WorldWideScience

Sample records for risk sharing scheme

  1. Intergenerational risk sharing and endogenous labour supply within funded pension schemes

    NARCIS (Netherlands)

    Bonenkamp, J.; Westerhout, E.

    2014-01-01

    Funded defined-benefit pensions add to welfare on account of providing intergenerational risk sharing, but lower it on account of inducing labour supply distortions. We show that a properly designed funded defined-benefit pension scheme involves a welfare improvement even if contributions are

  2. Risk:reward sharing contracts in the oil industry: the effects of bonus:penalty schemes

    International Nuclear Information System (INIS)

    Kemp, A.G.; Stephen, L.

    1999-01-01

    Partnering and alliancing among oil companies and their contractors have become common in the oil industry in recent years. The risk:reward mechanisms established very often incorporate bonus/penalty schemes in relation to agreed base values. This paper examines the efficiency requirements of such schemes. The effects of project cost and completion risks on the risk: reward positions of field investors and contractors with and without bonus/penalty schemes are examined with the aid of Monte Carlo simulation analysis. The schemes increase the total risk for contractors and have consequence for their cost of capital and optimal risk-bearing arrangements within the industry. (author)

  3. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  4. Multiple sclerosis risk sharing scheme: two year results of clinical cohort study with historical comparator.

    Science.gov (United States)

    Boggild, Mike; Palace, Jackie; Barton, Pelham; Ben-Shlomo, Yoav; Bregenzer, Thomas; Dobson, Charles; Gray, Richard

    2009-12-02

    To generate evidence on the longer term cost effectiveness of disease modifying treatments in patients with relapsing-remitting multiple sclerosis. Prospective cohort study with historical comparator. Specialist multiple sclerosis clinics in 70 centres in the United Kingdom. Patients with relapsing-remitting multiple sclerosis who started treatment from May 2002 to April 2005 under the UK risk sharing scheme. Treatment with interferon beta or glatiramer acetate in accordance with guidelines of the UK Association of British Neurologists. Observed utility weighted progression in disability at two years' follow-up assessed on the expanded disability status scale (EDSS) compared with that expected by applying the progression rates in a comparator dataset, modified for patients receiving treatment by multiplying by the hazard ratio derived separately for each disease modifying treatment from the randomised trials. In the primary per protocol analysis, progression in disability was worse than that predicted and worse than that in the untreated comparator dataset ("deviation score" of 113%; excess in mean disability status scale 0.28). In sensitivity analyses, however, the deviation score varied from -72% (using raw baseline disability status scale scores, rather than applying a "no improvement" algorithm) to 156% (imputing missing data for year two from progression rates for year one). It is too early to reach any conclusion about the cost effectiveness of disease modifying treatments from this first interim analysis. Important methodological issues, including the need for additional comparator datasets, the potential bias from missing data, and the impact of the "no improvement" rule, will need to be addressed and long term follow-up of all patients is essential to secure meaningful results. Future analyses of the cohort are likely to be more informative, not least because they will be less sensitive to short term fluctuations in disability.

  5. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  6. Impact of a financial risk-sharing scheme on budget-impact estimations: a game-theoretic approach.

    Science.gov (United States)

    Gavious, Arieh; Greenberg, Dan; Hammerman, Ariel; Segev, Ella

    2014-06-01

    As part of the process of updating the National List of Health Services in Israel, health plans (the 'payers') and manufacturers each provide estimates on the expected number of patients that will utilize a new drug. Currently, payers face major financial consequences when actual utilization is higher than the allocated budget. We suggest a risk-sharing model between the two stakeholders; if the actual number of patients exceeds the manufacturer's prediction, the manufacturer will reimburse the payers by a rebate rate of α from the deficit. In case of under-utilization, payers will refund the government at a rate of γ from the surplus budget. Our study objective was to identify the optimal early estimations of both 'players' prior to and after implementation of the risk-sharing scheme. Using a game-theoretic approach, in which both players' statements are considered simultaneously, we examined the impact of risk-sharing within a given range of rebate proportions, on players' early budget estimations. When increasing manufacturer's rebate α to be over 50 %, then manufacturers will announce a larger number, and health plans will announce a lower number of patients than they would without risk sharing, thus substantially decreasing the gap between their estimates. Increasing γ changes players' estimates only slightly. In reaction to applying a substantial risk-sharing rebate α on the manufacturer, both players are expected to adjust their budget estimates toward an optimal equilibrium. Increasing α is a better vehicle for reaching the desired equilibrium rather than increasing γ, as the manufacturer's rebate α substantially influences both players, whereas γ has little effect on the players behavior.

  7. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  8. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  9. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  10. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  11. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  12. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  13. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  14. Globalization and Risk Sharing

    OpenAIRE

    Jaume Ventura; Fernando A. Broner

    2006-01-01

    We study the effects of globalization on risk sharing and welfare. Like the previous literature, we assume that governments cannot commit to enforce the repayment of debts owed by their citizens. Unlike the previous literature, we assume that governments cannot discriminate between domestic and foreign creditors when enforcing debt payments. This creates novel interactions between domestic and international trade in assets. (i) Increases in domestic trade raise the benefits of enforcement and...

  15. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  16. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  17. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  18. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  19. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  20. [Risk sharing methods in middle income countries].

    Science.gov (United States)

    Inotai, András; Kaló, Zoltán

    2012-01-01

    The pricing strategy of innovative medicines is based on the therapeutic value in the largest pharmaceutical markets. The cost-effectiveness of new medicines with value based ex-factory price is justifiable. Due to the international price referencing and parallel trade the ex-factory price corridor of new medicines has been narrowed in recent years. Middle income countries have less negotiation power to change the narrow drug pricing corridor, although their fair intention is to buy pharmaceuticals at lower price from their scarce public resources compared to higher income countries. Therefore the reimbursement of new medicines at prices of Western-European countries may not be justifiable in Central-Eastern European countries. Confidential pricing agreements (i.e. confidential price discounts, claw-back or rebate) in lower income countries of the European Union can alleviate this problem, as prices of new medicines can be adjusted to local purchasing power without influencing the published ex-factory price and so the accessibility of patients to these drugs in other countries. In order to control the drug budget payers tend to apply financial risk sharing agreements for new medicines in more and more countries to shift the consequences of potential overspending to pharmaceutical manufacturers. The major paradox of financial risk-sharing schemes is that increased mortality, poor persistence of patients, reduced access to healthcare providers, and no treatment reduce pharmaceutical spending. Consequently, payers have started to apply outcome based risk sharing agreements for new medicines recently to improve the quality of health care provision. Our paper aims to review and assess the published financial and outcome based risk sharing methods. Introduction of outcome based risk-sharing schemes can be a major advancement in the drug reimbursement strategy of payers in middle income countries. These schemes can help to reduce the medical uncertainty in coverage

  1. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  2. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  3. Trial of car-sharing scheme at CERN

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    On 6 July, a sample group of approximately 500 users started a six-month trial of a new car-sharing scheme. The project is an initiative of the General Infrastructure Services Department (GS), in collaboration with the Physics Department (PH) and Hertz car rentals.   One of the Hertz share cars.   How many times have you found yourself searching fruitlessly for a parking space? How many times have you decided against using your car to run a short errand because you were worried about being able to find another parking space? Over the last 50 years, the number of users at CERN has grown steadily, and it is gratifying that the total number now exceeds 10,000. Other contributing factors include the re-start of the LHC and the introduction of the new tram line in May 2011, which is expected to lead to people parking their vehicles at CERN for the purpose of taking the tram into Geneva.. This is why transportation has become an important priority. The present trial is an integral part of CERN...

  4. CERN car sharing scheme now open to everyone

    CERN Multimedia

    GS Department

    2011-01-01

    The CERN car sharing service is a self-service scheme providing a pool of 30 CERN cars available for pick-up free of charge from 13 points around the Meyrin and Prévessin sites. From Thursday, 1st December 2011, the service will be open to all members of the CERN personnel and contractors' personnel, in the framework of their professional activities at CERN only. The conditions of use can be consulted at: http://gs-dep.web.cern.ch/en/content/Mobility/Car_sharing To be able to use the service, members of the CERN personnel and contractors' personnel must: have a contractual link to CERN, possess an e-mail address registered in the CERN databases; hold an RFID access card, which can be obtained from the CERN Car Pool on presentation of a valid CERN access card. Car Pool, Building 130-R-012, open Monday-Friday, 8.00 a.m.-12.00 noon/1.00 p.m.-5.00 p.m. https://gs-dep.web.cern.ch/en/content/car-pool GS-IS

  5. Esquemas innovadores de mejora del acceso al mercado de nuevas tecnologías: los acuerdos de riesgo compartido Innovative patient access schemes for the adoption of new technology: risk-sharing agreements

    Directory of Open Access Journals (Sweden)

    Jaime Espín

    2010-12-01

    . However, traditional schemes based on fixed prices that fail to consider the product´s appropriacy of use or its results in terms of effectiveness may lead to inefficient decision-making processes. Recently, risk-sharing agreements have appeared as new access schemes based on results that aim to reduce the uncertainty of the distinct health care players involved in reaching an agreement on new health technology financing and conditions of use. Key elements in the debate on these instruments are the huge variety of instruments available (especially those based on results, the implications for different players involved in their design and supervision, and their possible implementation in Spain. Our main conclusion is that risk-sharing agreements should be used in highly limited cases when standard conditions of access cannot be applied due to uncertainty about long-term effectiveness. These measures are aimed not only at regulating price but also at acting on the appropriate use of new technology. However, because international experience is limited, drawing a solid conclusion on the final results of the application of risk-sharing agreements would be premature.

  6. Facilitating Shared Understandings of Risk

    DEFF Research Database (Denmark)

    Mitchell, Robb

    This thesis contributes an identification of a key mechanism and its constituent qualities, for facilitating shared understandings of risk. Globalisation and the pace of technological change increases the uncertainties of decision making within many design and innovation practices. Accordingly......, the focus of participatory workshops has expanded towards addressing broader questions of strategy, business models and other organizational and inter-organisational issues. To develop effective partnerships across the boundaries separating companies, I argue that is necessary for those involved to gain...... or proxy for absent others, 4) an incomplete comic with which children could contribute sketched ideas to a design process 5) a table top tool kits for discussing business relationship issues and 5) a number of bespoke interactive sculpture-like artifacts for provoking insights concerning business dilemmas...

  7. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  8. Construction of a knowledge classification scheme for sharing and usage of knowledge

    International Nuclear Information System (INIS)

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  9. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  10. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  11. Risk taking and risk sharing does responsibility matter?

    NARCIS (Netherlands)

    Cettolin, E.; Tausch, F.

    2013-01-01

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  12. Risk taking and risk sharing : does responsibility matter?

    NARCIS (Netherlands)

    Cettolin, Elena; Tausch, Franziska

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  13. The Political Economy of Intergenerational Risk Sharing

    NARCIS (Netherlands)

    Hollanders, D.A.

    2010-01-01

    This paper analyses the political constraints of intergenerational risk sharing. The rst result is that the political process generally does not lead to ex ante optimal insurance. The second result is that in a second best political setting PAYG still contributes to intergenerational risk sharing.

  14. Contract of Shared Risk. New investment opportunities

    International Nuclear Information System (INIS)

    Carta Petrolera

    1997-01-01

    In order to offering to the private capital, new investment opportunities in exploration and production in Colombia, ECOPETROL settled down since 1996 the Contract of Shared Risk. This is a novel recruiting modality, because the shared risk is applied to the exploratory areas that are assigned for the direct operation of ECOPETROL

  15. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  16. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  17. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  18. A Hierarchical Control Scheme for Reactive Power and Harmonic Current Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Firoozabadi, Mehdi Savaghebi; Askarian Abyaneh, Hossein

    2015-01-01

    In this paper, a hierarchical control scheme consisting of primary and secondary levels is proposed for achieving accurate reactive power and harmonic currents sharing among interface inverters of distributed generators (DGs) in islanded microgrids. Firstly, fundamental and main harmonic componen...

  19. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M.

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants

  20. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  1. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  2. Framework for Shared Drinking Water Risk Assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Thomas Stephen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tidwell, Vincent C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Roger [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Binning, David [AEM Corp., Herndon, VA (United States); Meszaros, Jenny [AEM Corp., Herndon, VA (United States)

    2017-01-01

    Central to protecting our nation's critical infrastructure is the development of methodologies for prioritizing action and supporting resource allocation decisions associated with risk-reduction initiatives. Toward this need a web-based risk assessment framework that promotes the anonymous sharing of results among water utilities is demonstrated. Anonymous sharing of results offers a number of potential advantages such as assistance in recognizing and correcting bias, identification of 'unknown, unknowns', self-assessment and benchmarking for the local utility, treatment of shared assets and/or threats across multiple utilities, and prioritization of actions beyond the scale of a single utility. The constructed framework was demonstrated for three water utilities. Demonstration results were then compared to risk assessment results developed using a different risk assessment application by a different set of analysts.

  3. Sharing of risks in Islamic finance

    OpenAIRE

    Sekreter, Ahmet

    2011-01-01

    For most of the people the prohibition on interest is the well known part of Islamic finance. Indeed, the concept of Islamic finance was not being discussed enough till financial crisis, after crisis it started to be seen as an alternative financial system for conventional finance. Sharing the risks is the main concept of Islamic finance and one of the main differences between conventional and Islamic finance. Depositors/savers do not bear any risk in conventional finance however Islamic fina...

