proper budgeting in Nigeria are ...

  7. Explorations in statistics: the assumption of normality.

    Science.gov (United States)

    Curran-Everett, Douglas

    2017-09-01

    Learning about statistics is a lot like learning about science: the learning is more meaningful if you can actively explore. This twelfth installment of Explorations in Statistics explores the assumption of normality, an assumption essential to the meaningful interpretation of a t test. Although the data themselves can be consistent with a normal distribution, they need not be. Instead, it is the theoretical distribution of the sample mean or the theoretical distribution of the difference between sample means that must be roughly normal. The most versatile approach to assess normality is to bootstrap the sample mean, the difference between sample means, or t itself. We can then assess whether the distributions of these bootstrap statistics are consistent with a normal distribution by studying their normal quantile plots. If we suspect that an inference we make from a t test may not be justified-if we suspect that the theoretical distribution of the sample mean or the theoretical distribution of the difference between sample means is not normal-then we can use a permutation method to analyze our data. Copyright © 2017 the American Physiological Society.

  8. Wetland distribution assumptions: consequences for Methane emissions

    Science.gov (United States)

    Kleinen, Thomas; Brovkin, Victor

    2017-04-01

    Wetlands are the largest natural source of methane to the atmosphere. While process models of wetland methane emissions have advanced considerably in recent years, all of these models critically depend on estimates of the methane-emitting area. These estimates are highly uncertain, however. We investigate several approaches for estimating the wetland area and the consequences these assumptions have for the spatial and temporal distributions of wetland methane emissions. For this investigation we use JSBACH, the land surface component of the Max Planck Institute Earth System Model MPI-ESM, extended with modules for the generation and soil transport of methane. We drive the model with an ensemble of simulations of climate over the historical period from the MPI-ESM CMIP5 archive, as well as observed climate from CRU-NCEP. We impose both static and dynamic wetland maps, as well as modelled wetland distributions, and determine the wetland methane emissions resulting from these estimates. Results are compared to methane fluxes from atmospheric inversions to evaluate the consequences of the assumptions on wetland area.

  9. Implementasi Proxy Server Dengan Linux Clear OS 5.2

    OpenAIRE

    Setiadi, Aprian

    2013-01-01

    Tugas Akhir ini membahas mengenai cara untuk membangun sebuah proxy server dalam jaringan LAN. Jaringan LAN yang dibangun menggunakan arsitektur topologi star dengan menjadikan komputer server sebagai Gateway Server dan Proxy Server, sehingga tidak membutuhkan perangkat tambahan Router yang berfungsi sebagai Gateway Server. Proxy Server yang yang dibangun menggunakan metode Transparent Mode, sehingga pada komputer klien tidak perlu mengkonfigurasi port proxy server pada Web Browser. Hasil ya...

  10. Budget and Appropriations - Congressional Justification

    Science.gov (United States)

    The Congressional Justification is prepared when the President submits an annual budget to Congress, to justify the President's request by explaining NCI's mission, objectives for the coming fiscal year, and providing comparative budget data and analysis.

  11. 12 CFR 7.2002 - Director or attorney as proxy.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Director or attorney as proxy. 7.2002 Section 7... OPERATIONS Corporate Practices § 7.2002 Director or attorney as proxy. Any person or group of persons, except the bank's officers, clerks, tellers, or bookkeepers, may be designated to act as proxy. The bank's...

  12. Physicians' Involvement with the New York State Health Care Proxy

    Science.gov (United States)

    Heyman, Janna C.; Sealy, Yvette M.

    2011-01-01

    This study examined physicians' attitude, involvement, and perceived barriers with the health care proxy. A cross sectional, correlational design was used to survey practicing physicians (N = 70). Physicians had positive attitudes toward the health care proxy and indicated that the most significant barriers to health care proxy completion were…

  13. [Attachment Quality of Young Children with Mentally Ill Parents on the Example of the Munchausen by Proxy Syndrome].

    Science.gov (United States)

    Ramberg, Axel; Feldkötter, Sinja

    2015-01-01

    One of the most discussed questions in clinical literature concerns the impact of child abuse by mentally ill parents (cf. Mattejat, 1998). It's obvious that most children cannot understand such a parental behaviour and that this lack of understanding along with the lack of knowledge about their parents' emotional disorder results in childrens' fear, disorientation and uncertainty. The consequences are massive interferences in the relationship between parents and children, who could develop an anxious-resistant insecure or even a disorganized/disoriented attachment. But how does a child react, if the behaviour of its parents is ambivalent itself and alternates from abuse to care? Such a parental behaviour is described as the "Munchausen by Proxy Syndrome". This article regards the effects of a "Munchausen by Proxy Syndrome" on the childrens' attachment development. After discussing the basic assumptions about the "Munchhauen by Proxy Syndrome" and the attachment theory we draw conclusions about the syndrome's effect on childrens' attachment behaviour.

  14. Challenging the assumptions for thermal sensation scales

    DEFF Research Database (Denmark)

    Schweiker, Marcel; Fuchs, Xaver; Becker, Susanne

    2016-01-01

    extensively, which is suitable for describing a one-dimensional relationship between physical parameters of indoor environments and subjective thermal sensation. However, human thermal comfort is not merely a physiological but also a psychological phenomenon. Thus, it should be investigated how scales for its...... assessment could benefit from a multidimensional conceptualization. The common assumptions related to the usage of thermal sensation scales are challenged, empirically supported by two analyses. These analyses show that the relationship between temperature and subjective thermal sensation is non......-linear and depends on the type of scale used. Moreover, the results signify that most people do not perceive the categories of the thermal sensation scale as equidistant and that the range of sensations regarded as ‘comfortable’ varies largely. Therefore, challenges known from experimental psychology (describing...

  15. Catalyst Deactivation: Control Relevance of Model Assumptions

    Directory of Open Access Journals (Sweden)

    Bernt Lie

    2000-10-01

    Full Text Available Two principles for describing catalyst deactivation are discussed, one based on the deactivation mechanism, the other based on the activity and catalyst age distribution. When the model is based upon activity decay, it is common to use a mean activity developed from the steady-state residence time distribution. We compare control-relevant properties of such an approach with those of a model based upon the deactivation mechanism. Using a continuous stirred tank reactor as an example, we show that the mechanistic approach and the population balance approach lead to identical models. However, common additional assumptions used for activity-based models lead to model properties that may deviate considerably from the correct one.

  16. APPLICATION OF FUZZY MATHEMATICS TO DETERMINATION OF BUDGET TOURIST FACILITIES

    Directory of Open Access Journals (Sweden)

    Ramón Rodríguez-Betancourt

    2016-01-01

    Full Text Available The financial budget is a statement about what is to be achieved at a future date and on the other drew up the method by which it shall achieve the financial goals. This has two dimensions, a time frame and level of aggregation, and most of the decisions involve long lead times, which means that they require much time to implant. In most tourist facilities practice indicates that the making of the budget shows a deviation of up to 45 % on the obtained real. From the above it follows that these assumptions are carried out under conditions of considerable uncertainty as it becomes necessary to use methods that take into account financial planning these conditions result in uncertainty and minimize the deviations are not substantiated. There are different methods to prepare the budget, which have advantages and disadvantages. In this research intends to use the preparation of budgets, fuzzy linear regression,  which consists in finding two regression lines that contain all the information and that the distance between them is minimal, in order to obtain a range of budget as a basis for future estimation. The two lines are determined by linear programming and its solution is used for the computer system LINDO. Preliminary testing in a hotel installation of the province Santiago de Cuba, are closer to actual budget execution in the years 2007 and 2008 compared with the traditional method by 14 and 18 % less compared to the traditional method. 

  17. Budget impact analysis.

    Science.gov (United States)

    Leelahavarong, Pattara

    2014-05-01

    A budget impact analysis (BIA) is used to assess whether the adoption of a new health technology is affordable, given the resource and budget constraints of the context. Increasingly, BIAs are coming to be viewed as an important-if not essential-part of health technology assessment (HTA). BIA data is often examined in conjunction with cost-effectiveness analysis (CEA) data to help inform decisions makers when developing reimbursement policies within the resource constraints of their health care system. This article presents a review of existing BIA guidelines from around the world and makes some initial recommendations for the development of Thai BIA guidelines, as part of the newly-developed Economic Evaluation guidelines for Thailand. Initial recommendations include guidelines on appropriate analytic framework design, study design, perspective, scenarios for comparison, target population, costing and resource use, uncertainty analysis, and discounting.

  18. Budget impact of vildagliptin

    OpenAIRE

    Orietta Zaniolo; Viola Sacchi; Lorenzo Pradelli

    2008-01-01

    Introduction: to evaluate the impact on the Italian National Health Service (NHS) budget of the recent introduction of the DPP-4 inhibitor vildagliptin in combination treatment for NIDDM patients. Methods: NIDDM patients eligible to vildagliptin treatment were identified and quantified based on approved indications and prevalence data review; adequate alternative strategies were identified; direct medical costs associated with competing strategies were calculated according to national practic...

  19. Simplified budget preparation

    OpenAIRE

    VIJAYA KRUSHNA VARMA

    2011-01-01

    In the present economic system the budget preparation is massive, multi staged, time consuming and laborious process. There are thousands of different high or very low valued goods or services to be segregated into different groups and taxed by both Centre and States with different taxes at three or more slab rates and, as if these are not enough, there are additional surcharges or cesses on selected goods. These tax structures and slab rates on different goods keep changing every year. With ...

  20. Proxy Graph: Visual Quality Metrics of Big Graph Sampling.

    Science.gov (United States)

    Nguyen, Quan Hoang; Hong, Seok-Hee; Eades, Peter; Meidiana, Amyra

    2017-06-01

    Data sampling has been extensively studied for large scale graph mining. Many analyses and tasks become more efficient when performed on graph samples of much smaller size. The use of proxy objects is common in software engineering for analysis and interaction with heavy objects or systems. In this paper, we coin the term 'proxy graph' and empirically investigate how well a proxy graph visualization can represent a big graph. Our investigation focuses on proxy graphs obtained by sampling; this is one of the most common proxy approaches. Despite the plethora of data sampling studies, this is the first evaluation of sampling in the context of graph visualization. For an objective evaluation, we propose a new family of quality metrics for visual quality of proxy graphs. Our experiments cover popular sampling techniques. Our experimental results lead to guidelines for using sampling-based proxy graphs in visualization.

  1. Interannual and (multi-)decadal variability in the sedimentary BIT index of Lake Challa, East Africa, over the past 2200 years: assessment of the precipitation proxy

    NARCIS (Netherlands)

    Buckles, L.K.; Verschuren, D.; Weijers, J.W.H.; Cocquyt, C.; Blaauw, M.; Sinninghe Damsté, J.S.

    2016-01-01

    The branched vs. isoprenoid tetraether (BIT) index is based on the relative abundance of branched tetraether lipids (brGDGTs) and the isoprenoidal GDGT crenarchaeol. In Lake Challa sediments the BIT index has been applied as a proxy for local monsoon precipitation on the assumption that the primary

  2. Adaptability in CORBA: The Mobile Proxy Approach

    DEFF Research Database (Denmark)

    Aziz, B.; Jensen, Christian D.

    2000-01-01

    are inherently open, heterogeneous, and dynamic environments integrating a wide range of platforms, operating systems and applications from a number of different sources. In this paper, we propose to use mobile proxies to provide adaptability in distributed applications integrated using the CORBA technology......Adaptability is one of the most important challenges in modern distributed systems. It may be defined as the ease with which a software application satisfies the different system constraints and the requirements of users and other applications. Adaptability is needed because distributed systems...

  3. TRADITIONAL BUDGETING VERSUS BEYOND BUDGETING: A LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    CARDOS ILDIKO REKA

    2014-07-01

    Full Text Available Budgets are an important part of the business environment since 1920 and are considered to be the key drivers and evaluators of managerial performance; and the key elements for planning and control. Budgets are the most powerful tool for management control; they can play an essential role in the organization’s power politics because it can increase the power and authority of top management and limit the autonomy of lower-level managers. Besides its advantages traditional budgeting presents disadvantages also. In recent years criticism towards traditional budgeting has increased. The basis of this criticism is that traditional budgeting is a relic of the past; it prevents reactions to changes in the market, it cannot keep up with the changes and requirements of today’s business world and it isn’t useful for business management. In order to eliminate criticism researchers and practitioners have developed more systematic and alternative concepts of budgeting that suits better for the needs of the modern business environment. Beyond budgeting, better budgeting, rolling forecasts, activity-based budgeting are the main alternatives developed in the last years. From the mentioned alternatives this article examines only beyond budgeting. Our paper discusses how budgeting has evolved into its current state, before examining why this universal technique has come under such heavy criticism of late. The paper is a literature analysis, it contributes to the existing managerial accounting literature and it is structured as follows. In the first part the background and evolution of budgeting is presented, followed by the analysis of related theories in traditional budgeting, emphasizing both the advantages and disadvantages of traditional budgeting. The second part of the paper continues with the discussion about alternative budgeting methods highlighting pros and cons of alternative methods, especially beyond budgeting. In the third part conducted

  4. Transsexual parenthood and new role assumptions.

    Science.gov (United States)

    Faccio, Elena; Bordin, Elena; Cipolletta, Sabrina

    2013-01-01

    This study explores the parental role of transsexuals and compares this to common assumptions about transsexuality and parentage. We conducted semi-structured interviews with 14 male-to-female transsexuals and 14 men, half parents and half non-parents, in order to explore four thematic areas: self-representation of the parental role, the description of the transsexual as a parent, the common representations of transsexuals as a parent, and male and female parental stereotypes. We conducted thematic and lexical analyses of the interviews using Taltac2 software. The results indicate that social representations of transsexuality and parenthood have a strong influence on processes of self-representation. Transsexual parents accurately understood conventional male and female parental prototypes and saw themselves as competent, responsible parents. They constructed their role based on affection toward the child rather than on the complementary role of their wives. In contrast, men's descriptions of transsexual parental roles were simpler and the descriptions of their parental role coincided with their personal experiences. These results suggest that the transsexual journey toward parenthood involves a high degree of re-adjustment, because their parental role does not coincide with a conventional one.

  5. Towards New Probabilistic Assumptions in Business Intelligence

    Directory of Open Access Journals (Sweden)

    Schumann Andrew

    2015-01-01

    Full Text Available One of the main assumptions of mathematical tools in science is represented by the idea of measurability and additivity of reality. For discovering the physical universe additive measures such as mass, force, energy, temperature, etc. are used. Economics and conventional business intelligence try to continue this empiricist tradition and in statistical and econometric tools they appeal only to the measurable aspects of reality. However, a lot of important variables of economic systems cannot be observable and additive in principle. These variables can be called symbolic values or symbolic meanings and studied within symbolic interactionism, the theory developed since George Herbert Mead and Herbert Blumer. In statistical and econometric tools of business intelligence we accept only phenomena with causal connections measured by additive measures. In the paper we show that in the social world we deal with symbolic interactions which can be studied by non-additive labels (symbolic meanings or symbolic values. For accepting the variety of such phenomena we should avoid additivity of basic labels and construct a new probabilistic method in business intelligence based on non-Archimedean probabilities.

  6. Munchausen syndrome by proxy: ongoing clinical challenges.

    Science.gov (United States)

    Squires, Janet E; Squires, Robert H

    2010-09-01

    In 1977, Roy Meadow, a pediatric nephrologist, first described a condition he subsequently coined Munchausen syndrome by proxy. The classic form involves a parent or other caregiver who inflicts injury or induces illness in a child, deceive the treating physician with fictitious or exaggerated information, and perpetrate the trick for months or years. A related form of pathology is more insidious and more common but also damaging. It involves parents who fabricate or exaggerate symptoms of illness in children, causing overly aggressive medical evaluations and interventions. The common thread is that the treating physician plays a role in inflicting the abuse upon the child. Failure to recognize the problem is common because the condition is often not included in the differential diagnosis of challenging or confusing clinical problems. We believe that a heightened "self-awareness" of the physician's role in Munchausen syndrome by proxy will prevent or reduce the morbidity and mortality associated with this diagnosis. In addition, we believe contemporary developments within the modern health care system likely facilitate this condition.

  7. Statistical framework for evaluation of climate model simulations by use of climate proxy data from the last millennium – Part 1: Theory

    Directory of Open Access Journals (Sweden)

    R. Sundberg

    2012-08-01

    Full Text Available A statistical framework for comparing the output of ensemble simulations from global climate models with networks of climate proxy and instrumental records has been developed, focusing on near-surface temperatures for the last millennium. This framework includes the formulation of a joint statistical model for proxy data, instrumental data and simulation data, which is used to optimize a quadratic distance measure for ranking climate model simulations. An essential underlying assumption is that the simulations and the proxy/instrumental series have a shared component of variability that is due to temporal changes in external forcing, such as volcanic aerosol load, solar irradiance or greenhouse gas concentrations. Two statistical tests have been formulated. Firstly, a preliminary test establishes whether a significant temporal correlation exists between instrumental/proxy and simulation data. Secondly, the distance measure is expressed in the form of a test statistic of whether a forced simulation is closer to the instrumental/proxy series than unforced simulations. The proposed framework allows any number of proxy locations to be used jointly, with different seasons, record lengths and statistical precision. The goal is to objectively rank several competing climate model simulations (e.g. with alternative model parameterizations or alternative forcing histories by means of their goodness of fit to the unobservable true past climate variations, as estimated from noisy proxy data and instrumental observations.

  8. TRADITIONAL BUDGETING VERSUS BEYOND BUDGETING: A LITERATURE REVIEW

    OpenAIRE

    CARDOS ILDIKO REKA; PETE STEFAN; CARDOS VASILE DANIEL

    2014-01-01

    Budgets are an important part of the business environment since 1920 and are considered to be the key drivers and evaluators of managerial performance; and the key elements for planning and control. Budgets are the most powerful tool for management control; they can play an essential role in the organization’s power politics because it can increase the power and authority of top management and limit the autonomy of lower-level managers. Besides its advantages traditional budgeting presents di...

  9. Marketing with limited budget

    OpenAIRE

    Smirnova, Daria

    2017-01-01

    The purpose of this research-based thesis was to get an idea how managers of two small resembling hotels of a specific region deal with marketing process with a limited budget. In addition, the aim of the thesis was to examine if hotel managers who were interviewed perceive marketing only in the way of ‘promotion’ rather than marketing research, marketing mix and marketing environment theories. It was also found out if hotel managers of those hotels consider marketing as a key to successful h...

  10. European Union Budget Politics

    DEFF Research Database (Denmark)

    Citi, Manuele

    2015-01-01

    The marginal involvement of the European Union (EU) in redistributive policies and its limited fiscal resources have led to a notable lack of attention by EU scholars towards the EU budget and its dynamics. Yet the nature of the budgetary data and their high usability for statistical analysis make...... them an excellent tool for studying and measuring policy change in the EU. In this article, I analyse an original dataset containing yearly data for the main categories of expenditure and how they have changed over the last three decades (1979–2013). Using time-series analysis, I find that the ability...

  11. Challenging assumptions from emotion dysregulation psychological treatments.

    Science.gov (United States)

    Neacsiu, Andrada D; Smith, Megan; Fang, Caitlin M

    2017-09-01

    Contemporary treatments assume that the inability to downregulate negative emotional arousal is a key problem in the development and maintenance of psychopathology and that lack of effective regulation efforts and a preference to use maladaptive regulation strategies is a primary mechanism. Though ubiquitous, there is limited empirical evidence to support this assumption. Therefore, the aim of the current study was to examine whether self-reported emotion dysregulation equated to difficulties reducing emotional arousal during a behavioral task and to primary use of maladaptive strategies to manage negative emotions. 44 anxious and depressed adults with high emotion dysregulation induced negative distress using autobiographic memory recall. After induction, participants were instructed to downregulate but were not provided any specific instructions in strategies to use. Self-reported emotional arousal was assessed before and after induction and after regulation. Qualitative descriptions of regulation efforts were collected and codedinto effective and maladaptive strategies. The task was successful in inducing emotional arousal and participants were successful in their efforts to down regulate negative emotions. Additionally, effective regulation strategies were used more frequently than maladaptive strategies. Data collected was exclusively self-report and the sample size was small. Adults who report high emotion dysregulation may still have effective emotion regulation strategies in their behavioral repertoire and are more likely to engage in these effective strategies when given an unspecific prompt to regulate negative emotional arousal. Despite reporting problems with emotion regulation, adults with anxiety and depression can successfully downregulate distress when prompted to do so. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Psychopatholgy, fundamental assumptions and CD-4 T lymphocyte ...

    African Journals Online (AJOL)

    e.g. PTSD, depression, substance abuse) was associated with more negative fundamental assumptions. A secondary aim was to investigate whether psychopathology and fundamental assumptions were associated with a lower CD4 count.

  13. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available The proxy signature, a variant of the ordinary digital signature, has been an active research topic in recent years; it has many useful applications, including distributed systems and grid computing. Although many identity-based proxy signature schemes have been proposed in the literature, only a few proposals for identity-based strong designated verifier proxy signature (ID-SDVPS schemes are available. However, it has been found that most of the ID-SDVPS schemes that have been proposed to date are not efficient in terms of computation and security, and a computationally efficient and secured ID-SDVPS scheme using elliptic curve bilinear pairing has been proposed in this paper. The security of the scheme is mainly based on the hardness assumption of CDH and GBDH problems in the random oracle model, which is existentially unforgeable against different types of adversaries. Furthermore, the security of our scheme is simulated in the AVISPA (Automated Validation of Internet Security Protocols and Applications software, a widely used automated internet protocol validation tool, and the simulation results confirm strong security against both active and passive attacks. In addition, because of a high processing capability and supporting additional security features, the scheme is suitable for the environments in which less computational cost with strong security is required.

  14. Roy's specific life values and the philosophical assumption of humanism.

    Science.gov (United States)

    Hanna, Debra R

    2013-01-01

    Roy's philosophical assumption of humanism, which is shaped by the veritivity assumption, is considered in terms of her specific life values and in contrast to the contemporary view of humanism. Like veritivity, Roy's philosophical assumption of humanism unites a theocentric focus with anthropological values. Roy's perspective enriches the mainly secular, anthropocentric assumption. In this manuscript, the basis for Roy's perspective of humanism will be discussed so that readers will be able to use the Roy adaptation model in an authentic manner.

  15. Baseline budgeting for continuous improvement.

    Science.gov (United States)

    Kilty, G L

    1999-05-01

    This article is designed to introduce the techniques used to convert traditionally maintained department budgets to baseline budgets. This entails identifying key activities, evaluating for value-added, and implementing continuous improvement opportunities. Baseline Budgeting for Continuous Improvement was created as a result of a newly named company president's request to implement zero-based budgeting. The president was frustrated with the mind-set of the organization, namely, "Next year's budget should be 10 to 15 percent more than this year's spending." Zero-based budgeting was not the answer, but combining the principles of activity-based costing and the Just-in-Time philosophy of eliminating waste and continuous improvement did provide a solution to the problem.

  16. 46 CFR 67.239 - Requirements for assumptions of mortgages.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Requirements for assumptions of mortgages. 67.239... MEASUREMENT OF VESSELS DOCUMENTATION OF VESSELS Filing and Recording of Instruments-Mortgages, Preferred Mortgages, and Related Instruments § 67.239 Requirements for assumptions of mortgages. An assumption of...

  17. Philosophy of Technology Assumptions in Educational Technology Leadership

    Science.gov (United States)

    Webster, Mark David

    2017-01-01

    A qualitative study using grounded theory methods was conducted to (a) examine what philosophy of technology assumptions are present in the thinking of K-12 technology leaders, (b) investigate how the assumptions may influence technology decision making, and (c) explore whether technological determinist assumptions are present. Subjects involved…

  18. The zero-sum assumption in neutral biodiversity theory

    NARCIS (Netherlands)

    Etienne, Rampal S.; Alonso, David; McKane, Alan J.

    2007-01-01

    The neutral theory of biodiversity as put forward by Hubbell in his 2001 monograph has received much criticism for its unrealistic simplifying assumptions. These are the assumptions of functional equivalence among different species (neutrality), the assumption of point mutation speciation, and the

  19. Indonesia : Budget Reform Strategy Priorities

    OpenAIRE

    Allen, R.; Eckardt, S.; Jacobs, D; Kristensen, J; Lienert, I.; Schiavo-Campo, S.

    2007-01-01

    This report is designed to assist the authorities develop an overall road map for reforming budget preparation. A specific focus is on the steps to be taken to introduce a medium-term framework for the central government's budget and a performance-based budget. These reforms require important preconditions to be in place, and a substantial change in the culture, incentives and behavior of ...

  20. Collection assessment and acquisitions budgets

    CERN Document Server

    Lee, Sul H

    2013-01-01

    This invaluable new book contains timely information about the assessment of academic library collections and the relationship of collection assessment to acquisition budgets. The rising cost of information significantly influences academic libraries'abilities to acquire the necessary materials for students and faculty, and public libraries'abilities to acquire material for their clientele. Collection Assessment and Acquisitions Budgets examines different aspects of the relationship between the assessment of academic library collections and the management of library acquisition budgets. Librar

  1. Operational budgeting using fuzzy goal programming

    OpenAIRE

    Saeed Mohammadi; Kamran Feizi; Ali Khatami Firouz Abadi

    2013-01-01

    Having an efficient budget normally has different advantages such as measuring the performance of various organizations, setting appropriate targets and promoting managers based on their achievements. However, any budgeting planning requires prediction of different cost components. There are various methods for budgeting planning such as incremental budgeting, program budgeting, zero based budgeting and performance budgeting. In this paper, we present a fuzzy goal programming to estimate oper...

  2. Conference OKs science budgets

    Science.gov (United States)

    With the budget process all but complete for next fiscal year, the National Science Foundation and the National Aeronautics and Space Administration observers were saying that science had not done that badly in Congress, for an election year. NSF got half the budget increase it requested, NASA two-thirds. The Space Station did well, at the expense of environmental and social programs, which are funded by Congress from the same pot of money as NASA and NSF.A House-Senate conference finished work on a $59 billion appropriations bill for the Department of Housing and Urban Development and independent agencies, including EPA, NASA, and NSF, in early August. The House and Senate then quickly passed the measure before their recess; the President is expected to sign it soon. Included in the Fiscal Year 1989 spending bill are $1,885 billion for NSF, a 9.8% increase over FY 1988, and $10.7 billion for NASA, 18.5% more than the year before.

  3. Assessing Statistical Model Assumptions under Climate Change

    Science.gov (United States)

    Varotsos, Konstantinos V.; Giannakopoulos, Christos; Tombrou, Maria

    2016-04-01

    The majority of the studies assesses climate change impacts on air-quality using chemical transport models coupled to climate ones in an off-line mode, for various horizontal resolutions and different present and future time slices. A complementary approach is based on present-day empirical relations between air-pollutants and various meteorological variables which are then extrapolated to the future. However, the extrapolation relies on various assumptions such as that these relationships will retain their main characteristics in the future. In this study we focus on the ozone-temperature relationship. It is well known that among a number of meteorological variables, temperature is found to exhibit the highest correlation with ozone concentrations. This has led, in the past years, to the development and application of statistical models with which the potential impact of increasing future temperatures on various ozone statistical targets was examined. To examine whether the ozone-temperature relationship retains its main characteristics under warmer temperatures we analyze the relationship during the heatwaves events of 2003 and 2006 in Europe. More specifically, we use available gridded daily maximum temperatures (E-OBS) and hourly ozone observations from different non-urban stations (EMEP) within the areas that were impacted from the two heatwave events. In addition, we compare the temperature distributions of the two events with temperatures from two different future time periods 2021-2050 and 2071-2100 from a number of regional climate models developed under the framework of the Cordex initiative (http://www.cordex.org) with a horizontal resolution of 12 x 12km, based on different IPCC RCPs emissions scenarios. A statistical analysis is performed on the ozone-temperature relationship for each station and for the two aforementioned years which are then compared against the ozone-temperature relationships obtained from the rest of the available dataseries. The

  4. Workflows for intelligent monitoring using proxy services.

    Science.gov (United States)

    Rüping, Stefan; Wegener, Dennis; Sfakianakis, Stelios; Sengstag, Thierry

    2009-01-01

    Grid technologies have proven to be very successful in the area of eScience, and in particular in healthcare applications. But while the applicability of workflow enacting tools for biomedical research has long since been proven, the practical adoption into regular clinical research has some additional challenges in grid context. In this paper, we investigate the case of data monitoring, and how to seamlessly implement the step between a one-time proof-of-concept workflow and high-performance on-line monitoring of data streams, as exemplified by the case of long-running clinical trials. We will present an approach based on proxy services that allows executing single-run workflows repeatedly with little overhead.

  5. Salmon: Robust Proxy Distribution for Censorship Circumvention

    Directory of Open Access Journals (Sweden)

    Douglas Frederick

    2016-10-01

    Full Text Available Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on low-performance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system designed to resist a censor with the resources of the “Great Firewall” of China. Salmon relies on a network of volunteers in uncensored countries to run proxy servers. Although any member of the public can become a user, Salmon protects the bulk of its servers from being discovered and blocked by the censor via an algorithm for quickly identifying malicious users. The algorithm entails identifying some users as especially trustworthy or suspicious, based on their actions. We impede Sybil attacks by requiring either an unobtrusive check of a social network account, or a referral from a trustworthy user.

  6. Development of six PROMIS pediatrics proxy-report item banks

    Directory of Open Access Journals (Sweden)

    Irwin Debra E

    2012-02-01

    Full Text Available Abstract Background Pediatric self-report should be considered the standard for measuring patient reported outcomes (PRO among children. However, circumstances exist when the child is too young, cognitively impaired, or too ill to complete a PRO instrument and a proxy-report is needed. This paper describes the development process including the proxy cognitive interviews and large-field-test survey methods and sample characteristics employed to produce item parameters for the Patient Reported Outcomes Measurement Information System (PROMIS pediatric proxy-report item banks. Methods The PROMIS pediatric self-report items were converted into proxy-report items before undergoing cognitive interviews. These items covered six domains (physical function, emotional distress, social peer relationships, fatigue, pain interference, and asthma impact. Caregivers (n = 25 of children ages of 5 and 17 years provided qualitative feedback on proxy-report items to assess any major issues with these items. From May 2008 to March 2009, the large-scale survey enrolled children ages 8-17 years to complete the self-report version and caregivers to complete the proxy-report version of the survey (n = 1548 dyads. Caregivers of children ages 5 to 7 years completed the proxy report survey (n = 432. In addition, caregivers completed other proxy instruments, PedsQL™ 4.0 Generic Core Scales Parent Proxy-Report version, PedsQL™ Asthma Module Parent Proxy-Report version, and KIDSCREEN Parent-Proxy-52. Results Item content was well understood by proxies and did not require item revisions but some proxies clearly noted that determining an answer on behalf of their child was difficult for some items. Dyads and caregivers of children ages 5-17 years old were enrolled in the large-scale testing. The majority were female (85%, married (70%, Caucasian (64% and had at least a high school education (94%. Approximately 50% had children with a chronic health condition, primarily

  7. Budgeting Time to Teach about the School Budget

    Science.gov (United States)

    Weiss, Dale

    2011-01-01

    As a teacher in the Milwaukee Public Schools (MPS) for the past 16 years, the author has grown used to dismal budget cut news arriving each February. Although cuts are always frustrating and their results burdensome, the school has been able to "hang on" reasonably well. This year, however, the budget cuts were extreme. In this article,…

  8. BUDGET PLANNING IN FINANCIAL MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Nataliya Melnichuk

    2015-11-01

    Full Text Available The purpose of the paper is to determine the nature, targets, functions, principles and methods of budget planning and development of classifications due to its types. The essence of budget planning presented by various authors, is own interpretation (the process of developing a plan of formation, distribution and redistribution of financial funds according to budget system units during the reporting period based on budgetary purposes and targets defined by socio-economic development strategy is proposed. Methodology. The following methods such as cognition, induction, deduction, analysis and synthesis have been used in the process of survey. Results of the survey proves that budget planning plays an essential role in the financial management. On condition business environment changing even the best management system can become obsolete. The immediate reaction to the new trends in the financial system as a whole, in the industry is possible with budget planning as well. It also allows to make appropriate adjustments to the plans. Adjustment of long-term, medium-term and short-term plans makes it possible, without changing goals, to change ways of their achievement and thus to raise the level of efficiency of budget funds formation and use. It is necessary to revise the whole system plans, including their mission and goals in the case of global changes in the external and internal environment. Practical implications. The proposed approach to the classification of budget planning types allows to cope with the shortcomings of modern planning in the public sector (the development of the targets according to the state budget expenditures in Ukraine remains a formality and it rarely complies with realities. Value/originality is specified in the proposed interpretation which differs from existing ones that provides clarification of budget planning purpose in financial management; classification of budget planning principles, which differs from previous

  9. Operational budgeting using fuzzy goal programming

    Directory of Open Access Journals (Sweden)

    Saeed Mohammadi

    2013-10-01

    Full Text Available Having an efficient budget normally has different advantages such as measuring the performance of various organizations, setting appropriate targets and promoting managers based on their achievements. However, any budgeting planning requires prediction of different cost components. There are various methods for budgeting planning such as incremental budgeting, program budgeting, zero based budgeting and performance budgeting. In this paper, we present a fuzzy goal programming to estimate operational budget. The proposed model uses fuzzy triangular as well as interval number to estimate budgeting expenses. The proposed study of this paper is implemented for a real-world case study in province of Qom, Iran and the results are analyzed.

  10. Motivation in Beyond Budgeting: A Motivational Paradox?

    DEFF Research Database (Denmark)

    Sandalgaard, Niels; Bukh, Per Nikolaj

    In this paper we discuss the role of motivation in relation to budgeting and we analyse how the Beyond Budgeting model functions compared with traditional budgeting. In the paper we focus on budget related motivation (and motivation in general) and conclude that the Beyond Budgeting model...... is a motivational paradox....

  11. Zero-Base Budgeting:; An Institutional Experience.

    Science.gov (United States)

    Alexander, Donald L.; Anderson, Roger C.

    Zero-base budgeting as it is used at Allegany College is described. Zero-based budgeting is defined as a budgeting and planning approach that requires the examination of every item in a budget request as if the request were being proposed for the first time. Budgets (decision packages) are first made up for decision units (i.e., a course for the…

  12. Proxy-produced ethnographic work: what are the problems, issues, and dilemmas arising from proxy ethnography?

    DEFF Research Database (Denmark)

    Martinussen, Marie Louise; Højbjerg, Karin; Tamborg, Andreas Lindenskov

    2018-01-01

    and positions arising from such a setup between the teacher/researcher and the proxy ethnographer/student are found to have implications for the ethnographies produced. This article’s main focus is to show how these relations and positions have not distorted the ethnographic work and the ethnographies but......This article addresses the implications of research-student cooperation in the production of empirical material. For the student to replace the experienced researcher and work under the researcher’s supervision, we call such work proxy-produced ethnographic work. The specific relations...... the research process. These ethnographic distortions will be generated and described within a framework drawn primarily on the work of sociologist Pierre Bourdieu....

  13. Technology support for participatory budgeting

    DEFF Research Database (Denmark)

    Rose, Jeremy; Rios, Jesus; Lippa, Barbara

    2010-01-01

    and match them to the generic participatory budgeting processes. This results in a comprehensive picture of how known eParticipation technologies can be used to support participatory budgeting. The next research question (unfortunately beyond the scope of this article) is how to choose - which technologies...

  14. Service Increases Fueling Budget Growth

    Science.gov (United States)

    Cottrell, Terry

    2011-01-01

    Reactionary stances against pending budget cuts should be considered to be less favorable positioning for library leaders versus more proactive and anticipatory strategies. By changing the attitudinal and service posturing of library staff and services, libraries can show themselves as a more essential function to their colleges. Budget cuts…

  15. The FY2011 Federal Budget

    Science.gov (United States)

    2010-08-04

    costs of federal health care programs and baby boomer retirements present further challenges to fiscal stability. Operating these programs in their...costs and baby boomer retirements. Budget Fiscal Year 2011 The Obama Administration released its FY2011 budget on February 1, 2010. Congress began its...11 Healthcare Legislation .................................................................................................. 12

  16. FLEXIBLE BUDGET OF SPORT COMPETITIONS

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2009-11-01

    Full Text Available Manager of sport competition has right to decide and also to take responsibility for costs, income and financial results. From economic point of wiev flexible budget and planning cost calculations is top management base for analyzing success level of sport competition. Flexible budget is made before sport competition with few output level, where one is always from static plan-master plan. At the end of competition when we have results, we make report of plan executing and we also analyzing plan variances. Results of comparation between achieved and planning level of static budget can be acceptable if achieved level is approximate to budget level or if we analyzing results from gross or net income. Flexible budget become very important in case of world eco- nomic crises

  17. Reinterpreting climate proxy records from late Quaternary Chinese loess: A detailed OSL investigation

    Science.gov (United States)

    Stevens, Thomas; Thomas, David S. G.; Armitage, Simon J.; Lunn, Hannah R.; Lu, Huayu

    2007-01-01

    Numerous authors have utilised physical properties of Chinese loess and red clay deposits to develop apparently detailed and continuous past climate records from the Miocene into the Holocene. Many of these studies have further suggested that the principal climatic agent responsible for the aeolian emplacement and diagenesis of Chinese loess, the East Asian Monsoon, has fluctuated rapidly on millennial to sub-millennial timescales, in concert with dramatic changes in the North Atlantic (Dansgaard-Oeschger cycles and Heinrich events) and the Western Pacific (El Niño Southern Oscillation). Much of this evidence is based on reconstructions and age models that are tied to assumptions concerning the nature of loess sedimentation and diagenesis, for example, the belief that loess sedimentation can be viewed as essentially continuous. Some authors have however, cast doubt on these assumptions and suggest that the application of radiometric techniques may be required to determine their validity. Recent studies utilising Optically Stimulated Luminescence (OSL) methods have reinforced these doubts and here, OSL dates obtained at 10 cm intervals from three sites along a transect across the Chinese Loess Plateau have been used, in combination with climate proxy evidence, to test the existing assumptions that underpin many palaeoclimatic reconstructions from loess. In this way, the first time-continuous and independently dated late Quaternary climate reconstruction is developed from loess. The data indicate that sedimentation is episodic and that once emplaced, loess is prone to pedogenic disturbance, diagenetic modification and in some cases erosion. The relationships between proxies and sedimentation rates are also assessed and climatic interpretations based on different age models compared. The implications of these findings for reconstructions of climate from loess are explored and comparisons are made between the developed palaeoclimate records and evidence from ice and

  18. Attacks on One Designated Verifier Proxy Signature Scheme

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2012-01-01

    Full Text Available In a designated verifier proxy signature scheme, there are three participants, namely, the original signer, the proxy signer, and the designated verifier. The original signer delegates his or her signing right to the proxy signer, then the proxy signer can generate valid signature on behalf of the original signer. But only the designated verifier can verify the proxy signature. Several designated verifier proxy signature schemes have been proposed. However, most of them were proven secure in the random oracle model, which has received a lot of criticism since the security proofs in the random oracle model are not sound with respect to the standard model. Recently, by employing Water's hashing technique, Yu et al. proposed a new construction of designated verifier proxy signature. They claimed that the new construction is the first designated verifier proxy signature, whose security does not rely on the random oracles. But, in this paper, we will show some attacks on Yu et al.'s scheme. So, their scheme is not secure.

  19. Factitious Disorder by Proxy in Educational Settings: A Review

    Science.gov (United States)

    Frye, Ellen M.; Feldman, Marc D.