  4. Mutuality and solidarity: assessing risks and sharing losses.

    Science.gov (United States)

    Wilkie, D

    1997-01-01

    Mutuality is the principle of private, commercial insurance; individuals enter the pool for sharing losses, and pay according to the best estimate of the risk they bring with them. Solidarity is the sharing of losses with payment according to some other scheme; this is the principle of state social insurance; essential features of solidarity are comprehensiveness and compulsion. Private insurance is subject to the uberrima fides principle, or utmost good faith; each side declares all it knows about the risk. The Disability Discrimination Act requires insurers to justify disability discrimination on the basis of relevant information, acturial, statistical or medical, on which it is reasonable to rely. It could be very damaging to private insurance to abandon uberrima fides. However, although some genetic information is clearly useful to underwriters, other information may be so general as to be of little use. The way in which mortality rates are assessed is also explained. PMID:9304668

  5. Risk-sharing agreements in the EU

    DEFF Research Database (Denmark)

    Traulsen, Janine Marie; Traulsen, Janine Marie; Holm-Larsen, Tove

    2017-01-01

    Abstract Objective Our objectives were to explore the changes in the level of interest in risk-sharing agreements (RSAs) in the EU during the last 15 years and the underlying reasons for these changes. Methods A systematic literature review was conducted using PubMed, Scopus, Web of Science...

  6. Pension systems, intergenerational risk sharing and inflation

    NARCIS (Netherlands)

    Beetsma, R.M.W.J.; Bovenberg, A.L.

    2006-01-01

    We investigate intergenerational risk sharing in two-pillar pension systems with a pay-as-you-go pillar and a funded pillar. We consider shocks in productivity, depreciation of capital and inflation. The funded pension pillar can be either defined contribution or defined benefit, with benefits

  7. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  8. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  9. 24 CFR 266.15 - Risk-Sharing Agreement.

    Science.gov (United States)

    2010-04-01

    ... HOUSING FINANCE AGENCY RISK-SHARING PROGRAM FOR INSURED AFFORDABLE MULTIFAMILY PROJECT LOANS General Provisions § 266.15 Risk-Sharing Agreement. Execution of a Risk-Sharing Agreement is a prerequisite to... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Risk-Sharing Agreement. 266.15...

  10. A load-sharing control scheme for a microgrid with a fixed frequency inverter

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhihao; Huang, Xinhong; Jiang, Jin [Department of Electrical and Computer Engineering, The University of Western Ontario, 1151 Richmond St., London, Ontario (Canada); Wu, Bin [Department of Electrical and Computer Engineering, Ryerson University, Toronto, Ontario (Canada)

    2010-03-15

    In this paper, a load-sharing control strategy is developed for a microgrid consisting of a fuel cell power module and two synchronous generators in a stand-alone environment. The fuel cell is interfaced with the synchronous generators through a DC/AC inverter to convert unregulated DC to a three-phase AC. Since the frequency of the DC/AC inverter is fixed, the conventional load-frequency control scheme cannot be used for load-sharing control. To alleviate this problem, a load-voltage control scheme is developed. The theoretical analysis and experimental validation of the proposed scheme are presented. It is shown, by theoretical analysis and experiments, that this control strategy can effectively distribute the load among the different energy sources based on their individual pre-defined load-voltage droop characteristics. (author)

  11. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2014-04-01

    This paper focuses on the development of multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, two scheduling schemes are proposed for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme focuses on optimizing the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base station (BS) scans the secondary users in a sequential manner until a user whose channel quality is above an acceptable predetermined threshold is found. We develop expressions for the statistics of the signal-to-interference and noise ratio as well as the average spectral efficiency, average feedback load, and the delay at the secondary BS. We then present numerical results for the effect of the number of users and the interference constraint on the optimal switching threshold and the system performance and show that our analysis results are in perfect agreement with the numerical results. © 2014 John Wiley & Sons, Ltd.

  12. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  13. Risk Management Collaboration through Sharing Interactive Graphics

    Science.gov (United States)

    Slingsby, Aidan; Dykes, Jason; Wood, Jo; Foote, Matthew

    2010-05-01

    Risk management involves the cooperation of scientists, underwriters and actuaries all of whom analyse data to support decision-making. Results are often disseminated through static documents with graphics that convey the message the analyst wishes to communicate. Interactive graphics are increasingly popular means of communicating the results of data analyses because they enable other parties to explore and visually analyse some of the data themselves prior to and during discussion. Discussion around interactive graphics can occur synchronously in face-to-face meetings or with video-conferencing and screen sharing or they can occur asynchronously through web-sites such as ManyEyes, web-based fora, blogs, wikis and email. A limitation of approaches that do not involve screen sharing is the difficulty in sharing the results of insights from interacting with the graphic. Static images accompanied can be shared but these themselves cannot be interacted, producing a discussion bottleneck (Baker, 2008). We address this limitation by allowing the state and configuration of graphics to be shared (rather than static images) so that a user can reproduce someone else's graphic, interact with it and then share the results of this accompanied with some commentary. HiVE (Slingsby et al, 2009) is a compact and intuitive text-based language that has been designed for this purpose. We will describe the vizTweets project (a 9-month project funded by JISC) in which we are applying these principles to insurance risk management in the context of the Willis Research Network, the world's largest collaboration between the insurance industry and the academia). The project aims to extend HiVE to meet the needs of the sector, design, implement free-available web services and tools and to provide case studies. We will present a case study that demonstrate the potential of this approach for collaboration within the Willis Research Network. Baker, D. Towards Transparency in Visualisation Based

  14. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  15. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  16. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  17. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  18. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  19. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  20. Agent-based power sharing scheme for active hybrid power sources

    Science.gov (United States)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  1. An Enhanced Power Sharing Scheme for Voltage unbalance and harmonics compensation in an islanded AC microgrid

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2016-01-01

    In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled to autonomou......In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled...... to autonomously compensate voltage unbalance and harmonics while sharing the compensation effort for the real power, reactive power, unbalance and harmonic powers. The proposed control system of the microgrid mainly consists of the positive sequence real and reactive power droop controllers, voltage and current......) technique is adopted to send the compensation command of the secondary control and auxiliary control from the microgrid control center (MGCC) to the local controllers of DG unit. Finally, the hardware-in-the-loop (HIL) results using dSPACE 1006 platform are presented to demonstrate the effectiveness...

  2. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  3. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  4. Iterative schemes for parallel Sn algorithms in a shared-memory computing environment

    International Nuclear Information System (INIS)

    Haghighat, A.; Hunter, M.A.; Mattis, R.E.

    1995-01-01

    Several two-dimensional spatial domain partitioning S n transport theory algorithms are developed on the basis of different iterative schemes. These algorithms are incorporated into TWOTRAN-II and tested on the shared-memory CRAY Y-MP C90 computer. For a series of fixed-source r-z geometry homogeneous problems, it is demonstrated that the concurrent red-black algorithms may result in large parallel efficiencies (>60%) on C90. It is also demonstrated that for a realistic shielding problem, the use of the negative flux fixup causes high load imbalance, which results in a significant loss of parallel efficiency

  5. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  6. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  7. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  8. Adaptive transmission schemes for MISO spectrum sharing systems: Tradeoffs and performance analysis

    KAUST Repository

    Bouida, Zied

    2014-10-01

    In this paper, we propose a number of adaptive transmission techniques in order to improve the performance of the secondary link in a spectrum sharing system. We first introduce the concept of minimum-selection maximum ratio transmission (MS-MRT) as an adaptive variation of the existing MRT (MRT) technique. While in MRT all available antennas are used for transmission, MS-MRT uses the minimum subset of antennas verifying both the interference constraint (IC) to the primary user and the bit error rate (BER) requirements. Similar to MRT, MS-MRT assumes that perfect channel state information (CSI) is available at the secondary transmitter (ST), which makes this scheme challenging from a practical point of view. To overcome this challenge, we propose another transmission technique based on orthogonal space-time block codes with transmit antenna selection (TAS). This technique uses the full-rate full-diversity Alamouti scheme in order to maximize the secondary\\'s transmission rate. The performance of these techniques is analyzed in terms of the average spectral efficiency (ASE), average number of transmit antennas, average delay, average BER, and outage performance. In order to give the motivation behind these analytical results, the tradeoffs offered by the proposed schemes are summarized and then demonstrated through several numerical examples.

  9. Risk Aversion and Engagement in the Sharing Economy

    Directory of Open Access Journals (Sweden)

    Jessica Santana

    2015-10-01

    Full Text Available The sharing economy is a new online community that has important implications for offline behavior. This study evaluates whether engagement in the sharing economy is associated with an actor’s aversion to risk. Using a web-based survey and a field experiment, we apply an adaptation of Holt and Laury’s (2002 risk lottery game to a representative sample of sharing economy participants. We find that frequency of activity in the sharing economy predicts risk aversion, but only in interaction with satisfaction. While greater satisfaction with sharing economy websites is associated with a decrease in risk aversion, greater frequency of usage is associated with greater risk aversion. This analysis shows the limitations of a static perspective on how risk attitudes relate to participation in the sharing economy.

  10. The Influence of Employee Share Ownership Schemes on Firm Performance: the Case of Zimbabwean Firms

    Directory of Open Access Journals (Sweden)

    Maxwell Sandada

    2016-04-01

    Full Text Available The purpose of this study was to examine the influence of employee share ownership schemes on firm performance in the case of Zimbabwean companies. The study sought to provide valuable insights on the influence of this initiative on employee productivity and organisational performance in Zimbabwe. A cross sectional design was employed to collect data from Confederation of Zimbabwe Industry listed companies using simple random sampling. The study revealed that financial benefits from EOSs, employee participation, ECOS communication and percentage of shareholding have a significant positive relationship with firm performance. The study has important implications for the implementation and management of ESOs in the context of a development country such as Zimbabwe.

  11. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing

    Directory of Open Access Journals (Sweden)

    Daisuke Mashima

    2018-03-01

    Full Text Available Thanks to the roll-out of smart meters, availability of fine-grained electricity usage data has rapidly grown. Such data has enabled utility companies to perform robust and efficient grid operations. However, at the same time, privacy concerns associated with sharing and disclosure of such data have been raised. In this paper, we first demonstrate the feasibility of estimating privacy-sensitive household attributes based solely on the energy usage data of residential customers. We then discuss a framework to measure privacy gain and evaluate the effectiveness of customer-centric privacy-protection schemes, namely redaction of data irrelevant to services and addition of bounded artificial noise. Keywords: Privacy, Smart meter data, Quantitative evaluation

  12. The Foreign Investment Risks of Chinese B Share Market

    OpenAIRE

    JIANG, MINCHANG

    2014-01-01

    The objective of this dissertation is to investigate and analyse the risks existing in Chinese B share market for foreign investment. Based on the brief history of B share market as well as background information such as characteristics of Chinese stock exchange, several areas of risks are identified as: macroeconomic risks, stock volatility and return including cross-impacts among market segmentations and different countries’ markets, financial market and currency risks, and finally the poli...

  13. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  14. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.

    2014-11-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary receiver (PU-Rx). In this paper, we consider a secondary link composed of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx). The secondary link is allowed to share the spectrum with a primary network composed of multiple PUs communicating over distinct frequency spectra with a primary base station. We develop a transmission scheme where the SU-Tx initially broadcasts a set of random beams over all the available primary spectra for which the PU-Rx sends back the index of the spectrum with the minimum interference level, as well as information that describes the interference value, for each beam. Based on the feedback information on the PU-Rx, the SU-Tx adapts the transmitted beams and then resends the new beams over the best primary spectrum for each beam to the SU-Rx. The SU-Rx selects the beam that maximizes the received signal-to-interference-plus-noise ratio (SINR) to be used in transmission over the next frame. We consider three cases for the level of feedback information describing the interference level. In the first case, the interference level is described by both its magnitude and phase; in the second case, only the magnitude is considered; and in the third case, we focus on a q-bit description of its magnitude. In the latter case, we propose a technique to find the optimal quantizer thresholds in a mean-square-error sense. We also develop a statistical analysis for the SINR statistics and the capacity and bit error rate of the secondary link and present numerical results that study the impact of the different system parameters.

  15. Egalitarian Risk Sharing under Liquidity Constraints

    NARCIS (Netherlands)

    Koster, M.; Boonen, T.

    2014-01-01

    Undertaking joint projects in practice involves a lot of uncertainty, especially when it comes to the final costs. This paper addresses the problem of sharing realized costs by the participants, subject to their indvidual liquidity constraints. If all cost levels can be accounted for, and it the

  16. Risk sharing, public policy and the contribution of Islamic finance

    Directory of Open Access Journals (Sweden)

    Hossein Askari

    2014-12-01

    Full Text Available A major reason for the recurrent episodes of financial instability is the predominance of interest-based debt and leveraging. Financial stability is achievable through risk sharing finance instead of risk shifting that characterizes contemporary finance. A risk sharing system serves the true function of finance as facilitator of real sector activities and avoids the emergence of a “paper economy” where there is gradual decoupling of finance from the real sector. Islamic finance was initially proposed as a profit-loss sharing system, but its core principle is risk sharing. In prohibiting interest-based debt instruments, Islam grounds finance on a strong risk sharing footing. Although still a young industry that has come a long way, it has not managed to develop truly risk-sharing instruments that would allow individuals, households, and firms as well as whole economies to mitigate systematic and un-systematic risks. It is suggested that governments should intervene and issue macro-market instruments to provide their treasuries with a significant source of non-interest rate based financing while promoting risk sharing. Moreover, given that evidence across the world suggests that monetary policy’s transmission mechanism may be impaired, it is suggested that these government issued securities could also impart added potency to monetary policy.