    2012-01-01

    Factitious disorder by proxy (FDP), historically known as Munchausen syndrome by proxy, is a diagnosis applied to parents and other caregivers who intentionally feign, exaggerate, and/or induce illness or injury in a child to get attention from health professionals and others. A review of the recent literature and our experience as consultants…

  20. Global Carbon Budget 2016

    Science.gov (United States)

    Le Quéré, Corinne; Andrew, Robbie M.; Canadell, Josep G.; Sitch, Stephen; Korsbakken, Jan Ivar; Peters, Glen P.; Manning, Andrew C.; Boden, Thomas A.; Tans, Pieter P.; Houghton, Richard A.; Keeling, Ralph F.; Alin, Simone; Andrews, Oliver D.; Anthoni, Peter; Barbero, Leticia; Bopp, Laurent; Chevallier, Frédéric; Chini, Louise P.; Ciais, Philippe; Currie, Kim; Delire, Christine; Doney, Scott C.; Friedlingstein, Pierre; Gkritzalis, Thanos; Harris, Ian; Hauck, Judith; Haverd, Vanessa; Hoppema, Mario; Klein Goldewijk, Kees; Jain, Atul K.; Kato, Etsushi; Körtzinger, Arne; Landschützer, Peter; Lefèvre, Nathalie; Lenton, Andrew; Lienert, Sebastian; Lombardozzi, Danica; Melton, Joe R.; Metzl, Nicolas; Millero, Frank; Monteiro, Pedro M. S.; Munro, David R.; Nabel, Julia E. M. S.; Nakaoka, Shin-ichiro; O'Brien, Kevin; Olsen, Are; Omar, Abdirahman M.; Ono, Tsuneo; Pierrot, Denis; Poulter, Benjamin; Rödenbeck, Christian; Salisbury, Joe; Schuster, Ute; Schwinger, Jörg; Séférian, Roland; Skjelvan, Ingunn; Stocker, Benjamin D.; Sutton, Adrienne J.; Takahashi, Taro; Tian, Hanqin; Tilbrook, Bronte; van der Laan-Luijkx, Ingrid T.; van der Werf, Guido R.; Viovy, Nicolas; Walker, Anthony P.; Wiltshire, Andrew J.; Zaehle, Sönke

    2016-11-01

    Accurate assessment of anthropogenic carbon dioxide (CO2) emissions and their redistribution among the atmosphere, ocean, and terrestrial biosphere - the "global carbon budget" - is important to better understand the global carbon cycle, support the development of climate policies, and project future climate change. Here we describe data sets and methodology to quantify all major components of the global carbon budget, including their uncertainties, based on the combination of a range of data, algorithms, statistics, and model estimates and their interpretation by a broad scientific community. We discuss changes compared to previous estimates and consistency within and among components, alongside methodology and data limitations. CO2 emissions from fossil fuels and industry (EFF) are based on energy statistics and cement production data, respectively, while emissions from land-use change (ELUC), mainly deforestation, are based on combined evidence from land-cover change data, fire activity associated with deforestation, and models. The global atmospheric CO2 concentration is measured directly and its rate of growth (GATM) is computed from the annual changes in concentration. The mean ocean CO2 sink (SOCEAN) is based on observations from the 1990s, while the annual anomalies and trends are estimated with ocean models. The variability in SOCEAN is evaluated with data products based on surveys of ocean CO2 measurements. The global residual terrestrial CO2 sink (SLAND) is estimated by the difference of the other terms of the global carbon budget and compared to results of independent dynamic global vegetation models. We compare the mean land and ocean fluxes and their variability to estimates from three atmospheric inverse methods for three broad latitude bands. All uncertainties are reported as ±1σ, reflecting the current capacity to characterise the annual estimates of each component of the global carbon budget. For the last decade available (2006-2015), EFF was 9

  1. Global Carbon Budget 2016

    Science.gov (United States)

    Quéré, Corinne Le; Andrew, Robbie M.; Canadell, Josep G.; Sitch, Stephen; Korsbakken, Jan Ivar; Peters, Glen P.; Manning, Andrew C.; Boden, Thomas A.; Tans, Pieter P.; Houghton, Richard A.; hide 12px; height:12px; display:none; " src="images/arrow-down.gif" width="12" height="12" border="0" alt="hide" id="author_20170008485_hide">

    2016-01-01

    Accurate assessment of anthropogenic carbon dioxide (CO2) emissions and their redistribution among the atmosphere, ocean, and terrestrial biosphere the global carbon budget is important to better understand the global carbon cycle, support the development of climate policies, and project future climate change. Here we describe data sets and methodology to quantify all major components of the global carbon budget, including their uncertainties, based on the combination of a range of data, algorithms, statistics, and model estimates and their interpretation by a broad scientific community. We discuss changes compared to previous estimates and consistency within and among components, alongside methodology and data limitations. CO2 emissions from fossil fuels and industry (EFF) are based on energy statistics and cement production data, respectively, while emissions from land-use change (ELUC), mainly deforestation, are based on combined evidence from land-cover change data, fire activity associated with deforestation, and models. The global atmospheric CO2 concentration is measured directly and its rate of growth (GATM) is computed from the annual changes in concentration. The mean ocean CO2 sink (SOCEAN) is based on observations from the 1990s, while the annual anomalies and trends are estimated with ocean models. The variability in SOCEAN is evaluated with data products based on surveys of ocean CO2 measurements. The global residual terrestrial CO2 sink (SLAND) is estimated by the difference of the other terms of the global carbon budget and compared to results of independent dynamic global vegetation models. We compare the mean land and ocean fluxes and their variability to estimates from three atmospheric inverse methods for three broad latitude bands. All uncertainties are reported as +/- 1(sigma), reflecting the current capacity to characterize the annual estimates of each component of the global carbon budget. For the last decade available (2006-2015), EFF was 9

  2. Perbandingan proxy pada linux dan windows untuk mempercepat browsing website

    Directory of Open Access Journals (Sweden)

    Dafwen Toresa

    2017-05-01

    Full Text Available AbstrakPada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan,  maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa.  Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid  dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client. Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute.  Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute AbstractAt this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy

  3. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  4. Lithium in Brachiopods - proxy for seawater evolution?

    Science.gov (United States)

    Gaspers, Natalie; Magna, Tomas; Tomasovych, Adam; Henkel, Daniela

    2017-04-01

    Marine biogenic carbonates have the potential to serve as a proxy for evolution of seawater chemistry. In order to compile a record of the past and recent δ7Li in the oceans, foraminifera shells, scleractinian corals and belemnites have been used. However, only a foraminifera-based record appears to more accurately reflect the Li isotope composition of ocean water. At present, this record is available for the Cenozoic with implications for major events during this period of time, including K/T event [1]. A record for the entire Phanerozoic has not yet been obtained. In order to extend this record to the more distant past, Li elemental/isotope systematics of brachiopods were investigated because these marine animals were already present in Early Cambrian oceans and because they are less sensitive to diagenesis-induced modifications due to their shell mineralogy (low-Mg calcite). The preliminary data indicates a species-, temperature- and salinity-independent behavior of Li isotopes in brachiopod shells. Also, no vital effects have been observed for different shell parts. The consistent offset of -4‰ relative to modern seawater is in accordance with experimental data [2]. Further data are now being collected for Cenozoic specimens to more rigorously test brachiopods as possible archives of past seawater in comparison to the existing foraminiferal records. [1] Misra & Froelich (2012) Science 335, 818-823 [2] Marriott et al. (2004) Chem Geol 212, 5-15

  5. Deciphering dynamical proxy responses from lake sediments

    Science.gov (United States)

    Ramisch, Arne; Tjallingii, Rik; Hartmann, Kai; Brauer, Achim; Diekmann, Bernhard; Haberzettl, Torsten; Kasper, Thomas; Ahlborn, Marieke

    2017-04-01

    Lakes form a reliable archive of paleoenvironmental change in the terrestrial realm. Non-destructive XRF scans provide high-resolution records of element concentrations that are commonly related to past environmental change. However, XRF records of lake sediments enclose paleoenvironmental information that originates from multiple lake external and internal forcing. The variety of environmental forcing factors can complicate a direct identification of single mechanisms like climatic change from XRF or other proxy records. Here we present XRF records from several Asian lake archives, which indicate asynchronous variations of similar geochemical records since the late glacial/early Holocene. All XRF time series are characterized by damped harmonic oscillations of relative element concentrations through time. The asynchronous variations can be expressed by the frequency and the rate of damping of theses oscillations that differ between the lakes. We argue that the oscillatory behavior is a result of a feedback between the physical removal and dissolution of mineral phases in catchment soils and their subsequent enrichment and deposition within the lake. We present a numerical model, which accurately simulates major Holocene variations in the element concentration of lake records and discuss implications for the reconstruction of environmental signals from lake sediments.

  6. Assumptions, Trust, and Names in Computer Security Protocols

    Science.gov (United States)

    2011-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ASSUMPTIONS, TRUST, AND NAMES IN COMPUTER SECURITY PROTOCOLS by Charles Dylan Shearer June 2011...21–6–2011 Master’s Thesis 27-09-2010—17-06-2011 Assumptions, Trust, and Names in Computer Security Protocols Charles Dylan Shearer Naval Postgraduate...future work. computer security , protocol, assumption, belief, trust, naming Unclassified Unclassified Unclassified UU 85 i THIS PAGE INTENTIONALLY LEFT

  7. Investigating the Assumptions of Uses and Gratifications Research

    Science.gov (United States)

    Lometti, Guy E.; And Others

    1977-01-01

    Discusses a study designed to determine empirically the gratifications sought from communication channels and to test the assumption that individuals differentiate channels based on gratifications. (MH)

  8. Legal assumptions for private company claim for additional (supplementary payment

    Directory of Open Access Journals (Sweden)

    Šogorov Stevan

    2011-01-01

    Full Text Available Subject matter of analyze in this article are legal assumptions which must be met in order to enable private company to call for additional payment. After introductory remarks discussion is focused on existence of provisions regarding additional payment in formation contract, or in shareholders meeting general resolution, as starting point for company's claim. Second assumption is concrete resolution of shareholders meeting which creates individual obligations for additional payments. Third assumption is defined as distinctness regarding sum of payment and due date. Sending of claim by relevant company body is set as fourth legal assumption for realization of company's right to claim additional payments from member of private company.

  9. Constraints in the application of the Branched and Isoprenoid Tetraether index as a terrestrial input proxy

    Science.gov (United States)

    Fietz, Susanne; MartíNez-Garcia, Alfredo; Huguet, Carme; Rueda, Gemma; Rosell-Melé, Antoni

    2011-10-01

    Determination of the relative inputs of aquatic autochthonous and terrestrial allochthonous organic matter into marine and lacustrine environments is essential to understanding the global carbon budget. A variety of proxies are used for this purpose, including the Branched and Isoprenoid Tetraether (BIT) index. This is calculated from the concentrations of branched glycerol dialkyl glycerol tetraethers (GDGTs), derived from unidentified terrestrial bacteria, and crenarchaeol, a marker for aquatic mesophile Thaumarchaeota (Crenarchaeota group I). As the index is a ratio, its value depends on both the crenarchaeol aquatic in situ production and the soil-derived branched GDGT input. Therefore, the BIT index reflects not only changes in the input of terrestrial or soil organic matter but also relative variations in aquatic Thaumarchaeota abundance in the water column. In fact, we show that in oceanic and lacustrine settings, the BIT index can be dominated by the aquatic end-member of the ratio. Consequently, the BIT index by itself can be an unreliable proxy to compare the input of terrestrial matter between sites and over time, and we propose that the quantification of branched GDGT fluxes or concentrations may instead be a better indicator of soil terrestrial inputs.

  10. Validation of Spacecraft Active Cavity Radiometer Total Solar Irradiance (TSI) Long Term Measurement Trends Using Proxy TSI Least Squares Analyses

    Science.gov (United States)

    Lee, Robert Benjamin, III; Wilson, Robert S.

    2003-01-01

    Long-term, incoming total solar irradiance (TSI) measurement trends were validated using proxy TSI values, derived from indices of solar magnetic activity. Spacecraft active cavity radiometers (ACR) are being used to measure longterm TSI variability, which may trigger global climate changes. The TSI, typically referred to as the solar constant, was normalized to the mean earth-sun distance. Studies of spacecraft TSI data sets confirmed the existence of a 0.1 %, long-term TSI variability component within a 10-year period. The 0.1% TSI variability component is clearly present in the spacecraft data sets from the 1984-2004 time frame. Typically, three overlapping spacecraft data sets were used to validate long-term TSI variability trends. However, during the years of 1978-1984, 1989-1991, and 1993-1996, three overlapping spacecraft data sets were not available in order to validate TSI trends. The TSI was found to vary with indices of solar magnetic activity associated with recent 10-year sunspot cycles. Proxy TSI values were derived from least squares analyses of the measured TSI variability with the solar indices of 10.7-cm solar fluxes, and with limb-darked sunspot fluxes. The resulting proxy TSI values were compared to the spacecraft ACR measurements of TSI variability to detect ACR instrument degradation, which may be interpreted as TSI variability. Analyses of ACR measurements and TSI proxies are presented primarily for the 1984-2004, Earth Radiation Budget Experiment (ERBE) ACR solar monitor data set. Differences in proxy and spacecraft measurement data sets suggest the existence of another TSI variability component with an amplitude greater than or equal to 0.5 Wm-2 (0.04%), and with a cycle of 20 years or more.

  11. Global Carbon Budget 2015

    Science.gov (United States)

    Le Quéré, C.; Moriarty, R.; Andrew, R. M.; Canadell, J. G.; Sitch, S.; Korsbakken, J. I.; Friedlingstein, P.; Peters, G. P.; Andres, R. J.; Boden, T. A.; Houghton, R. A.; House, J. I.; Keeling, R. F.; Tans, P.; Arneth, A.; Bakker, D. C. E.; Barbero, L.; Bopp, L.; Chang, J.; Chevallier, F.; Chini, L. P.; Ciais, P.; Fader, M.; Feely, R. A.; Gkritzalis, T.; Harris, I.; Hauck, J.; Ilyina, T.; Jain, A. K.; Kato, E.; Kitidis, V.; Klein Goldewijk, K.; Koven, C.; Landschützer, P.; Lauvset, S. K.; Lefèvre, N.; Lenton, A.; Lima, I. D.; Metzl, N.; Millero, F.; Munro, D. R.; Murata, A.; Nabel, J. E. M. S.; Nakaoka, S.; Nojiri, Y.; O'Brien, K.; Olsen, A.; Ono, T.; Pérez, F. F.; Pfeil, B.; Pierrot, D.; Poulter, B.; Rehder, G.; Rödenbeck, C.; Saito, S.; Schuster, U.; Schwinger, J.; Séférian, R.; Steinhoff, T.; Stocker, B. D.; Sutton, A. J.; Takahashi, T.; Tilbrook, B.; van der Laan-Luijkx, I. T.; van der Werf, G. R.; van Heuven, S.; Vandemark, D.; Viovy, N.; Wiltshire, A.; Zaehle, S.; Zeng, N.

    2015-12-01

    Accurate assessment of anthropogenic carbon dioxide (CO2) emissions and their redistribution among the atmosphere, ocean, and terrestrial biosphere is important to better understand the global carbon cycle, support the development of climate policies, and project future climate change. Here we describe data sets and a methodology to quantify all major components of the global carbon budget, including their uncertainties, based on the combination of a range of data, algorithms, statistics, and model estimates and their interpretation by a broad scientific community. We discuss changes compared to previous estimates as well as consistency within and among components, alongside methodology and data limitations. CO2 emissions from fossil fuels and industry (EFF) are based on energy statistics and cement production data, while emissions from land-use change (ELUC), mainly deforestation, are based on combined evidence from land-cover-change data, fire activity associated with deforestation, and models. The global atmospheric CO2 concentration is measured directly and its rate of growth (GATM) is computed from the annual changes in concentration. The mean ocean CO2 sink (SOCEAN) is based on observations from the 1990s, while the annual anomalies and trends are estimated with ocean models. The variability in SOCEAN is evaluated with data products based on surveys of ocean CO2 measurements. The global residual terrestrial CO2 sink (SLAND) is estimated by the difference of the other terms of the global carbon budget and compared to results of independent dynamic global vegetation models forced by observed climate, CO2, and land-cover change (some including nitrogen-carbon interactions). We compare the mean land and ocean fluxes and their variability to estimates from three atmospheric inverse methods for three broad latitude bands. All uncertainties are reported as ±1σ, reflecting the current capacity to characterise the annual estimates of each component of the global

  12. GUIDELINES FOR OPTIMAL PURCHASING OF CONSTRUCTION WITH THE USE OF BUDGETING BASED ON TDABC ACCOUNT

    Directory of Open Access Journals (Sweden)

    MARZANTOWICZ Lukasz

    2016-09-01

    Full Text Available The article elaborates on the optimal purchasing process with the use of budgeting based on TimeDriven Activity-Based Costing (TDABC. It has been defined the basic assumptions of the TDABC model. Collected by vehicle examination, has been identified indications are conditioning the use of TDABC, as well as the factors and barriers that prevent the use of TDABC.

  13. Secure Mobile Agent from Leakage-Resilient Proxy Signatures

    Directory of Open Access Journals (Sweden)

    Fei Tang

    2015-01-01

    Full Text Available A mobile agent can sign a message in a remote server on behalf of a customer without exposing its secret key; it can be used not only to search for special products or services, but also to make a contract with a remote server. Hence a mobile agent system can be used for electronic commerce as an important key technology. In order to realize such a system, Lee et al. showed that a secure mobile agent can be constructed using proxy signatures. Intuitively, a proxy signature permits an entity (delegator to delegate its signing right to another entity (proxy to sign some specified messages on behalf of the delegator. However, the proxy signatures are often used in scenarios where the signing is done in an insecure environment, for example, the remote server of a mobile agent system. In such setting, an adversary could launch side-channel attacks to exploit some leakage information about the proxy key or even other secret states. The proxy signatures which are secure in the traditional security models obviously cannot provide such security. Based on this consideration, in this paper, we design a leakage-resilient proxy signature scheme for the secure mobile agent systems.

  14. Proxies and consent discussions for dementia research.

    Science.gov (United States)

    Sugarman, Jeremy; Roter, Debra; Cain, Carole; Wallace, Roberta; Schmechel, Don; Welsh-Bohmer, Kathleen A

    2007-04-01

    To better understand the nature of informed consent encounters for research involving patients with dementia that requires proxy consent. Audiotaping of informed-consent encounters for a study of genetic markers for sporadic Alzheimer's disease. Outpatients at an Alzheimer's disease research center. Patients with dementia and their companions. Audiotapes were analyzed to characterize communication style and coverage of the standard elements of informed consent and, using the Roter Interaction Analysis System, to capture the dynamics of three-way interaction between the patient, their companion, and the physician investigator. Of 26 informed consent encounters, all involved a patient, a companion, and a physician. Patients had a mean Mini-Mental State Examination (MMSE) score of 21.8. For patients, 49% of their interactions involved agreement and approval (positive statements), 16% psychosocial information, 7% biomedical information, 7% asking questions, and 7% expressing emotion. Companion interactions involved 37% positive statements and 19% biomedical information. Physician interactions involved emotional expressiveness (30%) and positive statements (19%). Discussion length was positively related to MMSE score (Spearman rho=0.45; Pinformed consent was fairly comprehensive and had no relationship to patients' MMSE scores. These data should inform policies regarding the ethically appropriate ways of conducting research with cognitively impaired adults. For example, patients in this study were more silent than their companions and the physician, but when patients spoke, they primarily agreed with what was said. Although this might first seem to signal assent, such an interpretation should be made with caution for persons with dementia. In addition, previous work on informed consent has focused on its cognitive aspects, but these data reveal that the emotional and social dimensions warrant attention.

  15. Application and Network-Cognizant Proxies - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Antonio Ortega; Daniel C. Lee

    2003-03-24

    OAK B264 Application and Network-Cognizant Proxies - Final Report. Current networks show increasing heterogeneity both in terms of their bandwidths/delays and the applications they are required to support. This is a trend that is likely to intensify in the future, as real-time services, such as video, become more widely available and networking access over wireless links becomes more widespread. For this reason they propose that application-specific proxies, intermediate network nodes that broker the interactions between server and client, will become an increasingly important network element. These proxies will allow adaptation to changes in network characteristics without requiring a direct intervention of either server or client. Moreover, it will be possible to locate these proxies strategically at those points where a mismatch occurs between subdomains (for example, a proxy could be placed so as to act as a bridge between a reliable network domain and an unreliable one). This design philosophy favors scalability in the sense that the basic network infrastructure can remain unchanged while new functionality can be added to proxies, as required by the applications. While proxies can perform numerous generic functions, such as caching or security, they concentrate here on media-specific, and in particular video-specific, tasks. The goal of this project was to demonstrate that application- and network-specific knowledge at a proxy can improve overall performance especially under changing network conditions. They summarize below the work performed to address these issues. Particular effort was spent in studying caching techniques and on video classification to enable DiffServ delivery. other work included analysis of traffic characteristics, optimized media scheduling, coding techniques based on multiple description coding, and use of proxies to reduce computation costs. This work covered much of what was originally proposed but with a necessarily reduced scope.

  16. Water Budget Quick Start Guide

    Science.gov (United States)

    WaterSense created the Water Budget Tool as one option to help builders, landscape professionals, and irrigation professionals certified by a WaterSense labeled program meet the criteria specified in the WaterSense New Home Specification.

  17. On reading the federal budget.

    Science.gov (United States)

    1974-03-01

    Within the scientific community there seem to be at least two schools of thought as far as the federal budget is concerned. One holds that more money would be made available for research if only spokesmen for research could gain access to high government officials. The other view is that the research budget of the United States reflects well-considered policy and cannot be changed by friendly persuasion. Rashi Fein, professor of the economics of medicine at Harvard Medical School, believes the latter. He expressed his point of view recently in an address before the American Public Health Association. His remarks were directed to last year's budget but apply equally to the President's budget for fiscal 1975. Excerpts from his talk, "The new national health spending policy-who pays and who gets?" follow.

  18. Congress smiles on research budgets

    CERN Multimedia

    Reichhardt, T

    1998-01-01

    Congress has agreed to match or exceed most of the funding requests for the major science agencies requested by President Clinton in February. Many of them will receive their largest budget increases for years (11 paragraphs).

  19. GEWEX Surface Radiation Budget (SRB)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The NASA/GEWEX Surface Radiation Budget (SRB) Release-3.0 data sets contains global 3-hourly, daily, monthly/3-hourly, and monthly averages of surface and top-of...

  20. Evaluation of Algebraic Reynolds Stress Model Assumptions Using Experimental Data

    Science.gov (United States)

    Jyoti, B.; Ewing, D.; Matovic, D.

    1996-11-01

    The accuracy of Rodi's ASM assumption is examined by evaluating the terms in Reynolds stress transport equation and their modelled counterparts. The basic model assumption: Dτ_ij/Dt + partial T_ijl/partial xl = (τ_ij/k )(Dk/Dt + partial Tl /partial xl ) (Rodi( Rodi W., ZAMM.), 56, pp. 219-221, 1976.), can also be broken into two stronger assumptions: Da_ij/Dt = 0 and (2) partial T_ijl/partial xl = (τ_ij/k )(partial Tl /partial xl ) (e.g. Taulbee( Taulbee D. B., Phys. of Fluids), 4(11), pp. 2555-2561, 1992.). Fu et al( Fu S., Huang P.G., Launder B.E. & Leschziner M.A., J. Fluid Eng.), 110(2), pp. 216-221., 1988 examined the accuracy of Rodi's assumption using the results of RSM calculation of axisymmetric jets. Since the RSM results did not accurately predict the experimental results either, it may be useful to examine the basic ASM model assumptions using experimental data. The database of Hussein, Capp and George( Hussein H., Capp S. & George W., J.F.M.), 258, pp.31-75., 1994. is sufficiently detailed to evaluate the terms of Reynolds stress transport equations individually, thus allowing both Rodi's and the stronger assumptions to be tested. For this flow assumption (1) is well satisfied for all the components (including \\overlineuv); however, assumption (2) does not seem as well satisfied.

  1. Distributed automata in an assumption-commitment framework

    Indian Academy of Sciences (India)

    We propose a class of finite state systems of synchronizing distributed processes, where processes make assumptions at local states about the state of other processes in the system. This constrains the global states of the system to those where assumptions made by a process about another are compatible with the ...

  2. Basic assumptions in statistical analyses of data in biomedical ...

    African Journals Online (AJOL)

    If one or more assumptions are violated, an alternative procedure must be used to obtain valid results. This article aims at highlighting some basic assumptions in statistical analyses of data in biomedical sciences. Keywords: samples, independence, non-parametric, parametric, statistical analyses. Int. J. Biol. Chem. Sci. Vol.

  3. 40 CFR 761.2 - PCB concentration assumptions for use.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false PCB concentration assumptions for use..., AND USE PROHIBITIONS General § 761.2 PCB concentration assumptions for use. (a)(1) Any person may..., oil-filled cable, and rectifiers whose PCB concentration is not established contain PCBs at < 50 ppm...

  4. 7 CFR 1779.88 - Transfers and assumptions.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE (CONTINUED) WATER AND WASTE DISPOSAL PROGRAMS GUARANTEED LOANS § 1779.88 Transfers and assumptions... transfer fees will be a standard fee plus the cost of the appraisal. (2) The lender will collect and submit... be filed, registered, or recorded as appropriate and legally permissible. (4) The assumption will be...

  5. Performance Appraisal Is Based on Five Major Assumptions.

    Science.gov (United States)

    Silver, Harvey A.

    This review of the performance appraisal process discusses the major assumptions on which performance appraisal is based, the general goals of performance appraisal, and the characteristics of effective performance appraisal programs. The author stresses the dependence of the process on the assumption that human behavior can be changed; he…

  6. Balancing regional sea level budgets

    Science.gov (United States)

    Leuliette, E. W.; Miller, L.; Tamisiea, M. E.

    2015-12-01

    Balancing the sea-level budget is critical to understanding recent and future climate change as well as balancing Earth's energy budget and water budget. During the last decade, advancements in the ocean observing system — satellite altimeters, hydrographic profiling floats, and space-based gravity missions — have allowed the global mean sea level budget to?be assessed with unprecedented accuracy from direct, rather than inferred, estimates. In particular, several recent studies have used the sea-level budget to bound the rate of deep ocean warming [e.g. Llovel et al. 2014]. On a monthly basis, the sum of the steric component estimated from Argo and the ocean mass (barostatic) component from GRACE agree total sea level from Jason within the estimated uncertainties with the residual difference having an r.m.s. of less than 2 mm [Leuliette 2014]. Direct measurements of ocean warming above 2000 m depth during January 2005 and July 2015 explain about one-third of the observed annual rate of global mean sea-level rise. Extending the understanding of the sea-level budget from global mean sea level to regional patterns of sea level change is crucial for identifying regional differences in recent sea level change. The local sea-level budget can be used to identify any systematic errors in the global ocean observing system. Using the residuals from closing the sea level budget, we demonstrate that systematic regional errors remain, in part due to Argo sampling. We also show the effect of applying revised geocentric pole-tide corrections for GRACE [Wahr et al. 2015] and altimetry [Desai et al., 2015].

  7. Budget deficits and public debt

    OpenAIRE

    Ph.D. Student Ionut Constantin

    2009-01-01

    In the recent decades, the budget deficit has become one of the characteristics of national economies. Furthermore, it finds its dimensions amplification. Despite this, more and more are the economists who dispute the need to balance the budget, arguing the need even the deficit and systematic use of in order to achieve economic equilibrium. Such guidance is substantiated by the need to promote an economic policy which ensures full use of resources and non-inflation economic growth.In these c...

  8. US physics suffers budget setbacks

    CERN Multimedia

    Gwynne, Peter

    2007-01-01

    "The US has slashed funding for the International Linear Collider (ILC) by 75% as the budget for 2008 has been finally agreed between the Republican Bush Administration and Democratic Cngress. The new budget legislation, which US president George W. Bush is expected to signe by 31 December, will see up to 200 scientists at the Fermi National Accelerator Laboratory (Fermilag) lose their jobs." (2 pages)

  9. Optimizing TCP Performance over UMTS with Split TCP Proxy

    DEFF Research Database (Denmark)

    Hu, Liang; Dittmann, Lars

    2009-01-01

    Abstract: The TCP performance over UMTS network is challenged by the large delay bandwidth product. Large delay bandwidth product is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer which are used to cope with radio transmission errors...... scenario (e.g.64 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. To the end, for the configuration of the split proxy, an aggressive initial TCP congestion window size (e.g. 10 MSS) at proxy is particularly useful for radio links...

  10. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  11. Web proxy cache replacement strategies simulation, implementation, and performance evaluation

    CERN Document Server

    ElAarag, Hala; Cobb, Jake

    2013-01-01

    This work presents a study of cache replacement strategies designed for static web content. Proxy servers can improve performance by caching static web content such as cascading style sheets, java script source files, and large files such as images. This topic is particularly important in wireless ad hoc networks, in which mobile devices act as proxy servers for a group of other mobile devices. Opening chapters present an introduction to web requests and the characteristics of web objects, web proxy servers and Squid, and artificial neural networks. This is followed by a comprehensive review o

  12. Uncertainty Budget Analysis for Dimensional Inspection Processes (U)

    Energy Technology Data Exchange (ETDEWEB)

    Valdez, Lucas M. [Los Alamos National Laboratory

    2012-07-26

    This paper is intended to provide guidance and describe how to prepare an uncertainty analysis of a dimensional inspection process through the utilization of an uncertainty budget analysis. The uncertainty analysis is stated in the same methodology as that of the ISO GUM standard for calibration and testing. There is a specific distinction between how Type A and Type B uncertainty analysis is used in a general and specific process. All theory and applications are utilized to represent both a generalized approach to estimating measurement uncertainty and how to report and present these estimations for dimensional measurements in a dimensional inspection process. The analysis of this uncertainty budget shows that a well-controlled dimensional inspection process produces a conservative process uncertainty, which can be attributed to the necessary assumptions in place for best possible results.

  13. Enhanced Collaboration for Space Situational Awareness via Proxy Agents

    Science.gov (United States)

    Picciano, P.; Schurr, N.

    2012-09-01

    The call for dynamic partnerships demanded in the US. Space Policy confronts two formidable challenges. The first is evident in the lack of the adoption of technical innovations that could substantially enhance collaboration. The second category, and perhaps a greater impediment, involves organizational and social constraints that minimize information sharing. Compounding the technical challenges, the organizational barriers to collaboration present a different problem set. There is a culture in the space domain that predisposes most stakeholders to guard their information. Most owner/operators are reluctant to share asset data, whether experiencing an anomaly or just providing status updates. This is unfortunate, because the owner/operators generally have the most accurate and timely data pertaining to their satellite. Comprehensive Space Situational Awareness (SSA) requires the marshaling of disparate mission critical elements. The mission threads reliant on SSA are complex and often require analysis from a diverse team of experts with sophisticated systems and tools that may be dispersed across multiple entities including military, commercial, and public interests. Two significant trends are likely to further perpetuate this state of affairs: 1) the space environment continues to be more congested, contested, and competitive, and 2) further pressures to increase SSA Sharing with a greater number of stakeholders throughout the world. The challenge of delivering the right information to the right people, while protecting national security and privacy interests, is in need of an innovative solution. Our approach, entitled Space Collaboration via an Agent Network (SCAN), enables proxy software agents to represent stakeholders (as individuals and organizations) to enhance collaboration among various agency producers and consumers of space information The SCAN agent network will facilitate collaboration by identifying opportunities to collaborate, as well as optimize

  14. 42 CFR 457.140 - Budget.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Budget. 457.140 Section 457.140 Public Health... Child Health Insurance Programs and Outreach Strategies § 457.140 Budget. The State plan, or plan amendment that has a significant impact on the approved budget, must include a budget that describes the...

  15. The prevalence of Beyond Budgeting in Denmark

    DEFF Research Database (Denmark)

    Sandalgaard, Niels

      The annual budget has been criticised in recent years. The critics claim, among other things, that the annual budget is not suitable for today's business environment, that annual budgets stimulate dysfunctional behaviour and furthermore that the use of budgets is too costly. This paper examines...

  16. Cycle-Based Budgeting Toolkit: A Primer

    Science.gov (United States)

    Yan, Bo

    2016-01-01

    At the core, budgeting is about distributing and redistributing limited financial resources for continuous improvement. Incremental budgeting is limited in achieving the goal due to lack of connection between outcomes and budget decisions. Zero-based budgeting fills the gap, but is cumbersome to implement, especially for large urban school…

  17. School Budget Hold'em Facilitator's Guide

    Science.gov (United States)

    Education Resource Strategies, 2012

    2012-01-01

    "School Budget Hold'em" is a game designed to help school districts rethink their budgeting process. It evolved out of Education Resource Strategies' (ERS) experience working with large urban districts around the country. "School Budget Hold'em" offers a completely new approach--one that can turn the budgeting process into a long-term visioning…

  18. Munchausen syndrome by proxy presenting as hearing loss.

    Science.gov (United States)

    Ashraf, N; Thevasagayam, M S

    2014-06-01

    To review the diagnosis of Munchausen syndrome by proxy, a factitious disorder, in which symptoms are induced or feigned, usually in a child, by the caregiver. The involved caregiver seeks to gain attention or sympathy and often has a psychological need to maintain the sick role. We highlight the diagnostic difficulties and factors that may help with diagnosis in an otolaryngology setting. We present the case of Munchausen syndrome by proxy presenting with hearing loss in a five-year old boy, who was diagnosed eight years after his initial presentation. A literature review of Munchausen syndrome by proxy cases presenting with ENT symptoms is provided. Munchausen syndrome by proxy is a diagnosis that otolaryngologists should be aware of, particularly where recurrent or persistent illnesses in children, especially those involving otological symptoms, are refractory to the usual treatments.

  19. Munchausen Syndrome by Proxy: Unusual Manifestations and Disturbing Sequelae.

    Science.gov (United States)

    Porter, Gerald E.; And Others

    1994-01-01

    This study documents previously unreported findings in cases of Munchausen Syndrome by Proxy (in which a mother fabricates an illness in her child). In the reported case, esophageal perforation, retrograde intussusception, tooth loss, and bradycardia were found. (Author/DB)

  20. Carbon and nitrogen budgets of the Arabian Sea

    Digital Repository Service at National Institute of Oceanography (India)

    Somasundar, K.; Rajendran, A.; DileepKumar, M.; SenGupta, R.

    to be a carbon source for the Persian Gulf and the Red Sea, whereas both of these adjacent seas added nitrogen to the Arabian Sea. Based on the standing crop and net outfluxes, estimated residence times were ~ 944 and 4.04× i04 years for carbon... Fig. 4. Schematic diagram of annual fluxes of nitrogen in the Arabian Sea from various sources (in trillion grams). SARBON AND NITROGEN BUDGETS OF THE ARABIAN SEA 373 ing crop in evaluating residence time. Based on the assumptions made earlier...

  1. Applicability of a cognitive questionnaire in the elderly and proxy

    Directory of Open Access Journals (Sweden)

    Renata Areza Fegyveres

    Full Text Available Abstract The Informant Questionnaire on Cognitive Decline in the Elderly with the Proxy (IQCODE was developed as a screening tool for cognition alterations. Objectives: 1 To verify the applicability of IQCODE in the elderly with limited schooling, 2 To verify the reliability of the responses supplied by the aged and their proxies. Methods: Individuals of a Community Group were evaluated using the Mini-Mental State Examination (MMSE, IQCODE and Geriatric Depression Scale (GDS. The IQCODE was applied to informants and proxies. Results: We analyzed 44 individuals, aged between 58-82 years (M=66.8, SD=5.97 with mean elderly-schooling level of 3.75, SD=2.82 and 44 proxies aged 44.5 (SD=13.3, with mean schooling level of 8.25 (SD=4.3. The mean GDS was 8.22, SD=4.90 and 13 participants presented a score suggestive of depressive symptoms. The mean elderly IQCODE score was 3.26, SD=0.69 and 3.21, SD=0.65, for proxy responses. There was no statistical difference between these means. On the MMSE, the mean score was 24.20, SD=4.14 and 18 participants presented scores below the cut-off. The IQCODE answers by the elderly in this latter group were more congruent with MMSE than the answers of proxies. Conclusions: The applicability of the IQCODE in a population with little schooling was verified in that the proxy-report was similar to the elderly report. We can affirm that the elderly answers were more accurate than the proxies, as they were closer to MMSE score. The inclusion of a greater number of participants from community-dwelling settings is necessary to confirm the results obtained in this study.

  2. Proxy-rated quality of life in Alzheimer's disease

    DEFF Research Database (Denmark)

    Vogel, Asmus; Bhattacharya, Suvosree; Waldorff, Frans Boch

    2012-01-01

    The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months.......The study investigated the change in proxy rated quality of life (QoL) of a large cohort of home living patients with Alzheimer's disease (AD) over a period of 36 months....

  3. Gender Equality From A Gender Budgeting Perspective

    OpenAIRE

    Nyevero Maruzani; Nogget Matope; Efiritha Chauraya

    2012-01-01

    Gender budgeting, which is also known as gender responsive budgeting , tracks how budgets respond to gender equality and women’s rights requirement. This entails investing in and making available mechanisms, guidelines and indicators that enable gender equality advocates to track progress, benefit incidence and show how supposedly gender neutral budgets impact on men and women. The aim of this discussion is to highlight the importance of gender budgeting in addressing gender disparities while...

  4. Depletion sampling in stream ecosystems: assumptions and techniques

    Science.gov (United States)

    Raleigh, Robert F.; Short, Cathleen

    1981-01-01

    Reliable fish and invertebrate population estimates depend on meeting the assumptions of the methods used for organism capture and data analysis. A review of several population estimation studies has indicated that assumptions of the removal method for population estimation are often violated. This paper outlines (1) procedures to assist in meeting the removal method assumptions (2) an economical procedure to obtain reliable invertebrate population estimates by the removal method and (3) a computer program (CAPTURE) designed to test the adequacy of study design and to analyze capture data where variable probability of removal exists.

  5. Drastic changes in the distribution of branched tetraether lipids in suspended matter and sediments from the Yenisei River and Kara Sea (Siberia): Implications for the use of brGDGT-based proxies in coastal marine sediment

    NARCIS (Netherlands)

    De Jonge, C.; Stadnitskaia, A.; Hopmans, E.C.; Cherkashov, G.; Fedotov, A.; Streletskaya, I.D.; Vasiliev, A.A.; Sinninghe Damsté, J.S.

    2015-01-01

    The distribution of branched glycerol dialkyl glycerol tetraethers (brGDGTs) in soils has been shown to correlate with pH and mean annual air temperature. Because of this dependence brGDGTs have found an application as palaeoclimate proxies in coastal marine sediments, based on the assumption that

  6. The Immoral Assumption Effect: Moralization Drives Negative Trait Attributions.

    Science.gov (United States)

    Meindl, Peter; Johnson, Kate M; Graham, Jesse

    2016-04-01

    Jumping to negative conclusions about other people's traits is judged as morally bad by many people. Despite this, across six experiments (total N = 2,151), we find that multiple types of moral evaluations--even evaluations related to open-mindedness, tolerance, and compassion--play a causal role in these potentially pernicious trait assumptions. Our results also indicate that moralization affects negative-but not positive-trait assumptions, and that the effect of morality on negative assumptions cannot be explained merely by people's general (nonmoral) preferences or other factors that distinguish moral and nonmoral traits, such as controllability or desirability. Together, these results suggest that one of the more destructive human tendencies--making negative assumptions about others--can be caused by the better angels of our nature. © 2016 by the Society for Personality and Social Psychology, Inc.