  17. Online Information Sharing About Risks: The Case of Organic Food.

    Science.gov (United States)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  18. Bicycle and Car Share Schemes as Inclusive Modes of Travel? A Socio-Spatial Analysis in Glasgow, UK

    Directory of Open Access Journals (Sweden)

    Julie Clark

    2016-06-01

    Full Text Available Public bicycle and car sharing schemes have proliferated in recent years and are increasingly part of the urban transport landscape. Shared transport options have the potential to support social inclusion by improving accessibility: these initiatives could remove some of the barriers to car ownership or bicycle usage such as upfront costs, maintenance and storage. However, the existing evidence base indicates that, in reality, users are most likely to be white, male and middle class. This paper argues that there is a need to consider the social inclusivity of sharing schemes and to develop appropriate evaluation frameworks accordingly. We therefore open by considering ways in which shared transport schemes might be inclusive or not, using a framework developed from accessibility planning. In the second part of the paper, we use the case study of Glasgow in Scotland to undertake a spatial equity analysis of such schemes. We examine how well they serve different population groups across the city, using the locations of bicycle stations and car club parking spaces in Glasgow, comparing and contrasting bike and car. An apparent failure to deliver benefits across the demographic spectrum raises important questions about the socially inclusive nature of public investment in similar schemes.

  19. Petroleum tax systems and risk sharing

    International Nuclear Information System (INIS)

    Sunnevaag, K.

    1992-12-01

    We have focused on four different measures of risk, well known from the finance literature, namely sensitivity, standard deviation, coefficient of variation and finally probability of a negative expected net present value (NPV). While the two first measures show that the state carries most of the risk, the latter measures show the opposite result. Whether or not the project is developed on a stand-alone or on-going basis, has a crucial impact on much risk the company carries. We have also looked at the risk development as a consequence of changes in tax regime. While the two first measures of risk (sensitivity and standard deviation) show an increase in risk for the company from the pre 1987 tax regime to the 1987-1991 tax regime, and a decrease in risk as a consequence of the last change, the opposite is the case when we look at the two last measures of risk, namely coefficient of variation and probability of a negative expected NPV. The same is the conclusion for the state, except that the sign of change is the opposite that of the company. This analysis could have been extended to include a risk concept based on the well known Capital Asset Pricing Model, which is relevant risk, or covariance risk. This model concludes that the return on any risky asset is a function of the correlation between the return on this asset and the market portfolio. In this case only the projects contribution to the portfolio risk should be accounted for. For the Norwegian state it is not unreasonable to assume that the risk contribution of a medium sized oil field to a big portfolio of fields and onshore activities only is marginal. For the national or international oil company it is somewhat less marginal, and for a company developing the field on a stand-alone basis it is substantial. 12 refs., 15 figs

  20. Financial risk-sharing in updating the National List of Health Services in Israel: stakeholders' perceived interests.

    Science.gov (United States)

    Hammerman, Ariel; Feder-Bubis, Paula; Greenberg, Dan

    2012-01-01

    Risk-sharing is being considered by many health care systems to address the financial risk associated with the adoption of new technologies. We explored major stakeholders' views toward the potential implementation of a financial risk-sharing mechanism regarding budget-impact estimates for adding new technologies to the Israeli National List of Health Services. According to our proposed scheme, health plans will be partially compensated by technology sponsors if the actual use of a technology is substantially higher than what was projected and health plans will refund the government for budgets that were not fully utilized. By using a semi-structured protocol, we interviewed major stakeholders involved in the process of updating the National List of Health Services (N = 31). We inquired into participants' views toward our proposed risk-sharing mechanism, whether the proposed scheme would achieve its purpose, its feasibility of implementation, and their opinion on the other stakeholders' incentives. Participants' considerations were classified into four main areas: financial, administrative/managerial, impact on patients' health, and influence on public image. Most participants agreed that the conceptual risk-sharing scheme will improve the accuracy of early budget estimates and were in favor of the proposed scheme, although Ministry of Finance officials tended to object to it. The successful implementation of risk-sharing schemes depends mainly on their perception as a win-win situation by all stakeholders. The perception exposed by our participants that risk-sharing can be a tool for improving the accuracy of early budget-impact estimates and the challenges pointed by them are relevant to other health care systems also and should be considered when implementing similar schemes. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  1. Risk taking and risk sharing: does responsibility matter? (RM/13/045-revised-)

    NARCIS (Netherlands)

    Cettolin, Elena; Tausch, Franziska

    2016-01-01

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  2. Modifiable risk factors for prescription medicine sharing behaviours.

    Science.gov (United States)

    Beyene, Kebede; Aspden, Trudi; McNeill, Rob; Sheridan, Janie

    2018-04-06

    Prescription medicine sharing has been defined as giving one's own medicine to someone else (lending) or taking someone else's medicine (borrowing). Medicines can be shared for non-medical purposes (recreational sharing or drug abuse) or for their intended therapeutic benefits (non-recreational sharing, e.g. sharing antibiotics to self-treat); the latter is the focus of this research. Limited research evidence is available about modifiable risk factors for non-recreational medicine sharing and addressing this issue was the main aim of this research. An online, cross-sectional survey design was used. The study population comprised a convenience sample of 233 adults, who were primarily recruited through patient support groups across New Zealand. Principal component analysis was used to develop scales assessing attitudes toward medicine lending and borrowing. Logistic regression was used to examine the relationship between explanatory (demographics, medical conditions, and attitudes towards medicine sharing) and outcome (medicine sharing behaviours) variables. Half of the study participants reported ever borrowing/lending medicines, and approximately a third of participants reported borrowing/lending in the past year. Modifiable risk factors associated with an increased risk of medicine borrowing behaviour were having more difficulty with accessing medicine ('access-related issue'), stronger 'emotional beliefs about borrowing', and greater 'concern about missing doses.' Greater 'concern for the wellbeing of others' and stronger 'beliefs about the benefits and safety of lending' were associated with an increased risk of medicine lending behaviour. Those with a higher 'perceived risk of harm' were less likely to borrow or lend medicines. This research expands the current knowledge of medicine sharing by examining underlying behavioural factors which predict sharing behaviours and that can be modified by interventions. This research suggests using multifaceted

  3. Online Information Sharing About Risks : The Case of Organic Food

    NARCIS (Netherlands)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-01-01

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic

  4. Game-theoretic approaches to optimal risk sharing

    NARCIS (Netherlands)

    Boonen, T.J.

    2014-01-01

    This Ph.D. thesis studies optimal risk capital allocation and optimal risk sharing. The first chapter deals with the problem of optimally allocating risk capital across divisions within a financial institution. To do so, an asymptotic approach is used to generalize the well-studied Aumann-Shapley

  5. Clarification of nuclear risk recognition scheme through dialogue forum

    International Nuclear Information System (INIS)

    Yagi, Ekou; Takahashi, Makoto; Kitamura, Masaharu

    2007-01-01

    The design framework and operational guidelines for conducting repetitive dialogue between public and nuclear engineers are described in this paper. An action research project named repetitive dialogue forum has been conducted in two municipalities where nuclear facilities were sited. The qualitative evaluation by public participants indicated that the public trust in the nuclear experts, known as the crucial factor for meaningful communication, was successfully established through the dialogue forum. In addition, the expert showed a marked psychological change from distrust to trust in public. Through a detailed analysis of the comments of the participants raised during the forums, the nuclear risk recognition scheme of the public was clarified. The constituents of the risk recognition scheme about nuclear facilities were identified as follows. The first is related to the technical risk recognition factor including purely technical risk, organizational elements and regulatory elements. The second is the social risk recognition factor including economical and mental elements. The last is the communication factor including the influence of mass media, difficulty in frank communication in local community etc. It became clear that the information provision activities conducted by the government and the nuclear industry were lack of in-depth understanding of actual information needs in the public. Provision of information contents consistent with our observations is recommended for reestablishment of public trust in expert and for more informative dialogical interactions. (author)

  6. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  7. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    KAUST Repository

    Sayed, Mostafa

    2012-12-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary licensed user under the condition that the interference at the the primary user receiver (PU-Rx) is below a predetermined threshold. Joint primary spectrum and transmit antenna selection diversity schemes can be utilized as an efficient way to meet the quality of service (QoS) demands of the SUs while satisfying the interference constraint. In this paper, we consider a secondary link comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with a number of primary users (PUs) operating at distinct spectra. We present a performance analysis for two primary spectrum and transmit antenna switched selection schemes with different amount of feedback requirements. In particular, assuming Rayleigh fading and BPSK transmission, we derive approximate BER expressions for the presented schemes. For the sake of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified with numerical simulations. © 2012 IEEE.

  8. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Tourki, Kamel; Alouini, Mohamed-Slim

    2014-01-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary

  9. Risk aversion affects economic values of blue fox breeding scheme.

    Science.gov (United States)

    Peura, J; Kempe, R; Strandén, I; Rydhmer, L

    2016-12-01

    The profit and production of an average Finnish blue fox farm was simulated using a deterministic bio-economic farm model. Risk was included using Arrow-Prat absolute risk aversion coefficient and profit variance. Risk-rated economic values were calculated for pregnancy rate, litter loss, litter size, pelt size, pelt quality, pelt colour clarity, feed efficiency and eye infection. With high absolute risk aversion, economic values were lower than with low absolute risk aversion. Economic values were highest for litter loss (18.16 and 26.42 EUR), litter size (13.27 and 19.40 EUR), pregnancy (11.99 and 18.39 EUR) and eye infection (12.39 and 13.81 EUR). Sensitivity analysis showed that selection pressure for improved eye health depended strongly on proportion of culled animals among infected animals and much less on the proportion of infected animals. The economic value of feed efficiency was lower than expected (6.06 and 8.03 EUR). However, it was almost the same magnitude as pelt quality (7.30 and 7.30 EUR) and higher than the economic value of pelt size (3.37 and 5.26 EUR). Risk factors should be considered in blue fox breeding scheme because they change the relative importance of traits. © 2016 Blackwell Verlag GmbH.

  10. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2014-01-01

    the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base

  11. Risk Sharing Partnerships With Suppliers: The Case of EMBRAER

    Directory of Open Access Journals (Sweden)

    Paulo Figueiredo

    2008-04-01

    Full Text Available Since the mid 1990s, the global aircraft industry has been creating new solutions for product development. Risk-sharing partnerships with suppliers began to be established in an attempt to reduce investments and, consequentially, the dependence on loans. The partners began not only to invest in tooling, engineering and infrastructure, but also to participate more directly in the projects, in the investments and design activities, acquiring rights to future sales income of products. This contractual modality, called risk-sharing partnership, is the focus of this study. Specifically, it analyzes the risk-sharing partnerships made by Embraer during the projects of the ERJ-170/190 family of aircrafts. It also aims to justify these partnerships, considering the current global aircraft market conditions, evaluating the critical success factors, requirements and macro-economic conditions which supported the adoption of this new policy.

  12. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  13. A Discussion of a Risk-Sharing Pension Plan

    Directory of Open Access Journals (Sweden)

    Catherine Donnelly

    2017-02-01

    Full Text Available I show that risk-sharing pension plans can reduce some of the shortcomings of defined benefit and defined contributions plans. The risk-sharing pension plan presented aims to improve the stability of benefits paid to generations of members, while allowing them to enjoy the expected advantages of a risky investment strategy. The plan does this by adjusting the investment strategy and benefits in response to a changing funding level, motivated by the with-profits contract proposed by Goecke (2013. He suggests a mean-reverting log reserve (or funding ratio, where mean reversion occurs through adjustments to the investment strategy and declared bonuses. To measure the robustness of the plan to human factors, I introduce a measurement of disappointment, where disappointment is high when there are many consecutive years over which benefit payments are declining. Another measure introduced is devastation, where devastation occurs when benefit payments are zero. The motivation is that members of a pension plan who are easily disappointed or likely to get no benefit, are more likely to exit the plan. I find that the risk-sharing plan offers more disappointment than a defined contribution plan, but it eliminates the devastation possible in a plan that tries to accumulate contributions at a steadily increasing rate. The proposed risk-sharing plan can give a narrower range of benefits than in a defined contribution plan. Thus it can offer a stable benefit to members without the risk of running out of money.

  14. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed; Qaraqe, Khalid; Alouini, Mohamed-Slim

    2012-01-01

    users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a

  15. Benefits and risks of shared services in healthcare.

    Science.gov (United States)

    Kennewell, Suzanne; Baker, Laura

    2016-05-16

    Purpose - The purpose of this paper is to explore the experiences of staff in a large, public health service involved in transitioning support services to a shared services model. It aims to understand their perceptions of the benefits and risks arising from this change. Design/methodology/approach - Thematic analysis of qualitative data from semi-structured interviews with both service provider and customer agency staff was used to identify, analyze and report patterns of benefits and risks within data. Findings - Staff expressed the need for relevant subject-matter-experts to work within customer agencies to facilitate effective communication between the customer agency and shared services provider, reflecting observations found in out-sourcing literature. Research limitations/implications - Results point to significant challenges continuing to occur for shared services in healthcare. Risks identified suggest a more intimate relationship between clinical and support services than previously discussed. Originality/value - Previous discussion of the shared services model has not considered the skills, knowledge and ability required by staff in the customer agency. This research indicates that in the absence of such consideration, the concepts of the shared services model are weakened.

  16. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-09-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  17. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Tourki, Kamel; Ghrayeb, Ali A.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2012-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  18. An islanding microgrid reactive power sharing scheme enhanced by programmed virtual impedances

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2012-01-01

    harmonic currents. With the knowledge of feeder impedances, reactive power sharing performance can be enhanced by the regulation of DG unit output virtual impedance. The proposed method realizes accurate real and reactive power sharing in proportion to DG unit rated power. Simulated and experimental...