  7. Target similarity effects: support for the parallel distributed processing assumptions.

    Science.gov (United States)

    Humphreys, M S; Tehan, G; O'Shea, A; Bolland, S W

    2000-07-01

    Recent research has begun to provide support for the assumptions that memories are stored as a composite and are accessed in parallel (Tehan & Humphreys, 1998). New predictions derived from these assumptions and from the Chappell and Humphreys (1994) implementation of these assumptions were tested. In three experiments, subjects studied relatively short lists of words. Some of the lists contained two similar targets (thief and theft) or two dissimilar targets (thief and steal) associated with the same cue (robbery). As predicted, target similarity affected performance in cued recall but not free association. Contrary to predictions, two spaced presentations of a target did not improve performance in free association. Two additional experiments confirmed and extended this finding. Several alternative explanations for the target similarity effect, which incorporate assumptions about separate representations and sequential search, are rejected. The importance of the finding that, in at least one implicit memory paradigm, repetition does not improve performance is also discussed.

  8. Supporting calculations and assumptions for use in WESF safetyanalysis

    Energy Technology Data Exchange (ETDEWEB)

    Hey, B.E.

    1997-03-07

    This document provides a single location for calculations and assumptions used in support of Waste Encapsulation and Storage Facility (WESF) safety analyses. It also provides the technical details and bases necessary to justify the contained results.

  9. On the role of budget sufficiency, cost efficiency, and uncertainty in species management

    Science.gov (United States)

    van der Burg, Max Post; Bly, Bartholomew B.; Vercauteren, Tammy; Grand, James B.; Tyre, Andrew J.

    2014-01-01

    Many conservation planning frameworks rely on the assumption that one should prioritize locations for management actions based on the highest predicted conservation value (i.e., abundance, occupancy). This strategy may underperform relative to the expected outcome if one is working with a limited budget or the predicted responses are uncertain. Yet, cost and tolerance to uncertainty rarely become part of species management plans. We used field data and predictive models to simulate a decision problem involving western burrowing owls (Athene cunicularia hypugaea) using prairie dog colonies (Cynomys ludovicianus) in western Nebraska. We considered 2 species management strategies: one maximized abundance and the other maximized abundance in a cost-efficient way. We then used heuristic decision algorithms to compare the 2 strategies in terms of how well they met a hypothetical conservation objective. Finally, we performed an info-gap decision analysis to determine how these strategies performed under different budget constraints and uncertainty about owl response. Our results suggested that when budgets were sufficient to manage all sites, the maximizing strategy was optimal and suggested investing more in expensive actions. This pattern persisted for restricted budgets up to approximately 50% of the sufficient budget. Below this budget, the cost-efficient strategy was optimal and suggested investing in cheaper actions. When uncertainty in the expected responses was introduced, the strategy that maximized abundance remained robust under a sufficient budget. Reducing the budget induced a slight trade-off between expected performance and robustness, which suggested that the most robust strategy depended both on one's budget and tolerance to uncertainty. Our results suggest that wildlife managers should explicitly account for budget limitations and be realistic about their expected levels of performance.

  10. Reducing uncertainty in nitrogen budgets for African livestock systems

    Science.gov (United States)

    Rufino, M. C.; Brandt, P.; Herrero, M.; Butterbach-Bahl, K.

    2014-10-01

    Livestock is poorly represented in N budgets for the African continent although some studies have examined livestock-related N flows at different levels. Livestock plays an important role in N cycling and therefore on N budgets including livestock-related flows. This study reviews the literature on N budgets for Africa to identify factors contributing to uncertainties. Livestock densities are usually modelled because of the lack of observational spatial data. Even though feed availability and quality varies across seasons, most studies use constant livestock excretion rates, and excreta are usually assumed to be uniformly distributed onto the land. Major uncertainties originate in the fraction of manure managed, and emission factors which may not reflect the situation of Africa. N budgets use coarse assumptions on production, availability, and use of crop residues as livestock feed. No flows between croplands-livestock and rangelands reflect the lack of data. Joint efforts are needed for spatial data collection of livestock data, crowdsourcing appears to be a promising option. The focus of the assessment of N budgets must go beyond croplands to include livestock and crop-livestock flows. We propose a nested systems definition of livestock systems to link local, regional level, and continental level and to increase the usefulness of point measurements of N losses. Scientists working at all levels should generate data to calibrate process-based models. Measurements in the field should not only concentrate on greenhouse gas emissions, but need to include crop and livestock production measurements, soil stock changes and other N loss pathways such as leaching, run-off and volatilization to assess management practices and trade-offs. Compared to the research done in other continents on N flows in livestock systems, there are few data for Africa, and therefore concerted effort will be needed to generate sufficient data for modelling.

  11. Verification of test battery of motoric assumptions for tennis

    OpenAIRE

    Křelina, Vladimír

    2016-01-01

    This thesis focuses on testing the motoric assumptions of junior category tennis players in certain sport games. The aim of this thesis is to compare the results of the motoric test regarding to three tennis players of various performance levels in chosen sport games. Thus define the substantive significance and specificity of each test towards tennis. The assumptions in the theoretical part are based on my Bachelor thesis. In said thesis I am dealing with the characteristics of tennis, the s...

  12. Developing animals flout prominent assumptions of ecological physiology.

    Science.gov (United States)

    Burggren, Warren W

    2005-08-01

    Every field of biology has its assumptions, but when they grow to be dogma, they can become constraining. This essay presents data-based challenges to several prominent assumptions of developmental physiologists. The ubiquity of allometry is such an assumption, yet animal development is characterized by rate changes that are counter to allometric predictions. Physiological complexity is assumed to increase with development, but examples are provided showing that complexity can be greatest at intermediate developmental stages. It is assumed that organs have functional equivalency in embryos and adults, yet embryonic structures can have quite different functions than inferred from adults. Another assumption challenged is the duality of neural control (typically sympathetic and parasympathetic), since one of these two regulatory mechanisms typically considerably precedes in development the appearance of the other. A final assumption challenged is the notion that divergent phylogeny creates divergent physiologies in embryos just as in adults, when in fact early in development disparate vertebrate taxa show great quantitative as well as qualitative similarity. Collectively, the inappropriateness of these prominent assumptions based on adult studies suggests that investigation of embryos, larvae and fetuses be conducted with appreciation for their potentially unique physiologies.

  13. Budget deficits and public debt

    Directory of Open Access Journals (Sweden)

    Ph. D. Student Ionut Constantin

    2009-05-01

    Full Text Available In the recent decades, the budget deficit has become one of the characteristics of national economies. Furthermore, it finds its dimensions amplification. Despite this, more and more are the economists who dispute the need to balance the budget, arguing the need even the deficit and systematic use of in order to achieve economic equilibrium. Such guidance is substantiated by the need to promote an economic policy which ensures full use of resources and non-inflation economic growth.In these circumstances, balancing the budgest is clearly of secondary importance. In this context, it supported the need to increase expenditure at a pace faster than income growth and, implicitly , to keep budget deficits.

  14. Entropy Budget for Hawking Evaporation

    National Research Council Canada - National Science Library

    Ana Alonso-Serrano; Matt Visser

    2017-01-01

    ...” in correlations between the photons. The importance of this result lies in the posterior extension of this argument to the Hawking radiation from black holes, demonstrating that the assumption of unitarity leads to a perfectly...

  15. Budget Brief: 2015 Proposed Budget Milwaukee Public Schools

    Science.gov (United States)

    Allen, Vanessa; Chapman, Anne; Henken, Rob

    2014-01-01

    In this report, the authors provide a detailed analysis of the major changes in revenue and expenditures in the Milwaukee Public Schools (MPS) 2015 proposed budget, and the manner in which MPS has responded to recent legislative changes and turbulent workforce challenges. The objective is to provide an independent assessment of the district's…

  16. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  17. Programme Budgets for Graduate Training.

    Science.gov (United States)

    Appelquist, Claes G.; And Others

    The development of a methodological framework for planning, programming, and budgeting which is specific to graduate training and research activities at the Chalmers University of Technology in Sweden is described. This pilot project is regarded as a step towards developing and implementing a generalized approach to an output-oriented finance…

  18. Program Budgeting: Promise and Problems.

    Science.gov (United States)

    Huff, Robert A.

    Planning, Programming, and Budgeting Systems (PPBS) are increasingly mentioned as effective means for improving the management of educational resources in institutions of higher education. PPBS has several advantages over conventional accounting systems, which still would be needed for day to day operations. First, it relates cost to output;…

  19. Feminism, Budgeting and Gender Justice

    Science.gov (United States)

    Misra, S. N.; Ghadai, Sanjaya Kumar

    2017-01-01

    The Fourth Conference on Women at Beijing (1995) underlined the importance of gender mainstreaming; spurring India to provide for separate Gender Budgeting in 2005-06. The Constitution tries to make fine balance between right to equality and positive discrimination for promoting gender justice in India. Yet high levels of Gender Inequality Index…

  20. Rational Budgeting? The Stanford Case.

    Science.gov (United States)

    Chaffee, Ellen Earle

    The budget decision making process at Stanford University, California, from 1970 through 1979 was evaluated in relation to the allocation of general funds to 38 academic departments. Using Simon's theory of bounded rationality and an organizational level of analysis, the Stanford decision process was tested for its rationality through…

  1. Kollektiivne vastutus ja gender budgeting

    Index Scriptorium Estoniae

    2005-01-01

    Vestlusringi teemad: riigieelarve koostamisel ei arvestata soolist võrdõiguslikkust; gender budgeting kui üks soolise võrdõiguslikkuse jälgimise viise; vabaabielu võib osutuda naisele palju ebasoodsamaks kui mehele; kogukonna kollektiivne vastutus perevägivalla korral. Vt. samas: Aasta 2004 suurte mõtlejate auhinnad

  2. Zero-Based Budgeting Redux.

    Science.gov (United States)

    Geiger, Philip E.

    1993-01-01

    Zero-based, programmatic budgeting involves four basic steps: (1) define what needs to be done; (2) specify the resources required; (3) determine the assessment procedures and standards to use in evaluating the effectiveness of various programs; and (4) assign dollar figures to this information. (MLF)

  3. A new way to proxy levels of infrastructure development

    Directory of Open Access Journals (Sweden)

    Steve Pickering

    2017-01-01

    Full Text Available Researchers in many fields have needed to develop a measure of infrastructure, and many proxies have been used toward this end, such as night light data and the Digital Chart of the World. Yet there are issues in using these methods. This paper presents a new way of proxying infrastructure: analysing the file sizes of map images on the Bing, Google, OpenStreetMap and Sina websites. The paper also demonstrates four ways in which this can be achieved. This approach is by no means perfect and does not solve all of the difficulties presented by other methods. Nevertheless, it does provide a simple and functional alternative proxy for level of infrastructure development.

  4. Munchausen Syndrome By Proxy Admitting with Bloody Urine and Stool

    Directory of Open Access Journals (Sweden)

    Tugba Koca

    2014-02-01

    Full Text Available Munchausen syndrome by Proxy is a severe form of child abuse. Disease symptoms and signs are fabricated or imitated by parents or caregivers The child is usually presented to doctors, persistently. A delay in diagnosis may cause severe negative impact on spiritual, physical, mental and social development of the cases and even death. Symptoms usually disappear in the absence of the perpetrators. The diagnosis is extremely difficult. A 21-month-old boy who had applied to many centers due to bleeding from various parts of the body for last six months, and whose symptoms could not be explained with any physical reason after tests were conducted. Finally he was admitted to our center with bloody urine and stools, and diagnosed Munchausen syndrome by proxy. In cases with recurrent hospital admission in whom no apparent disease is diagnosed, Munchausen syndrome by Proxy should be among the differential diagnosis.

  5. Research on implementation of proxy Arp in IP DSLAM

    Science.gov (United States)

    Cheng, Chuanqing; Wang, Li; Huang, Qiugen

    2005-02-01

    While the ethernet is applied more and more in public network environment and xdsl service become the most common access mode ,IP kenel DSLAM undertakes some functions such as service distribution and convergence ,security management and customer management.Facing the contradiction of the need of port isolation and the shortage of ip address,VLAN aggregation technology is applied in DSLAM.How to implement the communicatio between the two vlan but share the same ip subnet,proxy arp does this. This paper introduces how to implement proxy arp in the DSLAM. TCP/IP communication detail procedure betweent two host ,the relation of VLAN and network segment are discussed. The proxy arp model and its implementation in IP DSLAM is also expatiated in this paper and a conformance tesing is given.

  6. Best practices for budget-based design.

    Science.gov (United States)

    2017-03-01

    State Departments of Transportation (State DOTs) encounter difficulties in establishing feasible and : reliable project budget early in the project development. The lack of a systematic process for establishing : baseline budget with the consideratio...

  7. Performance Budgeting in the Netherlands: Beyond Arithmetic

    NARCIS (Netherlands)

    F.K.M. van Nispen tot Pannerden (Frans); J.J.A. Posseth (Johan)

    2006-01-01

    textabstractPerformance-based budgeting seems to be a promising tool for improving the management and accountability of public finances. However, its application causes many difficulties. This article briefly reviews international experience with performance-based budgeting and explores its

  8. Female Athletes Thrive, but Budget Pressures Loom.

    Science.gov (United States)

    Suggs, Welch

    2001-01-01

    A "Chronicle" survey finds significant progress for female athletes at the college level and budget constraints looming for all sports programs. The article includes several data tables on sports participation by women, scholarships, and athletic budgets. (EV)

  9. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    DISCOURSES AND THEORETICAL ASSUMPTIONS IN IT PROJECT PORTFOLIO MANAGEMENT: A REVIEW OF THE LITERATURE These years increasing interest is put on IT project portfolio management (IT PPM). Considering IT PPM an interdisciplinary practice, we conduct a concept-based literature review of relevant......: (1) IT PPM as the top management marketplace, (2) IT PPM as the cause of social dilemmas at the lower organizational levels (3) IT PPM as polity between different organizational interests, (4) IT PPM as power relations that suppress creativity and diversity. Our metaphors can be used by practitioners...... to articulate and discuss underlying and conflicting assumptions in IT PPM, serving as a basis for adjusting organizations’ IT PPM practices. Keywords: IT project portfolio management or IT PPM, literature review, scientific discourses, underlying assumptions, unintended consequences, epistemological biases...

  10. Evolution of Requirements and Assumptions for Future Exploration Missions

    Science.gov (United States)

    Anderson, Molly; Sargusingh, Miriam; Perry, Jay

    2017-01-01

    NASA programs are maturing technologies, systems, and architectures to enabling future exploration missions. To increase fidelity as technologies mature, developers must make assumptions that represent the requirements of a future program. Multiple efforts have begun to define these requirements, including team internal assumptions, planning system integration for early demonstrations, and discussions between international partners planning future collaborations. For many detailed life support system requirements, existing NASA documents set limits of acceptable values, but a future vehicle may be constrained in other ways, and select a limited range of conditions. Other requirements are effectively set by interfaces or operations, and may be different for the same technology depending on whether the hard-ware is a demonstration system on the International Space Station, or a critical component of a future vehicle. This paper highlights key assumptions representing potential life support requirements and explanations of the driving scenarios, constraints, or other issues that drive them.

  11. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    DISCOURSES AND THEORETICAL ASSUMPTIONS IN IT PROJECT PORTFOLIO MANAGEMENT: A REVIEW OF THE LITERATURE These years increasing interest is put on IT project portfolio management (IT PPM). Considering IT PPM an interdisciplinary practice, we conduct a concept-based literature review of relevant...... to articulate and discuss underlying and conflicting assumptions in IT PPM, serving as a basis for adjusting organizations’ IT PPM practices. Keywords: IT project portfolio management or IT PPM, literature review, scientific discourses, underlying assumptions, unintended consequences, epistemological biases......: (1) IT PPM as the top management marketplace, (2) IT PPM as the cause of social dilemmas at the lower organizational levels (3) IT PPM as polity between different organizational interests, (4) IT PPM as power relations that suppress creativity and diversity. Our metaphors can be used by practitioners...

  12. Health anxiety by proxy in women with severe health anxiety

    DEFF Research Database (Denmark)

    Thorgaard, Mette Viller; Frostholm, Lisbeth; Walker, Lynn

    2017-01-01

    Health anxiety (HA) refers to excessive worries and anxiety about harbouring serious illness based on misinterpretation of bodily sensations or changes as signs of serious illness. Severe HA is associated with disability and high health care costs. However, the impact of parental HA on excessive...... concern with their children's health (health anxiety by proxy) is scantly investigated. The aim of this study is to investigate HA by proxy in mothers with severe HA. Fifty mothers with severe HA and two control groups were included, i.e. mothers with rheumatoid arthritis (N = 49) and healthy mothers (N...

  13. Budget estimates fiscal year 1995: Volume 10

    Energy Technology Data Exchange (ETDEWEB)

    1994-02-01

    This report contains the Nuclear Regulatory Commission (NRC) fiscal year budget justification to Congress. The budget provides estimates for salaries and expenses and for the Office of the Inspector General for fiscal year 1995. The NRC 1995 budget request is $546,497,000. This is an increase of $11,497,000 above the proposed level for FY 1994. The NRC FY 1995 budget request is 3,218 FTEs. This is a decrease of 75 FTEs below the 1994 proposed level.

  14. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    infrastructure": parties have registered public keys, no single registration authority needs to be fully trusted, and no single piece of information has to be globally trusted and available. In addition, unlike known protocols in the CRS model, the proposed protocols guarantee some basic level of security even...... allow for UC protocols. We answer this question in the affirmative: we propose alternative and relaxed set-up assumptions and show that they suffice for reproducing the general feasibility results for UC protocols in the CRS model. These alternative assumptions have the flavor of a "public-key...

  15. Changing Assumptions and Progressive Change in Theories of Strategic Organization

    DEFF Research Database (Denmark)

    Foss, Nicolai J.; Hallberg, Niklas L.

    2017-01-01

    A commonly held view is that strategic organization theories progress as a result of a Popperian process of bold conjectures and systematic refutations. However, our field also witnesses vibrant debates or disputes about the specific assumptions that our theories rely on, and although these debates...... are often decoupled from the results of empirical testing, changes in assumptions seem closely intertwined with theoretical progress. Using the case of the resource-based view, we suggest that progressive change in theories of strategic organization may come about as a result of scholarly debate and dispute...

  16. Roy's specific life values and the philosophical assumption of veritivity.

    Science.gov (United States)

    Hanna, Debra R

    2012-07-01

    Roman Catholic beliefs that form the basis for Roy's life values are discussed to help others understand veritivity and the Roy adaptation model more clearly. Veritivity, the main philosophical assumption of the Roy adaptation model, shapes it, and Roy's assumption of humanism in a unique way. Veritivity has a theocentric focus, with anthropological values. Roy views human beings as individuals in community with a loving Creator and with others. Truth, freedom, and moral ends are discussed in terms of veritivity and in terms of contemporary values.

  17. The Economic and Budget Outlook: An Update

    National Research Council Canada - National Science Library

    1999-01-01

    .... It satisfies the requirement of section 202(e) of the Congressional Budget Act of 1974 for CBO to submit periodic reports to the Committees on the Budget with respect to fiscal policy and to provide five-year baseline projections of the federal budget...

  18. The 2014 Budget Act: Selected Legal Aspects

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2014-03-01

    Full Text Available The Budget Act for the year 2014 raises legal questions in the context of the provisions of the Constitution as well as the Public Finance Act from 2009. Polish constitutional provisions relating to the state budget may be described as too general. They specify the requirements with regard to the Budget Act only to a limited extent.

  19. Strategic plan creates a blueprint for budgeting.

    Science.gov (United States)

    Cook, D

    1990-05-01

    Effective healthcare organizations develop budgets that reflect and support a strategic plan. Senior managers set a framework that expresses the hospital's future strategic objectives. The budget enables executives to determine which specific service lines are profitable or unprofitable. Administrators and clinicians at all levels are involved in the budgeting process.

  20. 7 CFR 955.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 955.41 Section 955.41 Agriculture Regulations... Assessments § 955.41 Budget. At least 60 days prior to each fiscal period, or such other date as may be... budget of income and expenditures necessary for the administration of this part. The committee may...

  1. 7 CFR 959.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 959.41 Section 959.41 Agriculture Regulations... Handling Expenses and Assessments § 959.41 Budget. As soon as practicable after the beginning of each fiscal period and as may be necessary thereafter, the committee shall prepare an estimated budget of...

  2. 7 CFR 906.33 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 906.33 Section 906.33 Agriculture Regulations... GRANDE VALLEY IN TEXAS Order Regulating Handling Expenses and Assessments § 906.33 Budget. At the... budget of income and expenditures necessary for the administration of this part. The committee shall...

  3. 7 CFR 948.76 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 948.76 Section 948.76 Agriculture Regulations... Regulating Handling Expenses and Assessments § 948.76 Budget. As soon as practicable after the beginning of... budget of income and expenditures necessary for its administration of this part. Each area committee may...

  4. 7 CFR 956.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 956.41 Section 956.41 Agriculture Regulations... OF SOUTHEAST WASHINGTON AND NORTHEAST OREGON Expenses and Assessments § 956.41 Budget. Prior to each fiscal period and as may be necessary thereafter, the committee shall prepare an estimated budget of...

  5. 7 CFR 966.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 966.41 Section 966.41 Agriculture Regulations... Handling Expenses and Assessments § 966.41 Budget. At the beginning of each fiscal period and as may be necessary thereafter, the committee shall prepare an estimated budget of income and expenditures necessary...

  6. 25 CFR 122.7 - Budget.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Budget. 122.7 Section 122.7 Indians BUREAU OF INDIAN... § 122.7 Budget. (a) By August 1 of each year, the Osage Tribal Education Committee will submit a proposed budget to the Assistant Secretary or to his/her designated representative for formal approval...

  7. 7 CFR 958.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 958.41 Section 958.41 Agriculture Regulations... Budget. Prior to each fiscal period, and as may be necessary thereafter the committee shall prepare a budget of estimated income and expenditures necessary for the administration of this part. The committee...

  8. 25 CFR 41.12 - Annual budget.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Annual budget. 41.12 Section 41.12 Indians BUREAU OF... NAVAJO COMMUNITY COLLEGE Tribally Controlled Community Colleges § 41.12 Annual budget. Appropriations... identified in the Bureau of Indian Affairs Budget Justification. Funds appropriated for grants under this...

  9. Budget Considerations: A Primer for Senate Leaders

    Science.gov (United States)

    Academic Senate for California Community Colleges, 2009

    2009-01-01

    This paper is intended to provide a selection of easy to use resources and tools to enhance the effectiveness of a local senate president during ongoing budget conversations. It is not intended to provide a narrative description of budgets and budget process, nor a comprehensive listing of the many arcane rules that govern community college…

  10. 7 CFR 945.41 - Budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Budget. 945.41 Section 945.41 Agriculture Regulations... COUNTIES IN IDAHO, AND MALHEUR COUNTY, OREGON Order Regulating Handling Budget, Expenses and Assessments § 945.41 Budget. At the beginning of each fiscal period, and as may be necessary thereafter, the...

  11. 42 CFR 441.472 - Budget methodology.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Budget methodology. 441.472 Section 441.472 Public... Self-Directed Personal Assistance Services Program § 441.472 Budget methodology. (a) The State shall set forth a budget methodology that ensures service authorization resides with the State and meets the...

  12. Program Budgeting for a Graduate School Library.

    Science.gov (United States)

    Westerman, Mel

    Program budgeting, a method founded in the systems approach, allows control, management, and planning in the library system, and avoids the more comprehensive analysis required by zero-based budgeting. By evaluation of the impacts of the work accomplished by the library staff, the budgeted amounts can be justified or adjusted in subsequent years.…

  13. Is Zero-Based Budgeting Different from Planning--Programming--Budgeting Systems?

    Science.gov (United States)

    Hentschke, Guilbert C.

    1977-01-01

    Successful adoption of zero-base budgeting (ZBB) will be greater than that of planning-programming-budgeting-systems (PPBS) because perceived problems inherent in PPBS are largely missing in ZBB; ZBB appears to fit current school district budgeting behavior; and ZBB seems to improve communication about the need for budget reform. (Author/IRT)

  14. Multi-unit auctions with budget-constrained bidders

    Science.gov (United States)

    Ghosh, Gagan Pratap

    assumptions, there always exist bidder-types who submit unequal bids in equilibrium, (2) the equilibrium is monotonic in the sense that bidders with higher valuations prefer more unequal splits of their budgets than bidders with lower valuations and the same budget-level. With a formal theory in place, I carry out a quantitative exercise, using data from the 1970 OCS auction. I show that the model is able to match many aspects of the data. (1) In the data, the number of tracts bidders submit bids on is positively correlated with budgets (an R2 of 0.84), even though this relationship is non-monotonic; my model is able to capture this non-monotonicity, while producing an R2 of 0.89 (2) In the data, the average number of bids per tract is 8.21; for the model, this number is 10.09. (3) Auction revenue in the data was 1.927 billion; the model produced a mean revenue of 1.944 billion.

  15. Five countries pioneering accrual budgeting and accounting in central government

    NARCIS (Netherlands)

    Dees, M.; Neelissen, P.A.

    2004-01-01

    In its 2001 Budget Memorandum, the Dutch government announced that accrual budgeting and accounting would replace the current obligation-cash budgeting and accounting system in ministerial budgets and accounts in several years’ time.

  16. Challenging Teachers' Pedagogic Practice and Assumptions about Social Media

    Science.gov (United States)

    Cartner, Helen C.; Hallas, Julia L.

    2017-01-01

    This article describes an innovative approach to professional development designed to challenge teachers' pedagogic practice and assumptions about educational technologies such as social media. Developing effective technology-related professional development for teachers can be a challenge for institutions and facilitators who provide this…

  17. Extension of the GSMW Formula in Weaker Assumptions

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available In this note, the generalized Sherman-Morrison-Woodbury (for short GSMW formula (A+YGZ∗⊙=A⊙−A⊙Y(G⊙+Z∗A⊙Y⊙Z∗A⊙ is extended under some assumptions weaker than those used by Duan, 2013.

  18. Questioning Engelhardt's assumptions in Bioethics and Secular Humanism.

    Science.gov (United States)

    Ahmadi Nasab Emran, Shahram

    2016-06-01

    In Bioethics and Secular Humanism: The Search for a Common Morality, Tristram Engelhardt examines various possibilities of finding common ground for moral discourse among people from different traditions and concludes their futility. In this paper I will argue that many of the assumptions on which Engelhardt bases his conclusion about the impossibility of a content-full secular bioethics are problematic. By starting with the notion of moral strangers, there is no possibility, by definition, for a content-full moral discourse among moral strangers. It means that there is circularity in starting the inquiry with a definition of moral strangers, which implies that they do not share enough moral background or commitment to an authority to allow for reaching a moral agreement, and concluding that content-full morality is impossible among moral strangers. I argue that assuming traditions as solid and immutable structures that insulate people across their boundaries is problematic. Another questionable assumption in Engelhardt's work is the idea that religious and philosophical traditions provide content-full moralities. As the cardinal assumption in Engelhardt's review of the various alternatives for a content-full moral discourse among moral strangers, I analyze his foundationalist account of moral reasoning and knowledge and indicate the possibility of other ways of moral knowledge, besides the foundationalist one. Then, I examine Engelhardt's view concerning the futility of attempts at justifying a content-full secular bioethics, and indicate how the assumptions have shaped Engelhardt's critique of the alternatives for the possibility of content-full secular bioethics.

  19. DDH-like Assumptions Based on Extension Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike

    2011-01-01

    We introduce and study a new type of DDH-like assumptions based on groups of prime order q. Whereas standard DDH is based on encoding elements of F_{q} ``in the exponent'' of elements in the group, we ask what happens if instead we put in the exponent elements of the extension ring R_f= \\F...

  20. Distributed automata in an assumption-commitment framework

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    This kind of distribution through assumption and commitment is not novel. This hap- pens routinely when one develops subsystems without having access to a global view of the system, for example, when different groups develop parts of a large program. For instance, suppose we are designing a receiver that receives a bit ...

  1. Assumptions behind size-based ecosystem models are realistic

    DEFF Research Database (Denmark)

    Andersen, Ken Haste; Blanchard, Julia L.; Fulton, Elizabeth A.

    2016-01-01

    A recent publication about balanced harvesting (Froese et al., ICES Journal of Marine Science; doi:10.1093/icesjms/fsv122) contains several erroneous statements about size-spectrum models. We refute the statements by showing that the assumptions pertaining to size-spectrum models discussed...

  2. Does Artificial Neural Network Support Connectivism's Assumptions?

    Science.gov (United States)

    AlDahdouh, Alaa A.

    2017-01-01

    Connectivism was presented as a learning theory for the digital age and connectivists claim that recent developments in Artificial Intelligence (AI) and, more specifically, Artificial Neural Network (ANN) support their assumptions of knowledge connectivity. Yet, very little has been done to investigate this brave allegation. Does the advancement…

  3. Origins and Traditions in Comparative Education: Challenging Some Assumptions

    Science.gov (United States)

    Manzon, Maria

    2018-01-01

    This article questions some of our assumptions about the history of comparative education. It explores new scholarship on key actors and ways of knowing in the field. Building on the theory of the social constructedness of the field of comparative education, the paper elucidates how power shapes our scholarly histories and identities.

  4. Operation Cottage: A Cautionary Tale of Assumption and Perceptual Bias

    Science.gov (United States)

    2015-01-01

    the planning process, but the planning staff must not become so wedded to their assumptions that they reject or overlook information that is not in...Allied deci- sionmakers misread and misunderstood Japanese intentions on Kiska, facilitating a needless loss of blood and treasure. Epilogue Two tense

  5. Bilingual Learners: How Our Assumptions Limit Their World.

    Science.gov (United States)

    Freeman, David; Freeman, Yvonne

    Five common assumptions are held by teachers about learners: (1) adults should choose what children need to learn; (2) oral language must be mastered before written language can be introduced; (3) real, whole language is too difficult for students learning language; (4) language learning is different in different languages, and simultaneous…

  6. 7 CFR 1980.476 - Transfer and assumptions.

    Science.gov (United States)

    2010-01-01

    ... number of the transferor and transferee. (m) Loan terms cannot be changed by the Assumption agreement... released from personal liability. Any new loan terms cannot exceed those authorized in this subpart. The... loan terms. (2) Certification that the lien position securing the guaranteed loan will be maintained or...

  7. 7 CFR 3575.88 - Transfers and assumptions.

    Science.gov (United States)

    2010-01-01

    ... Agency case number of the transferor and transferee. (5) Loan terms cannot be changed by the Assumption... transferor (including guarantor if it has not been released from personal liability). Any new loan terms... explanation of the reasons for the proposed change in the loan terms, and (ii) Certification that the lien...

  8. Observing gravitational-wave transient GW150914 with minimal assumptions

    NARCIS (Netherlands)