  19. Multi-period risk sharing under financial fairness

    NARCIS (Netherlands)

    Bao, Hailong; Ponds, Eduard; Schumacher, Hans

    We work with a multi-period system where a finite number of agents need to share multiple monetary risks. We look for the solutions that are both Pareto efficient utility-wise and financially fair value-wise. A buffer enables the inter-temporal capital transfer. Expected utility is used to evaluate

  20. Shared Genetic Risk Factors of Intracranial, Abdominal, and Thoracic Aneurysms

    NARCIS (Netherlands)

    van 't Hof, Femke N G; Ruigrok, Ynte M; Lee, Cue Hyunkyu; Ripke, Stephan; Anderson, Graig; de Andrade, Mariza; Baas, Annette F; Blankensteijn, Jan D; Böttinger, Erwin P; Bown, Matthew J; Broderick, Joseph; Bijlenga, Philippe; Carrell, David S; Crawford, Dana C; Crosslin, David R; Ebeling, Christian; Eriksson, Johan G; Fornage, Myriam; Foroud, Tatiana; von Und Zu Fraunberg, Mikael; Friedrich, Christoph M; Gaál, Emília I; Gottesman, Omri; Guo, Dong-Chuan; Harrison, Seamus C; Hernesniemi, Juha; Hofman, Albert; Inoue, Ituro; Jääskeläinen, Juha E; Jones, Gregory T; Kiemeney, Lambertus A L M; Kivisaari, Riku; Ko, Nerissa; Koskinen, Seppo; Kubo, Michiaki; Kullo, Iftikhar J; Kuivaniemi, Helena; Kurki, Mitja I; Laakso, Aki; Lai, Dongbing; Leal, Suzanne M; Lehto, Hanna; LeMaire, Scott A; Low, Siew-Kee; Malinowski, Jennifer; McCarty, Catherine A; Milewicz, Dianna M; Mosley, Thomas H; Nakamura, Yusuke; Nakaoka, Hirofumi; Niemelä, Mika; Pacheco, Jennifer; Peissig, Peggy L; Pera, Joanna; Rasmussen-Torvik, Laura; Ritchie, Marylyn D; Rivadeneira, Fernando; van Rij, Andre M; Santos-Cortez, Regie Lyn P; Saratzis, Athanasios; Slowik, Agnieszka; Takahashi, Atsushi; Tromp, Gerard; Uitterlinden, André G; Verma, Shefali S; Vermeulen, Sita H; Wang, Gao T; Han, Buhm; Rinkel, Gabriël J E; de Bakker, Paul I W

    2016-01-01

    BACKGROUND: Intracranial aneurysms (IAs), abdominal aortic aneurysms (AAAs), and thoracic aortic aneurysms (TAAs) all have a familial predisposition. Given that aneurysm types are known to co-occur, we hypothesized that there may be shared genetic risk factors for IAs, AAAs, and TAAs. METHODS AND

  1. Shared genetic risk factors of intracranial, abdominal, and thoracic aneurysms

    NARCIS (Netherlands)

    van 't Hof, Femke N G; Ruigrok, Ynte M; Lee, Cue Hyunkyu; Ripke, Stephan; Anderson, Graig; de Andrade, Mariza; Baas, Annette F; Blankensteijn, Jan D; Böttinger, Erwin P; Bown, Matthew J; Broderick, Joseph; Bijlenga, Philippe; Carrell, David S; Crawford, Dana C; Crosslin, David R; Ebeling, Christian; Eriksson, Johan G; Fornage, Myriam; Foroud, Tatiana; von Und Zu Fraunberg, Mikael; Friedrich, Christoph M; Gaál, Emília I; Gottesman, Omri; Guo, Dong-Chuan; Harrison, Seamus C; Hernesniemi, Juha; Hofman, Albert; Inoue, Ituro; Jääskeläinen, Juha E; Jones, Gregory T; Kiemeney, Lambertus A L M; Kivisaari, Riku; Ko, Nerissa; Koskinen, Seppo; Kubo, Michiaki; Kullo, Iftikhar J; Kuivaniemi, Helena; Kurki, Mitja I; Laakso, Aki; Lai, Dongbing; Leal, Suzanne M; Lehto, Hanna; LeMaire, Scott A; Low, Siew-Kee; Malinowski, Jennifer; McCarty, Catherine A; Milewicz, Dianna M; Mosley, Thomas H; Nakamura, Yusuke; Nakaoka, Hirofumi; Niemelä, Mika; Pacheco, Jennifer; Peissig, Peggy L; Pera, Joanna; Rasmussen-Torvik, Laura; Ritchie, Marylyn D; Rivadeneira, Fernando; van Rij, Andre M; Santos-Cortez, Regie Lyn P; Saratzis, Athanasios; Slowik, Agnieszka; Takahashi, Atsushi; Tromp, Gerard; Uitterlinden, André G; Verma, Shefali S; Vermeulen, Sita H; Wang, Gao T; Han, Buhm; Rinkel, Gabriël J E; de Bakker, Paul I W

    2016-01-01

    Background--Intracranial aneurysms (IAs), abdominal aortic aneurysms (AAAs), and thoracic aortic aneurysms (TAAs) all have a familial predisposition. Given that aneurysm types are known to co-occur, we hypothesized that there may be shared genetic risk factors for IAs, AAAs, and TAAs. Methods and

  2. Multi-Period Risk Sharing under Financial Fairness

    NARCIS (Netherlands)

    Bao, Hailong; Ponds, Eduard; Schumacher, Hans

    2015-01-01

    We work with a multi-period system where a finite number of agents need to share multiple monetary risks. We look for the solutions that are both Pareto efficient utility-wise and financially fair value-wise. A buffer enables the inter-temporal capital transfer. Expected utility is used to evaluate

  3. International Risk-Sharing: Macroeconomic and Financial Aspects

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.

    2008-01-01

    International risk-sharing is one of the most important benefits from the process of international financial integration, which gained in speed, scope, and geographical coverage during the past decades. As long as different national economies are not perfectly correlated, there are possibilities for

  4. Accounting for Households' Perceived Income Uncertainty in Consumption Risk Sharing

    NARCIS (Netherlands)

    Singh, S.; Stoltenberg, C.A.

    2017-01-01

    We develop a consumption risk-sharing model that distinguishes households' perceived income uncertainty from income uncertainty as measured by an econometrician. Households receive signals on their future disposable income that can drive a gap between the two uncertainties. Accounting for the

  5. Sharing as risk pooling in a social dilemma experiment

    Directory of Open Access Journals (Sweden)

    Todd L. Cherry

    2015-03-01

    Full Text Available In rural economies with missing or incomplete markets, idiosyncratic risk is frequently pooled through informal networks. Idiosyncratic shocks, however, are not limited to private goods but can also restrict an individual from partaking in or benefiting from a collective activity. In these situations, a group must decide whether to provide insurance to the affected member. We describe results of a laboratory experiment designed to test whether a simple sharing institution can sustain risk pooling in a social dilemma with idiosyncratic risk. We tested whether risk could be pooled without a commitment device and, separately, whether effective risk pooling induced greater cooperation in the social dilemma. We found that even in the absence of a commitment device or reputational considerations, subjects voluntarily pooled risk, thereby reducing variance in individual earnings. In spite of effective risk pooling, however, cooperation in the social dilemma was unaffected.

  6. Interleaved Buck Converter with Variable Number of Active Phases and a Predictive Current Sharing Scheme

    DEFF Research Database (Denmark)

    Jakobsen, Lars Tønnes; Garcia, O.; Oliver, J. A.

    2008-01-01

    The efficiency of an interleaved Buck converter is typically low at light load conditions because of the switching losses in each of the switching stages. Improvements in the converter efficiency can be achieved by dynamically changing the number of active phases depending on the load current....... This paper addresses the issues related to the transient response of the converter when the number of active phases is changed by a digital control scheme. The problem arises because the current in the individual phases of the interleaved Buck converter will not be equal immediately after the controller has...... changed the number of active phases. This paper proposes a current equalisation scheme that adjusts the duty cycle of each phase in a manner that ensures equal average inductor current in all active phases in one or two PWM periods. The current equalisation scheme relies on the measurement of the output...

  7. [Incentive for Regional Risk Selection in the German Risk Structure Compensation Scheme].

    Science.gov (United States)

    Wende, Danny

    2017-10-01

    The introduction of the new law GKV-FQWG strengthens the competition between statutory health insurance. If incentives for risk selection exist, they may force a battle for cheap customers. This study aims to document and discuss incentives for regional risk selection in the German risk structure compensation scheme. Identify regional autocorrelation with Moran's l on financial parameters of the risk structure compensation schema. Incentives for regional risk selection do indeed exist. The risk structure compensation schema reduces 91% of the effect and helps to reduce risk selection. Nevertheless, a connection between regional situation and competition could be shown (correlation: 69.5%). Only the integration of regional control variables into the risk compensation eliminates regional autocorrelation. The actual risk structure compensation is leading to regional inequalities and as a consequence to risk selection and distortion in competition. © Georg Thieme Verlag KG Stuttgart · New York.

  8. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  9. A supply chain contract with flexibility as a risk-sharing mechanism for demand forecasting

    Science.gov (United States)

    Kim, Whan-Seon

    2013-06-01

    Demand forecasting is one of the main causes of the bullwhip effect in a supply chain. As a countermeasure for demand uncertainty as well as a risk-sharing mechanism for demand forecasting in a supply chain, this article studies a bilateral contract with order quantity flexibility. Under the contract, the buyer places orders in advance for the predetermined horizons and makes minimum purchase commitments. The supplier, in return, provides the buyer with the flexibility to adjust the order quantities later, according to the most updated demand information. To conduct comparative simulations, four-echelon supply chain models, that employ the contracts and different forecasting techniques under dynamic market demands, are developed. The simulation outcomes show that demand fluctuation can be effectively absorbed by the contract scheme, which enables better inventory management and customer service. Furthermore, it has been verified that the contract scheme under study plays a role as an effective coordination mechanism in a decentralised supply chain.

  10. 75 FR 16821 - Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2010-04-02

    ...The proposed information collection requirement described below has been submitted to the Office of Management and Budget (OMB) for review, as required by the Paperwork Reduction Act. The Department is soliciting public comments on the subject proposal. Section 542(c) of the Risk Sharing Program authorizes qualified Housing Finance Agencies (HFAs) to underwrite and process loans. HUD provides full mortgage insurance on affordable multifamily housing project processed by HFAs under this program. Qualified HFAs are vested with the maximum amount of processing responsibilities. By entering into Risk-Sharing Agreement with HUD, HFAs contract to reimburse HUD for a portion of the loss from any defaults that occur while HUD insurance is in force.

  11. An Enhanced Islanding Microgrid Reactive Power, Imbalance Power, and Harmonic Power Sharing Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Lin, Yun Wei; Blaabjerg, Frede

    2015-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through online virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power, or harmonic power is added to the conventional real power...

  12. An accurate autonomous islanding microgrid reactive power, imbalance power and harmonic power sharing scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Blaabjerg, Frede

    2013-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through adaptive virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power or harmonic power is added to the conventional real power...

  13. An Islanding Microgrid Power Sharing Approach Using Enhanced Virtual Impedance Control Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2013-01-01

    In order to address the load sharing problem in islanding microgrids, this paper proposes an enhanced distributed generation (DG) unit virtual impedance control approach. The proposed method can realize accurate regulation of DG unit equivalent impedance at both fundamental and selected harmonic...... and PCC harmonic voltage compensation are achieved without using any fundamental and harmonic components extractions. Experimental results from a scaled single-phase microgrid prototype are provided to validate the feasibility of the proposed virtual impedance control approach....... frequencies. In contrast to conventional virtual impedance control methods, where only a line current feed-forward term is added to the DG voltage reference, the proposed virtual impedance at fundamental and harmonic frequencies is regulated using DG line current and point of common coupling (PCC) voltage...

  14. Capital Market Integration and Consumption Risk Sharing over the Long Run

    DEFF Research Database (Denmark)

    Rangvid, Jesper; Santa-Clara, Pedro; Schmeling, Maik

    integration. We also calculate the welfare costs of imperfect capital market integration and risk sharing and find that these costs vary a lot over time. Finally, we show that consumption risk sharing is higher during times of crises, i.e. at times when marginal utility is high and risk sharing is most......We empirically investigate time variation in capital market integration and consumption risk sharing using data for 16 countries from 1875 to 2012. We show that there has been considerable variation over time in the degrees of capital market integration and consumption risk sharing and that higher...... capital market integration forecasts more consumption risk sharing in the future. This finding is robust is to controlling for trade openness and exchange rate volatilities. Hence, financial integration seems to drive consumption risk sharing whereas we find no evidence that risk sharing forecasts market...

  15. RISK OF PROFIT LOSS SHARING FINANCING: THE CASE OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Ernawati Ernawati

    2016-02-01

    Full Text Available This study analyzes the risk of profit-and-loss sharing finance in Indonesian Islamic banking. Data used is secondary data obtained from the Financial Services Authority’s 2009-2014 publication. Financing risk is measured by risk return and opportunity cost. Results of the study show that risk return in mudharaba financing is more volatile than that in musharaka as it is potentially driven by agency problems. In all groups of banks, higher incomes are more promising in mudharaba than musharaka; but individually musharaka is more attractive to Islamic Rural Bank groups, and vice versa for the Sharia Bank groups. The one side it is more secure for Islamic banking to allocate funds in musharaka contract, which is an alternative to murabaha. However, musharaka contract is less attractive due to lower potential returns. Although high returns are more promising in mudaraba, this financing mode has higher risk of returns.DOI: 10.15408/aiq.v8i1.1793

  16. Value at Risk on Composite Price Share Index Stock Data

    Science.gov (United States)

    Oktaviarina, A.

    2018-01-01

    The financial servicest authority was declared Let’s Save Campaign on n commemoration of the World Savings Day that falls on this day, October 31, 2016. The activity was greeted enthusiastically by Indonesia Stock Exchange by taking out the slogan Let’s Save The Stocks. Stock is a form of investment that is expected to benefit in the future despite has risks. Value at Risk (VaR) is a method that can measure how much the risk of a financial investment. Composite Stock Price Indeks is the stock price index used by Indonesia Stock Exchange as stock volatility benchmarks in Indonesia. This study aimed to estimate Value at Risk (VaR) on closing price Composite Price Share Index Stock data on the period 20 September 2016 until 20 September 2017. Box-Pierce test results p value=0.9528 which is greater than a, that shows homoskedasticity. Value at Risk (VaR) with Variance Covariance Method is Rp.3.054.916,07 which means with 99% confindence interval someone who invests Rp.100.000.000,00 will get Rp.3.054.916,07 as a maximum loss.

  17. Human and animal sentinels for shared health risks

    Directory of Open Access Journals (Sweden)

    Peter Rabinowitz, MD, MPH

    2009-03-01

    Full Text Available The tracking of sentinel health events in humans in order to detect and manage disease risks facing a larger population is a well accepted technique applied to influenza, occupational conditions and emerging infectious diseases. Similarly, animal health professionals routinely track disease events in sentinel animal colonies and sentinel herds. The use of animals as sentinels for human health threats, or of humans as sentinels for animal disease risk, dates back at least to the era when coal miners brought caged canaries into mines to provide early warning of toxic gases. Yet the full potential of linking animal and human health information to provide warning of such ‘shared risks’ from environmental hazards has not been realised. Reasons appear to include the professional segregation of human and animal health communities, the separation of human and animal surveillance data and evidence gaps in the linkages between human and animal responses to environmental health hazards. The ‘One Health initiative’ and growing international collaboration in response to pandemic threats, coupled with development in the fields of informatics and genomics, hold promise for improved sentinel event coordination in order to detect and reduce environmental health threats shared between species.

  18. Capital Market Integration and Consumption Risk Sharing over the Long Run

    DEFF Research Database (Denmark)

    Rangvid, Jesper; Santa-Clara, Pedro; Schmeling, Maik

    2016-01-01

    capital market integration forecasts more consumption risk sharing in the future. This finding is robust to controlling for trade openness and exchange rate volatility as alternative drivers of risk sharing. Finally, we calculate the welfare costs of imperfect consumption risk sharing and find......We empirically investigate time variation in capital market integration and consumption risk sharing using data for 16 countries from 1875 to 2012. We show that there has been considerable variation over time in the degrees of capital market integration and consumption risk sharing and that higher...

  19. Financial risk sharing with providers in health maintenance organizations, 1999.

    Science.gov (United States)

    Gold, Marsha R; Lake, Timothy; Hurley, Robert; Sinclair, Michael

    2002-01-01

    The transfer of financial risk from health maintenance organizations (HMOs) to providers is controversial. To provide timely national data on these practices, we conducted a telephone survey in 1999 of a multi-staged probability sample of HMOs in 20 of the nation's 60 largest markets, accounting for 86% of all HMO enrollees nationally. Among those sampled, 82% responded. We found that HMOs' provider networks with physicians, hospitals, skilled nursing homes, and home health agencies are complex and multi-tiered Seventy-six percent of HMOs in our study use contracts for their HMO products that involve global, professional services, or hospital risk capitation to intermediate entities. These arrangements account for between 24.5 million and 27.4 million of the 55.9 million commercial and Medicare HMO enrollees in the 60 largest markets. While capitation arrangements are particularly common in California, they are more common elsewhere than many assume. The complex layering of risk sharing and delegation of care management responsibility raise questions about accountability and administrative costs in managed care. Do complex structures provide a way to involve providers more directly in managed care, or do they diffuse authority and add to administrative costs?

  20. Modifiable risk factors for schizophrenia and autism--shared risk factors impacting on brain development.

    Science.gov (United States)

    Hamlyn, Jess; Duhig, Michael; McGrath, John; Scott, James

    2013-05-01

    Schizophrenia and autism are two poorly understood clinical syndromes that differ in age of onset and clinical profile. However, recent genetic and epidemiological research suggests that these two neurodevelopmental disorders share certain risk factors. The aims of this review are to describe modifiable risk factors that have been identified in both disorders, and, where available, collate salient systematic reviews and meta-analyses that have examined shared risk factors. Based on searches of Medline, Embase and PsycINFO, inspection of review articles and expert opinion, we first compiled a set of candidate modifiable risk factors associated with autism. Where available, we next collated systematic-reviews (with or without meta-analyses) related to modifiable risk factors associated with both autism and schizophrenia. We identified three modifiable risk factors that have been examined in systematic reviews for both autism and schizophrenia. Advanced paternal age was reported as a risk factor for schizophrenia in a single meta-analysis and as a risk factor in two meta-analyses for autism. With respect to pregnancy and birth complications, for autism one meta-analysis identified maternal diabetes and bleeding during pregnancy as risks factors for autism whilst a meta-analysis of eight studies identified obstetric complications as a risk factor for schizophrenia. Migrant status was identified as a risk factor for both autism and schizophrenia. Two separate meta-analyses were identified for each disorder. Despite distinct clinical phenotypes, the evidence suggests that at least some non-genetic risk factors are shared between these two syndromes. In particular, exposure to drugs, nutritional excesses or deficiencies and infectious agents lend themselves to public health interventions. Studies are now needed to quantify any increase in risk of either autism or schizophrenia that is associated with these modifiable environmental factors. Copyright © 2012 Elsevier Inc

  1. A Mathematical Model of Profit-Loss Sharing Scheme of Small Investment for Traditional Market Traders using The Semi-Fuzzy Logic Approach

    Directory of Open Access Journals (Sweden)

    Novriana Sumarti

    2017-02-01

    Full Text Available A mathematical model of micro-finance investment using profit-loss sharing scheme are made and implemented to simulated data. Here profits from the venture will be shared in a portion between the investor and the entity running the business. The scheme can be classified as Musharaka type of investment in Sharia economy. The proposed model is theoretically implemented with data from small-scale traders at a local traditional market who have small turnover. They are common target of usurers who lend money with high interest rate and penalties. If the traders are in unfortunate conditions, they are potentially in poorer condition than before committing themselves to the usurer. In the conventional practices of the profit sharing scheme, the investor will get a fixed portion of the trader’s income, which is applied for all kind of small-scale traders. If the traders are diligent and hard worker and have very high turnover, then the investor will gain much more profit whether the contributed capital is small or large. In this paper, the scheme is implemented using Semi-Fuzzy Logic Approach so that the profit-loss sharing scheme can achieve its intended goal, which is to make a profitable investment not only for the investor but also for traders. The approach is not fully using Fuzzy Logic because some variables are still in crisp numbers and the optimization problem is regular in the form of crisp numbers. Based on the existing data, the results show that the optimal profit share is depended on the income of the traders. The higher the income coming from the venture, the lesser the profit share for the investor which is reasonable with the fixed initial contributed capital.

  2. From Risks to Shared Value? Corporate Strategies in Building a Global Water Accounting and Disclosure Regime

    Directory of Open Access Journals (Sweden)

    Marco A. Daniel

    2012-10-01

    Full Text Available The current debate on water accounting and accountability among transnational actors such as corporations and NGOs is likely to contribute to the emergence of a global water governance regime. Corporations within the food and beverage sector (F-B are especially vulnerable to water risks; therefore, in this article we analyse motivations and strategies of the major F-B corporations participating in the debate and developing different water accounting, disclosure and risk-assessment tools. Neo-institutionalism and neo-Gramscian regime theory provide the basis for our framework to analyse the discursive, material and organisational corporate water strategies. Findings based on an analysis of the chosen F-B corporations’ sustainability reports and interviews with key informants suggest that the corporations share similar goals and values with regard to the emerging regime. They seek a standardisation that is practical and supportive in improving their water efficiency and communication with stakeholders. This indicates that some harmonisation has taken place over time and new actors have been pursuing the path of the pioneering companies, but the lead corporations are also differentiating their strategies, thus engaging in hegemonic positioning. However, so far the plethora of NGO-driven accountability initiatives and tools has fragmented the field more than 'war of position' amongst the corporations. Furthermore, several companies claim to have proceeded from internal water-risk management to reducing risks throughout their value chains and watersheds. As a result they are 'creating shared value' with stakeholders, and potentially manifesting an emergent paradigm that goes beyond a private regime framework. Nevertheless, in the absence of verification schemes, questions of sustainability and legitimacy of such actions on the ground prevail and remain a topic for further research.

  3. Performance analysis of joint multi-branch switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Qaraqe, Khalid A.; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2012-01-01

    desired performance for the primary link. The proposed switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan and wait combining technique (SWC) where a transmission occurs only when a branch with an acceptable performance

  4. Shared risk aversion in spontaneous and induced abortion.

    Science.gov (United States)

    Catalano, Ralph; Bruckner, Tim A; Karasek, Deborah; Adler, Nancy E; Mortensen, Laust H

    2016-05-01

    Does the incidence of spontaneous abortion correlate positively over conception cohorts with the incidence of non-clinically indicated induced abortion as predicted by shared risk aversion? We find that the number of spontaneous and non-clinically indicated induced abortions correlates in conception cohorts, suggesting that risk aversion affects both the conscious and non-conscious mechanisms that control parturition. Much literature speculates that natural selection conserved risk aversion because the trait enhanced Darwinian fitness. Risk aversion, moreover, supposedly influences all decisions including those that individuals can and cannot report making. We argue that these circumstances, if real, would manifest in conscious and non-conscious decisions to invest in prospective offspring, and therefore affect incidence of induced and spontaneous abortion over time. Using data from Denmark, we test the hypothesis that monthly conception cohorts yielding unexpectedly many non-clinically indicated induced abortions also yield unexpectedly many spontaneous abortions. The 180 month test period (January 1995 through December 2009), yielded 1 351 800 gestations including 156 780 spontaneous as well as 233 280 induced abortions 9100 of which were clinically indicated. We use Box-Jenkins transfer functions to adjust the incidence of spontaneous and non-clinically indicated induced abortions for autocorrelation (including seasonality), cohort size, and fetal as well as gestational anomalies over the 180-month test period. We use cross-correlation to test our hypothesized association. We find a positive association between spontaneous and non-clinically indicated induced abortions. This suggests, consistent with our theory, that mothers of conception cohorts that yielded more spontaneous abortions than expected opted more frequently than expected for non-clinically indicated induced abortion. Limitations of our work include that even the world's best registration system

  5. 12 CFR 955.3 - Required credit risk-sharing structure.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Required credit risk-sharing structure. 955.3...-BALANCE SHEET ITEMS ACQUIRED MEMBER ASSETS § 955.3 Required credit risk-sharing structure. (a... conducting a rating review of the asset or pool of assets in a securitization transaction. (b) Credit risk...

  6. Risk, redistribution and retirement : The role of pension schemes

    NARCIS (Netherlands)

    Bonenkamp, J.

    2013-01-01

    One of the main conclusions of this thesis is that collective pension funds are potentially welfare improving, even if contributions are distortionary and even if individuals face positively correlated wage and equity risks. By disconnecting individual contributions and benefits, the pension fund is

  7. A decision-support scheme for mapping endangered areas in pest risk analysis

    NARCIS (Netherlands)

    Baker, R.H.A.; Benninga, J.; Bremmer, J.; Brunel, S.; Dupin, M.; Eyre, D.; Ilieva, Z.; Jarosik, V.; Kehlenbeck, H.; Kriticos, D.J.; Makowski, D.; Pergl, J.; Reynaud, P.; Robinet, C.; Soliman, T.; Werf, van der W.; Worner, S.

    2012-01-01

    This paper describes a decision-support scheme (DSS) for mapping the area where economically important loss is likely to occur (the endangered area). It has been designed by the PRATIQUE project to help pest risk analysts address the numerous risk mapping challenges and decide on the most suitable

  8. The simple economics of risk-sharing agreements between the NHS and the pharmaceutical industry.

    Science.gov (United States)

    Barros, Pedro Pita

    2011-04-01

    The introduction of new (and expensive) pharmaceutical products is one of the major challenges for health systems. The search for new institutional arrangements is natural. The use of the so-called risk-sharing agreements is one example. Recent discussions have somewhat neglected the economic fundamentals underlying risk-sharing agreements. We argue here that risk-sharing agreements, although attractive due to the principle of paying by results, also entail risks. Too many patients may be put under treatment. Prices are likely to be adjusted upward, in anticipation of future risk-sharing agreements between the pharmaceutical company and the third-party payer. An available instrument is a verification cost per patient treated, which allows obtaining the first-best allocation of patients to the new treatment, under the agreement. Overall, the welfare effects of risk-sharing agreements are ambiguous, and caution is urged regarding their use. Copyright © 2010 John Wiley & Sons, Ltd.

  9. Who Should I Share Risk with? Gifts can tell : Theory and Evidence from Rural China

    NARCIS (Netherlands)

    Wang, Ruixin

    2016-01-01

    This paper studies how gift exchange may help to overcome limited commitment problem in risk sharing. When efficient contract enforcement is lacking, people rely on friends (or relatives) to share risk since emotional or moral cost of defaulting between friends can help to prevent moral hazard. The

  10. Perception and Management of Risk in Internet-Based Peer-to-Peer Milk-Sharing

    Science.gov (United States)

    Gribble, Karleen D.