    Abbott, B. P.; Abbott, R.; Abbott, T. D.; Abernathy, M. R.; Acernese, F.; Ackley, K.; Adams, C.; Phythian-Adams, A.T.; Addesso, P.; Adhikari, R. X.; Adya, V. B.; Affeldt, C.; Agathos, M.; Agatsuma, K.; Aggarwa, N.; Aguiar, O. D.; Aiello, L.; Ain, A.; Ajith, P.; Allen, B.; Allocca, A.; Altin, P. A.; Anderson, S. B.; Anderson, W. C.; Arai, K.; Araya, M. C.; Arceneaux, C. C.; Areeda, J. S.; Arnaud, N.; Arun, K. G.; Ascenzi, S.; Ashton, G.; Ast, M.; Aston, S. M.; Astone, P.; Aufmuth, P.; Aulbert, C.; Babak, S.; Bacon, P.; Bader, M. K. M.; Baker, P. T.; Baldaccini, F.; Ballardin, G.; Ballmer, S. W.; Barayoga, J. C.; Barclay, S. E.; Barish, B. C.; Barker, R.D.; Barone, F.; Barr, B.; Barsotti, L.; Barsuglia, M.; Barta, D.; Bartlett, J.; Bartos, I.; Bassiri, R.; Basti, A.; Batch, J. C.; Baune, C.; Bavigadda, V.; Bazzan, M.; Behnke, B.; Bejger, M.; Bell, A. S.; Bell, C. J.; Berger, B. K.; Bergman, J.; Bergmann, G.; Berry, C. P. L.; Bersanetti, D.; Bertolini, A.; Betzwieser, J.; Bhagwat, S.; Bhandare, R.; Bilenko, I. A.; Billingsley, G.; Birch, M.J.; Birney, R.; Biscans, S.; Bisht, A.; Bitossi, M.; Biwer, C.; Bizouard, M. A.; Blackburn, J. K.; Blackburn, L.; Blair, C. D.; Blair, D. G.; Blair, R. M.; Bloemen, A.L.S.; Bock, O.; Bodiya, T. P.; Boer, M.; Bogaert, J.G.; Bogan, C.; Bohe, A.; Bojtos, P.; Bond, T.C; Bondu, F.; Bonnand, R.; Boom, B. A.; Bork, R.; Boschi, V.; Bose, S.; Bouffanais, Y.; Bozzi, A.; Bradaschia, C.; Brady, P. R.; Braginsky, V. B.; Branchesi, M.; Brau, J. E.; Briant, T.; Brillet, A.; Brinkmann, M.; Brisson, V.; Brocki, P.; Brooks, A. F.; Brown, A.D.; Brown, D.; Brown, N. M.; Buchanan, C. C.; Buikema, A.; Bulik, T.; Bulten, H. J.; Buonanno, A.; Buskulic, D.; Buy, C.; Byer, R. L.; Cadonati, L.; Cagnoli, G.; Cahillane, C.; Calderon Bustillo, J.; Callister, T. A.; Calloni, E.; Camp, J. B.; Cannon, K. C.; Cao, J.; Capano, C. D.; Capocasa, E.; Carbognani, F.; Caride, S.; Diaz, J. Casanueva; Casentini, C.; Caudill, S.; Cavaglia, M.; Cavalier, F.; Cavalieri, R.; Cella, G.; Cepeda, C. B.; Baiardi, L. Cerboni; Cerretani, G.; Cesarini, E.; Chakraborty, R.; Chatterji, S.; Chalermsongsak, T.; Chamberlin, S. J.; Chan, M.; Chao, D. S.; Charlton, P.; Chassande-Mottin, E.; Chen, H. Y.; Chen, Y; Cheng, C.; Chincarini, A.; Chiummo, A.; Cho, H. S.; Cho, M.; Chow, J. H.; Christensen, N.; Chu, Qian; Chua, S. E.; Chung, E.S.; Ciani, G.; Clara, F.; Clark, J. A.; Clark, M.; Cleva, F.; Coccia, E.; Cohadon, P. -F.; Colla, A.; Collette, C. G.; Cominsky, L.; Constancio, M., Jr.; Conte, A.; Conti, L.; Cook, D.; Corbitt, T. R.; Cornish, N.; Corsi, A.; Cortese, S.; Costa, A.C.; Coughlin, M. W.; Coughlin, S. B.; Coulon, J. -P.; Countryman, S. T.; Couvares, P.; Cowan, E. E.; Coward, D. M.; Cowart, M. J.; Coyne, D. C.; Coyne, R.; Craig, K.; Creighton, J. D. E.; Cripe, J.; Crowder, S. G.; Cumming, A.; Cunningham, A.L.; Cuoco, E.; Dal Canton, T.; Danilishin, S. L.; D'Antonio, S.; Danzmann, K.; Darman, N. S.; Dattilo, V.; Dave, I.; Daveloza, H. P.; Davier, M.; Davies, G. S.; Daw, E. J.; Day, R.; Debra, D.; Debreczeni, G.; Degallaix, J.; De laurentis, M.; Deleglise, S.; Del Pozzo, W.; Denker, T.; Dent, T.; Dereli, H.; Dergachev, V.A.; DeRosa, R. T.; Rosa, R.; DeSalvo, R.; Dhurandhar, S.; Diaz, M. C.; Di Fiore, L.; Giovanni, M.G.; Di Lieto, A.; Di Pace, S.; Di Palma, I.; Di Virgilio, A.; Dojcinoski, G.; Dolique, V.; Donovan, F.; Dooley, K. L.; Doravari, S.; Douglas, R.; Downes, T. P.; Drago, M.; Drever, R. W. P.; Driggers, J. C.; Du, Z.; Ducrot, M.; Dwyer, S. E.; Edo, T. B.; Edwards, M. C.; Effler, A.; Eggenstein, H. -B.; Ehrens, P.; Eichholz, J.; Eikenberry, S. S.; Engels, W.; Essick, R. C.; Etzel, T.; Evans, T. M.; Evans, T. M.; Everett, R.; Factourovich, M.; Fafone, V.; Fair, H.; Fairhurst, S.; Fan, X.M.; Fang, Q.; Farinon, S.; Farr, B.; Farr, W. M.; Favata, M.; Fays, M.; Fehrmann, H.; Fejer, M. M.; Ferrante, I.; Ferreira, E. C.; Ferrini, F.; Fidecaro, F.; Fiori, I.; Fiorucci, D.; Fisher, R. R.; Flaminio, R.; Fletcher, M; Fournier, J. -D.; Franco, S; Frasca, S.; Frasconi, F.; Frei, Z.; Freise, A.; Frey, R.; Frey, V.; Fricke, T. T.; Fritsche, P.; Frolov, V. V.; Fulda, P.; Fyffe, M.; Gabbard, H. A. G.; Gair, J. R.; Gammaitoni, L.; Gaonkar, S. G.; Garufi, F.; Gatto, A.; Gaur, G.; Gehrels, N.; Gemme, G.; Gendre, B.; Genin, E.; Gennai, A.; George, J.; Gergely, L.; Germain, V.; Ghosh, Archisman; Ghosh, S.; Giaime, J. A.; Giardina, K. D.; Giazotto, A.; Gill, K.P.; Glaefke, A.; Goetz, E.; Goetz, R.; Gondan, L.; Gonzalez, Idelmis G.; Castro, J. M. Gonzalez; Gopakumar, A.; Gordon, N. A.; Gorodetsky, M. L.; Gossan, S. E.; Lee-Gosselin, M.; Gouaty, R.; Graef, C.; Graff, P. B.; Granata, M.; Grant, A.; Gras, S.; Gray, C.M.; Greco, G.; Green, A. C.; Groot, P.; Grote, H.; Grunewald, S.; Guidi, G. M.; Guo, X.; Gupta, A.; Gupta, M. K.; Gushwa, K. E.; Gustafson, E. K.; Gustafson, R.; de Haas, R.; Hacker, J. J.; Buffoni-Hall, R.; Hall, E. D.; Hammond, G.L.; Haney, M.; Hanke, M. M.; Hanks, J.; Hanna, C.; Hannam, M. D.; Hanson, P.J.; Hardwick, T.; Harms, J.; Harry, G. M.; Harry, I. W.; Hart, M. J.; Hartman, M. T.; Haster, C. -J.; Haughian, K.; Healy, J.; Heidmann, A.; Heintze, M. C.; Heitmann, H.; Hello, P.; Hemming, G.; Hendry, M.; Heng, I. S.; Hennig, J.; Heptonstall, A. W.; Heurs, M.; Hild, S.; Hinder, I.; Hoak, D.; Hodge, K. A.; Hofman, D.; Hollitt, S. E.; Holt, K.; Holz, D. E.; Hopkins, P.; Hosken, D. J.; Hough, J.; Houston, E. A.; Howell, E. J.; Hu, Y. M.; Huang, S.; Huerta, E. A.; Huet, D.; Hughey, B.; Husa, S.; Huttner, S. H.; Huynh-Dinh, T.; Idrisy, A.; Indik, N.; Ingram, D. R.; Inta, R.; Isa, H. N.; Isac, J. -M.; Isi, M.; Islas, G.; Isogai, T.; Iyer, B. R.; Izumi, K.; Jacqmin, T.; Jang, D.H.; Jani, K.; Jaranowski, P.; Jawahar, S.; Jimenez-Forteza, F.; Johnson, W.; Jones, I.D.; Jones, R.; Jonker, R. J. G.; Ju, L.; Haris, K.; Kalaghatgi, C. V.; Kalogera, V.; Kandhasamy, S.; Kang, G.H.; Kanner, J. B.; Karki, S.; Kasprzack, M.; Katsavounidis, E.; Katzman, W.; Kaufer, S.; Kaur, T.; Kawabe, K.; Kawazoe, F.; Kefelian, F.; Kehl, M. S.; Keitel, D.; Kelley, D. B.; Kells, W.; Kennedy, R.E.; Key, J. S.; Khalaidovski, A.; Khalili, F. Y.; Khan, I.; Khan., S.; Khan, Z.; Khazanov, E. A.; Kijhunchoo, N.; Kim, C.; Kim, J.; Kim, K.; Kim, Nam-Gyu; Kim, Namjun; Kim, Y.M.; King, E. J.; King, P. J.; Kinsey, M.; Kinzel, D. L.; Kissel, J. S.; Kleybolte, L.; Klimenko, S.; Koehlenbeck, S. M.; Kokeyama, K.; Koley, S.; Kondrashov, V.; Kontos, A.; Korobko, M.; Korth, W. Z.; Kowalska, I.; Kozak, D. B.; Kringel, V.; Krolak, A.; Krueger, C.; Kuehn, G.; Kumar, P.; Kuo, L.; Kutynia, A.; Lackey, B. D.; Laguna, P.; Landry, M.; Lange, J.; Lantz, B.; Lasky, P. D.; Lazzarini, A.; Lazzaro, C.; Leaci, R.; Leavey, S.; Lebigot, E. O.; Lee, C.H.; Lee, K.H.; Lee, M.H.; Lee, K.; Lenon, A.; Leonardi, M.; Leong, J. R.; Leroy, N.; Letendre, N.; Levin, Y.; Levine, B. M.; Li, T. G. F.; Libson, A.; Littenberg, T. B.; Lockerbie, N. A.; Logue, J.; Lombardi, A. L.; Lord, J. E.; Lorenzini, M.; Loriette, V.; Lormand, M.; Losurdo, G.; Lough, J. D.; Lueck, H.; Lundgren, A. P.; Luo, J.; Lynch, R.; Ma, Y.; MacDonald, T.T.; Machenschalk, B.; MacInnis, M.; Macleod, D. M.; Magana-Sandoval, F.; Magee, R. M.; Mageswaran, M.; Majorana, E.; Maksimovic, I.; Malvezzi, V.; Man, N.; Mandel, I.; Mandic, V.; Mangano, V.; Mansell, G. L.; Manske, M.; Mantovani, M.; Marchesoni, F.; Marion, F.; Marka, S.; Marka, Z.; Markosyan, A. S.; Maros, E.; Martelli, F.; Martellini, L.; Martin, I. W.; Martin, R.M.; Martynov, D. V.; Marx, J. N.; Mason, K.; Masserot, A.; Massinger, T. J.; Masso-Reid, M.; Matichard, F.; Matone, L.; Mavalvala, N.; Mazumder, N.; Mazzolo, G.; McCarthy, R.; McClelland, D. E.; McCormick, S.; McGuire, S. C.; McIntyre, G.; McIver, J.; McManus, D. J.; McWilliams, S. T.; Meacher, D.; Meadors, G. D.; Meidam, J.; Melatos, A.; Mende, G.; Mendoza-Gandara, D.; Mercer, R. A.; Merilh, E. L.; Merzougui, M.; Meshkov, S.; Messenger, C.; Messick, C.; Meyers, P. M.; Mezzani, F.; Miao, H.; Michel, C.; Middleton, H.; Mikhailov, E. E.; Milano, L.; Miller, J.; Millhouse, M.; Minenkov, Y.; Ming, J.; Mirshekari, S.; Mishra, C.; Mitra, S.; Mitrofanov, V. P.; Mitselmakher, G.; Mittleman, R.; Moggi, A.; Mohan, M.; Mohapatra, S. R. P.; Montani, M.; Moore, B.C.; Moore, J.C.; Moraru, D.; Gutierrez Moreno, M.; Morriss, S. R.; Mossavi, K.; Mours, B.; Mow-Lowry, C. M.; Mueller, C. L.; Mueller, G.; Muir, A. W.; Mukherjee, Arunava; Mukherjee, S.D.; Mukherjee, S.; Mukund, N.; Mullavey, A.; Munch, J.; Murphy, D. J.; Murray, P.G.; Mytidis, A.; Nardecchia, I.; Naticchioni, L.; Nayak, R. K.; Necula, V.; Nedkova, K.; Nelemans, G.; Gutierrez-Neri, M.; Neunzert, A.; Newton-Howes, G.; Nguyen, T. T.; Nielsen, A. B.; Nissanke, S.; Nitz, A.; Nocera, F.; Nolting, D.; Normandin, M. E. N.; Nuttall, L. K.; Oberling, J.; Ochsner, E.; O'Dell, J.; Oelker, E.; Ogin, G. H.; Oh, J.; Oh, S. H.; Ohme, F.; Oliver, M. B.; Oppermann, P.; Oram, Richard J.; O'Reilly, B.; O'Shaughnessy, R.; Ottaway, D. J.; Ottens, R. S.; Overmier, H.; Owen, B. J.; Pai, A.; Pai, S. A.; Palamos, J. R.; Palashov, O.; Palomba, C.; Pal-Singh, A.; Pan, H.; Pankow, C.; Pannarale, F.; Pant, B. C.; Paoletti, F.; Paoli, A.; Papa, M. A.; Page, J.; Paris, H. R.; Parker, W.S; Pascucci, D.; Pasqualetti, A.; Passaquieti, R.; Passuello, D.; Patricelli, B.; Patrick, Z.; Pearlstone, B. L.; Pedraza, M.; Pedurand, R.; Pekowsky, L.; Pele, A.; Penn, S.; Perreca, A.; Phelps, M.; Piccinni, O. J.; Pichot, M.; Piergiovanni, F.; Pierro, V.; Pillant, G.; Pinard, L.; Pinto, I. M.; Pitkin, M.; Poggiani, R.; Popolizio, P.; Post, A.; Powell, J.; Prasad, J.; Predoi, V.; Premachandra, S. S.; Prestegard, T.; Price, L. R.; Prijatelj, M.; Principe, M.; Privitera, S.; Prodi, G. A.; Prolchorov, L.; Puncken, O.; Punturo, M.; Puppo, P.; Puerrer, M.; Qi, H.; Qin, J.; Quetschke, V.; Quintero, E. A.; Quitzow-James, R.; Raab, F. J.; Rabeling, D. S.; Radkins, H.; Raffai, P.; Raja, S.; Rakhmanov, M.; Rapagnani, P.; Raymond, V.; Razzano, M.; Re, V.; Read, J.; Reed, C. M.; Regimbau, T.; Rei, L.; Reid, S.; Reitze, D. H.; Rew, H.; Reyes, S. D.; Ricci, F.; Riles, K.; Robertson, N. A.; Robie, R.; Robinet, F.; Rocchi, A.; Rolland, L.; Rollins, J. G.; Roma, V. J.; Romano, R.; Romanov, G.; Romie, J. H.; Rosinska, D.; Rowan, S.; Ruediger, A.; Ruggi, P.; Ryan, K.A.; Sachdev, P.S.; Sadecki, T.; Sadeghian, L.; Salconi, L.; Saleem, M.; Salemi, F.; Samajdar, A.; Sammut, L.; Sanchez, E. J.; Sandberg, V.; Sandeen, B.; Sanders, J. R.; Sassolas, B.; Sathyaprakash, B. S.; Saulson, P. R.; Sauter, O.; Savage, R. L.; Sawadsky, A.; Schale, P.; Schilling, R.; Schmidt, J; Schmidt, P.; Schnabel, R.B.; Schofield, R. M. S.; Schoenbeck, A.; Schreiber, K.E.C.; Schuette, D.; Schutz, B. F.; Scott, J.; Scott, M.S.; Sellers, D.; Sengupta, A. S.; Sentenac, D.; Sequino, V.; Sergeev, A.; Serna, G.; Setyawati, Y.; Sevigny, A.; Shaddock, D. A.; Shah, S.; Shithriar, M. S.; Shaltev, M.; Shao, Z.M.; Shapiro, B.; Shawhan, P.; Sheperd, A.; Shoemaker, D. H.; Shoemaker, D. M.; Siellez, K.; Siemens, X.; Sigg, D.; Silva, António Dias da; Simakov, D.; Singer, A; Singer, L. P.; Singh, A.; Singh, R.; Singhal, A.; Sintes, A. M.; Slagmolen, B. J. J.; Smith, R. J. E.; Smith, N.D.; Smith, R. J. E.; Son, E. J.; Sorazu, B.; Sorrentino, F.; Souradeep, T.; Srivastava, A. K.; Staley, A.; Steinke, M.; Steinlechner, J.; Steinlechner, S.; Steinmeyer, D.; Stephens, B. C.; Stone, J.R.; Strain, K. A.; Straniero, N.; Stratta, G.; Strauss, N. A.; Strigin, S. E.; Sturani, R.; Stuver, A. L.; Summerscales, T. Z.; Sun, L.; Sutton, P. J.; Swinkels, B. L.; Szczepanczyk, M. J.; Tacca, M.D.; Talukder, D.; Tanner, D. B.; Tapai, M.; Tarabrin, S. P.; Taracchini, A.; Taylor, W.R.; Theeg, T.; Thirugnanasambandam, M. P.; Thomas, E. G.; Thomas, M.; Thomas, P.; Thorne, K. A.; Thorne, K. S.; Thrane, E.; Tiwari, S.; Tiwari, V.; Tokmakov, K. V.; Tomlinson, C.; Tonelli, M.; Torres, C. V.; Torrie, C. I.; Toyra, D.; Travasso, F.; Traylor, G.; Trifiro, D.; Tringali, M. C.; Trozzo, L.; Tse, M.; Turconi, M.; Tuyenbayev, D.; Ugolini, D.; Unnikrishnan, C. S.; Urban, A. L.; Usman, S. A.; Vahlhruch, H.; Vajente, G.; Valdes, G.; Van Bakel, N.; Van Beuzekom, Martin; Van den Brand, J. F. J.; Van Den Broeck, C.F.F.; Vander-Hyde, D. C.; van der Schaaf, L.; van Heijningen, J. V.; van Veggel, A. A.; Vardaro, M.; Vass, S.; Vasuth, M.; Vaulin, R.; Vecchio, A.; Vedovato, G.; Veitch, J.; Veitch, R. J.; Venkateswara, K.; Verkindt, D.; Vetrano, F.; Vicere, A.; Vinciguerra, S.; Vine, D. J.; Vinet, J. -Y.; Vitale, S.; Vo, T.; Vocca, H.; Vorvick, C.; Voss, D. V.; Vousden, W. D.; Vyatchanin, S. P.; Wade, A. R.; Wade, L. E.; Wade, MT; Walker, M.; Wallace, L.; Walsh, S.; Wang, G.; Wang, H.; Wang, M.; Wang, X.; Wang, Y.; Ward, R. L.; Warner, J.; Was, M.; Weaver, B.; Wei, L. -W.; Weinert, M.; Weinstein, A. J.; Weiss, R.; Welborn, T.; Wen, L.M.; Wessels, P.; Westphal, T.; Wette, K.; Whelan, J. T.; White, D. J.; Whiting, B. F.; Williams, D.; Williams, D.R.; Williamson, A. R.; Willis, J. L.; Willke, B.; Wimmer, M. H.; Winkler, W.; Wipf, C. C.; Wittel, H.; Woan, G.; Worden, J.; Wright, J.L.; Wu, G.; Yablon, J.; Yam, W.; Yamamoto, H.; Yancey, C. C.; Yap, M. J.; Yu, H.; Yvert, M.; Zadrozny, A.; Zangrando, L.; Zanolin, M.; Zendri, J. -P.; Zevin, M.; Zhang, F.; Zhang, L.; Zhang, M.; Zhang, Y.; Zhao, C.; Zhou, M.; Zhou, Z.; Zhu, X. J.; Zucker, M. E.; Zuraw, S. E.; Zweizig, J.

    2016-01-01

    The gravitational-wave signal GW150914 was first identified on September 14, 2015, by searches for short-duration gravitational-wave transients. These searches identify time-correlated transients in multiple detectors with minimal assumptions about the signal morphology, allowing them to be

  9. Measuring Productivity Change without Neoclassical Assumptions: A Conceptual Analysis

    NARCIS (Netherlands)

    B.M. Balk (Bert)

    2008-01-01

    textabstractThe measurement of productivity change (or difference) is usually based on models that make use of strong assumptions such as competitive behaviour and constant returns to scale. This survey discusses the basics of productivity measurement and shows that one can dispense with most if not

  10. Relaxing the zero-sum assumption in neutral biodiversity theory

    NARCIS (Netherlands)

    Haegeman, Bart; Etienne, Rampal S.

    2008-01-01

    The zero-sum assumption is one of the ingredients of the standard neutral model of biodiversity by Hubbell. It states that the community is saturated all the time, which in this model means that the total number of individuals in the community is constant over time, and therefore introduces a

  11. The Metatheoretical Assumptions of Literacy Engagement: A Preliminary Centennial History

    Science.gov (United States)

    Hruby, George G.; Burns, Leslie D.; Botzakis, Stergios; Groenke, Susan L.; Hall, Leigh A.; Laughter, Judson; Allington, Richard L.

    2016-01-01

    In this review of literacy education research in North America over the past century, the authors examined the historical succession of theoretical frameworks on students' active participation in their own literacy learning, and in particular the metatheoretical assumptions that justify those frameworks. The authors used "motivation" and…

  12. Unpacking Assumptions in Research Synthesis: A Critical Construct Synthesis Approach

    Science.gov (United States)

    Wolgemuth, Jennifer R.; Hicks, Tyler; Agosto, Vonzell

    2017-01-01

    Research syntheses in education, particularly meta-analyses and best-evidence syntheses, identify evidence-based practices by combining findings across studies whose constructs are similar enough to warrant comparison. Yet constructs come preloaded with social, historical, political, and cultural assumptions that anticipate how research problems…

  13. Deep Borehole Field Test Requirements and Controlled Assumptions.

    Energy Technology Data Exchange (ETDEWEB)

    Hardin, Ernest [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-07-01

    This document presents design requirements and controlled assumptions intended for use in the engineering development and testing of: 1) prototype packages for radioactive waste disposal in deep boreholes; 2) a waste package surface handling system; and 3) a subsurface system for emplacing and retrieving packages in deep boreholes. Engineering development and testing is being performed as part of the Deep Borehole Field Test (DBFT; SNL 2014a). This document presents parallel sets of requirements for a waste disposal system and for the DBFT, showing the close relationship. In addition to design, it will also inform planning for drilling, construction, and scientific characterization activities for the DBFT. The information presented here follows typical preparations for engineering design. It includes functional and operating requirements for handling and emplacement/retrieval equipment, waste package design and emplacement requirements, borehole construction requirements, sealing requirements, and performance criteria. Assumptions are included where they could impact engineering design. Design solutions are avoided in the requirements discussion. Deep Borehole Field Test Requirements and Controlled Assumptions July 21, 2015 iv ACKNOWLEDGEMENTS This set of requirements and assumptions has benefited greatly from reviews by Gordon Appel, Geoff Freeze, Kris Kuhlman, Bob MacKinnon, Steve Pye, David Sassani, Dave Sevougian, and Jiann Su.

  14. Challenging Our Assumptions: Helping a Baby Adjust to Center Care.

    Science.gov (United States)

    Elliot, Enid

    2003-01-01

    Contends that assumptions concerning infants' adjustment to child center care need to be tempered with attention to observation, thought, and commitment to each individual baby. Describes the Options Daycare program for pregnant teens and young mothers. Presents a case study illustrating the need for openness in strategy and planning for…

  15. Developing Carbon Budgets for Cities: Phoenix as a Case Study

    Science.gov (United States)

    McHale, M. R.; Baker, L. A.; Koerner, B. A.; Grimm, N. B.

    2008-12-01

    Studies have shown that cities can alter regional carbon dynamics through changing ecosystem productivity, overall carbon cycling rate, and total carbon storage in vegetation and soils. Furthermore, people in urban regions import a large amount of carbon in food and fuel, as well as release an exceptional amount of CO2 into the atmosphere. Numerous studies have attempted to quantify some sources and sinks of carbon in urban areas, although a complete carbon budget for a city that accounts for total inputs, outputs, and storage within the ecosystem has yet to be fully accomplished. One challenge is associated with attaining the data necessary to accurately account for all carbon dynamics in these heterogeneous and complex ecosystems. Our goal was to estimate a budget for the Phoenix metropolitan area while developing methodology to calculate carbon dynamics in urban systems that can be applied to cities across the US. Only with comparable carbon budgets for multiple cities will we finally begin to understand the influence of urbanization on carbon dynamics. Our analysis shows when calculating certain variables like transportation emissions, results can vary radically (up to 250%) depending on the data source and methodology implemented (i.e. bottom-up vs. top-down). A common assumption is that productivity and carbon storage will increase with urbanization in arid systems due to water and nutrient inputs, as well as changes in vegetation structure; however, our results indicated that this may not actually be the case in Phoenix where a large number of residents design landscapes to conserve water. Even if all urban expansion was dedicated to landscapes designed for carbon sequestration and storage, vegetation and soils will unlikely have a large effect on the C budget without significant changes in transportation and lifestyle choices.

  16. Capital budgeting practices in Spain

    Directory of Open Access Journals (Sweden)

    Pablo de Andrés

    2015-01-01

    Full Text Available This paper seeks to shed further light on the capital budgeting techniques used by Spanish companies. Our paper posits that the gap between theory and practice might be related to the nature of sources of value and to the efficiency of mechanisms aligning managerial and shareholder incentives, rather than to resource restrictions or model misinterpretation. We analyze data from a survey conducted in 2011, the final sample comprising 140 non-financial Spanish firms. Our findings show a behaviour pattern similar to that reported in prior research for firms in other countries. Particularly noteworthy is that payback appears to be the most widely used tool, while real options are used relatively little. Our results confirm that size and industry are related to the frequency of use of certain capital budgeting techniques. Further, we find that the relevance of growth opportunities and flexibility is an important factor explaining the use of real options.

  17. Slices: A shape-proxy based on planar sections

    KAUST Repository

    McCrae, James

    2011-12-01

    Minimalist object representations or shape-proxies that spark and inspire human perception of shape remain an incompletely understood, yet powerful aspect of visual communication. We explore the use of planar sections, i.e., the contours of intersection of planes with a 3D object, for creating shape abstractions, motivated by their popularity in art and engineering. We first perform a user study to show that humans do define consistent and similar planar section proxies for common objects. Interestingly, we observe a strong correlation between user-defined planes and geometric features of objects. Further we show that the problem of finding the minimum set of planes that capture a set of 3D geometric shape features is both NP-hard and not always the proxy a user would pick. Guided by the principles inferred from our user study, we present an algorithm that progressively selects planes to maximize feature coverage, which in turn influence the selection of subsequent planes. The algorithmic framework easily incorporates various shape features, while their relative importance values are computed and validated from the user study data. We use our algorithm to compute planar slices for various objects, validate their utility towards object abstraction using a second user study, and conclude showing the potential applications of the extracted planar slice shape proxies.

  18. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    Even though South Africa is in a more fortunate position with regard to the availability of such data, it also has data gaps, notably with regard to informal economic activities in the rural areas of the country. This exploratory article engages the use of proxy indicators to provide cues as to the state of a local economy.

  19. Proxy indicators as measure of local economic dispositions in South ...

    African Journals Online (AJOL)

    The growth of spare-part sales mirrors the behaviour of the national economy more accurately than used and new vehicles. BER: Retail Survey. (2005-2010). Used vehicles. 0.53. Spare Parts. 0.80. Banking-related proxy indicators. 13. House bonds. 0.43. Although some similarities exist between the national economy and ...

  20. Munchausen Syndrome by Proxy: A Study of Psychopathology.

    Science.gov (United States)

    Bools, Christopher; And Others

    1994-01-01

    This study evaluated 100 mothers with Munchausen Syndrome by Proxy (the fabrication of illness by a mother in her child). Approximately half of the mothers had either smothered or poisoned their child as part of their fabrications. Lifetime psychiatric histories were reported for 47 of the mothers. The most notable psychopathology was personality…

  1. Munchausen Syndrome by Proxy: Mother Fabricates Infant's Hearing Impairment.

    Science.gov (United States)

    Kahn, Gerri; Goldman, Ellen

    1991-01-01

    Case study reports a case of Munchausen Syndrome by Proxy, a form of child abuse in which the mother presents a child for treatment for a condition she herself has invented or created. This case study describes the ways in which a mother obtained a diagnosis of sensorineural hearing loss as well as amplification for her normally hearing infant.…

  2. Munchausen syndrome by adult proxy: a review of the literature.

    Science.gov (United States)

    Burton, M Caroline; Warren, Mark B; Lapid, Maria I; Bostwick, J Michael

    2015-01-01

    Munchausen syndrome by proxy (MSBP), more formally known as factitious disorder imposed on another, is a form of abuse in which a caregiver deliberately produces or feigns illness in a person under his or her care so that the proxy will receive medical care that gratifies the caregiver. Although well documented in the pediatric literature, few cases of MSBP with adult proxies (MSB-AP) have been reported. This study reviews existing literature on MSB-AP to provide a framework for clinicians to recognize this disorder. We searched Ovid MEDLINE, Ovid EMBASE, PubMed, Web of Knowledge, and PsychINFO, supplemented by bibliographic examination. We identified 13 cases of MSB-AP. Perpetrators were caregivers, most (62%) were women, and many worked in healthcare. The age range of the victims was 21 to 82 years. Most were unaware of the abuse, although in 2 cases the victim may have colluded with the perpetrator. Disease fabrication most often resulted from poisoning. MSB-AP should be included in the differential diagnosis of patients presenting with a complex constellation of symptoms without a unifying etiology and an overly involved caregiver with suspected psychological gain. Early identification is necessary so that healthcare providers do not unknowingly perpetuate harm through treatments that satisfy the perpetrator's psychological needs at the proxy's expense. © 2014 Society of Hospital Medicine.

  3. Identifying and Responding to Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Pearl, Peggy T.

    1995-01-01

    Defines Munchausen Syndrome by Proxy in children up to eight years, in which the mother falsifies illness in her child by simulating or producing illness, bringing about frequent hospitalizations, painful tests, potentially harmful treatment, and in extreme cases, death. Describes symptoms and suggested professional actions. (DR)

  4. Munchausen by Proxy Victims in Adulthood: A First Look.

    Science.gov (United States)

    Libow, Judith A.

    1995-01-01

    Childhood experiences and long-term psychological outcomes were investigated with 10 adults, ages 33 through 71, who were self-identified victims of illness fabrication by a parent (Munchausen by Proxy). During childhood they felt unloved and unsafe and had emotional and physical problems. As adults, problems included insecurity, reality-testing…

  5. Munchausen Syndrome by Proxy (MSBP): An Intergenerational Perspective.

    Science.gov (United States)

    Rappaport, Sol R.; Hochstadt, Neil J.

    1993-01-01

    Presents new information about Munchausen Syndrome by Proxy (MSBP), factitious disorder in which caretaker may induce or exaggerate medical illness in his or her child that may lead to illness and even death. Provides psychosocial history of caregiver using intergenerational model. Presents case of MSBP involving three siblings and information…

  6. Shareholder Activism through Proxy Proposals : The European Perspective

    NARCIS (Netherlands)

    Cziraki, P.; Renneboog, L.D.R.; Szilagyi, P.G.

    2009-01-01

    This paper is the first to investigate the corporate governance role of shareholderinitiated proxy proposals in European firms. While proposals in the US are nonbinding even if they pass the shareholder vote, they are legally binding in the UK and most of Continental Europe. Nonetheless, submissions

  7. A comparison of Solar proxy-magnetometry diagnostics

    NARCIS (Netherlands)

    Leenaarts, J.|info:eu-repo/dai/nl/304837946; Rutten, R.J.|info:eu-repo/dai/nl/074143662; Carlsson, M.; Uitenbroek, H.

    2006-01-01

    Aims. We test various proxy-magnetometry diagnostics, i.e., brightness signatures of small-scale magnetic elements, for studying magnetic field structures in the solar photosphere. Methods. Images are numerically synthesized from a 3D solar magneto-convection simulation for, respectively, the G band

  8. Munchausen by Proxy (MBP) Maltreatment: An International Educational Challenge.

    Science.gov (United States)

    Lasher, Louisa J.

    2003-01-01

    This article is an introduction to a special section on Munchausen Syndrome by Proxy (MSBP) as a form of child maltreatment. In MSBP the perpetrator has deliberately induced, fabricated, or exaggerated a physical and/or psychological-behavioral-mental health problem in another. The article stresses the importance of obtaining an MSBP finding of…

  9. Polity age and political budget cycles

    DEFF Research Database (Denmark)

    Aaskoven, Lasse

    2017-01-01

    Incumbent incentive for competence-signaling and lack of voter information are generally thought to be factors that increase the prevalence of political budget cycles. These mechanisms should be more prevalent in new political units. Since the creation of new political units is rarely exogenous......-experimental to study whether political budget cycles are larger in new political units. Contrary to theoretical predictions, political budget cycles seem to be of a smaller scale in the new municipalities, but only regarding budget cycles in budgetary overruns. The findings are of wider interest for discussions about...... the mechanisms behind context-conditional political budget cycles....

  10. Zero-base budgeting and the library.

    Science.gov (United States)

    Sargent, C W

    1978-01-01

    This paper describes the application of zero-base budgeting to libraries and the procedures involved in setting up this type of budget. It describes the "decision packages" necessary when this systmem is employed, as well as how to rank the packages and the problems which are related to the process. Zero-base budgeting involves the entire staff of a library, and the incentive engendered makes for a better and more realistic budget. The paper concludes with the problems which one might encounter in zero-base budgeting and the major benefits of the system. PMID:626795

  11. Using a sediment budget to understand geomorphic response following dam removal

    Science.gov (United States)

    Major, J. J.; O'Connor, J. E.; Podolak, C.; Keith, M.; Spicer, K.; Pittman, S.; Bragg, H.; Wallick, J.; Grant, G.

    2013-12-01

    measurements, balancing the budget was challenging. Uncertainties in computing annual sediment transport from non-stationary sediment rating curves, ambiguity in the precise composition of the reservoir sediment, uncertainties in relations between sediment mass and volume, and logistical difficulties of making measurements within the gorge tempered budget precision. Consequently, error bands on various budget components varied greatly (erosion ×10%; flux ×40%-50%; deposition ×20%). Nevertheless, the estimated sediment budget provided significant insights on the manner in which this high-gradient mountain river redistributed a large sediment input. Existing and emerging techniques which may aid higher-fidelity sediment budgets include: bathymetric lidar; proxy methods for measuring continuous sediment flux; and methods for acquiring high-resolution topography in critical reaches, such as terrestrial laser scanning or structure-from-motion photogrammetry.

  12. SINOMA - a better tool for proxy based reconstructions?

    Science.gov (United States)

    Buras, Allan; Thees, Barnim; Czymzik, Markus; Dräger, Nadine; Kienel, Ulrike; Neugebauer, Ina; Ott, Florian; Scharnweber, Tobias; Simard, Sonia; Slowinski, Michal; Slowinski, Sandra; Tecklenburg, Christina; Zawiska, Izabela; Wilmking, Martin

    2014-05-01

    Our knowledge on past environmental conditions largely relies on reconstructions that are based on linear regressions between proxy variables (e.g. tree-rings, lake sediments, ice cores) covering a comparably long period (centuries to millennia) and environmental parameters (e.g. climate data) of which only rather short measurement series exist (mostly decades). In general, the corresponding measurements are prone to errors. For instance, air temperature records that are to be prolonged by reconstruction from tree-rings are normally not measured in situ, i.e. where the trees used for reconstructions are growing. In contrast, the variation of tree-ring properties which are used as proxies does not only depend on temperature variations but also on other environmental variables and biological effects. However, if regressions are based on noisy data, knowledge on the noise intensity of both predictor and predictand is needed and model parameter estimates (slope and intercept) will be erroneous if information on the noise is not included in their estimation (Kutzbach et al., 2011). Here, we investigate the performance of the new Sequential Iterative Noise Matching Algorithm (SINOMA; Thees et al., 2009; and Thees et al., submitted) on a variety of typical proxy-data of differing temporal resolution (i.e. hourly (dendrometers, piezometers), seasonally (tree-rings), and annually (tree rings and varved lake sediments)). For each of the investigated proxies a number of pseudo-proxy datasets is generated. I.e. to each proxy variable two different noises are added, resulting in two noisy variables that originate from a common signal (the proxy) and of which the respective error noises and the true model parameters (slope and intercept) between both are known. SINOMA is applied to each of these pseudo-proxy datasets and its performance is evaluated against traditional regression techniques. The herewith submitted contribution thus focuses on the applicability of SINOMA rather

  13. On the use of human mobility proxies for modeling epidemics.

    Directory of Open Access Journals (Sweden)

    Michele Tizzoni

    2014-07-01

    Full Text Available Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i official census surveys, (ii proxy mobility data extracted from mobile phone call records, and (iii the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies

  14. On the use of human mobility proxies for modeling epidemics.

    Science.gov (United States)

    Tizzoni, Michele; Bajardi, Paolo; Decuyper, Adeline; Kon Kam King, Guillaume; Schneider, Christian M; Blondel, Vincent; Smoreda, Zbigniew; González, Marta C; Colizza, Vittoria

    2014-07-01

    Human mobility is a key component of large-scale spatial-transmission models of infectious diseases. Correctly modeling and quantifying human mobility is critical for improving epidemic control, but may be hindered by data incompleteness or unavailability. Here we explore the opportunity of using proxies for individual mobility to describe commuting flows and predict the diffusion of an influenza-like-illness epidemic. We consider three European countries and the corresponding commuting networks at different resolution scales, obtained from (i) official census surveys, (ii) proxy mobility data extracted from mobile phone call records, and (iii) the radiation model calibrated with census data. Metapopulation models defined on these countries and integrating the different mobility layers are compared in terms of epidemic observables. We show that commuting networks from mobile phone data capture the empirical commuting patterns well, accounting for more than 87% of the total fluxes. The distributions of commuting fluxes per link from mobile phones and census sources are similar and highly correlated, however a systematic overestimation of commuting traffic in the mobile phone data is observed. This leads to epidemics that spread faster than on census commuting networks, once the mobile phone commuting network is considered in the epidemic model, however preserving to a high degree the order of infection of newly affected locations. Proxies' calibration affects the arrival times' agreement across different models, and the observed topological and traffic discrepancies among mobility sources alter the resulting epidemic invasion patterns. Results also suggest that proxies perform differently in approximating commuting patterns for disease spread at different resolution scales, with the radiation model showing higher accuracy than mobile phone data when the seed is central in the network, the opposite being observed for peripheral locations. Proxies should therefore be

  15. Quantifying the effect of seasonal and vertical habitat tracking on planktonic foraminifera proxies

    Science.gov (United States)

    Jonkers, Lukas; Kučera, Michal

    2017-06-01

    The composition of planktonic foraminiferal (PF) calcite is routinely used to reconstruct climate variability. However, PF ecology leaves a large imprint on the proxy signal: seasonal and vertical habitats of PF species vary spatially, causing variable offsets from annual mean surface conditions recorded by sedimentary assemblages. PF seasonality changes with temperature in a way that minimises the environmental change that individual species experience and it is not unlikely that changes in depth habitat also result from such habitat tracking. While this behaviour could lead to an underestimation of spatial or temporal trends as well as of variability in proxy records, most palaeoceanographic studies are (implicitly) based on the assumption of a constant habitat. Up to now, the effect of habitat tracking on foraminifera proxy records has not yet been formally quantified on a global scale. Here we attempt to characterise this effect on the amplitude of environmental change recorded in sedimentary PF using core top δ18O data from six species. We find that the offset from mean annual near-surface δ18O values varies with temperature, with PF δ18O indicating warmer than mean conditions in colder waters (on average by -0.1 ‰ (equivalent to 0.4 °C) per °C), thus providing a first-order quantification of the degree of underestimation due to habitat tracking. We use an empirical model to estimate the contribution of seasonality to the observed difference between PF and annual mean δ18O and use the residual Δδ18O to assess trends in calcification depth. Our analysis indicates that given an observation-based model parametrisation calcification depth increases with temperature in all species and sensitivity analysis suggests that a temperature-related seasonal habitat adjustment is essential to explain the observed isotope signal. Habitat tracking can thus lead to a significant reduction in the amplitude of recorded environmental change. However, we show that this

  16. Measurement of the Turbulence Kinetic Energy Budget of a Turbulent Planar Wake Flow in Pressure Gradients

    Science.gov (United States)

    Liu, Xiao-Feng; Thomas, Flint O.; Nelson, Robert C.

    2001-01-01

    Turbulence kinetic energy (TKE) is a very important quantity for turbulence modeling and the budget of this quantity in its transport equation can provide insight into the flow physics. Turbulence kinetic energy budget measurements were conducted for a symmetric turbulent wake flow subjected to constant zero, favorable and adverse pressure gradients in year-three of research effort. The purpose of this study is to clarify the flow physics issues underlying the demonstrated influence of pressure gradient on wake development and provide experimental support for turbulence modeling. To ensure the reliability of these notoriously difficult measurements, the experimental procedure was carefully designed on the basis of an uncertainty analysis. Four different approaches, based on an isotropic turbulence assumption, a locally axisymmetric homogeneous turbulence assumption, a semi-isotropy assumption and a forced balance of the TKE equation, were applied for the estimate of the dissipation term. The pressure transport term is obtained from a forced balance of the turbulence kinetic energy equation. This report will present the results of the turbulence kinetic energy budget measurement and discuss their implication on the development of strained turbulent wakes.

  17. Ground water budget analysis and cross-formational leakage in an arid basin.

    Science.gov (United States)

    Hutchison, William R; Hibbs, Barry J

    2008-01-01

    Ground water budget analysis in arid basins is substantially aided by integrated use of numerical models and environmental isotopes. Spatial variability of recharge, storage of water of both modern and pluvial age, and complex three-dimensional flow processes in these basins provide challenges to the development of a good conceptual model. Ground water age dating and mixing analysis with isotopic tracers complement standard hydrogeologic data that are collected and processed as an initial step in the development and calibration of a numerical model. Environmental isotopes can confirm or refute a priori assumptions of ground water flow, such as the general assumption that natural recharge occurs primarily along mountains and mountain fronts. Isotopes also serve as powerful tools during postaudits of numerical models. Ground water models provide a means of developing ground water budgets for entire model domains or for smaller regions within the model domain. These ground water budgets can be used to evaluate the impacts of pumping and estimate the magnitude of capture in the form of induced recharge from streams, as well as quantify storage changes within the system. The coupled analyses of ground water budget analysis and isotope sampling and analysis provide a means to confirm, refute, or modify conceptual models of ground water flow.

  18. The sufficiency assumption of the reasoned approach to action

    Directory of Open Access Journals (Sweden)

    David Trafimow

    2015-12-01

    Full Text Available The reasoned action approach to understanding and predicting behavior includes the sufficiency assumption. Although variables not included in the theory may influence behavior, these variables work through the variables in the theory. Once the reasoned action variables are included in an analysis, the inclusion of other variables will not increase the variance accounted for in behavioral intentions or behavior. Reasoned action researchers are very concerned with testing if new variables account for variance (or how much traditional variables account for variance, to see whether they are important, in general or with respect to specific behaviors under investigation. But this approach tacitly assumes that accounting for variance is highly relevant to understanding the production of variance, which is what really is at issue. Based on the variance law, I question this assumption.

  19. Models for waste life cycle assessment: Review of technical assumptions

    DEFF Research Database (Denmark)

    Gentil, Emmanuel; Damgaard, Anders; Hauschild, Michael Zwicky

    2010-01-01

    , such as the functional unit, system boundaries, waste composition and energy modelling. The modelling assumptions of waste management processes, ranging from collection, transportation, intermediate facilities, recycling, thermal treatment, biological treatment, and landfilling, are obviously critical when comparing......A number of waste life cycle assessment (LCA) models have been gradually developed since the early 1990s, in a number of countries, usually independently from each other. Large discrepancies in results have been observed among different waste LCA models, although it has also been shown that results...... from different LCA studies can be consistent. This paper is an attempt to identify, review and analyse methodologies and technical assumptions used in various parts of selected waste LCA models. Several criteria were identified, which could have significant impacts on the results...

  20. Evaluating The Markov Assumption For Web Usage Mining

    DEFF Research Database (Denmark)

    Jespersen, S.; Pedersen, Torben Bach; Thorhauge, J.

    2003-01-01

    Web usage mining concerns the discovery of common browsing patterns, i.e., pages requested in sequence, from web logs. To cope with the enormous amounts of data, several aggregated structures based on statistical models of web surfing have appeared, e.g., the Hypertext Probabilistic Grammar (HPG...... knowledge there has been no systematic study of the validity of the Markov assumption wrt.\\ web usage mining and the resulting quality of the mined browsing patterns. In this paper we systematically investigate the quality of browsing patterns mined from structures based on the Markov assumption. Formal......, that long rules are generally more distorted than shorter rules and that the model yield knowledge of a higher quality when applied to more random usage patterns. Thus we conclude that Markov-based structures for web usage mining are best suited for tasks demanding less accuracy such as pre...

  1. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Scafuro, Alessandra

    2013-01-01

    the usefulness of our compiler by providing two (constant-round) instantiations of ideal straight-line extractable commitment based on (malicious) PUFs [36] and stateless tamper-proof hardware tokens [26], therefore achieving the first unconditionally UC-secure commitment with malicious PUFs and stateless tokens......, respectively. Our constructions are secure for adversaries creating arbitrarily malicious stateful PUFs/tokens. Previous results with malicious PUFs used either computational assumptions to achieve UC-secure commitments or were unconditionally secure but only in the indistinguishability sense [36]. Similarly......, with stateless tokens, UC-secure commitments are known only under computational assumptions [13,24,15], while the (not UC) unconditional commitment scheme of [23] is secure only in a weaker model in which the adversary is not allowed to create stateful tokens. Besides allowing us to prove feasibility...

  2. On the minimum set of physical assumption leading to the

    Energy Technology Data Exchange (ETDEWEB)

    Bobbio, S.; Marrucci, G. [Naples Univ. `Federico II` (Italy). School of Engineering

    1996-11-01

    The way of obtaining the Schroedinger equation for a quantum particle in an electromagnetic field is revisited, showing that very few physical assumptions are required. In fact, after having introduced the general formalism of non-relativistic quantum mechanics, it is shown that the structure of the Schroedinger equation for a spinless particle is obtained merely by requiring continuity of space and time, and covariance with respect to Galilean transformation. Both the Correspondence and Uncertainly principles then become `theorems`.

  3. The effect of motivation profile and participative budgeting on budget goal commitment

    DEFF Research Database (Denmark)

    Sandalgaard, Niels; Bukh, Per Nikolaj; Poulsen, Carsten Stig

    2009-01-01

    The effect of participative budgeting on motivation is often considered in management accounting research. In this study we focus on dispositional factors of motivation rooted in personality that affect budgeting. Especially we focus on the effect of personality traits in the form of achievement......, power and affiliation motives on budget goal commitment in interaction with participative budgeting. The study is based on a survey among bank managers at different organizational levels of a Scandinavian regional bank and the results indicate that the effect of participative budgeting on budget goal...... commitment is moderated by the implicit power motivation of the bank manager....

  4. The 2015 Budget Act and proposals for amendments of the Budget Act in Poland

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2015-03-01

    Full Text Available The article presents the legal content and system of the 2015 Budget Act and the legal significance of its regulations. In the paper there are also proposals to the new structure Polish Budget Act. The present system of the Budget Act does not include the revenues and expenditure of certain state funds (especially the National Road Fund and finances of State Treasury companies. The current system weakens the control function and budgetary power of the Parliament. New Polish system of the Budget Act should contain the general budget and several special budgets.

  5. Budget estimates. Fiscal year 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-02-01

    The U.S. Congress has determined that the safe use of nuclear materials for peaceful purposes is a legitimate and important national goal. It has entrusted the Nuclear Regulatory Commission (NRC) with the primary Federal responsibility for achieving that goal. The NRC`s mission, therefore, is to regulate the Nation`s civilian use of byproduct, source, and special nuclear materials to ensure adequate protection of public health and safety, to promote the common defense and security, and to protect the environment. The NRC`s FY 1998 budget requests new budget authority of $481,300,000 to be funded by two appropriations - one is the NRC`s Salaraies and Expenses appropriation for $476,500,000, and the other is NRC`s Office of Inspector General appropriation for $4,800,000. Of the funds appropriated to the NRC`s Salaries and Expenses, $17,000,000, shall be derived from the Nuclear Waste Fund and $2,000,000 shall be derived from general funds. The proposed FY 1998 appropriation legislation would also exempt the $2,000,000 for regulatory reviews and other assistance provided to the Department of Energy from the requirement that the NRC collect 100 percent of its budget from fees. The sums appropriated to the NRC`s Salaries and Expenses and NRC`s Office of Inspector General shall be reduced by the amount of revenues received during FY 1998 from licensing fees, inspection services, and other services and collections, so as to result in a final FY 1998 appropriation for the NRC of an estimated $19,000,000 - the amount appropriated from the Nuclear Waste Fund and from general funds. Revenues derived from enforcement actions shall be deposited to miscellaneous receipts of the Treasury.

  6. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    Science.gov (United States)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  7. How different proxies record precipitation variability over southeastern South America

    Energy Technology Data Exchange (ETDEWEB)

    Chiessi, Cristiano M; Mulitza, Stefan; Paetzold, Juergen; Wefer, Gerold, E-mail: chiessi@uni-bremen.d [MARUM-Center for Marine Environmental Sciences, University of Bremen, Leobener Strasse, 28359 Bremen (Germany)

    2010-03-15

    Detrending natural and anthropogenic components of climate variability is arguably an issue of utmost importance to society. To accomplish this issue, one must rely on a comprehensive understanding of the natural variability of the climate system on a regional level. Here we explore how different proxies (e.g., stalagmite oxygen isotopic composition, pollen percentages, bulk sediment elemental ratios) record Holocene precipitation variability over southeastern South America. We found a general good agreement between the different records both on orbital and centennial time-scales. Dry mid Holocene, and wet late Holocene, Younger Dryas and a period between {approx}9.4 and 8.12 cal kyr BP seem to be pervasive features. Moreover, we show that proxy-specific sensitivity can greatly improve past precipitation reconstructions.

  8. A comparison of proxy performance in coral biodiversity monitoring

    Science.gov (United States)

    Richards, Zoe T.

    2013-03-01

    The productivity and health of coral reef habitat is diminishing worldwide; however, the effect that habitat declines have on coral reef biodiversity is not known. Logistical and financial constraints mean that surveys of hard coral communities rarely collect data at the species level; hence it is important to know if there are proxy metrics that can reliably predict biodiversity. Here, the performances of six proxy metrics are compared using regression analyses on survey data from a location in the northern Great Barrier Reef. Results suggest generic richness is a strong explanatory variable for spatial patterns in species richness (explaining 82 % of the variation when measured on a belt transect). The most commonly used metric of reef health, percentage live coral cover, is not positively or linearly related to hard coral species richness. This result raises doubt as to whether management actions based on such reefscape information will be effective for the conservation of coral biodiversity.

  9. False allegations of abuse and Munchausen syndrome by proxy.

    Science.gov (United States)

    Meadow, R

    1993-01-01

    Fourteen children from seven families are reported for whom false allegations of abuse were made by the mother. Twelve children were alleged to have incurred sexual abuse, one both sexual and physical abuse, and one physical abuse alone. Thirteen of the children had incurred, or were currently victims of, factitious illness abuse invented by the mother. The one child with no history of factitious illness abuse had a sibling who had incurred definite factitious illness abuse. The false allegations of abuse did not occur in the context of parental separation, divorce, or custody disputes concerning the children. They occurred in the context of Munchausen syndrome by proxy abuse. The age of the children, 3 to 9 years, was older than the usual age for Munchausen syndrome by proxy abuse. The mother was the source of the false allegations and was the person who encouraged or taught six of the children to substantiate allegations of sexual abuse. PMID:8503664

  10. Munchausen syndrome and Munchausen syndrome by proxy in dermatology.

    Science.gov (United States)

    Boyd, Alan S; Ritchie, Coleman; Likhari, Sunaina

    2014-08-01

    Patients with Munchausen syndrome purposefully injure themselves, often with the injection of foreign materials, to gain hospital admission and the attention associated with having a difficult-to-identify condition. Munchausen syndrome by proxy occurs when a child's caregiver, typically the mother, injures the child for the same reasons. Cases of Munchausen syndrome and Munchausen syndrome by proxy with primary cutaneous involvement appear to be rarely described in the literature suggesting either that diagnosis is not made readily or that it is, in fact, an uncommon disorder. At the center of both conditions is significant psychological pathology and treatment is difficult as many patients with Munchausen syndrome when confronted with these diagnostic possibilities simply leave the hospital. Little is known about the long-term outcome or prognosis of these patients. Copyright © 2014 American Academy of Dermatology, Inc. Published by Mosby, Inc. All rights reserved.

  11. A case report of Factitious Disorder (Munchausen Syndrome by proxy

    Directory of Open Access Journals (Sweden)

    Mehdi Shirzadifar

    2014-09-01

    Full Text Available Background: In Factitious Disorder by proxy, one person (perpetrator induces the disease in another person, thereby seeking emotional needs during the treatment process Diagnosis of this disorder is very difficult and there is not much consensus over it among experts. Lack of timely diagnosis of this disorder may lead to serious harms in patients. Case presentation: We will introduce a 19 year-old boy with mental retardation and history of multiple admissions to psychiatric, internal, urology and surgery wards. He has a 12 year-old sister and a 4 year-old brother, both with history of multiple admissions to pediatrics and internal wards. The father of family was 48 years old with chronic mental disorder, drug dependency and history of multiple admissions to medical, psychiatry and neurology wards. The mother of this family was diagnosed with munchausen syndrome by proxy.

  12. Munchausen syndrome by proxy: an alarming face of child abuse.

    Science.gov (United States)

    Gehlawat, Pratibha; Gehlawat, Virender Kumar; Singh, Priti; Gupta, Rajiv

    2015-01-01

    Munchausen syndrome by proxy (MSBP) is emerging as a serious form of child abuse. It is an intentional production of illness in another, usually children by mothers, to assume sick role by proxy. It is poorly understood and a controversial diagnosis. Treatment is very difficult. We present a case of 9-year-old boy brought to Pt. B. D. Sharma, PGIMS, Rohtak, a tertiary care hospital in northern India by his father and paternal uncle with complaints of hematemesis since July 2012. He underwent many invasive procedures until the diagnosis of MSBP was finally considered. The examination of the blood sample confirmed the diagnosis. The child was placed under custody of his mother. The case was reported to social services, which incorporated whole family in the management.

  13. Does National Culture Impact Capital Budgeting Systems?

    Directory of Open Access Journals (Sweden)

    Peter J. Graham

    2017-06-01

    Full Text Available We examine how national culture impacts organisational selection of capital budgeting systems to develop our understanding of what influence a holistic formulation of national culture has on capital budgeting systems. Such an understanding is important as it would not only provide a clearer link between national culture and capital budgeting systems and advance extant literature but would also help multinational firms that have business relationships with Indonesian firms in suitably designing strategies. We conducted semi-structured interviews of selected finance managers of listed firms in Indonesia and Australia. Consistent with the contingency theory, we found that economic, political, legal and social uncertainty impact on the use of capital budgeting systems. The levels of uncertainty were higher in Indonesia than Australia and need to be reckoned in the selection of capital budgeting systems used by firms. We also found that firms are influenced by project size and complexity, when selecting capital budgeting systems.

  14. Proxy-SU(3) symmetry in heavy deformed nuclei

    Science.gov (United States)

    Bonatsos, Dennis; Assimakis, I. E.; Minkov, N.; Martinou, Andriana; Cakirli, R. B.; Casten, R. F.; Blaum, K.

    2017-06-01

    Background: Microscopic calculations of heavy nuclei face considerable difficulties due to the sizes of the matrices that need to be solved. Various approximation schemes have been invoked, for example by truncating the spaces, imposing seniority limits, or appealing to various symmetry schemes such as pseudo-SU(3). This paper proposes a new symmetry scheme also based on SU(3). This proxy-SU(3) can be applied to well-deformed nuclei, is simple to use, and can yield analytic predictions. Purpose: To present the new scheme and its microscopic motivation, and to test it using a Nilsson model calculation with the original shell model orbits and with the new proxy set. Method: We invoke an approximate, analytic, treatment of the Nilsson model, that allows the above vetting and yet is also transparent in understanding the approximations involved in the new proxy-SU(3). Results: It is found that the new scheme yields a Nilsson diagram for well-deformed nuclei that is very close to the original Nilsson diagram. The specific levels of approximation in the new scheme are also shown, for each major shell. Conclusions: The new proxy-SU(3) scheme is a good approximation to the full set of orbits in a major shell. Being able to replace a complex shell model calculation with a symmetry-based description now opens up the possibility to predict many properties of nuclei analytically and often in a parameter-free way. The new scheme works best for heavier nuclei, precisely where full microscopic calculations are most challenged. Some cases in which the new scheme can be used, often analytically, to make specific predictions, are shown in a subsequent paper.

  15. Law Enforcement Proxies Matter for the Law and Finance Nexus

    OpenAIRE

    Valentin Toci; Iraj Hashi

    2013-01-01

    The paper employs various measures of law enforcement to provide new evidence on the importance of legal institutions for different dimensions of financial development in transition economies. It offers a critical assessment of law enforcement measures employed in recent studies by showing that some proxies for law enforcement in the credit market may not be appropriate. Hence, care should be taken in how the quality of institutions is measured and the context which it represents. An original...

  16. Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows

    Science.gov (United States)

    2013-09-01

    Address Translation NPS Naval Postgraduate School OTT One-way Transit Time PET Privacy Enhancing Technology PHP Hypertext Preprocessor P2P ] Peer-to...of timing information that can translate into usable intelligence for detecting the use of reverse proxies by a network domain. 1.1 Problem Statement...websites (i.e., Sky News Arabia, Kemalist Gazete, Detroit News), and entertainment industry sites (i.e., HBO GO, LeoVegas Online Casino , FreeRide Games

  17. Marine proxy evidence linking decadal North Pacific and Atlantic climate

    Energy Technology Data Exchange (ETDEWEB)

    Hetzinger, S. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); Halfar, J. [University of Toronto Mississauga, CPS-Department, Mississauga, ON (Canada); Mecking, J.V.; Keenlyside, N.S. [Leibniz Institute of Marine Sciences, IFM-GEOMAR, Kiel (Germany); University of Bergen, Geophysical Institute and Bjerknes Centre for Climate Research, Bergen (Norway); Kronz, A. [University of Goettingen, Geowissenschaftliches Zentrum, Goettingen (Germany); Steneck, R.S. [University of Maine, Darling Marine Center, Walpole, ME (United States); Adey, W.H. [Smithsonian Institution, Department of Botany, Washington, DC (United States); Lebednik, P.A. [ARCADIS U.S. Inc., Walnut Creek, CA (United States)

    2012-09-15

    Decadal- to multidecadal variability in the extra-tropical North Pacific is evident in 20th century instrumental records and has significant impacts on Northern Hemisphere climate and marine ecosystems. Several studies have discussed a potential linkage between North Pacific and Atlantic climate on various time scales. On decadal time scales no relationship could be confirmed, potentially due to sparse instrumental observations before 1950. Proxy data are limited and no multi-centennial high-resolution marine geochemical proxy records are available from the subarctic North Pacific. Here we present an annually-resolved record (1818-1967) of Mg/Ca variations from a North Pacific/Bering Sea coralline alga that extends our knowledge in this region beyond available data. It shows for the first time a statistically significant link between decadal fluctuations in sea-level pressure in the North Pacific and North Atlantic. The record is a lagged proxy for decadal-scale variations of the Aleutian Low. It is significantly related to regional sea surface temperature and the North Atlantic Oscillation (NAO) index in late boreal winter on these time scales. Our data show that on decadal time scales a weaker Aleutian Low precedes a negative NAO by several years. This atmospheric link can explain the coherence of decadal North Pacific and Atlantic Multidecadal Variability, as suggested by earlier studies using climate models and limited instrumental data. (orig.)

  18. MUNCHAUSEN SYNDROME BY PROXY IN PEDIATRIC DENTISTRY: MYTH OR REALITY?

    Directory of Open Access Journals (Sweden)

    Veronica PINTILICIUC-ŞERBAN

    2017-06-01

    Full Text Available Background and aims: Munchausen syndrome by proxy is a condition traditionally comprising physical and mental abuse and medical neglect as a form of psychogenic maltreatment of the child, secondary to fabrication of a pediatric illness by the parent or guardian. The aim of our paper is to assess whether such condition occurs in current pediatric dental practice and to evidence certain situations in which the pediatric dentist should suspect this form of child abuse. Problem statement: Munchausen syndrome by proxy in pediatric dentistry may lead to serious chronic disabilities of the abused or neglected child, being one of the causes of treatment failure. Discussion: Prompt detection of such condition should be regarded as one of the duties of the practitioner who should be trained to report the suspected cases to the governmental child protective agencies. This should be regarded as a form of child abuse and neglect, and the responsible caregiver could be held liable when such wrongful actions cause harm or endanger child’s welfare. Conclusion: Munchausen syndrome by proxy should be regarded as a reality in current pediatric dental practice and dental teams should be trained to properly recognize, assess and manage such complex situations.

  19. Short-term indicators. Intensities as a proxy for savings

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M.; Gerdes, J. [ECN Policy Studies, Petten (Netherlands); Faberi, S. [Institute of Studies for the Integration of Systems ISIS, Rome (Italy)

    2013-12-15

    The ODYSSEE database on energy efficiency indicators (www.odyssee-indicators.org) has been set up to enable the monitoring and evaluation of realised energy efficiency improvements and related energy savings. The database covers the 27 EU countries as well as Norway and Croatia and data are available from 1990 on. This work contributes to the growing need for quantitative monitoring and evaluation of the impacts of energy policies and measures, both at the EU and national level, e.g. due to the Energy Services Directive and the proposed Energy Efficiency Directive. Because the underlying data become available only after some time, the savings figures are not always timely available. This is especially true for the ODEX efficiency indices per sector that rely on a number of indicators. Therefore, there is a need for so-called short-term indicators that become available shortly after the year has passed for which data are needed. The short term indicators do not replace the savings indicators but function as a proxy for the savings in the most recent year. This proxy value is faster available, but will be less accurate than the saving indicators themselves. The short term indicators have to be checked regularly with the ODEX indicators in order to see whether they can function still as a proxy.

  20. A unified proxy for ENSO and PDO variability since 1650

    Directory of Open Access Journals (Sweden)

    S. McGregor

    2010-01-01

    Full Text Available In this manuscript we have attempted to consolidate the common signal in previously defined proxy reconstructions of the El Niño-Southern Oscillation into one individual proxy titled the Unified ENSO Proxy (UEP. While correlating well with the majority of input reconstructions, the UEP provides better representation of observed indices of ENSO, discrete ENSO events and documented historical chronologies of ENSO than any of these input ENSO reconstructions. Further to this, the UEP also provides a means to reconstruct the PDO/IPO multi-decadal variability of the Pacific Ocean as the low-pass filtered UEP displays multi-decadal variability that is consistent with the 20th century variability of the PDO and IPO. The UEP is then used to describe changes in ENSO variability which have occurred since 1650 focusing on changes in ENSOs variance, multi-year ENSO events, PDO-like multi-decadal variability and the effects of volcanic and solar forcing on ENSO. We find that multi-year El Niño events similar to the 1990–1995 event have occurred several times over the last 3 1/2 centuries. Consistent with earlier studies we find that volcanic forcing can induce a statistically significant change in the mean state of ENSO in the year of the eruption and a doubling of the probability of an El Niño (La Niña event occurring in the year of (three years after the eruption.

  1. Evaluating Ground-based Proxies for Solar Irradiance Variation

    Science.gov (United States)

    Oegerle, William (Technical Monitor); Jordan, Stuart

    2003-01-01

    In order to determine what ground-based proxies are best for evaluating solar irradiance variation before the advent of space observations, it is necessary to test these proxies against space observations. We have tested sunspot number, total sunspot area, and sunspot umbral area against the Nimbus-7 measurements of total solar irradiance variation cover the eleven year period 1980-1990. The umbral area yields the best correlation and the total sunspot area yields the poorest. Reasons for expecting the umbral area to yield the best correlation are given, the statistical procedure followed to obtain the results is described, and the value of determining the best proxy is discussed. The latter is based upon the availability of an excellent database from the Greenwich Observatory obtained over the period 1876-1976, which can be used to estimate the total solar irradiance variation before sensitive space observations were available. The ground-based observations used were obtained at the Coimbra Solar Observatory. The analysis was done at Goddard using these data and data from the Nimbus-7 satellite.

  2. Shell architecture: a novel proxy for paleotemperature reconstructions?

    Science.gov (United States)

    Milano, Stefania; Nehrke, Gernot; Wanamaker, Alan D., Jr.; Witbaard, Rob; Schöne, Bernd R.

    2017-04-01

    Mollusk shells are unique high-resolution paleoenvironmental archives. Their geochemical properties, such as oxygen isotope composition (δ18Oshell) and element-to-calcium ratios, are routinely used to estimate past environmental conditions. However, the existing proxies have certain drawbacks that can affect paleoreconstruction robustness. For instance, the estimation of water temperature of brackish and near-shore environments can be biased by the interdependency of δ18Oshell from multiple environmental variables (water temperature and δ18Owater). Likely, the environmental signature can be masked by physiological processes responsible for the incorporation of trace elements into the shell. The present study evaluated the use of shell structural properties as alternative environmental proxies. The sensitivity of shell architecture at µm and nm-scale to the environment was tested. In particular, the relationship between water temperature and microstructure formation was investigated. To enable the detection of potential structural changes, the shells of the marine bivalves Cerastoderma edule and Arctica islandica were analyzed with Scanning Electron Microscopy (SEM), nanoindentation and Confocal Raman Microscopy (CRM). These techniques allow a quantitative approach to the microstructural analysis. Our results show that water temperature induces a clear response in shell microstructure. A significant alteration in the morphometric characteristics and crystallographic orientation of the structural units was observed. Our pilot study suggests that shell architecture records environmental information and it has potential to be used as novel temperature proxy in near-shore and open ocean habitats.

  3. Heinrich event 4 characterized by terrestrial proxies in southwestern Europe

    Directory of Open Access Journals (Sweden)

    J. M. López-García

    2013-05-01

    Full Text Available Heinrich event 4 (H4 is well documented in the North Atlantic Ocean as a cooling event that occurred between 39 and 40 Ka. Deep-sea cores around the Iberian Peninsula coastline have been analysed to characterize the H4 event, but there are no data on the terrestrial response to this event. Here we present for the first time an analysis of terrestrial proxies for characterizing the H4 event, using the small-vertebrate assemblage (comprising small mammals, squamates and amphibians from Terrassa Riera dels Canyars, an archaeo-palaeontological deposit located on the seaboard of the northeastern Iberian Peninsula. This assemblage shows that the H4 event is characterized in northeastern Iberia by harsher and drier terrestrial conditions than today. Our results were compared with other proxies such as pollen, charcoal, phytolith, avifauna and large-mammal data available for this site, as well as with the general H4 event fluctuations and with other sites where H4 and the previous and subsequent Heinrich events (H5 and H3 have been detected in the Mediterranean and Atlantic regions of the Iberian Peninsula. We conclude that the terrestrial proxies follow the same patterns as the climatic and environmental conditions detected by the deep-sea cores at the Iberian margins.

  4. Error characterization for asynchronous computations: Proxy equation approach

    Science.gov (United States)

    Sallai, Gabriella; Mittal, Ankita; Girimaji, Sharath

    2017-11-01

    Numerical techniques for asynchronous fluid flow simulations are currently under development to enable efficient utilization of massively parallel computers. These numerical approaches attempt to accurately solve time evolution of transport equations using spatial information at different time levels. The truncation error of asynchronous methods can be divided into two parts: delay dependent (EA) or asynchronous error and delay independent (ES) or synchronous error. The focus of this study is a specific asynchronous error mitigation technique called proxy-equation approach. The aim of this study is to examine these errors as a function of the characteristic wavelength of the solution. Mitigation of asynchronous effects requires that the asynchronous error be smaller than synchronous truncation error. For a simple convection-diffusion equation, proxy-equation error analysis identifies critical initial wave-number, λc. At smaller wave numbers, synchronous error are larger than asynchronous errors. We examine various approaches to increase the value of λc in order to improve the range of applicability of proxy-equation approach.

  5. Budget Deficits Effects on Economic Growth

    OpenAIRE

    L.C.Risti; C. Nicolaescu; D.Tăgăduan

    2013-01-01

    The budget deficit can not be analyzed autarchically, as it affects all the macroeconomic processes and, is itself influenced by all other macroeconomic indicators. Most analyses and studies on public finance and budget balance measure the impact that budgetary deficits accumulation has on economy. Therefore, the present paper aims at following and analyzing the mutual impact between budget deficit and another economic macro indicator, namely the economic growth.

  6. INSTITUTIONAL SUPPORT OF SECURITY BUDGET OF UKRAINE

    Directory of Open Access Journals (Sweden)

    S. Onishchenko

    2016-06-01

    Full Text Available The institutional framework from positions of different conceptual approaches was examined in the article. The attention was paid the problems of institutional support budget security in Ukraine. The institutionalization of budgetary relations and especially the formation system of institutional support was investigated. The author's approach to the nature of institutional support budget security was suggested. Institutional and legal, institutional and organizational, and staffing budget security were characterized. It is concluded that the process of institutional development budget security characterized by unacceptable levels of institutional strain.

  7. OMB Recommended vs Approved Operating Budget

    Data.gov (United States)

    Montgomery County of Maryland — This dataset includes the Fiscal Year 2015 County Executive Recommended and County Council Approved operating budgets for Montgomery County, for comparison purposes....

  8. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

    NARCIS (Netherlands)

    Weng, Jiang; Yang, Yanjiang; Tang, Qiang; Deng, Robert H.; Bao, Feng

    Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this

  9. 17 CFR 240.14a-16 - Internet availability of proxy materials.

    Science.gov (United States)

    2010-04-01

    ... holder to access and review the proxy materials before voting; (3) The Internet Web site address where... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Internet availability of proxy... Under the Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-16 Internet...

  10. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    Science.gov (United States)

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  11. A novel salinity proxy based on Na incorporation into foraminiferal calcite

    NARCIS (Netherlands)

    Wit, J.C.; de Nooijer, L.J.; Wolthers, M.; Reichart, G.J.

    2013-01-01

    Salinity and temperature determine seawater density, and differences in both thereby control global thermohaline circulation. Whereas numerous proxies have been calibrated and applied to reconstruct temperature, a direct and independent proxy for salinity is still missing. Ideally, a new proxy for

  12. A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    NARCIS (Netherlands)

    Ibraimi, L.; Tang, Qiang; Hartel, Pieter H.; Jonker, Willem

    2008-01-01

    Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the

  13. Posttraumatic world assumptions among treatment-seeking refugees.

    Science.gov (United States)

    Ter Heide, F Jackie June; Sleijpen, Marieke; van der Aa, Niels

    2017-01-01

    The clinical relevance of negative changes in cognitions about oneself, others, and the world is reflected in the diagnostic criteria for posttraumatic stress disorder (PTSD) in the DSM-5 and complex posttraumatic stress disorder in the ICD-11. Although such changes in cognition have been posited to be especially relevant for traumatised refugees, few studies have examined this in refugee populations. The present study used a cross-sectional design to compare negative cognitions among 213 adult treatment-seeking refugees with those in previously published samples from the general population, veterans with combat-related PTSD, and whiplash victims. Measures included the World Assumptions Scale (WAS) and the Events and DSM-IV PTSD subscales of the Harvard Trauma Questionnaire (HTQ). Path models examined the relation of the WAS subscales to five demographic and trauma-related variables. Results showed that world assumptions were especially negative with regard to Benevolence of World, Benevolence of People, and Luck subscales, on which refugees scored lower than all reference samples. Differences between the refugee sample and the reference samples were smallest with regard to self-worth and self-controllability. World assumptions were associated with gender and PTSD symptom severity but not with age, length of residence in the Netherlands, and number of traumatic event types. The DSM-5 criterion of negative changes in belief about oneself, others, and the world appears more applicable to refugees than the more narrowly formulated ICD-11 criterion of diminished and defeated sense of self. Prevention and treatment efforts with refugees may need to be especially aimed at preventing a further decline of trust as well as restoration of trust in others and the world.

  14. THE COMPLEX OF ASSUMPTION CATHEDRAL OF THE ASTRAKHAN KREMLIN

    Directory of Open Access Journals (Sweden)

    Savenkova Aleksandra Igorevna

    2016-08-01

    Full Text Available This article is devoted to an architectural and historical analysis of the constructions forming a complex of Assumption Cathedral of the Astrakhan Kremlin, which earlier hasn’t been considered as a subject of special research. Basing on the archival sources, photographic materials, publications and on-site investigations of monuments, the creation history of the complete architectural complex sustained in one style of the Muscovite baroque, unique in its composite construction, is considered. Its interpretation in the all-Russian architectural context is offered. Typological features of single constructions come to light. The typology of the Prechistinsky bell tower has an untypical architectural solution - “hexagonal structure on octagonal and quadrangular structures”. The way of connecting the building of the Cathedral and the chambers by the passage was characteristic of monastic constructions and was exclusively seldom in kremlins, farmsteads and ensembles of city cathedrals. The composite scheme of the Assumption Cathedral includes the Lobnoye Mesto (“the Place of Execution” located on an axis from the West, it is connected with the main building by a quarter-turn with landing. The only prototype of the structure is a Lobnoye Mesto on the Red Square in Moscow. In the article the version about the emergence of the Place of Execution on the basis of earlier existing construction - a tower “the Peal” which is repeatedly mentioned in written sources in connection with S. Razin’s revolt is considered. The metropolitan Sampson, trying to keep the value of the Astrakhan metropolitanate, builds the Assumption Cathedral and the Place of Execution directly appealing to a capital prototype to emphasize the continuity and close connection with Moscow.

  15. Posttraumatic Growth and Shattered World Assumptions Among Ex-POWs

    DEFF Research Database (Denmark)

    Lahav, Y.; Bellin, Elisheva S.; Solomon, Z.

    2016-01-01

    world assumptions (WAs) and that the co-occurrence of high PTG and negative WAs among trauma survivors reflects reconstruction of an integrative belief system. The present study aimed to test these claims by investigating, for the first time, the mediating role of dissociation in the relation between...... PTG and WAs. Method: Former prisoners of war (ex-POWs; n = 158) and comparable controls (n = 106) were assessed 38 years after the Yom Kippur War. Results: Ex-POWs endorsed more negative WAs and higher PTG and dissociation compared to controls. Ex-POWs with posttraumatic stress disorder (PTSD...

  16. Diversion assumptions for high-powered research reactors

    Energy Technology Data Exchange (ETDEWEB)

    Binford, F.T.

    1984-01-01

    This study deals with diversion assumptions for high-powered research reactors -- specifically, MTR fuel; pool- or tank-type research reactors with light-water moderator; and water, beryllium, or graphite reflectors, and which have a power level of 25 MW(t) or more. The objective is to provide assistance to the IAEA in documentation of criteria and inspection observables related to undeclared plutonium production in the reactors described above, including: criteria for undeclared plutonium production, necessary design information for implementation of these criteria, verification guidelines including neutron physics and heat transfer, and safeguards measures to facilitate the detection of undeclared plutonium production at large research reactors.

  17. Radiation hormesis and the linear-no-threshold assumption

    CERN Document Server

    Sanders, Charles L

    2009-01-01

    Current radiation protection standards are based upon the application of the linear no-threshold (LNT) assumption, which considers that even very low doses of ionizing radiation can cause cancer. The radiation hormesis hypothesis, by contrast, proposes that low-dose ionizing radiation is beneficial. In this book, the author examines all facets of radiation hormesis in detail, including the history of the concept and mechanisms, and presents comprehensive, up-to-date reviews for major cancer types. It is explained how low-dose radiation can in fact decrease all-cause and all-cancer mortality an

  18. First assumptions and overlooking competing causes of death

    DEFF Research Database (Denmark)

    Leth, Peter Mygind; Andersen, Anh Thao Nguyen

    2014-01-01

    Determining the most probable cause of death is important, and it is sometimes tempting to assume an obvious cause of death, when it readily presents itself, and stop looking for other competing causes of death. The case story presented in the article illustrates this dilemma. The first assumption...... of cause of death, which was based on results from bacteriology tests, proved to be wrong when the results from the forensic toxicology testing became available. This case also illustrates how post mortem computed tomography (PMCT) findings of radio opaque material in the stomach alerted the pathologist...

  19. Exploring power assumptions in the leadership and management debate

    OpenAIRE

    Edwards, G.; Schedlitzki, D.; Turnbull, S.; Gill, R.

    2015-01-01

    Purpose – The purpose of this paper is to take a fresh look at the leadership and management debate through exploring underlying power assumptions in the literature.\\ud \\ud Design/methodology/approach – The paper is a conceptual discussion that draws on the power-based literature to develop a framework to help conceptually understand leadership in relation to management.\\ud \\ud Findings – The paper highlights the historically clichéd nature of comments regarding conceptual similarities and di...

  20. The Australian terrestrial carbon budget

    Directory of Open Access Journals (Sweden)

    V. Haverd

    2013-02-01

    Full Text Available This paper reports a study of the full carbon (C-CO2 budget of the Australian continent, focussing on 1990–2011 in the context of estimates over two centuries. The work is a contribution to the RECCAP (REgional Carbon Cycle Assessment and Processes project, as one of numerous regional studies. In constructing the budget, we estimate the following component carbon fluxes: net primary production (NPP; net ecosystem production (NEP; fire; land use change (LUC; riverine export; dust export; harvest (wood, crop and livestock and fossil fuel emissions (both territorial and non-territorial. Major biospheric fluxes were derived using BIOS2 (Haverd et al., 2012, a fine-spatial-resolution (0.05° offline modelling environment in which predictions of CABLE (Wang et al., 2011, a sophisticated land surface model with carbon cycle, are constrained by multiple observation types. The mean NEP reveals that climate variability and rising CO2 contributed 12 ± 24 (1σ error on mean and 68 ± 15 TgC yr−1, respectively. However these gains were partially offset by fire and LUC (along with other minor fluxes, which caused net losses of 26 ± 4 TgC yr−1 and 18 ± 7 TgC yr−1, respectively. The resultant net biome production (NBP is 36 ± 29 TgC yr−1, in which the largest contributions to uncertainty are NEP, fire and LUC. This NBP offset fossil fuel emissions (95 ± 6 TgC yr−1 by 38 ± 30%. The interannual variability (IAV in the Australian carbon budget exceeds Australia's total carbon emissions by fossil fuel combustion and is dominated by IAV in NEP. Territorial fossil fuel emissions are significantly smaller than the rapidly growing fossil fuel exports: in 2009–2010, Australia exported 2.5 times more carbon in fossil fuels than it emitted by burning fossil fuels.

  1. The contour method cutting assumption: error minimization and correction

    Energy Technology Data Exchange (ETDEWEB)

    Prime, Michael B [Los Alamos National Laboratory; Kastengren, Alan L [ANL

    2010-01-01

    The recently developed contour method can measure 2-D, cross-sectional residual-stress map. A part is cut in two using a precise and low-stress cutting technique such as electric discharge machining. The contours of the new surfaces created by the cut, which will not be flat if residual stresses are relaxed by the cutting, are then measured and used to calculate the original residual stresses. The precise nature of the assumption about the cut is presented theoretically and is evaluated experimentally. Simply assuming a flat cut is overly restrictive and misleading. The critical assumption is that the width of the cut, when measured in the original, undeformed configuration of the body is constant. Stresses at the cut tip during cutting cause the material to deform, which causes errors. The effect of such cutting errors on the measured stresses is presented. The important parameters are quantified. Experimental procedures for minimizing these errors are presented. An iterative finite element procedure to correct for the errors is also presented. The correction procedure is demonstrated on experimental data from a steel beam that was plastically bent to put in a known profile of residual stresses.

  2. The extended evolutionary synthesis: its structure, assumptions and predictions.

    Science.gov (United States)

    Laland, Kevin N; Uller, Tobias; Feldman, Marcus W; Sterelny, Kim; Müller, Gerd B; Moczek, Armin; Jablonka, Eva; Odling-Smee, John

    2015-08-22

    Scientific activities take place within the structured sets of ideas and assumptions that define a field and its practices. The conceptual framework of evolutionary biology emerged with the Modern Synthesis in the early twentieth century and has since expanded into a highly successful research program to explore the processes of diversification and adaptation. Nonetheless, the ability of that framework satisfactorily to accommodate the rapid advances in developmental biology, genomics and ecology has been questioned. We review some of these arguments, focusing on literatures (evo-devo, developmental plasticity, inclusive inheritance and niche construction) whose implications for evolution can be interpreted in two ways—one that preserves the internal structure of contemporary evolutionary theory and one that points towards an alternative conceptual framework. The latter, which we label the 'extended evolutionary synthesis' (EES), retains the fundaments of evolutionary theory, but differs in its emphasis on the role of constructive processes in development and evolution, and reciprocal portrayals of causation. In the EES, developmental processes, operating through developmental bias, inclusive inheritance and niche construction, share responsibility for the direction and rate of evolution, the origin of character variation and organism-environment complementarity. We spell out the structure, core assumptions and novel predictions of the EES, and show how it can be deployed to stimulate and advance research in those fields that study or use evolutionary biology. © 2015 The Author(s).

  3. The extended evolutionary synthesis: its structure, assumptions and predictions

    Science.gov (United States)

    Laland, Kevin N.; Uller, Tobias; Feldman, Marcus W.; Sterelny, Kim; Müller, Gerd B.; Moczek, Armin; Jablonka, Eva; Odling-Smee, John

    2015-01-01

    Scientific activities take place within the structured sets of ideas and assumptions that define a field and its practices. The conceptual framework of evolutionary biology emerged with the Modern Synthesis in the early twentieth century and has since expanded into a highly successful research program to explore the processes of diversification and adaptation. Nonetheless, the ability of that framework satisfactorily to accommodate the rapid advances in developmental biology, genomics and ecology has been questioned. We review some of these arguments, focusing on literatures (evo-devo, developmental plasticity, inclusive inheritance and niche construction) whose implications for evolution can be interpreted in two ways—one that preserves the internal structure of contemporary evolutionary theory and one that points towards an alternative conceptual framework. The latter, which we label the ‘extended evolutionary synthesis' (EES), retains the fundaments of evolutionary theory, but differs in its emphasis on the role of constructive processes in development and evolution, and reciprocal portrayals of causation. In the EES, developmental processes, operating through developmental bias, inclusive inheritance and niche construction, share responsibility for the direction and rate of evolution, the origin of character variation and organism–environment complementarity. We spell out the structure, core assumptions and novel predictions of the EES, and show how it can be deployed to stimulate and advance research in those fields that study or use evolutionary biology. PMID:26246559

  4. Economic Growth Assumptions in Climate and Energy Policy

    Directory of Open Access Journals (Sweden)

    Nir Y. Krakauer

    2014-03-01

    Full Text Available The assumption that the economic growth seen in recent decades will continue has dominated the discussion of future greenhouse gas emissions and the mitigation of and adaptation to climate change. Given that long-term economic growth is uncertain, the impacts of a wide range of growth trajectories should be considered. In particular, slower economic growth would imply that future generations will be relatively less able to invest in emissions controls or adapt to the detrimental impacts of climate change. Taking into consideration the possibility of economic slowdown therefore heightens the urgency of reducing greenhouse gas emissions now by moving to renewable energy sources, even if this incurs short-term economic cost. I quantify this counterintuitive impact of economic growth assumptions on present-day policy decisions in a simple global economy-climate model (Dynamic Integrated model of Climate and the Economy (DICE. In DICE, slow future growth increases the economically optimal present-day carbon tax rate and the utility of taxing carbon emissions, although the magnitude of the increase is sensitive to model parameters, including the rate of social time preference and the elasticity of the marginal utility of consumption. Future scenario development should specifically include low-growth scenarios, and the possibility of low-growth economic trajectories should be taken into account in climate policy analyses.

  5. Halo-Independent Direct Detection Analyses Without Mass Assumptions

    CERN Document Server

    Anderson, Adam J.; Kahn, Yonatan; McCullough, Matthew

    2015-10-06

    Results from direct detection experiments are typically interpreted by employing an assumption about the dark matter velocity distribution, with results presented in the $m_\\chi-\\sigma_n$ plane. Recently methods which are independent of the DM halo velocity distribution have been developed which present results in the $v_{min}-\\tilde{g}$ plane, but these in turn require an assumption on the dark matter mass. Here we present an extension of these halo-independent methods for dark matter direct detection which does not require a fiducial choice of the dark matter mass. With a change of variables from $v_{min}$ to nuclear recoil momentum ($p_R$), the full halo-independent content of an experimental result for any dark matter mass can be condensed into a single plot as a function of a new halo integral variable, which we call $\\tilde{h}(p_R)$. The entire family of conventional halo-independent $\\tilde{g}(v_{min})$ plots for all DM masses are directly found from the single $\\tilde{h}(p_R)$ plot through a simple re...

  6. 7 CFR 1744.63 - The telephone loan budget.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false The telephone loan budget. 1744.63 Section 1744.63... Disbursement of Funds § 1744.63 The telephone loan budget. When the loan is made, RUS provides the borrower a Telephone Loan Budget, RUS Form 493. This budget divides the loan into budget accounts such as “Engineering...