    2014-01-01

    The perception and management of the risks of peer-to-peer milk sharing was explored via a written questionnaire administered to 97 peer milk donors and 41 peer milk recipients who were recruited via Facebook. All recipients' respondents were aware that there were risks associated with using peer-shared milk and took action to mitigate these…

  11. Stochastic Discount Factor Approach to International Risk-Sharing: Evidence from Fixed Exchange Rate Episodes

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.; Kool, C.J.M.

    2007-01-01

    This paper presents evidence of the stochastic discount factor approach to international risk-sharing applied to fixed exchange rate regimes. We calculate risk-sharing indices for two episodes of fixed or very rigid exchange rates: the Eurozone before and after the introduction of the Euro, and

  12. Stochastic Discount Factor Approach to International Risk-Sharing:A Robustness Check of the Bilateral Setting

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.; Kool, C.J.M.

    2007-01-01

    This paper presents a robustness check of the stochastic discount factor approach to international (bilateral) risk-sharing given in Brandt, Cochrane, and Santa-Clara (2006). We demonstrate two main inherent limitations of the bilateral SDF approach to international risk-sharing. First, the discount

  13. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  14. Performance analysis of joint multi-branch switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-12-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper two adaptive schemes using switched transmit diversity and adaptive modulation in order to increase the spectral efficiency of the secondary link and maintain a desired performance for the primary link. The proposed switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan and wait combining technique (SWC) where a transmission occurs only when a branch with an acceptable performance is found, otherwise data is buffered. In these schemes, the modulation constellation size and the used transmit branch are determined to minimize the average number of switched branches and to achieve the highest spectral efficiency given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver (PR). For delay-sensitive applications, we also propose two variations of the SES and BES schemes using power control (SES-PC and BES-PC) where the secondary transmitter (ST) starts sending data using a nominal power level which is selected in order to minimize the average delay introduced by the SWC technique. We demonstrate through numerical examples that the BES scheme increases the capacity of the secondary link when compared to the SES scheme. This spectral efficiency improvement comes at the expense of an increased average number of switched branches and thus an increased average delay. We also show that the SES-PC and the BES-PC schemes minimize the average delay while satisfying the same spectral efficiency as the SES and BES schemes, respectively. © 2012 IEEE.

  15. Current status and trends in performance-based risk-sharing arrangements between healthcare payers and medical product manufacturers.

    Science.gov (United States)

    Carlson, Josh J; Gries, Katharine S; Yeung, Kai; Sullivan, Sean D; Garrison, Louis P

    2014-06-01

    Our objective was to identify and characterize publicly available cases and related trends for performance-based risk-sharing arrangements (PBRSAs). We performed a review of PBRSAs over the past 20 years (1993-2013) using available databases and reports from colleagues and healthcare experts. These were categorized according to a previously published taxonomy of scheme types and assessed in terms of the underlying product and market attributes for each scheme. Macro-level trends were identified related to the timing of scheme adoption, countries involved, types of arrangements, and product and market factors. Our search yielded 148 arrangements. From this set, 65 arrangements included a coverage with an evidence development component, 20 included a conditional treatment continuation component, 54 included a performance-linked reimbursement component, and 42 included a financial utilization component. Each type of scheme addresses fundamental uncertainties that exist when products enter the market. The pace of adoption appears to be slowing, but new countries continue to implement PBRSAs. Over this 20-year period, there has been a consistent movement toward arrangements that minimize administrative burden. In conclusion, the pace of PBRSA adoption appears to be slowing but still has traction in many health systems. These remain a viable coverage and reimbursement mechanism for a wide range of medical products. The long-term viability and growth of these arrangements will rest in the ability of the parties to develop mutually beneficial arrangements that entail minimal administrative burden in their development and implementation.

  16. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age ≥ 75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to p...

  17. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    Objectives To evaluate the individual risk factors composing the CHADS2 (Congestive heart failure, Hypertension, Age=75 years, Diabetes, previous Stroke) score and the CHA2DS2-VASc (CHA2DS2-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to pr...

  18. Internal validation of risk models in clustered data: a comparison of bootstrap schemes

    NARCIS (Netherlands)

    Bouwmeester, W.; Moons, K.G.M.; Kappen, T.H.; van Klei, W.A.; Twisk, J.W.R.; Eijkemans, M.J.C.; Vergouwe, Y.

    2013-01-01

    Internal validity of a risk model can be studied efficiently with bootstrapping to assess possible optimism in model performance. Assumptions of the regular bootstrap are violated when the development data are clustered. We compared alternative resampling schemes in clustered data for the estimation

  19. Risk sources and attitude among the tenants of the Gezira Scheme – Sudan

    Directory of Open Access Journals (Sweden)

    Adam Elhag Ahmed

    2011-06-01

    Full Text Available In this paper, the variance and the expected income–variance risk analysis concepts are used to identify risk sources and attitudes among the Gezira Scheme tenants. Moreover, the study aimed at identifying which crop combination under risk consideration is closer to tenants’ preference. The results showed that sorghum has a high yield variance followed by cotton, wheat, and groundnut. Cotton has the highest output price variance and cost variance than the other crops produced in the scheme. Main risk sources of wheat are output prices, input prices and yield. Although sorghum is riskier in terms of its own variance of gross margins, it remains attractive to the tenants. This is because its gross margins are negatively covariate with the cotton resulting in a more stable total aggregate gross margin. Comparing the results of quadratic risk programming with crop combinations from the tenants point of view scenario, the fourth scenario (with target income of US $994 is the closest crop combination to the tenants’ preference and the tenants in the Gezira Scheme behave in a risk aversion way.

  20. Bleeding risk in 'real world' patients with atrial fibrillation: comparison of two established bleeding prediction schemes in a nationwide cohort

    DEFF Research Database (Denmark)

    Olesen, J B; Lip, G Y H; Hansen, P R

    2011-01-01

    Oral anticoagulation (OAC) in patients with atrial fibrillation (AF) is a double-edged sword, because it decreases the risk of stroke at the cost of an increased risk of bleeding. We compared the performance of a new bleeding prediction scheme, HAS-BLED, with an older bleeding prediction scheme...

  1. Tacit Knowledge Sharing Modes of University Teachers from the Perspectives of Psychological Risk and Value

    Science.gov (United States)

    Yu, Dengke; Zhou, Rong

    2015-01-01

    Tacit knowledge sharing (TKS) is important to improve the teaching skill and researching knowledge of university teachers. In this paper, the tacit knowledge sharing of university teachers is catalogued as four modes from perspectives of the psychological risk and psychological value which are measured by two grades--high and low. The four modes…

  2. On distributed key distribution centers and unconditionally secure proactive verifiable secret sharing schemes based on general access structure

    NARCIS (Netherlands)

    Nikov, V.S.; Nikova, S.I.; Preneel, B.; Vandewalle, J.; Menezes, A.; Sarkar, P.

    2002-01-01

    A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure

  3. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    KAUST Repository

    Sayed, Mostafa; Abdallah, Mohamed; Alouini, Mohamed Slim; Qaraqe, Khalid A.

    2012-01-01

    of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified

  4. Risk sharing between competing health plans and sponsors

    NARCIS (Netherlands)

    E.M. van Barneveld (Erik); W.P.M.M. van de Ven (Wynand); R.C.J.A. van Vliet (René)

    2001-01-01

    textabstractIn many countries, competing health plans receive capitation payments from a sponsor, whether government or a private employer. All capitation payment methods are far from perfect and have raised concerns about risk selection. Paying health plans partly on the basis

  5. An Enhanced Dual Droop Control Scheme for Resilient Active Power Sharing among Paralleled Two-Stage Converters

    DEFF Research Database (Denmark)

    Liu, Hongpeng; Yang, Yongheng; Wang, Xiongfei

    2017-01-01

    Traditional droop-controlled system has assumed that generators can always generate the powers demanded from them. This is true with conventional sources, where fuel supplies are usually planned in advance. For renewable sources, it may also be possible if energy storage is available. Energy...... storage, usually as batteries, may however be expensive, depending on its planned capacity. Renewable sources are therefore sometimes installed as non-dispatch-able sources without storage. This may not be viable for remote grids, where renewable sources may be the only or major type of sources. In those...... cases, traditional droop scheme may not work well when its demanded power cannot be met by some renewable sources due to intermittency. When that happens, the system may become unstable with some sources progressively brought out of generation. To avoid such occurrence, an enhanced dual droop scheme...

  6. Radioactively contaminated areas: Bioindicator species and biomarkers of effect in an early warning scheme for a preliminary risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Lourenço, Joana, E-mail: joanalourenco@ua.pt [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Mendo, Sónia [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Pereira, Ruth [Department of Biology, Faculty of Sciences of the University of Porto & CIIMAR – Interdisciplinary Centre of Marine and Environmental Research & GreenUP/CITAB-UP, Porto (Portugal)

    2016-11-05

    Highlights: • Knowing the most used biomarkers and bioindicators used in radioactive areas. • Understanding of the response similarities between human and non-human biota. • Identifying the knowledge gaps. • Proposing an early warning scheme, to perform a screening evaluation of radioactive areas. • Permitting routine assessments without disturbing and alarming local populations. - Abstract: Concerns about the impacts on public health and on the natural environment have been raised regarding the full range of operational activities related to uranium mining and the rest of the nuclear fuel cycle (including nuclear accidents), nuclear tests and depleted uranium from military ammunitions. However, the environmental impacts of such activities, as well as their ecotoxicological/toxicological profile, are still poorly studied. Herein, it is discussed if organisms can be used as bioindicators of human health effects, posed by lifetime exposure to radioactively contaminated areas. To do so, information was gathered from several studies performed on vertebrates, invertebrate species and humans, living in these contaminated areas. The retrieved information was compared, to determine which are the most used bioindicators and biomarkers and also the similarities between human and non-human biota responses. The data evaluated are used to support the proposal for an early warning scheme, based on bioindicator species and on the most sensitive and commonly shared biomarkers, to perform a screening evaluation of radioactively contaminated sites. This scheme could be used to support decision-making for a deeper evaluation of risks to human health, making it possible to screen a large number of areas, without disturbing and alarming local populations.

  7. 78 FR 52962 - 60-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-08-27

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Assistant Secretary... Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of Request (i.e. new, revision... Secretary to implement risk sharing with State and local housing finance agencies (HFAs). Under this program...

  8. A risk-based classification scheme for genetically modified foods. I: Conceptual development.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    The predominant paradigm for the premarket assessment of genetically modified (GM) foods reflects heightened public concern by focusing on foods modified by recombinant deoxyribonucleic acid (rDNA) techniques, while foods modified by other methods of genetic modification are generally not assessed for safety. To determine whether a GM product requires less or more regulatory oversight and testing, we developed and evaluated a risk-based classification scheme (RBCS) for crop-derived GM foods. The results of this research are presented in three papers. This paper describes the conceptual development of the proposed RBCS that focuses on two categories of adverse health effects: (1) toxic and antinutritional effects, and (2) allergenic effects. The factors that may affect the level of potential health risks of GM foods are identified. For each factor identified, criteria for differentiating health risk potential are developed. The extent to which a GM food satisfies applicable criteria for each factor is rated separately. A concern level for each category of health effects is then determined by aggregating the ratings for the factors using predetermined aggregation rules. An overview of the proposed scheme is presented, as well as the application of the scheme to a hypothetical GM food.

  9. Radical uncertainty, non-predictability, antifragility and risk-sharing Islamic finance

    Directory of Open Access Journals (Sweden)

    Umar Rafi

    2016-12-01

    Full Text Available Under conditions of radical uncertainty, risk sharing renders financial systems anti-fragile. Our goal in this paper is to show that risk-sharing Islamic finance (RSIF shares the characteristics defined by Taleb for an anti-fragile system, by mapping some characteristics of anti-fragility onto those of risk-sharing Islamic finance. A key insight around which such a connection can be established is by relating the principle of “no risk-no gain”from Islamic finance to the concept of skin-in-the-game from anti-fragility theory. The relationship is then extended to other characteristics of the two frameworks, to show that RSIF overlaps with anti-fragility over many dimensions. The broader case for an antifragile system includes another important characteristic, namely “soul in the game” and concern for social justice. It is the authors’ hope that emerging research on anti-fragility, combined with the emerging research on RSIF, can have a lasting impact on the field of finance by laying the foundations for a compelling case that it is time for humanity to replace the dominant debt-based risk transfer/risk shifting financial system with a system in which everyone shares the risks faced by society. JEL: D81, D89, E44, F34, G32

  10. Balancing the risks and benefits of genomic data sharing: genome research participants' perspectives.

    Science.gov (United States)

    Oliver, J M; Slashinski, M J; Wang, T; Kelly, P A; Hilsenbeck, S G; McGuire, A L

    2012-01-01

    Technological advancements are rapidly propelling the field of genome research forward, while lawmakers attempt to keep apace with the risks these advances bear. Balancing normative concerns of maximizing data utility and protecting human subjects, whose privacy is at risk due to the identifiability of DNA data, are central to policy decisions. Research on genome research participants making real-time data sharing decisions is limited; yet, these perspectives could provide critical information to ongoing deliberations. We conducted a randomized trial of 3 consent types affording varying levels of control over data release decisions. After debriefing participants about the randomization process, we invited them to a follow-up interview to assess their attitudes toward genetic research, privacy and data sharing. Participants were more restrictive in their reported data sharing preferences than in their actual data sharing decisions. They saw both benefits and risks associated with sharing their genomic data, but risks were seen as less concrete or happening in the future, and were largely outweighed by purported benefits. Policymakers must respect that participants' assessment of the risks and benefits of data sharing and their privacy-utility determinations, which are associated with their final data release decisions, vary. In order to advance the ethical conduct of genome research, proposed policy changes should carefully consider these stakeholder perspectives. Copyright © 2011 S. Karger AG, Basel.