  7. Budget Gamesmanship | Odia | Journal of Research in National ...

    African Journals Online (AJOL)

    ... slacks and budget gamesmanship. It could also arise due to conflicts between top management quest for control and lower-level management demand for flexibility, unclear objective setting process, market uncertainty, managers' drive to achieve target . Keywords: Budget, budget games, budgeting, budget participation ...

  8. Decentralized Budgeting: Getting the Most Out of Disbursements of Funds.

    Science.gov (United States)

    Jefferson, Anne L.

    1995-01-01

    Decentralizing educational budgets allows the disbursement of funds aimed at maximizing student development. Three strategies for decentralizing budgets are program budgeting, which eliminates line-item budgeting and allows administrators to address questions regarding the relative value of educational programs; zero-based budgeting, which allows…

  9. Accuracy of Atmospheric Energy Budgets from Analyses.

    Science.gov (United States)

    Trenberth, Kevin E.; Stepaniak, David P.; Caron, Julie M.

    2002-12-01

    Issues relevant to achieving an accuracy of better than 10 W m2 on 250-km scales for monthly means in the atmospheric energy balance are explored from the standpoint of the formulation and computational procedures using the National Centers for Environmental Prediction-National Center for Atmospheric Research (NCEP-NCAR, hereafter referred to as NCEP) and the European Centre for Medium-Range Weather Forecasts (ECMWF) reanalyses. The focus is on the vertically integrated energy components, their monthly tendencies, transports, and divergences, using the most accurate computations in model and pressure coordinates. Approximate equations have often been used previously; although relatively small compared with the moist static energy, kinetic energy transports should be taken into account, as divergences can exceed several tens of watts per square meter. Changes in energy storage terms over a month are not negligible, as they are typically over 25 W m2 in storm track regions. Transports of energy are meaningful only if the mass budget is closed.Typical magnitudes of the divergence of sensible heat and potential energy are very large (several hundred watts per square meter), but partly cancel when combined as dry static energy, reflecting the role of isentropic flow. The latent energy and sensible heat contributions are strongly positively correlated because of the dominance of low-level flow, and the latent energy divergence also cancels a large component of the dry static energy divergence, leaving a modest residual. This arises from the dominance of moist adiabatic processes in the Tropics and subtropics as the net divergent transports depend on temperature departures in the vertical from the saturated adiabatic lapse rate and their covariability with wind. Careful numerical treatments are required or else small errors in the large terms that should cancel can be amplified. Common assumptions that diagnostics can be computed on model terrain-following coordinates

  10. Centre for Budget and Governance Accountability

    International Development Research Centre (IDRC) Digital Library (Canada)

    This funding will enhance the Centre for Budget and Governance Accountability's (CBGA) role as a credible public policy institution in India by strengthening its ability to provide high-quality, influential, and policy-relevant research. About the Centre for Budget and Governance Accountability CBGA is an independent ...

  11. Gender Responsive Community Based Planning and Budgeting ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Gender Responsive Community Based Planning and Budgeting Tool for Local Governance. During the early 1990s, IDRC supported the development and testing of a reliable and cost-efficient tool for monitoring poverty and facilitating local level budgeting: the community-based (poverty) monitoring system (CBMS).

  12. CAUT Analysis of Federal Budget 2013

    Science.gov (United States)

    Canadian Association of University Teachers, 2013

    2013-01-01

    The 2013 federal Budget was delivered ironically the same day as the Parliamentary Budget Officer was in court seeking more information about the impact of the government's $5.2 billion in spending cuts announced last year. The lack of budgetary transparency and accountability has become a hallmark of the Conservative government. Anyone expecting…

  13. Women and gender budgeting: Nigeria's policy alternative ...

    African Journals Online (AJOL)

    This work contributes to the policy debate on women empowerment through gender budgeting and equally exposes the inherent negative impacts of the current budgeting system, and how it could help facilitate gender equity and open up economic opportunities for women. Gender inequalities thrive in all societies but are ...

  14. Zero Based Budgeting for Voc Ed

    Science.gov (United States)

    Chuang, Ying C.

    1977-01-01

    To help vocational education budget planners take a good look each year at where they are going, what they are trying to accomplish, and where to put their money, this article describes the 12 steps in a model commonly used for zero based budgeting. (Author/HD)

  15. CAUT Analysis of Federal Budget 2012

    Science.gov (United States)

    Canadian Association of University Teachers, 2012

    2012-01-01

    The 2012 federal Budget marks the beginning of a painful and unnecessary fiscal retrenchment. Despite boasting one of the lowest debt-to-GDP ratios amongst industrialized countries, the Conservative government is pressing ahead with deep cuts of more than $5 billion across departmental budgets by 2014-15. For post-secondary education and research,…

  16. Financial Advisor - Budget and Financial Management | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Job Summary As the most senior budget team member, the Financial Advisor assumes key responsibilities in the preparation of the annual program of work and budget of the Centre (xx cost centres totalling expending some $190 M in 2007-2008). The Financial Advisor also maintains and refines as needed financial ...

  17. Zero Base Budgeting Method Applied at Education Expenditures of Cluj-Napoca Budget

    Directory of Open Access Journals (Sweden)

    Paul ZAI

    2006-10-01

    Full Text Available This study is trying to propose alternative methods for budget elaboration, in order to be able to forcast the budget. For presenting the practical part of ZBB (Zero Base Budgeting, we have decided to apply ZBB method for forecasting Cluj-Napoca budget - Chapter Education. To estimate the values of the principal expenditures we will study the data from a budgetary centre, and a tertiary unit. The accuracy of our predictions is trying to underline the necessity of using modern methods for budget elaboration.

  18. Political Budget Cycles in the European Union

    Directory of Open Access Journals (Sweden)

    Jiří Gregor

    2016-01-01

    Full Text Available This paper provides research on the theme of the political budget cycles. The goal is to find out whether or not the government tries to manipulate the state budget and its components for the purpose of re-election across the countries of the European Union. In order to verify this theory a dynamic panel data model was used. The results were significant, but only if predetermined elections were not counted into the estimations. In that case, the theory of the political budget cycles could be accepted as valid for the EU countries. The main driving force of the political budget cycles across the countries of the European Union is fluctuation of the government expenditures. During the election year, the government expenditures are higher, and a year after the election, government expenditures are lower. This is reflected into the state budget balance.

  19. BUDGET AMENDMENT – CAUSE AND EFFECT

    Directory of Open Access Journals (Sweden)

    ROXANA ISPAS

    2014-10-01

    Full Text Available This paper analyzes both the causes and effects of budget amendment in Romania, taking into account the Fiscal Budget Responsibility Law. Reduction by 5% of the CSI payable by the employer from the 1st of October 2014 should be necessarily accompanied by a reform of the social security system, starting from the principle of equal treatment of taxpayers irrespective of their type of income and the elaboration and implementation of a medium-term strategy for financially rebalancing the social security budgets, especially the pensions' budget. Such a strategy should aim to increase the number of taxpayers, in particular by reducing "black" labor, and ensure a total transparency of budget expenditures as a whole in order to stimulate the growth of voluntary compliance to payment of taxes.

  20. How to combine sparse proxy data and coupled climate models

    Science.gov (United States)

    Paul, André; Schäfer-Neth, Christian

    2005-04-01

    We address the problem of reconstructing a global field from proxy data with sparse spatial sampling such as the MARGO (multi-proxy approach for the reconstruction of the glacial ocean surface) SST (sea-surface temperature) and δ18O c (oxygen-18/oxygen-16 isotope ratio preserved in fossil carbonate shells of planktic foraminifera) data. To this end, we propose to `assimilate' these data into coupled climate models by adjusting some of their parameters and optimizing the fit. In particular, we suggest to combine a forward model and an objective function that quantifies the misfit to the data. Because of their computational efficiency, earth system models of intermediate complexity are particularly well-suited for this purpose. We used one such model (the University of Victoria Earth System Climate Model) and carried out a series of sensitivity experiments by varying a single model parameter through changing the atmospheric CO2 concentration. The unanalyzed World Ocean Atlas SST and the observed sea-ice concentration served as present-day targets. The sparse data coverage as implied by the locations of 756 ocean sediment cores from the MARGO SST database was indeed sufficient to determine the best fit. As anticipated, it turned out to be the 365 ppm experiment. We also found that the 200 ppm experiment came surprisingly close to what is commonly expected for the Last Glacial Maximum ocean circulation. Our strategy has a number of advantages over more traditional mapping methods, e.g., there is no need to force the results of different proxies into a single map, because they can be compared to the model output one at a time, properly taking into account the different seasons of plankton growth or varying depth habitats. It can be extended to more model parameters and even be automated.

  1. Patient-rated versus proxy-rated cognitive and functional measures in older adults

    Science.gov (United States)

    Howland, Molly; Allan, Kevin C; Carlton, Caitlin E; Tatsuoka, Curtis; Smyth, Kathleen A; Sajatovic, Martha

    2017-01-01

    Objectives Patients with cognitive impairment may have difficulty reporting their functional and cognitive abilities, which are important clinical outcomes. Health care proxies may be able to corroborate patient self-reports. Several studies reported discrepancy between patient and proxy ratings, though the literature is sparse on changes over time of these ratings. Our goals in this 12-month study were to compare patient and proxy reports on functioning, cognition, and everyday executive function, and to further elucidate correlates of patient–proxy discrepancy. Methods This was a prospective cohort study of individuals older than 70 years who ranged from having no cognitive impairment to having moderate dementia who had a proxy available to complete instruments at baseline (N=76). Measurements included Alzheimer’s Disease Cooperative Study–Activities of Daily Living Inventory (ADCS-ADLI), Neuro-QOL Executive Function, PROMIS Applied Cognition (PROMIS-Cog), Mini-Mental State Examination (MMSE), and Geriatric Depression Scale. Results Patient- and proxy-rated ADCS-ADLI were correlated at baseline and at 1-year follow-up. Patient and proxy ratings were discrepant on Neuro-QOL Executive Function and PROMIS-Cog. Greater patient–proxy discrepancy on PROMIS-Cog was associated with younger age and less depression, and greater patient–proxy discrepancy on Neuro-QOL Executive Function was associated with less depression and worse cognitive impairment. Patient–proxy discrepancy increased over time for everyday executive function. Changes in proxy-rated but not patient-rated ADCS-ADLI correlated with MMSE changes. Conclusion Patients and proxies generally agree in reporting on activities of daily living. Patient and proxy reports differ in their respective evaluation of cognitive functioning and everyday executive function. Ratings from both sources may be preferred for these two domains, though studies using gold standard measures are necessary. It is important

  2. Tycho 2: A Proxy Application for Kinetic Transport Sweeps

    Energy Technology Data Exchange (ETDEWEB)

    Garrett, Charles Kristopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Computer, Computational, and Statistical Sciences Division; Warsa, James S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States). Computer, Computational, and Statistical Sciences Division

    2016-09-14

    Tycho 2 is a proxy application that implements discrete ordinates (SN) kinetic transport sweeps on unstructured, 3D, tetrahedral meshes. It has been designed to be small and require minimal dependencies to make collaboration and experimentation as easy as possible. Tycho 2 has been released as open source software. The software is currently in a beta release with plans for a stable release (version 1.0) before the end of the year. The code is parallelized via MPI across spatial cells and OpenMP across angles. Currently, several parallelization algorithms are implemented.

  3. Nursing interventions in Münchausen syndrome by proxy.

    Science.gov (United States)

    Volz, A G

    1995-09-01

    1. Münchausen syndrome by proxy is a rare but serious and potentially lethal form of child abuse in which a primary care giver induces or reports factitious symptoms in a child. 2. The child suffers from the caregiver's actions and health care providers unknowingly become accomplices when they provide unnecessary testing and therapies. 3. The child's physical and psychological welfare can be protected through the efforts of the forensic nurse specialist coordinating a multidisciplinary health care team's work to detect the syndrome and intervene early on.

  4. Compliance with treatment in asthma and Munchausen syndrome by proxy.

    Science.gov (United States)

    Godding, V; Kruth, M

    1991-01-01

    Among 1648 asthmatic patients, 17 families (1%) were identified as having Munchausen syndrome by proxy. Ten families did not treat their children's, attacks or refused medical care, and seven exaggerated the severity of symptoms to obtain invasive investigations and treatment. All the families had disturbed psychosocial backgrounds. The abuse consisted mainly of neglect, in that necessary treatment was not given. In some cases a more direct form of abuse was observed, when useless and sometimes harmful investigations and treatment were given. We conclude that medical control of the compliance of both parents and children is necessary in the management of childhood asthma. PMID:1929492

  5. Investigating genetic loci that encode plant-derived paleoclimate proxies

    Science.gov (United States)

    Bender, A. L. D.; Suess, M.; Chitwood, D. H.; Bradley, A. S.

    2016-12-01

    Long chain (>C25) n-alkanes in sediments predominantly derive from terrestrial plant waxes. Hydrogen isotope ratios (δD) of leaf wax hydrocarbons correlate with δDH2O of precipitation and are commonly used as paleoclimate proxies. However, biological variability in the isotopic fractionations between water and plant materials also affects the n-alkane δD values. Correct interpretation of this paleoclimate proxy requires that we resolve genetic and environmental effects. Genetic variability underlying differences in leaf wax structure and isotopic composition can be quantitatively determined through the use of model organisms. Interfertile Solanum sect. Lycopersicon (tomato) species provide an ideal model species complex for this approach. We used a set of 76 precisely defined near-isogenic lines (introgression lines [ILs]) in which small genomic regions from the wild tomato relative Solanum pennellii have been introduced into the genome of the domestic tomato, S. lycopersicum. By characterizing quantitative traits of these ILs (leaf wax structure and isotopic composition), we can resolve the degree to which each trait is regulated by genetic versus environmental factors. We present data from two growth experiments conducted with all 76 ILs. In this study, we quantify leaf wax traits, including δD values, δ13C values, and structural metrics including the methylation index (a variable that describes the ratio of iso­- and anteiso- to n-alkanes). Among ILs, δD values vary by up to 35‰ and 60‰ for C31 and C33 n-alkanes, respectively. Many ILs have methylation indices that are discernably different from the parent domesticated tomato (p < 0.001), which suggests that methylation is a highly polygenic trait. This pattern is similar to the genetics that control leaf shape, another trait commonly used as a paleoclimate proxy. Based on our preliminary analysis, we propose candidate genes that control aspects of plant physiology that affect these quantitative

  6. Experimental assessment of unvalidated assumptions in classical plasticity theory.

    Energy Technology Data Exchange (ETDEWEB)

    Brannon, Rebecca Moss (University of Utah, Salt Lake City, UT); Burghardt, Jeffrey A. (University of Utah, Salt Lake City, UT); Bauer, Stephen J.; Bronowski, David R.

    2009-01-01

    This report investigates the validity of several key assumptions in classical plasticity theory regarding material response to changes in the loading direction. Three metals, two rock types, and one ceramic were subjected to non-standard loading directions, and the resulting strain response increments were displayed in Gudehus diagrams to illustrate the approximation error of classical plasticity theories. A rigorous mathematical framework for fitting classical theories to the data, thus quantifying the error, is provided. Further data analysis techniques are presented that allow testing for the effect of changes in loading direction without having to use a new sample and for inferring the yield normal and flow directions without having to measure the yield surface. Though the data are inconclusive, there is indication that classical, incrementally linear, plasticity theory may be inadequate over a certain range of loading directions. This range of loading directions also coincides with loading directions that are known to produce a physically inadmissible instability for any nonassociative plasticity model.

  7. Assumptions of Customer Knowledge Enablement in the Open Innovation Process

    Directory of Open Access Journals (Sweden)

    Jokubauskienė Raminta

    2017-08-01

    Full Text Available In the scientific literature, open innovation is one of the most effective means to innovate and gain a competitive advantage. In practice, there is a variety of open innovation activities, but, nevertheless, customers stand as the cornerstone in this area, since the customers’ knowledge is one of the most important sources of new knowledge and ideas. Evaluating the context where are the interactions of open innovation and customer knowledge enablement, it is necessary to take into account the importance of customer knowledge management. Increasingly it is highlighted that customers’ knowledge management facilitates the creation of innovations. However, it should be an examination of other factors that influence the open innovation, and, at the same time, customers’ knowledge management. This article presents a theoretical model, which reveals the assumptions of open innovation process and the impact on the firm’s performance.

  8. Analysis of assumptions of recent tests of local realism

    Science.gov (United States)

    Bednorz, Adam

    2017-04-01

    Local realism in recent experiments is excluded on condition of freedom or randomness of choice combined with no signaling between observers by implementations of simple quantum models. Both no signaling and the underlying quantum model can be directly checked by analysis of experimental data. For particular tests performed on the data, it is shown that two of these experiments give the probability of the data under no-signaling (or choice independence in one of them) hypothesis at the level of 5%, accounting for the look-elsewhere effect, moderately suggesting that no signaling is violated with 95% confidence. On the other hand, the data from the two other experiments violate the assumption of the simple quantum model. Further experiments are necessary to clarify these issues and freedom and randomness of choice.

  9. Commentary: profiling by appearance and assumption: beyond race and ethnicity.

    Science.gov (United States)

    Sapién, Robert E

    2010-04-01

    In this issue, Acquaviva and Mintz highlight issues regarding racial profiling in medicine and how it is perpetuated through medical education: Physicians are taught to make subjective determinations of race and/or ethnicity in case presentations, and such assumptions may affect patient care. The author of this commentary believes that the discussion should be broadened to include profiling on the basis of general appearance. The author reports personal experiences as someone who has profiled and been profiled by appearance-sometimes by skin color, sometimes by other physical attributes. In the two cases detailed here, patient care could have been affected had the author not become aware of his practices in such situations. The author advocates raising awareness of profiling in the broader sense through training.

  10. Ancestral assumptions and the clinical uncertainty of evolutionary medicine.

    Science.gov (United States)

    Cournoyea, Michael

    2013-01-01

    Evolutionary medicine is an emerging field of medical studies that uses evolutionary theory to explain the ultimate causes of health and disease. Educational tools, online courses, and medical school modules are being developed to help clinicians and students reconceptualize health and illness in light of our evolutionary past. Yet clinical guidelines based on our ancient life histories are epistemically weak, relying on the controversial assumptions of adaptationism and advocating a strictly biophysical account of health. To fulfill the interventionist goals of clinical practice, it seems that proximate explanations are all we need to develop successful diagnostic and therapeutic guidelines. Considering these epistemic concerns, this article argues that the clinical relevance of evolutionary medicine remains uncertain at best.

  11. Cost and Performance Assumptions for Modeling Electricity Generation Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Tidball, R.; Bluestein, J.; Rodriguez, N.; Knoke, S.

    2010-11-01

    The goal of this project was to compare and contrast utility scale power plant characteristics used in data sets that support energy market models. Characteristics include both technology cost and technology performance projections to the year 2050. Cost parameters include installed capital costs and operation and maintenance (O&M) costs. Performance parameters include plant size, heat rate, capacity factor or availability factor, and plant lifetime. Conventional, renewable, and emerging electricity generating technologies were considered. Six data sets, each associated with a different model, were selected. Two of the data sets represent modeled results, not direct model inputs. These two data sets include cost and performance improvements that result from increased deployment as well as resulting capacity factors estimated from particular model runs; other data sets represent model input data. For the technologies contained in each data set, the levelized cost of energy (LCOE) was also evaluated, according to published cost, performance, and fuel assumptions.

  12. Elements and elasmobranchs: hypotheses, assumptions and limitations of elemental analysis.

    Science.gov (United States)

    McMillan, M N; Izzo, C; Wade, B; Gillanders, B M

    2017-02-01

    Quantifying the elemental composition of elasmobranch calcified cartilage (hard parts) has the potential to answer a range of ecological and biological questions, at both the individual and population level. Few studies, however, have employed elemental analyses of elasmobranch hard parts. This paper provides an overview of the range of applications of elemental analysis in elasmobranchs, discussing the assumptions and potential limitations in cartilaginous fishes. It also reviews the available information on biotic and abiotic factors influencing patterns of elemental incorporation into hard parts of elasmobranchs and provides some comparative elemental assays and mapping in an attempt to fill knowledge gaps. Directions for future experimental research are highlighted to better understand fundamental elemental dynamics in elasmobranch hard parts. © 2016 The Fisheries Society of the British Isles.

  13. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-02-14

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model.

  14. New media in strategy – mapping assumptions in the field

    DEFF Research Database (Denmark)

    Gulbrandsen, Ib Tunby; Plesner, Ursula; Raviola, Elena

    2018-01-01

    themselves in either a deterministic or at volontaristic camp with regards to technology. Strategy is portrayed as either determined by new media or a matter of rationally using them. Additionally, most articles portray the organization nicely delineated entity, where new media are relevant either...... to new media. By contrast, there is relatively little attention to the assumptions behind strategic thinking in relation to new media. This article reviews the most influential strategy journals, asking how new media are conceptualized. It is shown that strategy scholars have a tendency to place......There is plenty of empirical evidence for claiming that new media make a difference for how strategy is conceived and executed. Furthermore, there is a rapidly growing body of literature that engages with this theme, and offers recommendations regarding the appropriate strategic actions in relation...

  15. Elasticity reconstruction: Beyond the assumption of local homogeneity

    Science.gov (United States)

    Sinkus, Ralph; Daire, Jean-Luc; Van Beers, Bernard E.; Vilgrain, Valerie

    2010-07-01

    Elasticity imaging is a novel domain which is currently gaining significant interest in the medical field. Most inversion techniques are based on the homogeneity assumption, i.e. the local spatial derivatives of the complex-shear modulus are ignored. This analysis presents an analytic approach in order to overcome this limitation, i.e. first order spatial derivatives of the real-part of the complex-shear modulus are taken into account. Resulting distributions in a gauged breast lesion phantom agree very well with the theoretical expectations. An in-vivo example of a cholangiocarcinoma demonstrates that the new approach provides maps of the viscoelastic properties which agree much better with expectations from anatomy.

  16. Breakdown of Hydrostatic Assumption in Tidal Channel with Scour Holes

    Directory of Open Access Journals (Sweden)

    Chunyan Li

    2016-10-01

    Full Text Available Hydrostatic condition is a common assumption in tidal and subtidal motions in oceans and estuaries.. Theories with this assumption have been largely successful. However, there is no definite criteria separating the hydrostatic from the non-hydrostatic regimes in real applications because real problems often times have multiple scales. With increased refinement of high resolution numerical models encompassing smaller and smaller spatial scales, the need for non-hydrostatic models is increasing. To evaluate the vertical motion over bathymetric changes in tidal channels and assess the validity of the hydrostatic approximation, we conducted observations using a vessel-based acoustic Doppler current profiler (ADCP. Observations were made along a straight channel 18 times over two scour holes of 25 m deep, separated by 330 m, in and out of an otherwise flat 8 m deep tidal pass leading to the Lake Pontchartrain over a time period of 8 hours covering part of the diurnal tidal cycle. Out of the 18 passages over the scour holes, 11 of them showed strong upwelling and downwelling which resulted in the breakdown of hydrostatic condition. The maximum observed vertical velocity was ~ 0.35 m/s, a high value in a tidal channel, and the estimated vertical acceleration reached a high value of 1.76×10-2 m/s2. Analysis demonstrated that the barotropic non-hydrostatic acceleration was dominant. The cause of the non-hydrostatic flow was the that over steep slopes. This demonstrates that in such a system, the bathymetric variation can lead to the breakdown of hydrostatic conditions. Models with hydrostatic restrictions will not be able to correctly capture the dynamics in such a system with significant bathymetric variations particularly during strong tidal currents.

  17. The Budget and Economic Outlook: Fiscal Years 2006 to 2015

    National Research Council Canada - National Science Library

    Holland, Jeffrey; Blom, Barry; Arnold, Robert; Trimarco, Gerard; Booth, Mark; Hays, Ellen; Russek, Frank; Brauer, David; Futrell, Ann; Smith, Jennifer

    2005-01-01

    .... It satisfies the requirement of section 202(e) of the Congressional Budget Act of 1974 for CBO to submit to the Committees on the Budget periodic reports about fiscal policy and to provide baseline projections of the federal budget...

  18. Fiscal Year 2003 Budget of the U.S. Government

    National Research Council Canada - National Science Library

    2002-01-01

    Budget of the United States Government, Fiscal Year 2003 contains the Budget Message of the President and information on the President's budget and management priorities, including assesments of agencies performance...

  19. STRATEGIC PLANNING AND PROGRAM BUDGETING IN ROMANIA – RECENT DEVELOPMENTS

    Directory of Open Access Journals (Sweden)

    D#259;nule#539;iu Dan-Constantin

    2009-05-01

    Full Text Available The paper emphasizes the efforts of Romanian authorities to implement program budgeting. Based on the first results, authorities decided to establish a link between strategic planning and budgeting, as a condition for implementing multi-annual budgeting.

  20. Perspectives on geochemical proxies: The impact of model and parameter selection on the quantification of carbonate recrystallization rates

    Science.gov (United States)

    Huber, Christian; Druhan, Jennifer L.; Fantle, Matthew S.

    2017-11-01

    Diagenetic reactions in marine sediments, such as the recrystallization of carbonates, can impact the accuracy of paleo-environmental and paleo-climatic reconstructions by geochemical proxies. The extent to which the recrystallization of carbonates affects the chemistry of sedimentary archives depends on the reaction rate, extent of isotopic disequilibrium, and duration of reaction. The reaction rate, which is obviously critical, can be constrained by the elemental and isotopic compositions of pore fluids. Such constraints are affected by assumptions regarding the temperature in the sedimentary column relative to the temperature of formation, the burial rate, pore fluid advection, the composition of the sediments (carbonate-rich versus siliciclastic), and the porosity of the sediment column. In this study, we use a steady-state analytical solution to the diagenetic equations to constrain depth-dependent reaction rates (and extents of recrystallization) based on the Ca isotopic compositions of pore fluids in sedimentary columns at multiple ocean drilling sites (Sites 807, 984, 1170, and 1171), which encompass a diverse range of sedimentary compositions and conditions. We find that carbonates in siliciclastic sediments are generally less altered by diagenesis than their carbonate-rich counterparts. The discrepancy in recrystallization rates between siliciclastic and carbonate-rich sedimentary sections is, however, significantly smaller than previously estimated, suggesting that siliciclastic archives are not immune to diagenetic effects. While we find that diagenesis can decouple contemporaneous proxies of sea surface temperature (Mg/Ca and δ18O), our calculations also reveal that δ18O-based temperature estimates are more robust in siliciclastic sections relative to carbonate-rich sections. Sensitivity tests of the calculated extent of recrystallization suggest that uncertainties in porosity and burial rate are generally the greatest sources of error to proxy

  1. Comfort with proxy consent to research involving decisionally impaired older adults: do type of proxy and risk-benefit profile matter?

    Science.gov (United States)

    Dubois, Marie-France; Bravo, Gina; Graham, Janice; Wildeman, Sheila; Cohen, Carole; Painter, Karen; Bellemare, Suzanne

    2011-11-01

    Dementia research often requires the participation of people with dementia. Obtaining informed consent is problematic when potential participants lack the capacity to provide it. We investigated comfort with proxy consent to research involving older adults deemed incapable of this decision, and examined if comfort varies with the type of proxy and the study's risk-benefit profile. We surveyed random samples of five relevant groups (older adults, informal caregivers, physicians, researchers in aging, and Research Ethics Board members) from four Canadian provinces. Respondents were presented with scenarios involving four types of proxies (non-assigned, designated in a healthcare advance directive with or without instructions specific to research participation, and court-appointed). Given a series of risk-benefit profiles, respondents indicated whether they were comfortable with proxy consent to research for each scenario. Two percent of the respondents felt proxy consent should never be allowed. In all groups, comfort depended far more on the risk-benefit profile associated with the research scenario than with type of proxy. For research involving little or no risk and potential personal benefits, over 90% of the respondents felt comfortable with substitute consent by a designated or court-appointed proxy while 80% were at ease with a non-assigned proxy. For studies involving serious risks with potentially greater personal benefits, older adults and informal caregivers were less comfortable with proxy consent. A large majority of Canadians are comfortable with proxy consent for low-risk research. Further work is needed to establish what kinds of research are considered to be low risk.

  2. On the uncertainties associated with using gridded rainfall data as a proxy for observed

    Directory of Open Access Journals (Sweden)

    C. R. Tozer

    2012-05-01

    Full Text Available Gridded rainfall datasets are used in many hydrological and climatological studies, in Australia and elsewhere, including for hydroclimatic forecasting, climate attribution studies and climate model performance assessments. The attraction of the spatial coverage provided by gridded data is clear, particularly in Australia where the spatial and temporal resolution of the rainfall gauge network is sparse. However, the question that must be asked is whether it is suitable to use gridded data as a proxy for observed point data, given that gridded data is inherently "smoothed" and may not necessarily capture the temporal and spatial variability of Australian rainfall which leads to hydroclimatic extremes (i.e. droughts, floods. This study investigates this question through a statistical analysis of three monthly gridded Australian rainfall datasets – the Bureau of Meteorology (BOM dataset, the Australian Water Availability Project (AWAP and the SILO dataset. The results of the monthly, seasonal and annual comparisons show that not only are the three gridded datasets different relative to each other, there are also marked differences between the gridded rainfall data and the rainfall observed at gauges within the corresponding grids – particularly for extremely wet or extremely dry conditions. Also important is that the differences observed appear to be non-systematic. To demonstrate the hydrological implications of using gridded data as a proxy for gauged data, a rainfall-runoff model is applied to one catchment in South Australia initially using gauged data as the source of rainfall input and then gridded rainfall data. The results indicate a markedly different runoff response associated with each of the different sources of rainfall data. It should be noted that this study does not seek to identify which gridded dataset is the "best" for Australia, as each gridded data source has its pros and cons, as does gauged data. Rather, the intention is

  3. Thermodynamic Proxies to Compensate for Biases in Drug Discovery Methods.

    Science.gov (United States)

    Ekins, Sean; Litterman, Nadia K; Lipinski, Christopher A; Bunin, Barry A

    2016-01-01

    We propose a framework with simple proxies to dissect the relative energy contributions responsible for standard drug discovery binding activity. We explore a rule of thumb using hydrogen-bond donors, hydrogen-bond acceptors and rotatable bonds as relative proxies for the thermodynamic terms. We apply this methodology to several datasets (e.g., multiple small molecules profiled against kinases, Mycobacterium tuberculosis (Mtb) high throughput screening (HTS) and structure based drug design (SBDD) derived compounds, and FDA approved drugs). We found that Mtb active compounds developed through SBDD methods had statistically significantly larger PEnthalpy values than HTS derived compounds, suggesting these compounds had relatively more hydrogen bond donor and hydrogen bond acceptors compared to rotatable bonds. In recent FDA approved medicines we found that compounds identified via target-based approaches had a more balanced enthalpic relationship between these descriptors compared to compounds identified via phenotypic screens As it is common to experimentally optimize directly for total binding energy, these computational methods provide alternative calculations and approaches useful for compound optimization alongside other common metrics in available software and databases.

  4. Simulation of Wake Vortex Radiometric Detection via Jet Exhaust Proxy

    Science.gov (United States)

    Daniels, Taumi S.

    2015-01-01

    This paper describes an analysis of the potential of an airborne hyperspectral imaging IR instrument to infer wake vortices via turbine jet exhaust as a proxy. The goal was to determine the requirements for an imaging spectrometer or radiometer to effectively detect the exhaust plume, and by inference, the location of the wake vortices. The effort examines the gas spectroscopy of the various major constituents of turbine jet exhaust and their contributions to the modeled detectable radiance. Initially, a theoretical analysis of wake vortex proxy detection by thermal radiation was realized in a series of simulations. The first stage used the SLAB plume model to simulate turbine jet exhaust plume characteristics, including exhaust gas transport dynamics and concentrations. The second stage used these plume characteristics as input to the Line By Line Radiative Transfer Model (LBLRTM) to simulate responses from both an imaging IR hyperspectral spectrometer or radiometer. These numerical simulations generated thermal imagery that was compared with previously reported wake vortex temperature data. This research is a continuation of an effort to specify the requirements for an imaging IR spectrometer or radiometer to make wake vortex measurements. Results of the two-stage simulation will be reported, including instrument specifications for wake vortex thermal detection. These results will be compared with previously reported results for IR imaging spectrometer performance.

  5. Solar spectral irradiance datasets: analysis and comparison with proxies

    Science.gov (United States)

    Kretzschmar, M.; Schoell, M.; Dudok de Wit, T.

    2013-12-01

    Solar spectral irradiance (SSI) measurements have been acquired in space since the late 1960's. These data are of extreme importance to assess the variability of the Sun in the last decades as well as to understand how its magnetic activity affects its radiative output, and therefore to constrain the solar variability further in time. However, these data sometimes disagree between themselves or with our expectations deduced from well known observed proxies, and it is hard to disentangle instrumental effects from possible solar behavior. In the context of the european project SOLID (First European comprehensive SOlar Irradiance Data Exploitation) project, which aims at building an SSI composite with time dependent error-bars over the space age, we will show our first results towards the construction of a carefully assessed homogeneous solar spectral irradiance datasets, focussing on the ultraviolet wavelength range, for which more data are available. We will first present the data used, together with methods for gap-filling and outlier removal. Then we will show some results obtained by comparing a single dataset at different times of the mission, as well as results obtained from the comparison of simultaneous datasets and proxies. Finally, we will discuss how these analyses can help us to estimate errors on the solar variability at a particular wavelength.

  6. Attribute-based proxy re-encryption with keyword search.

    Directory of Open Access Journals (Sweden)

    Yanfeng Shi

    Full Text Available Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy. In the present paper, we consider the keyword search problem further and introduce a novel notion called attribute-based proxy re-encryption with keyword search (ABRKS, which introduces a promising feature: In addition to supporting keyword search on encrypted data, it enables data owners to delegate the keyword search capability to some other data users complying with the specific access control policy. To be specific, ABRKS allows (i the data owner to outsource his encrypted data to the cloud and then ask the cloud to conduct keyword search on outsourced encrypted data with the given search token, and (ii the data owner to delegate other data users keyword search capability in the fine-grained access control manner through allowing the cloud to re-encrypted stored encrypted data with a re-encrypted data (embedding with some form of access control policy. We formalize the syntax and security definitions for ABRKS, and propose two concrete constructions for ABRKS: key-policy ABRKS and ciphertext-policy ABRKS. In the nutshell, our constructions can be treated as the integration of technologies in the fields of attribute-based cryptography and proxy re-encryption cryptography.

  7. Budget-makers and health care systems.

    Science.gov (United States)

    White, Joseph

    2013-10-01

    Health programs are shaped by the decisions made in budget processes, so how budget-makers view health programs is an important part of making health policy. Budgeting in any country involves its own policy community, with key players including budgeting professionals and political authorities. This article reviews the typical pressures on and attitudes of these actors when they address health policy choices. The worldview of budget professionals includes attitudes that are congenial to particular policy perspectives, such as the desire to select packages of programs that maximize population health. The pressures on political authorities, however, are very different: most importantly, public demand for health care services is stronger than for virtually any other government activity. The norms and procedures of budgeting also tend to discourage adoption of some of the more enthusiastically promoted health policy reforms. Therefore talk about rationalizing systems is not matched by action; and action is better explained by the need to minimize blame. The budget-maker's perspective provides insight about key controversies in healthcare policy such as decentralization, competition, health service systems as opposed to health insurance systems, and dedicated vs. general revenue finance. It also explains the frequency of various "gaming" behaviors. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  8. The Polish Budget Act for 2016: Legal Issues

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2016-06-01

    Full Text Available The article presents the legal content and system of the 2016 Budget Act and the legal significance of its regulations. The Budget Act for 2016 contains three parts: the state budget (general budget, complementary budgets, other legal provisions. The state revenues, expenditure, expenses, salaries, rates of some state levies are determined in the Budget Act. The regulations of the Budget Act relate to the financial activity of government and other parts of the state. The complex Budget Act contains provisions resulting from the many legal acts.

  9. Scientific and theoretical principles of personnel costs’ budgeting

    Directory of Open Access Journals (Sweden)

    O.P. Gutsal

    2015-06-01

    Full Text Available The object of this article is to determine the main purpose of company’s budgeting, to study its functions in terms of personnel management, to identify the main advantages and disadvantages of budgeting and to determine the stages of realization budgeting in the company. There have been considered the purpose and aim of budgeting. The main functions of budgeting, which include such ones as: planning, forecasting, information and analysis function, motivational, coordinative, control and involvement function have been identified (determined. In terms of defined functions of budgeting their essence in budgeting personnel costs has been outlined. The main advantages and disadvantages of budgeting have been found. There has been determined the implementing and realization company’s budgeting. The process of budgeting is realized according to the following consecutive stages: preparatory and analytical stage; definition of budget constraints; drafting up the budget; discussion and adjustment of budget indicators; adoption of budget; analysis and control of the budget. There also has been considered budget organization structure which includes budget committee, budget planning and analysis department, financial responsibility center.

  10. WFIRST: Coronagraph Systems Engineering and Performance Budgets

    Science.gov (United States)

    Poberezhskiy, Ilya; cady, eric; Frerking, Margaret A.; Kern, Brian; Nemati, Bijan; Noecker, Martin; Seo, Byoung-Joon; Zhao, Feng; Zhou, Hanying

    2018-01-01

    The WFIRST coronagraph instrument (CGI) will be the first in-space coronagraph using active wavefront control to directly image and characterize mature exoplanets and zodiacal disks in reflected starlight. For CGI systems engineering, including requirements development, CGI performance is predicted using a hierarchy of performance budgets to estimate various noise components — spatial and temporal flux variations — that obscure exoplanet signals in direct imaging and spectroscopy configurations. These performance budgets are validated through a robust integrated modeling and testbed model validation efforts.We present the performance budgeting framework used by WFIRST for the flow-down of coronagraph science requirements, mission constraints, and observatory interfaces to measurable instrument engineering parameters.

  11. THE BUDGET, AN INSTRUMENT FOR PLANNING

    Directory of Open Access Journals (Sweden)

    Calin Anca

    2010-12-01

    Full Text Available The budget is a management instrument used by any entity, financially ensuring the dimension of the objectives, revenues, expenses and results at the management centers level and finally evaluating the economic efficiency through comparing the results with those budgeted for. A major component of the managerial control, the effectiveness of the budgeting process is reflected in the fact that: requires the strategic planning and implementing the plans, offers a frame of reference for performance evaluation, contributes to personnel motivation, encourages the coordination and communication.

  12. Loyalty Card Promotional Activity in Budget Hotel

    OpenAIRE

    Teng, Fei

    2010-01-01

    Loyalty card is one of the most commonly used promotional activities in business. Thus far, there are some research has been done on luxury hotel, but very few researches are on budget hotel. So, the purpose of the thesis is finding out the Swedish customers’ attitude and behavior towards budget hotel’s loyalty card; getting to know what factors influence Swedish customers’ response towards the loyalty card and budget hotels. In the thesis, the main research problem is “How do Swedish custome...

  13. Measurement equivalence across child self-reports and parent-proxy reports in the Chinese version of the pediatric quality of life inventory version 4.0.