  11. Research on Liquidity Risk Evaluation of Chinese A-Shares Market Based on Extension Theory

    Science.gov (United States)

    Bai-Qing, Sun; Peng-Xiang, Liu; Lin, Zhang; Yan-Ge, Li

    This research defines the liquidity risk of stock market in matter-element theory and affair-element theory, establishes the indicator system of the forewarning for liquidity risks,designs the model and the process of early warning using the extension set method, extension dependent function and the comprehensive evaluation model. And the paper studies empirically A-shares market through the data of 1A0001, which prove that the model can better describe liquidity risk of China’s A-share market. At last, it gives the corresponding policy recommendations.

  12. A Regional Decision Support Scheme for Pest Risk Analysis in Southeast Asia.

    Science.gov (United States)

    Soliman, T; MacLeod, A; Mumford, J D; Nghiem, T P L; Tan, H T W; Papworth, S K; Corlett, R T; Carrasco, L R

    2016-05-01

    A key justification to support plant health regulations is the ability of quarantine services to conduct pest risk analyses (PRA). Despite the supranational nature of biological invasions and the close proximity and connectivity of Southeast Asian countries, PRAs are conducted at the national level. Furthermore, some countries have limited experience in the development of PRAs, which may result in inadequate phytosanitary responses that put their plant resources at risk to pests vectored via international trade. We review existing decision support schemes for PRAs and, following international standards for phytosanitary measures, propose new methods that adapt existing practices to suit the unique characteristics of Southeast Asia. Using a formal written expert elicitation survey, a panel of regional scientific experts was asked to identify and rate unique traits of Southeast Asia with respect to PRA. Subsequently, an expert elicitation workshop with plant protection officials was conducted to verify the potential applicability of the developed methods. Rich biodiversity, shortage of trained personnel, social vulnerability, tropical climate, agriculture-dependent economies, high rates of land-use change, and difficulties in implementing risk management options were identified as challenging Southeast Asian traits. The developed methods emphasize local Southeast Asian conditions and could help support authorities responsible for carrying out PRAs within the region. These methods could also facilitate the creation of other PRA schemes in low- and middle-income tropical countries. © 2016 Society for Risk Analysis.

  13. Improving performance of breast cancer risk prediction using a new CAD-based region segmentation scheme

    Science.gov (United States)

    Heidari, Morteza; Zargari Khuzani, Abolfazl; Danala, Gopichandh; Qiu, Yuchen; Zheng, Bin

    2018-02-01

    Objective of this study is to develop and test a new computer-aided detection (CAD) scheme with improved region of interest (ROI) segmentation combined with an image feature extraction framework to improve performance in predicting short-term breast cancer risk. A dataset involving 570 sets of "prior" negative mammography screening cases was retrospectively assembled. In the next sequential "current" screening, 285 cases were positive and 285 cases remained negative. A CAD scheme was applied to all 570 "prior" negative images to stratify cases into the high and low risk case group of having cancer detected in the "current" screening. First, a new ROI segmentation algorithm was used to automatically remove useless area of mammograms. Second, from the matched bilateral craniocaudal view images, a set of 43 image features related to frequency characteristics of ROIs were initially computed from the discrete cosine transform and spatial domain of the images. Third, a support vector machine model based machine learning classifier was used to optimally classify the selected optimal image features to build a CAD-based risk prediction model. The classifier was trained using a leave-one-case-out based cross-validation method. Applying this improved CAD scheme to the testing dataset, an area under ROC curve, AUC = 0.70+/-0.04, which was significantly higher than using the extracting features directly from the dataset without the improved ROI segmentation step (AUC = 0.63+/-0.04). This study demonstrated that the proposed approach could improve accuracy on predicting short-term breast cancer risk, which may play an important role in helping eventually establish an optimal personalized breast cancer paradigm.

  14. Patients who share transparent visit notes with others: characteristics, risks, and benefits.

    Science.gov (United States)

    Jackson, Sara L; Mejilla, Roanne; Darer, Jonathan D; Oster, Natalia V; Ralston, James D; Leveille, Suzanne G; Walker, Jan; Delbanco, Tom; Elmore, Joann G

    2014-11-12

    Inviting patients to read their primary care visit notes may improve communication and help them engage more actively in their health care. Little is known about how patients will use the opportunity to share their visit notes with family members or caregivers, or what the benefits might be. Our goal was to evaluate the characteristics of patients who reported sharing their visit notes during the course of the study, including their views on associated benefits and risks. The OpenNotes study invited patients to access their primary care providers' visit notes in Massachusetts, Pennsylvania, and Washington. Pre- and post-intervention surveys assessed patient demographics, standardized measures of patient-doctor communication, sharing of visit notes with others during the study, and specific health behaviors reflecting the potential benefits and risks of offering patients easy access to their visit notes. More than half (55.43%, 2503/4516) of the participants who reported viewing at least one visit note would like the option of letting family members or friends have their own Web access to their visit notes, and 21.70% (980/4516) reported sharing their visit notes with someone during the study year. Men, and those retired or unable to work, were significantly more likely to share visit notes, and those sharing were neither more nor less concerned about their privacy than were non-sharers. Compared to participants who did not share clinic notes, those who shared were more likely to report taking better care of themselves and taking their medications as prescribed, after adjustment for age, gender, employment status, and study site. One in five OpenNotes patients shared a visit note with someone, and those sharing Web access to their visit notes reported better adherence to self-care and medications. As health information technology systems increase patients' ability to access their medical records, facilitating access to caregivers may improve perceived health

  15. Patients Who Share Transparent Visit Notes With Others: Characteristics, Risks, and Benefits

    OpenAIRE

    Jackson, Sara L; Mejilla, Roanne; Darer, Jonathan D; Oster, Natalia V; Ralston, James D; Leveille, Suzanne G; Walker, Jan; Delbanco, Tom; Elmore, Joann G

    2014-01-01

    Background Inviting patients to read their primary care visit notes may improve communication and help them engage more actively in their health care. Little is known about how patients will use the opportunity to share their visit notes with family members or caregivers, or what the benefits might be. Objective Our goal was to evaluate the characteristics of patients who reported sharing their visit notes during the course of the study, including their views on associated benefits and risks....

  16. Can't get no satisfaction? Will pay for performance help?: toward an economic framework for understanding performance-based risk-sharing agreements for innovative medical products.

    Science.gov (United States)

    Towse, Adrian; Garrison, Louis P

    2010-01-01

    --in principle--risk sharing can provide manufacturers and payers additional real options that increase overall efficiency. Given the lack of empirical evidence on the success of schemes already agreed and on the issues we set out above, it is too early to tell if the recent surge of interest in these arrangements is likely to be a trend or only a fad.

  17. Expert opinion on risks to the long-term viability of residential recycled water schemes: An Australian study.

    Science.gov (United States)

    West, Camilla; Kenway, Steven; Hassall, Maureen; Yuan, Zhiguo

    2017-09-01

    The water sector needs to make efficient and prudent investment decisions by carefully considering the long-term viability of water infrastructure projects. To support the assessment and planning of residential recycled water schemes in Australia, we have sought to clarify scheme objectives and to further define the array of critical risks that can impact the long-term viability of schemes. Building on historical information, we conducted a national survey which elicited responses from 88 Australian expert practitioners, of which 64% have over 10 years of industry experience and 42% have experience with more than five residential recycled water schemes. On the basis of expert opinion, residential recycled water schemes are considered to be highly relevant for diversifying and improving water supply security, reducing wastewater effluent discharge and pollutant load to waterways and contributing to sustainable urban development. At present however, the inability to demonstrate an incontestable business case is posing a significant risk to the long-term viability of residential recycled water schemes. Political, regulatory, organisational and financial factors were also rated as critical risks, in addition to community risk perception and fall in demand. The survey results shed further light on the regulatory environment of residential recycled water schemes, with regulatory participants rating the level and impact of risk factors higher than other survey participants in most cases. The research outcomes provide a comprehensive understanding of the critical risks to the long-term viability of residential recycled water schemes, thereby enabling the specification of targeted risk management measures at the assessment and planning stage of a scheme. Copyright © 2017 Elsevier Ltd. All rights reserved.

  18. 78 FR 64145 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-10-25

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Title of Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502... sharing with State and local housing finance agencies (HFAs). Under this program, HUD provides full...

  19. Is parent-child bed-sharing a risk for wheezing and asthma in early childhood?

    Science.gov (United States)

    Luijk, Maartje P C M; Sonnenschein-van der Voort, Agnes M M; Mileva-Seitz, Viara R; Jansen, Pauline W; Verhulst, Frank C; Hofman, Albert; Jaddoe, Vincent W V; de Jongste, Johan C; van IJzendoorn, Marinus H; Duijts, Liesbeth; Tiemeier, Henning

    2015-03-01

    Household crowding can place young children at risk for respiratory infections which subsequently provoke asthma symptoms. However, crowding might also protect against asthma, in accordance with the hygiene hypothesis. We tested if parent-infant bed-sharing, an important dimension of household crowding, increases or decreases the risk for asthma. In a population-based prospective cohort (N = 6160) we assessed bed-sharing at 2 and 24 months; wheezing between 1 and 6 years of age; and asthma at 6 years of age. Generalised estimating equation models were used to assess repeated measures of wheezing and asthma. We found no association between bed-sharing in early infancy and wheezing or diagnosis of asthma. By contrast, we found a positive association between bed-sharing in toddlerhood and both wheezing (OR 1.42, 95% CI 1.15-1.74) and asthma (OR 1.57, 95% CI 1.03-2.38). Wheezing was not associated with bed-sharing when using cross-lagged modelling. This study suggests that bed-sharing in toddlerhood is associated with an increased risk of asthma at later ages, and not vice versa. Further studies are needed to explore the underlying causal mechanisms. Copyright ©ERS 2015.

  20. European insurance scheme to cover geological risk related to geothermal operations

    Energy Technology Data Exchange (ETDEWEB)

    Tiberi, U [European Community, General Directorate XVII, ALTERNER Program, Bruxelles (Belgium); Demange, J [BRGM, Orleans (France)

    1997-12-01

    The development of geothermal energy can contribute significantly to the growth of NRE (new and renewable energies that are non-nuclear and non-combustible) within the European Community and within Europe as a whole. However, the `mining risk` related to this type of operation still constitutes a major obstacle to its development. Operators find it difficult to raise the necessary financing without a guarantee against the risk of failure during the drilling stage. Standard insurance companies will not cover this type of risk, due to its very nature. We must thus therefore find a specific solution. As a result of the oil crises during the 1970s, the French Government decided promote the use of renewable energies in France. The support provided to these energies, or at least to geothermal energy, was to set up a scheme whereby the resource is guaranteed. Thus the operator, by subscribing to the scheme, benefits from a guarantee of the resource. The insurance works at two level: - in the first place, it covers the mining risk during the drilling stage, i.e. should the resource prove to be insufficient, whether in discharge or temperature, for an economically viable operation, then the totality of the costs are reimbursed, apart form the premium and any government subsidy that might have been received. - A second level of guarantee covers the risk of change in the resource`s parameters over a period of 15 years (a study is in progress to consider the possibility of extending this period to 25 years). (orig.)

  1. INJECTING EQUPMENT SHARING AND PERCEPTION OF HIV AND HEPATITIS RISK AMONG INJECTING DRUG USERS IN BUDAPEST

    Science.gov (United States)

    Gyarmathy, V. Anna; Neaigus, Alan; Ujhelyi, Eszter

    2008-01-01

    In Central European states, rates of HIV among IDUs have been low although HCV infection is widespread. The goal of our study was to assess HIV infection, risk perceptions and injecting equipment sharing among injection drug users in Budapest, Hungary. Altogether 150 IDUs were interviewed (121 structured between 1999-2000 and 29 ethnographic between 2003-2004). The majority of them injected heroin (52% and 79%) and many injected amphetamines (51% and 35%). One person tested positive for HIV. Two thirds (68% of 121) shared injecting equipment (syringes, cookers and filters). Some participants said they shared syringes because they were not carrying them for fear of police harassment, and that they reused filters as a backup drug supply. In multivariate analysis, sharing of injecting equipment was associated with higher perceived susceptibility to HIV/AIDS, lower self-efficacy for sterile equipment use, higher motivation to comply with peer pressure to use dirty injecting equipment, and with having a criminal record. The high levels of injecting risk behaviors found in this study are a cause for serious concern. HIV prevention interventions need to address not only sharing syringes but also sharing and reusing other injecting equipment and drug filters. PMID:17129858

  2. Societal Risk Evaluation Scheme (SRES: Scenario-Based Multi-Criteria Evaluation of Synthetic Biology Applications.

    Directory of Open Access Journals (Sweden)

    Christopher L Cummings

    Full Text Available Synthetic biology (SB applies engineering principles to biology for the construction of novel biological systems designed for useful purposes. From an oversight perspective, SB products come with significant uncertainty. Yet there is a need to anticipate and prepare for SB applications before deployment. This study develops a Societal Risk Evaluation Scheme (SRES in order to advance methods for anticipatory governance of emerging technologies such as SB. The SRES is based upon societal risk factors that were identified as important through a policy Delphi study. These factors range from those associated with traditional risk assessment, such as health and environmental consequences, to broader features of risk such as those associated with reversibility, manageability, anticipated levels of public concern, and uncertainty. A multi-disciplinary panel with diverse perspectives and affiliations assessed four case studies of SB using the SRES. Rankings of the SRES components are compared within and across the case studies. From these comparisons, we found levels of controllability and familiarity associated with the cases to be important for overall SRES rankings. From a theoretical standpoint, this study illustrates the applicability of the psychometric paradigm to evaluating SB cases. In addition, our paper describes how the SRES can be incorporated into anticipatory governance models as a screening tool to prioritize research, information collection, and dialogue in the face of the limited capacity of governance systems. To our knowledge, this is the first study to elicit data on specific cases of SB with the goal of developing theory and tools for risk governance.