    Science.gov (United States)

    Lin, Chung-Ying; Luh, Wei-Ming; Cheng, Chung-Ping; Yang, Ai-Lun; Su, Chia-Ting; Ma, Hui-Ing

    2013-10-01

    An important assumption for comparing children's quality of life (QoL) between children's and parents' perceptions is that measurement equivalence/invariance (ME/I) exists. The ME/I across the child- and parent-reported Chinese PedsQL was examined, and the latent means between child self-reports and parent-proxy reports were compared. Third-grade to sixth-grade children (n = 519) and their parents (n = 270) respectively completed the child- and parent-reported PedsQL. Seventy-eight parents completed parent-proxy reports twice. Full ME/I across child and parent reports was found in first- and second-order factor loadings. Partial ME/I was supported in item intercepts and item residual variances. The latent means of child self-reports and of parent-proxy reports were not significantly different, which suggested interchangeability between child- and parent-reported PedsQL. The ME/I results support the use of PedsQL scores to compare children's and parents' perceptions of children's QoL.

  14. Associations of the MCM6-rs3754686 proxy for milk intake in Mediterranean and American populations with cardiovascular biomarkers, disease and mortality: Mendelian randomization

    Science.gov (United States)

    Smith, Caren E.; Coltell, Oscar; Sorlí, Jose V.; Estruch, Ramón; Martínez-González, Miguel Ángel; Salas-Salvadó, Jordi; Fitó, Montserrat; Arós, Fernando; Dashti, Hassan S.; Lai, Chao Q.; Miró, Leticia; Serra-Majem, Lluís; Gómez-Gracia, Enrique; Fiol, Miquel; Ros, Emilio; Aslibekyan, Stella; Hidalgo, Bertha; Neuhouser, Marian L.; Di, Chongzhi; Tucker, Katherine L.; Arnett, Donna K.; Ordovás, José M.; Corella, Dolores

    2016-01-01

    Controversy persists on the association between dairy products, especially milk, and cardiovascular diseases (CVD). Genetic proxies may improve dairy intake estimations, and clarify diet-disease relationships through Mendelian randomization. We meta-analytically (n ≤ 20,089) evaluated associations between a lactase persistence (LP) SNP, the minichromosome maintenance complex component 6 (MCM6)-rs3754686C>T (nonpersistence>persistence), dairy intake, and CVD biomarkers in American (Hispanics, African-American and Whites) and Mediterranean populations. Moreover, we analyzed longitudinal associations with milk, CVD and mortality in PREDIMED), a randomized Mediterranean diet (MedDiet) intervention trial (n = 7185). The MCM6-rs3754686/MCM6-rs309180 (as proxy), LP-allele (T) was strongly associated with higher milk intake, but inconsistently associated with glucose and lipids, and not associated with CVD or total mortality in the whole population. Heterogeneity analyses suggested some sex-specific associations. The T-allele was associated with higher CVD and mortality risk in women but not in men (P-sex interaction:0.005 and 0.032, respectively), mainly in the MedDiet group. However, milk intake was not associated with CVD biomarkers, CVD or mortality either generally or in sub-groups. Although MCM6-rs3754686 is a good milk intake proxy in these populations, attributing its associations with CVD and mortality in Mediterranean women to milk is unwarranted, as other factors limiting the assumption of causality in Mendelian randomization may exist. PMID:27624874

  15. Stream of consciousness: Quantum and biochemical assumptions regarding psychopathology.

    Science.gov (United States)

    Tonello, Lucio; Cocchi, Massimo; Gabrielli, Fabio; Tuszynski, Jack A

    2017-04-01

    The accepted paradigms of mainstream neuropsychiatry appear to be incompletely adequate and in various cases offer equivocal analyses. However, a growing number of new approaches are being proposed that suggest the emergence of paradigm shifts in this area. In particular, quantum theories of mind, brain and consciousness seem to offer a profound change to the current approaches. Unfortunately these quantum paradigms harbor at least two serious problems. First, they are simply models, theories, and assumptions, with no convincing experiments supporting their claims. Second, they deviate from contemporary mainstream views of psychiatric illness and do so in revolutionary ways. We suggest a possible way to integrate experimental neuroscience with quantum models in order to address outstanding issues in psychopathology. A key role is played by the phenomenon called the "stream of consciousness", which can be linked to the so-called "Gamma Synchrony" (GS), which is clearly demonstrated by EEG data. In our novel proposal, a unipolar depressed patient could be seen as a subject with an altered stream of consciousness. In particular, some clues suggest that depression is linked to an "increased power" stream of consciousness. It is additionally suggested that such an approach to depression might be extended to psychopathology in general with potential benefits to diagnostics and therapeutics in neuropsychiatry. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. On Some Unwarranted Tacit Assumptions in Cognitive Neuroscience†

    Science.gov (United States)

    Mausfeld, Rainer

    2011-01-01

    The cognitive neurosciences are based on the idea that the level of neurons or neural networks constitutes a privileged level of analysis for the explanation of mental phenomena. This paper brings to mind several arguments to the effect that this presumption is ill-conceived and unwarranted in light of what is currently understood about the physical principles underlying mental achievements. It then scrutinizes the question why such conceptions are nevertheless currently prevailing in many areas of psychology. The paper argues that corresponding conceptions are rooted in four different aspects of our common-sense conception of mental phenomena and their explanation, which are illegitimately transferred to scientific enquiry. These four aspects pertain to the notion of explanation, to conceptions about which mental phenomena are singled out for enquiry, to an inductivist epistemology, and, in the wake of behavioristic conceptions, to a bias favoring investigations of input–output relations at the expense of enquiries into internal principles. To the extent that the cognitive neurosciences methodologically adhere to these tacit assumptions, they are prone to turn into a largely a-theoretical and data-driven endeavor while at the same time enhancing the prospects for receiving widespread public appreciation of their empirical findings. PMID:22435062

  17. DDH-Like Assumptions Based on Extension Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike

    2012-01-01

    _f= \\mathbb{F}_{q}[X]/(f)$ where f is a degree-d polynomial. The decision problem that follows naturally reduces to the case where f is irreducible. This variant is called the d-DDH problem, where 1-DDH is standard DDH. We show in the generic group model that d-DDH is harder than DDH for d > 1 and that we...... obtain, in fact, an infinite hierarchy of progressively weaker assumptions whose complexities lie “between” DDH and CDH. This leads to a large number of new schemes because virtually all known DDH-based constructions can very easily be upgraded to be based on d-DDH. We use the same construction......-VDDH), which are based on f(X) = Xd, but with a twist to avoid problems with reducible polynomials. We show in the generic group model that d-VDDH is hard in bilinear groups and that the problems become harder with increasing d. We show that hardness of d-VDDH implies CCA-secure encryption, efficient Naor...

  18. PKreport: report generation for checking population pharmacokinetic model assumptions.

    Science.gov (United States)

    Sun, Xiaoyong; Li, Jun

    2011-05-16

    Graphics play an important and unique role in population pharmacokinetic (PopPK) model building by exploring hidden structure among data before modeling, evaluating model fit, and validating results after modeling. The work described in this paper is about a new R package called PKreport, which is able to generate a collection of plots and statistics for testing model assumptions, visualizing data and diagnosing models. The metric system is utilized as the currency for communicating between data sets and the package to generate special-purpose plots. It provides ways to match output from diverse software such as NONMEM, Monolix, R nlme package, etc. The package is implemented with S4 class hierarchy, and offers an efficient way to access the output from NONMEM 7. The final reports take advantage of the web browser as user interface to manage and visualize plots. PKreport provides 1) a flexible and efficient R class to store and retrieve NONMEM 7 output, 2) automate plots for users to visualize data and models, 3) automatically generated R scripts that are used to create the plots; 4) an archive-oriented management tool for users to store, retrieve and modify figures, 5) high-quality graphs based on the R packages, lattice and ggplot2. The general architecture, running environment and statistical methods can be readily extended with R class hierarchy. PKreport is free to download at http://cran.r-project.org/web/packages/PKreport/index.html.

  19. PKreport: report generation for checking population pharmacokinetic model assumptions

    Directory of Open Access Journals (Sweden)

    Li Jun

    2011-05-01

    Full Text Available Abstract Background Graphics play an important and unique role in population pharmacokinetic (PopPK model building by exploring hidden structure among data before modeling, evaluating model fit, and validating results after modeling. Results The work described in this paper is about a new R package called PKreport, which is able to generate a collection of plots and statistics for testing model assumptions, visualizing data and diagnosing models. The metric system is utilized as the currency for communicating between data sets and the package to generate special-purpose plots. It provides ways to match output from diverse software such as NONMEM, Monolix, R nlme package, etc. The package is implemented with S4 class hierarchy, and offers an efficient way to access the output from NONMEM 7. The final reports take advantage of the web browser as user interface to manage and visualize plots. Conclusions PKreport provides 1 a flexible and efficient R class to store and retrieve NONMEM 7 output, 2 automate plots for users to visualize data and models, 3 automatically generated R scripts that are used to create the plots; 4 an archive-oriented management tool for users to store, retrieve and modify figures, 5 high-quality graphs based on the R packages, lattice and ggplot2. The general architecture, running environment and statistical methods can be readily extended with R class hierarchy. PKreport is free to download at http://cran.r-project.org/web/packages/PKreport/index.html.

  20. Weak convergence of Jacobian determinants under asymmetric assumptions

    Directory of Open Access Journals (Sweden)

    Teresa Alberico

    2012-05-01

    Full Text Available Let $\\Om$ be a bounded open set in $\\R^2$ sufficiently smooth and $f_k=(u_k,v_k$ and $f=(u,v$ mappings belong to the Sobolev space $W^{1,2}(\\Om,\\R^2$. We prove that if the sequence of Jacobians $J_{f_k}$ converges to a measure $\\mu$ in sense of measures andif one allows different assumptions on the two components of $f_k$ and $f$, e.g.$$u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,2}(\\Om \\qquad \\, v_k \\rightharpoonup v \\;\\;\\mbox{weakly in} \\;\\; W^{1,q}(\\Om$$for some $q\\in(1,2$, then\\begin{equation}\\label{0}d\\mu=J_f\\,dz.\\end{equation}Moreover, we show that this result is optimal in the sense that conclusion fails for $q=1$.On the other hand, we prove that \\eqref{0} remains valid also if one considers the case $q=1$, but it is necessary to require that $u_k$ weakly converges to $u$ in a Zygmund-Sobolev space with a slightly higher degree of regularity than $W^{1,2}(\\Om$ and precisely$$ u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,L^2 \\log^\\alpha L}(\\Om$$for some $\\alpha >1$.    

  1. Finite Element Simulations to Explore Assumptions in Kolsky Bar Experiments.

    Energy Technology Data Exchange (ETDEWEB)

    Crum, Justin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-05

    The chief purpose of this project has been to develop a set of finite element models that attempt to explore some of the assumptions in the experimental set-up and data reduction of the Kolsky bar experiment. In brief, the Kolsky bar, sometimes referred to as the split Hopkinson pressure bar, is an experimental apparatus used to study the mechanical properties of materials at high strain rates. Kolsky bars can be constructed to conduct experiments in tension or compression, both of which are studied in this paper. The basic operation of the tension Kolsky bar is as follows: compressed air is inserted into the barrel that contains the striker; the striker accelerates towards the left and strikes the left end of the barrel producing a tensile stress wave that propogates first through the barrel and then down the incident bar, into the specimen, and finally the transmission bar. In the compression case, the striker instead travels to the right and impacts the incident bar directly. As the stress wave travels through an interface (e.g., the incident bar to specimen connection), a portion of the pulse is transmitted and the rest reflected. The incident pulse, as well as the transmitted and reflected pulses are picked up by two strain gauges installed on the incident and transmitted bars as shown. By interpreting the data acquired by these strain gauges, the stress/strain behavior of the specimen can be determined.

  2. Budget Elements of Economic Security: Specifics of Classification

    Directory of Open Access Journals (Sweden)

    О. S.

    2017-02-01

    Full Text Available Theoretical aspects of economic security in conjunction with budget components such as “budget interests” and “budget necessities” are analyzed. Key positions of the categories “budget interests” and “budget necessities” in the theory of economic security in the budgetary area are substantiated given their priority role in setting up its implementation strategy. The category “budget interests” is defined as the system of budget necessities of the interest holders, implemented through budget activities of entities and aimed at seeking benefits through the budget, in order to guarantee functioning and development of the society, the state, legal entities and physical persons. “Budget necessities” are defined as the need in budget funds to achieve and sustain, at a certain level, life activities of individuals, social groups, society, state and legal entities. Classification of budget interests by various criteria is made in the context of their impact on the economic security of the state. It is demonstrated that the four-tier classification of the budget interests by interest holder is essential to guaranteeing economic security in the budgetary area: budget interests of the state: the interests held by central and local power offices; budget interests of legal entities: the interests of profit and non-profit (public, budgetary, party and other organizations; budget interests of individuals: basic necessities of individuals, met by budget transfers, which stand out of the array of public necessities by their individual character.

  3. Iron content of soils as a precipitation proxy

    Science.gov (United States)

    Dzombak, R.; Sheldon, N. D.

    2016-12-01

    Given that different iron phases form under different precipitation and drainage regimes, soil iron content could be used as a proxy for both volume and seasonality of precipitation. Constraining these factors is important for predicting future precipitation trends, especially for a warmer climate that will likely see more frequent extreme weather events. Specifically, using paleoprecipitation data from periods of higher temperatures and atmospheric CO2 concentrations helps inform models of future `greenhouse' climate. Forty-five modern samples from across the continental United States were analyzed, with MAP ranging from 200 to 1200 mm yr-1 and MAT ranging from 5 to 22°C. Soil types included Alfisols (N=15), Inceptisols (N=8), Mollisols (N=15), and Aridisols (N=7), and ranged from seasonally wet to well-drained. Analytical techniques included combustion-elemental analysis and organic carbon isotope analysis, a sequential iron extraction modified with a sodium hypochlorite step for the extraction of organic matter-bound iron, and the extraction of iron sulfides. The sequential extractions yield five different `pools' of iron found in sediment: crystalline iron oxides (e.g., goethite, hematite), magnetite, carbonate-bound, organic matter-bound, and labile/easily reducible iron minerals (e.g., ferrihydrite). Analysis by ICP-OES yielded a strong relationship between magnetite-bound iron and MAP, and fair relationships between the other iron pools and MAP. Individual soil orders tended to show stronger relationships to the iron pools than all soils analyzed together, potentially indicating the need for separate proxy relationships for each soil order. Pyrite concentrations were well below 1% by weight for these soils, suggesting that none of these soils has a long enough wet season to encourage its formation and that the presence vs. absence of pyrite in paleosols may be a useful proxy for soil moisture state. In contrast to some earlier work, no significant

  4. Carbohydrates and phenols as quantitative molecular vegetation proxies in peats

    Science.gov (United States)

    Kaiser, K.; Benner, R. H.

    2012-12-01

    Vegetation in peatlands is intricately linked to local environmental conditions and climate. Here we use chemical analyses of carbohydrates and phenols to reconstruct paleovegetation in peat cores collected from 56.8°N (SIB04), 58.4°N (SIB06), 63.8°N (G137) and 66.5°N (E113) in the Western Siberian Lowland. Lignin phenols (vanillyl and syringyl phenols) were sensitive biomarkers for vascular plant contributions and provided additional information on the relative contributions of angiosperm and gymnosperm plants. Specific neutral sugar compositions allowed identification of sphagnum mosses, sedges (Cyperaceae) and lichens. Hydroxyphenols released by CuO oxidation were useful tracers of sphagnum moss contributions. The three independent molecular proxies were calibrated with a diverse group of peat-forming plants to yield quantitative estimates (%C) of vascular plant, sphagnum moss and lichen contributions in peat core samples. Correlation analysis indicated the three molecular proxies produced fairly similar results for paleovegetation compositions, generally within the error interval of each approach (≤26%). The lignin-based method generally lead to higher estimates of vascular plant vegetation. Several significant deviations were also observed due to different reactivities of carbohydrate and phenolic polymers during peat decomposition. Rapid vegetation changes on timescales of 50-200 years were observed in the southern cores SIB04 and SIB06 over the last 2000 years. Vanillyl and syringyl phenol ratios indicated these vegetation changes were largely due to varying inputs of angiosperm and gymnosperm plants. The northern permafrost cores G137 and E113 showed a more stable development. Lichens briefly replaced sphagnum mosses and vascular plants in both of these cores. Shifts in vegetation did not correlate well with Northern hemisphere climate variability over the last 2000 years. This suggested that direct climate forcing of peatland dynamics was overridden

  5. Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement

    Science.gov (United States)

    Wang, Tian-Yin; Wei, Zong-Li

    2016-02-01

    In a recent paper, Yang et al. (Quant. Inf. Process. 13(9), 2007-2016, 2014) analyzed the security of one-time proxy signature scheme Wang and Wei (Quant. Inf. Process. 11(2), 455-463, 2012) and pointed out that it cannot satisfy the security requirements of unforgeability and undeniability because an eavesdropper Eve can forge a valid proxy signature on a message chosen by herself. However, we find that the so-called proxy message-signature pair forged by Eve is issued by the proxy signer in fact, and anybody can obtain it as a requester, which means that the forgery attack is not considered as a successful attack. Therefore, the conclusion that this scheme cannot satisfy the security requirements of proxy signature against forging and denying is not appropriate in this sense. Finally, we study the reason for the misunderstanding and clarify the security requirements for proxy signatures.

  6. Legal procedures regarding state budget expenditure

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2016-03-01

    Full Text Available Government spending and the procedures for making them can be examined on the basis of many of public regulations, which are the legal grounds for these expenditure. The procedures of government spending can be studied in the field of personal expenditure of the state budget (including salaries, pensions and social benefits. Appropriate procedures are related to expenditure for purchases of goods and services and for making of public investments (e.g. public roads and buildings. An extensive area of expenditure is in the form of grants. There are special legal ways for transferring the budget grants to different legal organizations and entities. The state expenditure are fixed in the Budget Act. The implementation of the budgetary expenditure needs to take up, by state authorities and agencies, thousands of individual and concrete actions (e.g. the contracts, administrative decisions, other activities. That is, in the Budget Act fixed expenditure have, in principle, normative act features.

  7. Physics loses out in UK budget

    CERN Multimedia

    Cartlidge, E

    1998-01-01

    British astronomers are angry that the budget for the Particle Physics and Astronomy Research Council will receive only a 0.5% rise above inflation. All the other research councils will get increases of at least 3% (1 page).

  8. FY 2015 Supplement to the Presidents Budget

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The annual Supplement to the Presidents Budget for the NITRD Program provides a technical summary of the research activities planned and coordinated through NITRD in...

  9. FY 2014 Supplement to the Presidents Budget

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The annual Supplement to the Presidents Budget for the NITRD Program provides a technical summary of the research activities planned and coordinated through NITRD in...

  10. FY 2016 Supplement to the Presidents Budget

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The annual Supplement to the Presidents Budget for the NITRD Program provides a technical summary of the research activities planned and coordinated through NITRD in...

  11. [FY 1990 Budget Summary : Rocky Mountain Arsenal

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document contains information related to Rocky Mountain Arsenal's budget for the 1990 fiscal year. The specifics are broken down into seven tasks, task #1 being...

  12. [FY 1996 Budget Summary : Rocky Mountain Arsenal

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document contains information related to Rocky Mountain Arsenal's budget for the 1996 fiscal year. Page 1 is the memorandum from the Service to the U.S. Army...

  13. [FY 1989 Budget Summary : Rocky Mountain Arsenal

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is a single page document summarizing Rocky Mountain Arsenal's Budget for the 1989 fiscal year. There are three mentioned tasks; Operations & Planning, Law...

  14. Zero-Based Budgeting in Nursing Education.

    Science.gov (United States)

    Farrell, Marie; Eckert, Joseph

    1979-01-01

    Zero-based budgeting (ZBB) refers to a system whereby the entire nursing program is reevaluated yearly and justification for all programs and expenditures must be made. ZBB is compared to the governmental sunset law. (JOW)

  15. The surface heat budget of Hudson Bay

    National Research Council Canada - National Science Library

    Danielson, E.W

    1969-01-01

    ... which information the heat budget calculations are based. These data include surface air and sea temperatures, ice concentration, cloudiness, wind, atmospheric moisture, ice and water movement, and heat storage amounts within Hudson Bay waters...

  16. Carbon budgets and energy transition pathways

    National Research Council Canada - National Science Library

    Vuuren, Van, Detlef P; Soest, van, Heleen; Riahi, Keywan; Clarke, Leon; Krey, Volker; Kriegler, Elmar; Rogelj, Joeri; Schaeffer, Michiel; Tavoni, Massimo

    2016-01-01

    .... Here, we show typical values for these indicators for different carbon budgets, using the recently compiled IPCC scenario database, and discuss how these vary as a function of non-CO2 forcing, energy...

  17. Zero-based budgeting: Pathway to sustainable budget implementation in Nigeria

    OpenAIRE

    Udeh Francis Nnoli; Sopekan Sam Adeyemi; Oraka Azubuike Onuora

    2017-01-01

    This paper investigates the application of Zero-Based Budgeting (ZBB) system to budget implementation by the Federal Government of Nigeria by ascertaining among others, the relationship between ZBB approach and budget performance indices in Nigeria. To achieve the above, primary data were obtained through questionnaires that were specifically designed for this study. The data obtained were analysed with the SPSS version 21. The statistical tools employed were Analysis of Variance (ANOVA) and ...

  18. Budgeting, funding, and managing clinical research projects.

    Science.gov (United States)

    Hatfield, Elizabeth; Dicks, Elizabeth; Parfrey, Patrick

    2009-01-01

    Large, integrated multidisciplinary teams have become recognized as an efficient means by which to drive innovation and discovery in clinical research. This chapter describes how to budget and fund these large studies and effectively manage the large, often dispersed teams involved. Sources of funding are identified; budget development, justification, reporting, financial governance, and accountability are described; in addition to the creation and management of the multidisciplinary team that will implement the research plan.

  19. OPTIMIZING LOCAL BUDGET BALANCING IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Gyorgy Adina Crsitina

    2011-07-01

    Full Text Available The importance of the local public finance is growing in accordance with the increasing proportion of the decentralization process. The mechanism of resource allocation, and especially the allocation criteria used, constitutes subjects of debate. Our objective pursued is to assess whether the avoidance of the first step for balancing the allocation of funds can provide enhanced fairness in balancing the local budgets across the country. Local budgets in Romania receive significant resources from the state budget in the form of amounts and quotas distributed from certain taxes, which are revenues for the state budget. Some of these amounts are designed to balance the local budgets. The distribution of funds from the state budget to the local budgets requires two steps. Firstly, the amounts are divided by county, secondly, these amounts are directed within the county especially towards localities which have a lower financial standing. Given the significant disparities between counties, we believe that this mechanism does not ensure fairness in the allocation because the funds distributed according to the first step may not use fair criteria to meet the requirements for balanced local budgets. Therefore, we intend to simulate a balanced allocation of national funds for eliminating the first step that produces the most significant inequities. Direct application of the second step of allocation, with its two phases, will provide more funds serving those local administrative units for the income tax per capita is lower than the national average. Comparing the values allocated for the year 2011 with those obtained in the simulation we will examine changes that occur after the application of this method which seems to be more equitable and appropriate. This work was supported by CNCSISUEFISCSU, project number PNII-IDEI 1780/2008

  20. Meteorological Error Budget Using Open Source Data

    Science.gov (United States)

    2016-09-01

    Approved for public release; distribuiton unlimited. 4 The sites selected were in both the northern and southern hemispheres , and included...ARL-TR-7831 ● SEP 2016 US Army Research Laboratory Meteorological Error Budget Using Open- Source Data by J Cogan, J Smith, P...needed. Do not return it to the originator. ARL-TR-7831 ● SEP 2016 US Army Research Laboratory Meteorological Error Budget Using

  1. Antesen Customer Loyalty Pada Budget Hotel

    OpenAIRE

    Rahma, Latifa

    2016-01-01

    This research discusses the effects of Service Quality on Customer Satisfaction, Customer Loyalty, and Brand Image Budget hotel (Five Budget Hotel Managed by local chain hotel). The purpose of this study were 1) to analyze the effects of Service Quality on Customer Satisfaction, 2) to analyze the effects of Service Quality on Customer Loyalty, 3) to analyze the effect of Customer Satisfaction to Customer Loyalty, 4) to analyze the effects of Service Quality on the Brand Image, 5 ) to analyze ...

  2. Law Enforcement Proxies Matter for the Law and Finance Nexus

    Directory of Open Access Journals (Sweden)

    Valentin Toci

    2013-07-01

    Full Text Available The paper employs various measures of law enforcement to provide new evidence on the importance of legal institutions for different dimensions of financial development in transition economies. It offers a critical assessment of law enforcement measures employed in recent studies by showing that some proxies for law enforcement in the credit market may not be appropriate. Hence, care should be taken in how the quality of institutions is measured and the context which it represents. An original approach to measuring law enforcement in the credit market is developed by embodying the legal theory of dispute resolution and assessing this approach by collecting primary data for Kosovo. The findings suggest that Kosovo compares well with countries in the region and other transition economies in terms of the enforcement of creditor rights.

  3. Munchausen Syndrome by proxy: Definition, context, and psychological factors involved

    Directory of Open Access Journals (Sweden)

    Thomas Gomes Gonçalves

    2014-07-01

    Full Text Available The Munchausen syndrome by proxy refers to a pathology characterized by physical and emotional abuse in which the simulation or production of symptoms is directed towards a child, which involves taking him or her to health treatments and unnecessary surgeries. The difficulties in the diagnosis of this form of abuse and the emotional aspects involved highlight the destructive effects in the infancy subjectivity due to the lack of loving capacity protecting and prioritizing the child demands. Psychoanalysis offers a differentiated view, comprehending that the mother attempts to elaborate her own psychic conflicts by the repetition of traumatic experience. There is a necessity of comprehension of the instinct destructivity presented in the maternal unconscious dynamics revealed in the modality of caring which is reflected in violence.

  4. Obesity as a Presentation of Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Nogueira-de-Almeida, Carlos Alberto; de Almeida, Carla Cristina J N; Pereira, Natália Inocêncio; de Souza Filho, Nilton Antonio; de Oliveira, Valmir Aparecido

    2017-04-17

    To describe a case of an obese child whose weight gain was related to the Munchausen Syndrome by proxy (MSP). This is a case report including information regarding the child's clinical history and the mother's behavior. The common features of the syndrome are confronted with the description of the case, seeking to demonstrate the similarities. The description ratifies the diagnosis based on the signs and symptoms presented by the child (<5 years old, frequent contacts with health system, symptoms witnessed only by the mother, confusing findings, not helped by treatments, emotionally distant father) and the attitude of the mother (concerned, interested in procedures, comfortable in the medical setting, higher medical knowledge, hostile when thwarted). The case presented points to a new etiology, the MSP, to be considered within the set of factors currently known to cause and maintain obesity in childhood.

  5. Interactive images: Cuboid proxies for smart image manipulation

    KAUST Repository

    Zheng, Youyi

    2012-07-01

    Images are static and lack important depth information about the underlying 3D scenes. We introduce interactive images in the context of man-made environments wherein objects are simple and regular, share various non-local relations (e.g., coplanarity, parallelism, etc.), and are often repeated. Our interactive framework creates partial scene reconstructions based on cuboid-proxies with minimal user interaction. It subsequently allows a range of intuitive image edits mimicking real-world behavior, which are otherwise difficult to achieve. Effectively, the user simply provides high-level semantic hints, while our system ensures plausible operations by conforming to the extracted non-local relations. We demonstrate our system on a range of real-world images and validate the plausibility of the results using a user study. © 2012 ACM 0730-0301/2012/08-ART99.

  6. Reliability of proxy reports of parental smoking by elementary schoolchildren.

    Science.gov (United States)

    Barnett, T; O'Loughlin, J; Paradis, G; Renaud, L

    1997-08-01

    To investigate the reliability of reports of parental smoking by elementary schoolchildren aged 9-13 years, and to identify the correlates of disagreement between student proxy and parent self-reports. As part of the evaluation of a school-based heart health promotion program, data on parental smoking status were collected from 1240 student-mother pairs and 898 student-father pairs. Agreement for parental smoking status was 93.1% among student-mother pairs and 86.4% among student-father pairs. Among student-mother pairs, reports by students aged 9 years were more likely to disagree with mothers' self-reports than those of older children (odds ratio (OR) = 3.1). Among student-father pairs, the only significant correlate of disagreement was living in a single-parent family headed by the mother (OR = 2.6). Children 10-years or older can provide reliable reports of the smoking status of cohabiting parents.

  7. STRONTIUM DISTRIBUTION IN UPPER DEVONIAN CONODONT ELEMENTS: A PALAEOBIOLOGICAL PROXY

    Directory of Open Access Journals (Sweden)

    ANDREY V. ZHURAVLEV

    2017-04-01

    Full Text Available Conodonts are an extinct group of marine animals possessing debated affinities. The conodont elements are composed of calcium phosphate [apatite (CaF] and collagen-like proteins. Distribution of Sr in the bioapatite of albid, lamellar and paralamellar tissues of some Upper Devonian conodont element crowns from NW Russia was studied by microprobe. The calcium phosphate of the lamellar and paralamellar tissues demonstrates periodical oscillation of Sr contents across the lamellae (0.4-0.5 wt% in the outer part of lamella, and 0.2 wt% in the inner part. The albid tissue contains Sr of less than 0.4 wt%. It is suggested that oscillations of Sr concentrations reflect the periodic growth of the lamellae, and the average Ca/Sr ratio can be a proxy of the growth rate.

  8. Zero-based budgeting: Pathway to sustainable budget implementation in Nigeria

    Directory of Open Access Journals (Sweden)

    Udeh Francis Nnoli

    2017-10-01

    Full Text Available This paper investigates the application of Zero-Based Budgeting (ZBB system to budget implementation by the Federal Government of Nigeria by ascertaining among others, the relationship between ZBB approach and budget performance indices in Nigeria. To achieve the above, primary data were obtained through questionnaires that were specifically designed for this study. The data obtained were analysed with the SPSS version 21. The statistical tools employed were Analysis of Variance (ANOVA and Pearson Correlation Coefficiant (PCC. The Cronbach’s Alpha reliability test was used to test the internal consistency/reliability of the instrument used for the study. On the basis of the analysis, we found that there is significant difference in the effectiveness of ZBB in terms of budget implementation compared to the Traditional Budgeting System (TBS. It was also found that the application of ZBB tend to be performance-driven and is able to detect the redundant programmes/projects and staff, thereby recommending either realignment, discharge, transfer or redeployment of projects or resources. The study therefore, recommends among others that ZBB should be encouraged as a good means of budget implementation and also close monitoring of budget execution should be enshrined in work ethics at every stage of budget preparation and implementation in the country. This is believed would go a long way to strengthen measures aimed at mitigating poor budget implementation in the country.

  9. Research on budget management under IT environment

    Directory of Open Access Journals (Sweden)

    Wenchang Li

    2017-03-01

    Full Text Available IT technology has become a key element of core competitiveness of enterprises, and also the basis for its daily operation. The budget is a management process of forecasting and planning of the future operation and financial activities under the guidance of the strategic objectives, and completion of the strategic objectives to a maximum extent. Whether both of them can be effectively combined with is the key to effective implementation of the budget. Through analysis of the existing problems of the traditional budget of the enterprise and the budget under the information technology environment, analysis of the internal and external influencing factors of the budget management of the large and medium sized enterprises under the current environment with SWOT, factor quantization and weight with AHP, development of the strategic program according to the priority of weight, and finally verification with a case, this paper concludes that, the budget management work can be more strategic and forward-looking through combination with AHP and SWOT analysis.

  10. POLITICAL BUDGET CYCLES: EVIDENCE FROM TURKEY

    Directory of Open Access Journals (Sweden)

    FİLİZ ERYILMAZ

    2015-04-01

    Full Text Available The theorical literature on “Political Business Cycles” presents important insights on the extent to which politicians attempt to manipulate government monetary and fiscal policies to influence electoral outcomes, in particular, with the aim of re-election. In recent years “Political Budget Cycles” is the one of the most important topics in Political Business Cycles literature. According to Political Budget Cycles Theory, some components of the government budget are influenced by the electoral cycle and consequently an increase in government spending or decrease in taxes in an election year, leading to larger fiscal deficit. This incumbent’s fiscal manipulation is a tool that governments possess to increase their changes for re-election. In this paper we investigate the presence of Political Budget Cycles using a data set of budget balance, total expenditure and total revenue over the period 1994–2012. Our findings suggest that incumbents in Turkey use fiscal policy to increase their popularity and win elections, therefore fiscal manipulation was rewarded rather than punished by Turkish voters. The meaning of this result is that Political Budget Cycles Theory is valid for Turkey between 1994 and 2012.

  11. One thousand years of fires: Integrating proxy and model data

    Directory of Open Access Journals (Sweden)

    Natalie Marie Kehrwald

    2016-04-01

    Full Text Available The current fires raging across Indonesia are emitting more carbon than the annual fossil fuel emissions of Germany or Japan, and the fires are still consuming vast tracts of rainforest and peatlands. The National Interagency Fire Center (www.nifc.gov notes that 2015 is one worst fire years on record in the U.S., where more than 9 million acres burned -- equivalent to the combined size of Massachusetts and New Jersey. The U.S. and Indonesian fires have already displaced tens of thousands of people, and their impacts on ecosystems are still unclear. In the case of Indonesia, the burning peat is destroying much of the existing soil, with unknown implications for the type of vegetation regrowth. Such large fires result from a combination of fire management practices, increasing anthropogenic land use, and a changing climate. The expected increase in fire activity in the upcoming decades has led to a surge in research trying to understand their causes, the factors that may have influenced similar times of fire activity in the past, and the implications of such fire activity in the future. Multiple types of complementary data provide information on the impacts of current fires and the extent of past fires. The wide array of data encompasses different spatial and temporal resolutions (Figure 1 and includes fire proxy information such as charcoal and tree ring fire scars, observational records, satellite products, modern emissions data, fire models within global land cover and vegetation models, and sociodemographic data for modeling past human land use and ignition frequency. Any single data type is more powerful when combined with another source of information. Merging model and proxy data enables analyses of how fire activity modifies vegetation distribution, air and water quality, and proximity to cities; these analyses in turn support land management decisions relating to conservation and development.

  12. Assessing paleo-biodiversity using low proxy influx.

    Directory of Open Access Journals (Sweden)

    Olivier Blarquez

    Full Text Available We developed an algorithm to improve richness assessment based on paleoecological series, considering sample features such as their temporal resolutions or their volumes. Our new method can be applied to both high- and low-count size proxies, i.e. pollen and plant macroremain records, respectively. While pollen generally abounds in sediments, plant macroremains are generally rare, thus leading to difficulties to compute paleo-biodiversity indices. Our approach uses resampled macroremain influxes that enable the computation of the rarefaction index for the low influx records. The raw counts are resampled to a constant resolution and sample volume by interpolating initial sample ages at a constant time interval using the age∼depth model. Then, the contribution of initial counts and volume to each interpolated sample is determined by calculating a proportion matrix that is in turn used to obtain regularly spaced time series of pollen and macroremain influx. We applied this algorithm to sedimentary data from a subalpine lake situated in the European Alps. The reconstructed total floristic richness at the study site increased gradually when both pollen and macroremain records indicated a decrease in relative abundances of shrubs and an increase in trees from 11,000 to 7,000 cal BP. This points to an ecosystem change that favored trees against shrubs, whereas herb abundance remained stable. Since 6,000 cal BP, local richness decreased based on plant macroremains, while pollen-based richness was stable. The reconstructed richness and evenness are interrelated confirming the difficulty to distinguish these two aspects for the studies in paleo-biodiversity. The present study shows that low-influx bio-proxy records (here macroremains can be used to reconstruct stand diversity and address ecological issues. These developments on macroremain and pollen records may contribute to bridge the gap between paleoecology and biodiversity studies.

  13. Assessing paleo-biodiversity using low proxy influx.

    Science.gov (United States)

    Blarquez, Olivier; Finsinger, Walter; Carcaillet, Christopher

    2013-01-01

    We developed an algorithm to improve richness assessment based on paleoecological series, considering sample features such as their temporal resolutions or their volumes. Our new method can be applied to both high- and low-count size proxies, i.e. pollen and plant macroremain records, respectively. While pollen generally abounds in sediments, plant macroremains are generally rare, thus leading to difficulties to compute paleo-biodiversity indices. Our approach uses resampled macroremain influxes that enable the computation of the rarefaction index for the low influx records. The raw counts are resampled to a constant resolution and sample volume by interpolating initial sample ages at a constant time interval using the age∼depth model. Then, the contribution of initial counts and volume to each interpolated sample is determined by calculating a proportion matrix that is in turn used to obtain regularly spaced time series of pollen and macroremain influx. We applied this algorithm to sedimentary data from a subalpine lake situated in the European Alps. The reconstructed total floristic richness at the study site increased gradually when both pollen and macroremain records indicated a decrease in relative abundances of shrubs and an increase in trees from 11,000 to 7,000 cal BP. This points to an ecosystem change that favored trees against shrubs, whereas herb abundance remained stable. Since 6,000 cal BP, local richness decreased based on plant macroremains, while pollen-based richness was stable. The reconstructed richness and evenness are interrelated confirming the difficulty to distinguish these two aspects for the studies in paleo-biodiversity. The present study shows that low-influx bio-proxy records (here macroremains) can be used to reconstruct stand diversity and address ecological issues. These developments on macroremain and pollen records may contribute to bridge the gap between paleoecology and biodiversity studies.

  14. Intensity modulated neutron radiotherapy optimization by photon proxy.

    Science.gov (United States)

    Snyder, Michael; Hammoud, Ahmad; Bossenberger, Todd; Spink, Robyn; Burmeister, Jay

    2012-08-01

    Introducing intensity modulation into neutron radiotherapy (IMNRT) planning has the potential to mitigate some normal tissue complications seen in past neutron trials. While the hardware to deliver IMNRT plans has been in use for several years, until recently the IMNRT planning process has been cumbersome and of lower fidelity than conventional photon plans. Our in-house planning system used to calculate neutron therapy plans allows beam weight optimization of forward planned segments, but does not provide inverse optimization capabilities. Commercial treatment planning systems provide inverse optimization capabilities, but currently cannot model our neutron beam. We have developed a methodology and software suite to make use of the robust optimization in our commercial planning system while still using our in-house planning system to calculate final neutron dose distributions. Optimized multileaf collimator (MLC) leaf positions for segments designed in the commercial system using a 4 MV photon proxy beam are translated into static neutron ports that can be represented within our in-house treatment planning system. The true neutron dose distribution is calculated in the in-house system and then exported back through the MATLAB software into the commercial treatment planning system for evaluation. The planning process produces optimized IMNRT plans that reduce dose to normal tissue structures as compared to 3D conformal plans using static MLC apertures. The process involves standard planning techniques using a commercially available treatment planning system, and is not significantly more complex than conventional IMRT planning. Using a photon proxy in a commercial optimization algorithm produces IMNRT plans that are more conformal than those previously designed at our center and take much less time to create. The planning process presented here allows for the optimization of IMNRT plans by a commercial treatment planning optimization algorithm, potentially allowing

  15. Projecting the future of Canada's population: assumptions, implications, and policy

    Directory of Open Access Journals (Sweden)

    Beaujot, Roderic

    2003-01-01

    Full Text Available After considering the assumptions for fertility, mortality and international migration, this paper looks at implications of the evolving demographics for population growth, labour force, retirement, and population distribution. With the help of policies favouring gender equity and supporting families of various types, fertility in Canada could avoid the particularly low levels seen in some countries, and remain at levels closer to 1.6 births per woman. The prognosis in terms of both risk factors and treatment suggests further reductions in mortality toward a life expectancy of 85. On immigration, there are political interests for levels as high as 270,000 per year, while levels of 150,000 correspond to the long term post-war average. The future will see slower population growth, and due to migration more than natural increase. International migration of some 225,000 per year can enable Canada to avoid population decline, and sustain the size of the labour force, but all scenarios show much change in the relative size of the retired compared to the labour force population. According to the ratio of persons aged 20-64 to that aged 65 and over, there were seven persons at labour force ages per person at retirement age in 1951, compared to five in 2001 and probably less than 2.5 in 2051. Growth that is due to migration more so than natural increase will accentuate the urbanization trend and the unevenness of the population distribution over space. Past projections have under-projected the mortality improvements and their impact on the relative size of the population at older age groups. Policies regarding fertility, mortality and migration could be aimed at avoiding population decline and reducing the effect of aging, but there is lack of an institutional basis for policy that would seek to endogenize population.

  16. Cosmology without Einstein's assumption that inertial mass produces gravity

    Science.gov (United States)

    Ellis, Homer G.

    2015-06-01

    Giving up Einstein's assumption, implicit in his 1916 field equations, that inertial mass, even in its appearance as energy, is equivalent to active gravitational mass and therefore is a source of gravity allows revising the field equations to a form in which a positive cosmological constant is seen to (mis)represent a uniform negative net mass density of gravitationally attractive and gravitationally repulsive matter. Field equations with both positive and negative active gravitational mass densities of both primordial and continuously created matter, incorporated along with two scalar fields to 'relax the constraints' on the spacetime geometry, yield cosmological solutions that exhibit inflation, deceleration, coasting, acceleration, and a 'big bounce' instead of a 'big bang,' and provide good fits to a Hubble diagram of Type Ia supernovae data. The repulsive matter is identified as the back sides of the 'drainholes' introduced by the author in 1973 as solutions of those same field equations. Drainholes (prototypical examples of 'traversable wormholes') are topological tunnels in space which gravitationally attract on their front, entrance sides, and repel more strongly on their back, exit sides. The front sides serve both as the gravitating cores of the visible, baryonic particles of primordial matter and as the continuously created, invisible particles of the 'dark matter' needed to hold together the large-scale structures seen in the universe; the back sides serve as the misnamed 'dark energy' driving the current acceleration of the expansion of the universe. Formation of cosmic voids, walls, filaments and nodes is attributed to expulsion of drainhole entrances from regions populated by drainhole exits and accumulation of the entrances on boundaries separating those regions.

  17. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  18. Proxy-assisted multicasting of video streams over mobile wireless networks

    Science.gov (United States)

    Nguyen, Maggie; Pezeshkmehr, Layla; Moh, Melody

    2005-03-01

    This work addresses the challenge of providing seamless multimedia services to mobile users by proposing a proxy-assisted multicast architecture for delivery of video streams. We propose a hybrid system of streaming proxies, interconnected by an application-layer multicast tree, where each proxy acts as a cluster head to stream out content to its stationary and mobile users. The architecture is based on our previously proposed Enhanced-NICE protocol, which uses an application-layer multicast tree to deliver layered video streams to multiple heterogeneous receivers. We targeted the study on placements of streaming proxies to enable efficient delivery of live and on-demand video, supporting both stationary and mobile users. The simulation results are evaluated and compared with two other baseline scenarios: one with a centralized proxy system serving the entire population and one with mini-proxies each to serve its local users. The simulations are implemented using the J-SIM simulator. The results show that even though proxies in the hybrid scenario experienced a slightly longer delay, they had the lowest drop rate of video content. This finding illustrates the significance of task sharing in multiple proxies. The resulted load balancing among proxies has provided a better video quality delivered to a larger audience.

  19. Analisis Perbandingan Respons Time Squid Proxy Pada Windows Server dan Linux Server

    OpenAIRE

    Sirait, Parulian

    2016-01-01

    In the development of information technology, information is obtained quickly through technology computer network known as the Internet. The use bandwidth for Internet access can be maximized by using a proxy server. One of the proxy server is squid. The use squid as the proxy server need to consider the operating system on the server and have not known its best performance on any operating system yet. For that it is necessary to analyze the performance of squid proxy server on a different op...

  20. White Noise Assumptions Revisited : Regression Models and Statistical Designs for Simulation Practice

    OpenAIRE

    Kleijnen, J.P.C.

    2006-01-01

    Classic linear regression models and their concomitant statistical designs assume a univariate response and white noise.By definition, white noise is normally, independently, and identically distributed with zero mean.This survey tries to answer the following questions: (i) How realistic are these classic assumptions in simulation practice?(ii) How can these assumptions be tested? (iii) If assumptions are violated, can the simulation's I/O data be transformed such that the assumptions hold?(i...

  1. 40 CFR 96.140 - State trading budgets.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false State trading budgets. 96.140 Section...) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS CAIR NOX Allowance Allocations § 96.140 State trading budgets. The State trading budgets for annual...

  2. 40 CFR 97.140 - State trading budgets.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false State trading budgets. 97.140 Section...) FEDERAL NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS CAIR NOX Allowance Allocations § 97.140 State trading budgets. The State trading budgets for annual allocations of CAIR NOX allowances...

  3. Budget Update, November 9, 2010. Report 10-20

    Science.gov (United States)

    Woolfork, Kevin

    2010-01-01

    On October 8, Governor Arnold Schwarzenegger signed the 2010-11 Budget Act for the State of California. This budget was the outcome of many months of negotiation between the Governor and the Legislature. The Governor vetoed $963 million in spending from the Legislature's budget, arriving at a budget that addresses an estimated $19.1 billion…

  4. 40 CFR 96.40 - State trading program budget.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false State trading program budget. 96.40... (CONTINUED) NOX BUDGET TRADING PROGRAM AND CAIR NOX AND SO2 TRADING PROGRAMS FOR STATE IMPLEMENTATION PLANS NOX Allowance Allocations § 96.40 State trading program budget. The State trading program budget...

  5. A Capsule Look at Zero-Base Budgeting.

    Science.gov (United States)

    Griffin, William A., Jr.

    Weaknesses of the traditional incremental budgeting approach are considered as background to indicate the need for a new system of budgeting in educational institutions, and a step-by-step description of zero-based budgeting (ZBB) is presented. Proposed advantages of ZBB include the following: better staff morale due to a budget that is open and…

  6. STATE BUDGET AND FISCAL POLICY INSTRUMENTS TO ACHIEVE ITS

    Directory of Open Access Journals (Sweden)

    Haralambie George Alin

    2010-12-01

    Full Text Available This paper presents the tools for carrying out the fiscal budget in Romania. An effective fiscal policy involves increasing budget revenues and reduce their costs of collection. Public expenditure, taxes and debt are tools of fiscal policy to achieve economic stability budget. They are also presented the inter dependencies between fiscal policy and budget.

  7. School Principals' Assumptions about Human Nature: Implications for Leadership in Turkey

    Science.gov (United States)

    Sabanci, Ali

    2008-01-01

    This article considers principals' assumptions about human nature in Turkey and the relationship between the assumptions held and the leadership style adopted in schools. The findings show that school principals hold Y-type assumptions and prefer a relationship-oriented style in their relations with assistant principals. However, both principals…

  8. Exploring the Influence of Ethnicity, Age, and Trauma on Prisoners' World Assumptions

    Science.gov (United States)

    Gibson, Sandy

    2011-01-01

    In this study, the author explores world assumptions of prisoners, how these assumptions vary by ethnicity and age, and whether trauma history affects world assumptions. A random sample of young and old prisoners, matched for prison location, was drawn from the New Jersey Department of Corrections prison population. Age and ethnicity had…

  9. 7 CFR 1436.16 - Foreclosure, liquidation, assumptions, sales or conveyance, or bankruptcy.

    Science.gov (United States)

    2010-01-01

    ... subsequent borrower's ability to show a satisfactory credit history. An assumption of the loan may be... 7 Agriculture 10 2010-01-01 2010-01-01 false Foreclosure, liquidation, assumptions, sales or... FARM STORAGE FACILITY LOAN PROGRAM REGULATIONS § 1436.16 Foreclosure, liquidation, assumptions, sales...

  10. Philosophy of Technology Assumptions in Educational Technology Leadership: Questioning Technological Determinism

    Science.gov (United States)

    Webster, Mark David

    2013-01-01

    Scholars have emphasized that decisions about technology can be influenced by philosophy of technology assumptions, and have argued for research that critically questions technological determinist assumptions. Empirical studies of technology management in fields other than K-12 education provided evidence that philosophy of technology assumptions,…

  11. Simplified subsurface modelling: data assimilation and violated model assumptions

    Science.gov (United States)

    Erdal, Daniel; Lange, Natascha; Neuweiler, Insa

    2017-04-01

    Integrated models are gaining more and more attention in hydrological modelling as they can better represent the interaction between different compartments. Naturally, these models come along with larger numbers of unknowns and requirements on computational resources compared to stand-alone models. If large model domains are to be represented, e.g. on catchment scale, the resolution of the numerical grid needs to be reduced or the model itself needs to be simplified. Both approaches lead to a reduced ability to reproduce the present processes. This lack of model accuracy may be compensated by using data assimilation methods. In these methods observations are used to update the model states, and optionally model parameters as well, in order to reduce the model error induced by the imposed simplifications. What is unclear is whether these methods combined with strongly simplified models result in completely data-driven models or if they can even be used to make adequate predictions of the model state for times when no observations are available. In the current work we consider the combined groundwater and unsaturated zone, which can be modelled in a physically consistent way using 3D-models solving the Richards equation. For use in simple predictions, however, simpler approaches may be considered. The question investigated here is whether a simpler model, in which the groundwater is modelled as a horizontal 2D-model and the unsaturated zones as a few sparse 1D-columns, can be used within an Ensemble Kalman filter to give predictions of groundwater levels and unsaturated fluxes. This is tested under conditions where the feedback between the two model-compartments are large (e.g. shallow groundwater table) and the simplification assumptions are clearly violated. Such a case may be a steep hill-slope or pumping wells, creating lateral fluxes in the unsaturated zone, or strong heterogeneous structures creating unaccounted flows in both the saturated and unsaturated

  12. Do proxies reflect patients' health concerns about urinary incontinence and gait problems?

    Science.gov (United States)

    Higashi, Takahiro; Hays, Ron D; Brown, Julie A; Kamberg, Caren J; Pham, Chau; Reuben, David B; Shekelle, Paul G; Solomon, David H; Young, Roy T; Roth, Carol P; Chang, John T; MacLean, Catherine H; Wenger, Neil S

    2005-01-01

    Background While falls and urinary incontinence are prevalent among older patients, who sometimes rely on proxies to provide their health information, the validity of proxy reports of concern about falls and urinary incontinence remains unknown. Methods Telephone interviews with 43 consecutive patients with falls or fear of falling and/or bothersome urinary incontinence and their proxies chosen by patients as most knowledgeable about their health. The questionnaire included items derived from the Medical Outcomes Study Short Form 12 (SF-12), a scale assessing concerns about urinary incontinence (UI), and a measure of fear of falling, the Falls Efficacy Scale (FES). Scores were estimated using items asking the proxy perspective (6 items from the SF-12, 10 items from a UI scale, and all 10 FES items). Proxy and patient scores were compared using intraclass correlation coefficients (ICC, one-way model). Variables associated with absolute agreement between patients and proxies were explored. Results Patients had a mean age of 81 years (range 75–93) and 67% were female while proxies had a mean age of 70 (range 42–87) and 49% were female. ICCs were 0.63 for the SF-12, 0.52 for the UI scale, and 0.29 for the FES. Proxies tended to understate patients' general health and incontinence concern, but overstate patients' concern about falling. Proxies who lived with patients and those who more often see patients more closely reflected patient FES scores compared to those who lived apart or those who saw patients less often. Internal consistency reliability of proxy responses was 0.62 for the SF-12, 0.86 for the I-QOL, and 0.93 for the FES. In addition, construct validity of the proxy FES scale was supported by greater proxy-perceived fear of falling for patients who received medical care after a fall during the past 12 months (p < .05). Conclusion Caution should be exercised when using proxies as a source of information about older patients' health perceptions. Questions

  13. Do proxies reflect patients' health concerns about urinary incontinence and gait problems?

    Directory of Open Access Journals (Sweden)

    Solomon David H

    2005-11-01

    Full Text Available Abstract Background While falls and urinary incontinence are prevalent among older patients, who sometimes rely on proxies to provide their health information, the validity of proxy reports of concern about falls and urinary incontinence remains unknown. Methods Telephone interviews with 43 consecutive patients with falls or fear of falling and/or bothersome urinary incontinence and their proxies chosen by patients as most knowledgeable about their health. The questionnaire included items derived from the Medical Outcomes Study Short Form 12 (SF-12, a scale assessing concerns about urinary incontinence (UI, and a measure of fear of falling, the Falls Efficacy Scale (FES. Scores were estimated using items asking the proxy perspective (6 items from the SF-12, 10 items from a UI scale, and all 10 FES items. Proxy and patient scores were compared using intraclass correlation coefficients (ICC, one-way model. Variables associated with absolute agreement between patients and proxies were explored. Results Patients had a mean age of 81 years (range 75–93 and 67% were female while proxies had a mean age of 70 (range 42–87 and 49% were female. ICCs were 0.63 for the SF-12, 0.52 for the UI scale, and 0.29 for the FES. Proxies tended to understate patients' general health and incontinence concern, but overstate patients' concern about falling. Proxies who lived with patients and those who more often see patients more closely reflected patient FES scores compared to those who lived apart or those who saw patients less often. Internal consistency reliability of proxy responses was 0.62 for the SF-12, 0.86 for the I-QOL, and 0.93 for the FES. In addition, construct validity of the proxy FES scale was supported by greater proxy-perceived fear of falling for patients who received medical care after a fall during the past 12 months (p Conclusion Caution should be exercised when using proxies as a source of information about older patients' health perceptions

  14. RESULTS OF RESEARCH OF BUDGETING DEVELOPMENT IN SLOVENE INSURANCE COMPANIES

    OpenAIRE

    Guzej, Katarina

    2008-01-01

    The article presents the research of development and use of different methods and budgeting techniques in Slovene insurance companies. The analysis of budgeting methods in Slovene insurance companies shows that more attention should be given to changes in the budgeting process, enforcement of some modern budgeting approaches and more flexible budgeting systems in order to successfully confront the challenges of a turbulent environment and ever more demanding customers, while also reaching the...

  15. Analysis of Budget deficit in Romania during 2000-2013

    OpenAIRE

    Moraru Camelia; Popovici Norina

    2014-01-01

    Worldwide, over time, the years of economic crisis were defined by significant increases in the levels of budget deficits. Discussions on sizing budget deficits, financing, especially the volume of public debt became more intense, both politically and academically. The impact of budget deficit on economic growth is a common theme found in the economic policies adopted. The present paper aims to analyze the evolution of budget deficit and the structural budget deficit in Romania during 2000-20...

  16. Regression assumptions in clinical psychology research practice-a systematic review of common misconceptions.

    Science.gov (United States)

    Ernst, Anja F; Albers, Casper J

    2017-01-01

    Misconceptions about the assumptions behind the standard linear regression model are widespread and dangerous. These lead to using linear regression when inappropriate, and to employing alternative procedures with less statistical power when unnecessary. Our systematic literature review investigated employment and reporting of assumption checks in twelve clinical psychology journals. Findings indicate that normality of the variables themselves, rather than of the errors, was wrongfully held for a necessary assumption in 4% of papers that use regression. Furthermore, 92% of all papers using linear regression were unclear about their assumption checks, violating APA-recommendations. This paper appeals for a heightened awareness for and increased transparency in the reporting of statistical assumption checking.

  17. The 'People's Budget' and Budget Effectiveness:The Case of Local ...

    African Journals Online (AJOL)

    Using evidence from 105 Civil Society Organisations (CSOs) in Kabalore and Kamwenge district local governments, therefore, this study set out to analyse the participation of CSO's in the budgeting process and the effectiveness of the budget process, as a result of such participation. The findings were that the participation ...

  18. Budget Cuts: Financial Aid Offices Face Budget Cuts and Increasing Workload. Quick Scan Survey Results

    Science.gov (United States)

    National Association of Student Financial Aid Administrators (NJ1), 2010

    2010-01-01

    The majority of college financial aid offices have seen cuts to their operating budgets this year compared to the 2007-08 academic year when the recession began, according to the National Association of Student Financial Aid Administrator's latest QuickScan Survey. Sixty-two percent of financial aid offices reported operating budget cuts this year…

  19. The USDA's Healthy Eating on a Budget Program: Making Better Eating Decisions on a Budget

    Science.gov (United States)

    Franklin, Alexandra M.; Hongu, Nobuko

    2016-01-01

    The U.S. Department of Agriculture has launched a new interactive online program titled Healthy Eating on a Budget. It is an addition to the popular ChooseMyPlate.gov programs, such as the SuperTracker program. The Healthy Eating on a Budget program helps consumers plan, purchase, and prepare healthful meals. This article discusses materials and…

  20. The Optimization of Budget Outcome to Create Trust in Public Expenditure Allocation on Local Budget

    Directory of Open Access Journals (Sweden)

    Hendri Koeswara

    2016-11-01

    Full Text Available Planning and budgeting process is the most crucial process in the administration of local government. Results of previous studies in Solok, the increase in the total budget is not accompanied by spending management capabilities. Expenditure of public service has always fluctuated, but ideally should always increasing. This study aimed to analyze the outcome of the budget in the allocation of public spending in an effort to realize the presence of trust on the budget in Solok West Sumatra Province. This study uses qualitative research methods with the type of research that is selected using descriptive type. While the techniques of data collection are done through an interview, observation and documentation study. This study further highlights the emic perspective, is the voice of the informant, not the personal opinion of the researchers (etic. Then, the data analysis is done categorically and chronologically, viewed repeatedly, and will continue to be encoded. To test the verification of data, triangulation is done by comparing the results of interviews with documents obtained in the field and testing of concepts used by researchers with the information given by the informant. The results showed that the pathology was found that budget allocations reflect inefficiencies as a failure of the link between policy, planning, and budgeting as a fragmented system. But on the other hand, it must be admitted there has been “trust” among policymaking actors in allocating public expenditure budget in playing the role in the budget policy.

  1. THE POSITION BUDGETS OF ADMINISTRATIVE AND TERRITORIAL UNITS IN GENERAL CONSOLIDATED BUDGET

    Directory of Open Access Journals (Sweden)

    CHIRCULESCU MARIA FELICIA

    2016-12-01

    Full Text Available The budget is a tool of territorial administrative units of financial and budgetary policy in which the state intervenes in the economy at the local level, having a major impact on general government.Through the decentralization processes that are increasingly debated and applied, the paper aims to highlight the importance of the territorial administrative unit budgets in the consolidated budget in Romania.Thus, the work comprises both theoretical notions concerning the presentation of the consolidated state budget and the budget of the territorial administrative units. The relevance of the work lies in the importance of general government in the regulation of macroeconomic balances by sizing or macroeconomic imbalances, with modern methods that analyze the possibilities and effects of new types of deficits or surpluses in the public sector.

  2. Premelting and the Water Budget in Polycrystalline Ice

    Science.gov (United States)

    Thomson, E. S.; Wilen, L. A.; Wettlaufer, J. S.

    2008-12-01

    A number of mechanisms, generally classified as premelting are responsible for the presence of liquid water at ice interfaces at temperatures well below 0°C . Premelting includes the familiar colligative effects of ions and other impurities, which lower the chemical potential of the liquid solvent, and the Gibbs-Thomson effect which describes the lowering of the melting point for a solid convex into its melt. Such phenomena are known to influence the amount of water in natural and laboratory polycrystalline ice and to control the thermal, chemical, and material transport properties. Thus, liquid water within the solid ice matrix influences the behavior of terrestrial ice over a wide range of length and time scales, from the macroscopic behavior of temperate glacier ice to the distribution of climate proxies within polar ice sheets. Using optical microscopy observations of ice near its melting temperature, rough bounds have been put on the length scales and dihedral angle associated with the liquid network in ice. However, these techniques cannot resolve whether the boundary between any two grains is wet or dry. For this, a more refined light scattering method has been developed. This method and the results are described both in the context of the basic physics and the application to the geophysical setting. The importance of this approach is broad, with implications ranging from the understanding of the role of intermolecular forces in the wetting properties of the ice/ice interface to constructing a budget for the total amount of water in an ice sheet. Additionally, basic applications of grain boundary melting are important in fields from metallurgy and materials science to mineral physics and geoengineering.

  3. SAY NO TO NEW BUDGET CUTS !

    CERN Multimedia

    STAFF ASSOCIATION

    2010-01-01

    In June, CERN Finance Committee postponed its proposals for the 2011 budget and the Director-General’s medium-term plan (2012–2015). The Member State delegations asked for a significant reduction in these budgets. The Staff Association condemns this request for new budget cuts which shows a short-term political vision. It is therefore organizing a demonstration on 25th August to defend basic research in Europe. On this day your presence is indispensable. Enough of simply getting by ! We know that budget cuts and the reduction of deficits are topical in several countries. The areas of research and training are also affected. However, in the case of CERN, severe budgetary constraints have been imposed for several years now, in particular since 1996 when the Organization’s budget was reduced by around 10%, just when the construction of the LHC was due to start. Since then, 100 million Swiss francs have been lost each year, reducing CERN’s resources to a minimum. All e...

  4. PUBLIC EXPENDITURE ON HEALTH IN LOCAL BUDGETS

    Directory of Open Access Journals (Sweden)

    Cristinel ICHIM

    2017-06-01

    Full Text Available This paper entitled "Public expenditure on health in local budgets" aims analysing and deepening major spending categories that public authorities finance at local level, namely health expenditure. In the first part of the article we have specified the content and role of this category of expenditure in local budgets and also made some feedback on decentralization in health. In the second part of the work, based on data available in Statistical Yearbook of Romania, we have carried out an analysis of the dynamics of health spending from local budgets to emphasize their place and role in the health care expenses. The research carried out follows that the evolution and structure of health expenditure financed from local budgets is determined, along with the legislative framework in the field, by several variables that differ from one territorial administrative unit to another: the existence of sanitary units, their type, the involving of local public authorities in their development and modernization, the number and the social structure of the population. The research shows that over the period 1993-2015, the dynamics of the share of health spending in total expenditures of local budgets is sinusoidal, with a minimum threshold in 2000 of only 0.3%.

  5. 75 FR 9073 - Amendments to Rules Requiring Internet Availability of Proxy Materials

    Science.gov (United States)

    2010-02-26

    ... an Internet Web site; it is not intended to serve as a stand-alone basis for making a voting decision... Exchange Commission 17 CFR Parts 230 and 240 Amendments to Rules Requiring Internet Availability of Proxy... Rules Requiring Internet Availability of Proxy Materials AGENCY: Securities and Exchange Commission...

  6. Improving age-depth models using sedimentary proxies for accumulation rates in fluvio-lacustrine deposits

    NARCIS (Netherlands)

    Minderhoud, P.S.J.; Cohen, K.M.|info:eu-repo/dai/nl/185633374; Toonen, W.H.J.|info:eu-repo/dai/nl/317725505; Erkens, G.|info:eu-repo/dai/nl/323349382; Hoek, W.Z.|info:eu-repo/dai/nl/163819394

    2017-01-01

    Lacustrine fills, including those of oxbow lakes in river floodplains, often hold valuable sedimentary and biological proxy records of palaeo-environmental change. Precise dating of accumulated sediments at levels throughout these records is crucial for interpretation and correlation of (proxy) data

  7. 47 CFR 51.513 - Proxies for forward-looking economic cost.

    Science.gov (United States)

    2010-10-01

    ... SERVICES (CONTINUED) INTERCONNECTION Pricing of Elements § 51.513 Proxies for forward-looking economic cost... a cost study that complies with the forward-looking economic cost based pricing methodology... rates that apply in separate geographic areas in a state. (c) Proxies for specific elements—(1) Local...

  8. Diagnostic, Explanatory, and Detection Models of Munchausen by Proxy: Extrapolations from Malingering and Deception

    Science.gov (United States)

    Rogers, Richard

    2004-01-01

    Objective: The overriding objective is a critical examination of Munchausen syndrome by proxy (MSBP) and its closely-related alternative, factitious disorder by proxy (FDBP). Beyond issues of diagnostic validity, assessment methods and potential detection strategies are explored. Methods: A painstaking analysis was conducted of the MSBP and FDBP…

  9. Anxiety and worry when coping with cancer treatment: agreement between patient and proxy responses.

    Science.gov (United States)

    Hermont, Ana Paula; Scarpelli, Ana Carolina; Paiva, Saul M; Auad, Sheyla M; Pordeus, Isabela A

    2015-06-01

    Assess agreement between proxy respondents (caregivers) and children/adolescents related to the impact of cancer on children's/adolescents' health-related quality of life, with respect to anxiety and worry issues. A cross-sectional study was conducted among 83 Brazilian children/adolescents, of both genders, diagnosed with cancer, aged 5-18 years and their proxy respondents. Anxiety and worry were assessed through items of the instrument Pediatric Quality of Life Inventory™ Cancer Module Scale. Participants were recruited from the pediatric hematology/oncology centers at two public hospitals. All individuals were receiving medical care. Descriptive statistics were performed as well as a weighted kappa coefficient, Spearman's correlation coefficient, Wilcoxon signed-rank test and Bland-Altman plots. The magnitude of the difference between the mean scores obtained from children/adolescents and that of their proxy respondents was evaluated through effect size. The proxy respondents underestimated the feelings of worry among children (8-12 years) (p anxiety (p children/adolescents to report increasing feelings of worry as they got older. In the 'treatment anxiety' subscale, there was a tendency for proxy respondents to present higher mean scores, revealing that proxy respondents believed the children's/adolescents' treatment anxiety decreased as they aged. Discrepancies between the reports of children/adolescents and their proxy respondents were observed. Children's/adolescents' reports should not be ignored nor replaced by proxy reports; both reports should be analyzed together.

  10. Patient-rated versus proxy-rated cognitive and functional measures in older adults

    Directory of Open Access Journals (Sweden)

    Howland M

    2017-03-01

    Full Text Available Molly Howland,1 Kevin C Allan,1 Caitlin E Carlton,1 Curtis Tatsuoka,2–4 Kathleen A Smyth,3 Martha Sajatovic1,2,4,5 1Case Western Reserve University School of Medicine, 2Neurological and Behavioral Outcomes Center, University Hospitals Case Medical Center, 3Department of Epidemiology and Biostatistics, 4Department of Neurology, 5Department of Psychiatry, Case Western Reserve University School of Medicine, Cleveland, OH, USA Objectives: Patients with cognitive impairment may have difficulty reporting their functional and cognitive abilities, which are important clinical outcomes. Health care proxies may be able to corroborate patient self-reports. Several studies reported discrepancy between patient and proxy ratings, though the literature is sparse on changes over time of these ratings. Our goals in this 12-month study were to compare patient and proxy reports on functioning, cognition, and everyday executive function, and to further elucidate correlates of patient–proxy discrepancy. Methods: This was a prospective cohort study of individuals older than 70 years who ranged from having no cognitive impairment to having moderate dementia who had a proxy available to complete instruments at baseline (N=76. Measurements included Alzheimer’s Disease Cooperative Study–Activities of Daily Living Inventory (ADCS-ADLI, Neuro-QOL Executive Function, PROMIS Applied Cognition (PROMIS-Cog, Mini-Mental State Examination (MMSE, and Geriatric Depression Scale. Results: Patient- and proxy-rated ADCS-ADLI were correlated at baseline and at 1-year follow-up. Patient and proxy ratings were discrepant on Neuro-QOL Executive Function and PROMIS-Cog. Greater patient–proxy discrepancy on PROMIS-Cog was associated with younger age and less depression, and greater patient–proxy discrepancy on Neuro-QOL Executive Function was associated with less depression and worse cognitive impairment. Patient–proxy discrepancy increased over time for everyday executive

  11. The budget process in schools of nursing: a primer for the novice administrator.

    Science.gov (United States)

    Starck, P L; Bailes, B

    1996-01-01

    All administrators are expected to be competent in budget and financial management. Novice administrators of schools of nursing are expected to know about the budgetary process, budgeting techniques, and the various types of budgets that can be used, such as the open-ended budget, incremental budget, alternate-level budget, quota budget, formula budget, intramural budget, zero-based budget, and cost center budget. In addition, administrators are expected to know what key questions need to be asked about how the budget is structured and revenue sources and how to manage and evaluate their budgets.

  12. Health-related quality of life after stroke: reliability of proxy responses

    DEFF Research Database (Denmark)

    Muus, Ingrid; Petzold, Max; Ringsberg, Karin C

    2009-01-01

    A Danish version of the Stroke-Specific Quality of Life Scale (SSQOL-DK) has been developed for self-reporting; it contains 12 physical and psychosocial domains. The purpose of this study was (a) to assess the reliability of the proxy version of the SSQOL-DK and (b) to evaluate the influence...... of frequency of proxy contact on agreement. In all, 143 patients completed the SSQOL-DK 1 to 5 years post-stroke. A patient chosen proxy completed a proxy version of the same questionnaire. The proxy version showed satisfactory internal consistency (Cronbach's alpha = .85-.95). Agreement was generally high...... of the SSQOL-DK appears to be reliable for use with stroke patients up to a few years following a stroke....

  13. Developing Present-day Proxy Cases Based on NARVAL Data for Investigating Low Level Cloud Responses to Future Climate Change.

    Science.gov (United States)

    Reilly, Stephanie

    2017-04-01

    The energy budget of the entire global climate is significantly influenced by the presence of boundary layer clouds. The main aim of the High Definition Clouds and Precipitation for Advancing Climate Prediction (HD(CP)2) project is to improve climate model predictions by means of process studies of clouds and precipitation. This study makes use of observed elevated moisture layers as a proxy of future changes in tropospheric humidity. The associated impact on radiative transfer triggers fast responses in boundary layer clouds, providing a framework for investigating this phenomenon. The investigation will be carried out using data gathered during the Next-generation Aircraft Remote-sensing for VALidation (NARVAL) South campaigns. Observational data will be combined with ECMWF reanalysis data to derive the large scale forcings for the Large Eddy Simulations (LES). Simulations will be generated for a range of elevated moisture layers, spanning a multi-dimensional phase space in depth, amplitude, elevation, and cloudiness. The NARVAL locations will function as anchor-points. The results of the large eddy simulations and the observations will be studied and compared in an attempt to determine how simulated boundary layer clouds react to changes in radiative transfer from the free troposphere. Preliminary LES results will be presented and discussed.

  14. A Probabilistic Model of Chronological Errors in Layer-Counted Climate Proxies: Applications to Annually-Banded Coral Archives

    Science.gov (United States)

    Comboul, M.; Emile-Geay, J.; Evans, M. N.; Mirnateghi, N.; Cobb, K.; Thompson, D. M.

    2013-12-01

    The ability to precisely date climate proxies is central to the reconstruction of past climate variations. All climate proxies are affected by age uncertainties to some extent, and such age uncertainty is seldom quantified. This work proposes a probabilistic age model for proxies based on layer-counted chronologies, and explores its use for annually-banded coral archives. The model considers both errors due to missing rings and doubly-counted rings, which for simplicity we model as independent processes. The model can accommodate various assumptions about error rates and can be used to quantify how chronological uncertainties impact various diagnostics of variability. In one dimension, we find that time uncertainties primarily affect high-frequency signals (as expected) but also significantly bias the estimate of decadal signals. While tuning the coral data to an independent, tree-ring based chronology [Li et al., 2011] we show that correlations between the two records may be substantially improved by random age perturbations on the order of +/- 5 years per 100 bands in addition to adjustments within the error range of the U/Th dates. Using a synthetic pseudocoral network as testing ground, we quantify uncertainties in the estimation of spatiotemporal patterns of variability. Even for small error rates, the amplitude of multidecadal variability is systematically overestimated at the expense of interannual variability (ENSO, in this case), artificially flattening its spectrum at periods longer than 10 years. Finally, we present an approach to distinguish between chronologies and correct for age uncertainties within a network of time-uncertain records. The method is validated in idealized cases, where it consistently brings age-corrected chronologies closer to the true chronology. This optimization principle, however, is difficult to apply in practice due to the extremely high dimensionality of the space of plausible time perturbations. We end with a discussion of

  15. Budgeting in the Era of Judicial Independence

    Directory of Open Access Journals (Sweden)

    Jesper Wittrup

    2010-04-01

    Full Text Available In this paper judicial independence is viewed from the angle of economics. Economic historians have identified judicial independence as a key element in explaining why some nations have had a more successful economic development than others. Empirically it is shown that perceived judicial independence correlates with economic growth. I argue that the crucial importance of judicial independence and how it is perceived poses a challenge with regard to judicial budgeting, and that this true with regard to both basic models of judicial budgeting presently found in Europe: the traditional model which grants the authority to manage and allocate the judicial budget to the Ministry of Justice, and the more “modern” approach which grants this authority to an independent judicial council. However as illustrated with practical examples, in both cases the use of carefully designed and transparent statistical performance indicators may help authorities to deal more properly with the challenge posed by judicial independence.

  16. Millennial reconstructions: what can we learn from limited proxy data?

    Science.gov (United States)

    Annan, J. D.; Hargreaves, J. C.

    2011-12-01

    Reconstructions of the past millennium can help us to understand recent and future climate change, by placing the recent anthropogenically-forced changes in the context of natural variability. Proxy data prior to the instrumental era are, however, extremely limited, which raises the question of how well we can truly hope to understand the past. Until recently, temperature reconstructions over the past millennium have primarily used statistical regression-based methods, however approaches using data assimilation methodology (in which observational data are blended with dynamical climate models) have shown great potential and are being increasingly adopted. However, rigorous validation of these methods has been somewhat limited. Here we will present the results of some investigations into the performance, and the potential, of data assimilation approaches to estimate the climate state. We use a massive ensemble of the LOVECLIM model to generate precise results which (through being formally optimal) may be considered an upper bound on the performance of more realistic approaches. We show that the limited precision and volume of data places a severe constraint on our ability to reliably reconstruct past climate variability, especially prior to the middle of the last millennium.

  17. Identification of climatic state with limited proxy data

    Directory of Open Access Journals (Sweden)

    J. D. Annan

    2012-07-01

    Full Text Available We investigate the identifiability of the climate by limited proxy data. We test a data assimilation approach through perfect model pseudoproxy experiments, using a simple likelihood-based weighting based on the particle filtering process. Our experimental set-up enables us to create a massive 10 000-member ensemble at modest computational cost, thus enabling us to generate statistically robust results. We find that the method works well when data are sparse and imprecise, but in this case the reconstruction has a rather low accuracy as indicated by residual RMS errors. Conversely, when data are relatively plentiful and accurate, the estimate tracks the target closely, at least when considering the hemispheric mean. However, in this case, our prior ensemble size of 10 000 appears to be inadequate to correctly represent the true posterior, and the regional performance is poor. Using correlations to assess performance gives a more encouraging picture, with significant correlations ranging from about 0.3 when data are sparse to values over 0.7 when data are plentiful, but the residual RMS errors are substantial in all cases. Our results imply that caution is required in interpreting climate reconstructions, especially when considering the regional scale, as skill on this basis is markedly lower than on the large scale of hemispheric mean temperature.

  18. Medieval horse stable; the results of multi proxy interdisciplinary research.

    Science.gov (United States)

    Dejmal, Miroslav; Lisá, Lenka; Fišáková Nývltová, Miriam; Bajer, Aleš; Petr, Libor; Kočár, Petr; Kočárová, Romana; Nejman, Ladislav; Rybníček, Michal; Sůvová, Zdenka; Culp, Randy; Vavrčík, Hanuš

    2014-01-01

    A multi proxy approach was applied in the reconstruction of the architecture of Medieval horse stable architecture, the maintenance practices associated with that structure as well as horse alimentation at the beginning of 13th century in Central Europe. Finally, an interpretation of the local vegetation structure along Morava River, Czech Republic is presented. The investigated stable experienced two construction phases. The infill was well preserved and its composition reflects maintenance practices. The uppermost part of the infill was composed of fresh stabling, which accumulated within a few months at the end of summer. Horses from different backgrounds were kept in the stable and this is reflected in the results of isotope analyses. Horses were fed meadow grasses as well as woody vegetation, millet, oat, and less commonly hemp, wheat and rye. Three possible explanations of stable usage are suggested. The stable was probably used on a temporary basis for horses of workers employed at the castle, courier horses and horses used in battle.

  19. Music Therapy by Proxy: Using Humanised Images in Song

    Directory of Open Access Journals (Sweden)

    Carol Chambers

    2013-07-01

    Full Text Available Developing awareness, exploration and expression of emotionally sensitive issues can be difficult for some clients in music therapy. They may find it hard to express emotion through improvised music and may turn instead to the perceived security of the repetition of known songs.This paper presents the results from a completed research PhD, a qualitative case study based on naturalistic clinical practice, which examined the song choices of one woman in a medium-secure forensic unit over the three-year course of her music therapy. A descriptive narrative account was subjected to analysis according to a modified form of therapeutic narrative analysis (Aldridge and Aldridge 2002, resulting in the abstraction of a series of generative metaphoric images, framed within a chronological series of events. Crucially, these images were found to be humanised figures, yet they were also emotionally decentred or depersonalised. When approached from the philosophical and methodological perspective of behaviourism, which views these as conditioned responses associating music with life experiences as part of a process of developing self-identity, such images can be seen to provide an unspoken voice for the client’s feelings to be expressed in a manner that is personally revealing, socially acceptable, culturally accessible and therapeutically constructive.I assert that using these third-person characters as a form of proxy facilitates mutual reference and experimentation, and places music firmly at the heart of a socially constructed process of music therapy.

  20. A Rare Reason of Hyperinsulinism: Munchausen Syndrome by Proxy.

    Science.gov (United States)

    Akın, Onur; Yeşilkaya, Ediz; Sari, Erkan; Akar, Çağdaş; Başbozkurt, Gökalp; Macit, Enis; Aydin, Ibrahim; Taşlipinar, Abdullah; Gül, Hüsamettin

    2016-01-01

    Hyperinsulinism, one of the most important causes of hypoglycaemia, can be congenital or acquired. Rarely, drug toxicity can be a reason for hyperinsulinism. In the context of Munchausen syndrome by proxy (MSP), toxicity usually occurs in children due to drug administration by a parent or caregiver. A 7-year-old girl was referred to our department due to a hyperglycaemic period and hypoglycaemic episodes. On admission, gliclazide was initiated due to her hyperglycaemia, which we attributed to maturity onset diabetes of the young. However, during follow-up, hypoglycaemic levels were detected. Despite cessation of gliclazide, hypoglycaemic seizures occurred. Even with the medications administered, hypoglycaemia could not be prevented. During follow-up, the mother's affect, characterized by anxiety and interest in her daughter's medical care, appeared discordant with the situation. Due to our suspicion of MSP, we discovered toxic levels of gliclazide in the blood and urine samples which had been sent to the toxicology laboratory to search for hypoglycaemic agents. The patient was isolated, and all medications were stopped. After isolation, her hypoglycaemia disappeared, and she became hyperglycaemic (250 mg/dl). Physicians should consider the possibility of MSP in hyperinsulinaemic patients with discordant laboratory results and clinical symptoms, even if the child's parents display great concern. © 2016 S. Karger AG, Basel.