  3. Incentivizing intelligent customer behavior in smart-grids: a risk-sharing tariff & optimal strategies

    NARCIS (Netherlands)

    G. Methenitis (Georgios); M. Kaisers (Michael); J.A. La Poutré (Han)

    2016-01-01

    textabstractCurrent electricity tariffs for retail rarely provide incentives for intelligent demand response of flexible customers. Such customers could otherwise contribute to balancing supply and demand in future smart grids. This paper proposes an innovative risk-sharing tariff to incentivize

  4. TEACHING WRITING USING THINK-PAIR-SHARE VIEWED FROM STUDENTS’ LEVEL OF RISK-TAKING

    Directory of Open Access Journals (Sweden)

    Ningtyas Orilina Argawati

    2017-12-01

    Full Text Available Writing is considered as the most difficult skill to master compared with the other skills because it involves many language elements such as content, organization, vocabulary, grammar and mechanics. The research examines the effect of two independent variables (Think-Pair-Share and Direct instruction method on dependent variable (Writing Descriptive skill. The samples were class A1 2016 as the experimental class and A3 2016 as the control class. Each class consisted of 32 students. The instruments used covered the risk-taking’s questionnaire and writing test. Before applying the questionnaire of risk-taking, it was tried out to class A2 2016 to find out the validity and the reliability of the instrument. Meanwhile, before conducting the writing test, it needs to test the readability of the writing instruction. The treatment was conducted in eight meetings, and the 9th meeting was allocated for the post-test. The data were then analyzed using ANOVA and Tukey test. From the analysis, it reveals that: (1 Think-Pair-Share is significantly different from direct instruction method to teach writing; (2 the students with high level of risk-taking have better writing than those with low level of risk-taking; and (3 there is an interaction between teaching methods and the students’ level of risk-taking. Even though Think-Pair-Share is effective to teach writing, teachers must consider about the students’ condition, in this case their level of risk-taking.

  5. Genome-wide association study identifies shared risk loci common to two malignancies in golden retrievers.

    Directory of Open Access Journals (Sweden)

    Noriko Tonomura

    2015-02-01

    Full Text Available Dogs, with their breed-determined limited genetic background, are great models of human disease including cancer. Canine B-cell lymphoma and hemangiosarcoma are both malignancies of the hematologic system that are clinically and histologically similar to human B-cell non-Hodgkin lymphoma and angiosarcoma, respectively. Golden retrievers in the US show significantly elevated lifetime risk for both B-cell lymphoma (6% and hemangiosarcoma (20%. We conducted genome-wide association studies for hemangiosarcoma and B-cell lymphoma, identifying two shared predisposing loci. The two associated loci are located on chromosome 5, and together contribute ~20% of the risk of developing these cancers. Genome-wide p-values for the top SNP of each locus are 4.6×10-7 and 2.7×10-6, respectively. Whole genome resequencing of nine cases and controls followed by genotyping and detailed analysis identified three shared and one B-cell lymphoma specific risk haplotypes within the two loci, but no coding changes were associated with the risk haplotypes. Gene expression analysis of B-cell lymphoma tumors revealed that carrying the risk haplotypes at the first locus is associated with down-regulation of several nearby genes including the proximal gene TRPC6, a transient receptor Ca2+-channel involved in T-cell activation, among other functions. The shared risk haplotype in the second locus overlaps the vesicle transport and release gene STX8. Carrying the shared risk haplotype is associated with gene expression changes of 100 genes enriched for pathways involved in immune cell activation. Thus, the predisposing germ-line mutations in B-cell lymphoma and hemangiosarcoma appear to be regulatory, and affect pathways involved in T-cell mediated immune response in the tumor. This suggests that the interaction between the immune system and malignant cells plays a common role in the tumorigenesis of these relatively different cancers.

  6. Impact of catch shares on diversification of fishers' income and risk.

    Science.gov (United States)

    Holland, Daniel S; Speir, Cameron; Agar, Juan; Crosson, Scott; DePiper, Geret; Kasperski, Stephen; Kitts, Andrew W; Perruso, Larry

    2017-08-29

    Many fishers diversify their income by participating in multiple fisheries, which has been shown to significantly reduce year-to-year variation in income. The ability of fishers to diversify has become increasingly constrained in the last few decades, and catch share programs could further reduce diversification as a result of consolidation. This could increase income variation and thus financial risk. However, catch shares can also offer fishers opportunities to enter or increase participation in catch share fisheries by purchasing or leasing quota. Thus, the net effect on diversification is uncertain. We tested whether diversification and variation in fishing revenues changed after implementation of catch shares for 6,782 vessels in 13 US fisheries that account for 20% of US landings revenue. For each of these fisheries, we tested whether diversification levels, trends, and variation in fishing revenues changed after implementation of catch shares, both for fishers that remained in the catch share fishery and for those that exited but remained active in other fisheries. We found that diversification for both groups was nearly always reduced. However, in most cases, we found no significant change in interannual variation of revenues, and, where changes were significant, variation decreased nearly as often as it increased.

  7. Assessing the evidence for shared genetic risks across psychiatric disorders and traits.

    Science.gov (United States)

    Martin, Joanna; Taylor, Mark J; Lichtenstein, Paul

    2017-12-04

    Genetic influences play a significant role in risk for psychiatric disorders, prompting numerous endeavors to further understand their underlying genetic architecture. In this paper, we summarize and review evidence from traditional twin studies and more recent genome-wide molecular genetic analyses regarding two important issues that have proven particularly informative for psychiatric genetic research. First, emerging results are beginning to suggest that genetic risk factors for some (but not all) clinically diagnosed psychiatric disorders or extreme manifestations of psychiatric traits in the population share genetic risks with quantitative variation in milder traits of the same disorder throughout the general population. Second, there is now evidence for substantial sharing of genetic risks across different psychiatric disorders. This extends to the level of characteristic traits throughout the population, with which some clinical disorders also share genetic risks. In this review, we summarize and evaluate the evidence for these two issues, for a range of psychiatric disorders. We then critically appraise putative interpretations regarding the potential meaning of genetic correlation across psychiatric phenotypes. We highlight several new methods and studies which are already using these insights into the genetic architecture of psychiatric disorders to gain additional understanding regarding the underlying biology of these disorders. We conclude by outlining opportunities for future research in this area.

  8. Indirect Reciprocity, Resource Sharing, and Environmental Risk: Evidence from Field Experiments in Siberia

    Science.gov (United States)

    Howe, E. Lance; Murphy, James J.; Gerkey, Drew; West, Colin Thor

    2016-01-01

    Integrating information from existing research, qualitative ethnographic interviews, and participant observation, we designed a field experiment that introduces idiosyncratic environmental risk and a voluntary sharing decision into a standard public goods game. Conducted with subsistence resource users in rural villages on the Kamchatka Peninsula in Northeast Siberia, we find evidence consistent with a model of indirect reciprocity and local social norms of helping the needy. When participants are allowed to develop reputations in the experiments, as is the case in most small-scale societies, we find that sharing is increasingly directed toward individuals experiencing hardship, good reputations increase aid, and the pooling of resources through voluntary sharing becomes more effective. We also find high levels of voluntary sharing without a strong commitment device; however, this form of cooperation does not increase contributions to the public good. Our results are consistent with previous experiments and theoretical models, suggesting strategic risks tied to rewards, punishments, and reputations are important. However, unlike studies that focus solely on strategic risks, we find the effects of rewards, punishments, and reputations are altered by the presence of environmental factors. Unexpected changes in resource abundance increase interdependence and may alter the costs and benefits of cooperation, relative to defection. We suggest environmental factors that increase interdependence are critically important to consider when developing and testing theories of cooperation PMID:27442434

  9. Risk mitigation of shared electronic records system in campus institutions: medical social work practice in singapore.

    Science.gov (United States)

    Ow Yong, Lai Meng; Tan, Amanda Wei Li; Loo, Cecilia Lay Keng; Lim, Esther Li Ping

    2014-10-01

    In 2013, the Singapore General Hospital (SGH) Campus initiated a shared electronic system where patient records and documentations were standardized and shared across institutions within the Campus. The project was initiated to enhance quality of health care, improve accessibility, and ensure integrated (as opposed to fragmented) care for best outcomes in our patients. In mitigating the risks of ICT, it was found that familiarity with guiding ethical principles, and ensuring adherence to regulatory and technical competencies in medical social work were important. The need to negotiate and maneuver in a large environment within the Campus to ensure proactive integrative process helped.

  10. Juggling on a rollercoaster? Gains, loss and uncertainties in IVF patients' accounts of volunteering for a U.K. ‘egg sharing for research’ scheme

    Science.gov (United States)

    Haimes, Erica

    2013-01-01

    The past decade has seen a growth in demand for human eggs for stem cell related research and, more recently, for mitochondrial research. That demand has been accompanied by global debates over whether women should be encouraged, by offers of payments, in cash or kind, to provide eggs. Few of these debates have been informed by empirical evidence, let alone by the views of women themselves. This article addresses that gap in knowledge by presenting findings from a UK investigation, conducted 2008–2011, which is the first systematic study of women volunteering to provide eggs under such circumstances. This article focuses on the views and experiences of 25 IVF patients who volunteered for the Newcastle ‘egg sharing for research’ scheme (NESR), in exchange for reduced IVF fees. This was an interview based study, designed to gain understandings of volunteers' perspectives and reasoning. The interviews show that volunteers approached the scheme as a way of accessing more treatment in pursuit of their goal of having a baby, against a landscape of inadequate state provision of treatment and expensive private treatment. The process of deciding to volunteer raised a wide range of uncertainties about the consequent gains and losses, for women already in the uncertain world of the ‘IVF rollercoaster’. However, interviewees preferred to have the option of the NESR, than not, and they juggled the numerous uncertainties with skill and resilience. The article is as revealing of the ongoing challenges of the UK IVF bio-economy as it is of egg provision. This article adds to the growing body of knowledge of the contributions of tissue providers to the global bio-economy. It also contributes to several areas of wider sociological interest, including debates on the social management of ‘uncertainty’ and discussions at the interface of sociology and ethics. PMID:23608093

  11. 78 FR 65696 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-11-01

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of... housing finance agencies (HFAs). Under this program, HUD provides full mortgage insurance on multifamily...

  12. Risk Sharing in Corporate and Public Finance: The Contribution of Islamic Finance

    Directory of Open Access Journals (Sweden)

    Obiyathulla Ismath Bacha

    2015-09-01

    Full Text Available Financial crises have become a recurring problem for modern economies with increasingly detrimental fallouts. Risk-sharing finance (RSF contracts may be the best instrument for addressing the problem and its fallout, and in particular the risk-sharing principles of Islamic finance offer a potential alternative. This paper offers some preliminary thoughts on the design and implementation of RSF for both private and public sector funding, for revenue and non-revenue generating projects. It is argued that such form of financing avoids the leverage of conventional debt, minimizes the costs of dilution, reduces macroeconomic vulnerability, and enhances financial inclusion. It also has the potential to be a less risky alternative for developing countries to finance public spending and economic growth. JEL Classifications: G32, P43, O16

  13. Setting the Stage for Harmonized Risk Assessment by Seismic Hazard Harmonization in Europe (SHARE)

    Science.gov (United States)

    Woessner, Jochen; Giardini, Domenico; SHARE Consortium

    2010-05-01

    Probabilistic seismic hazard assessment (PSHA) is arguably one of the most useful products that seismology can offer to society. PSHA characterizes the best available knowledge on the seismic hazard of a study area, ideally taking into account all sources of uncertainty. Results form the baseline for informed decision making, such as building codes or insurance rates and provide essential input to each risk assessment application. Several large scale national and international projects have recently been launched aimed at improving and harmonizing PSHA standards around the globe. SHARE (www.share-eu.org) is the European Commission funded project in the Framework Programme 7 (FP-7) that will create an updated, living seismic hazard model for the Euro-Mediterranean region. SHARE is a regional component of the Global Earthquake Model (GEM, www.globalquakemodel.org), a public/private partnership initiated and approved by the Global Science Forum of the OECD-GSF. GEM aims to be the uniform, independent and open access standard to calculate and communicate earthquake hazard and risk worldwide. SHARE itself will deliver measurable progress in all steps leading to a harmonized assessment of seismic hazard - in the definition of engineering requirements, in the collection of input data, in procedures for hazard assessment, and in engineering applications. SHARE scientists will create a unified framework and computational infrastructure for seismic hazard assessment and produce an integrated European probabilistic seismic hazard assessment (PSHA) model and specific scenario based modeling tools. The results will deliver long-lasting structural impact in areas of societal and economic relevance, they will serve as reference for the Eurocode 8 (EC8) application, and will provide homogeneous input for the correct seismic safety assessment for critical industry, such as the energy infrastructures and the re-insurance sector. SHARE will cover the whole European territory, the

  14. Educational differences in cardiovascular mortality: The role of shared family factors and cardiovascular risk factors.

    Science.gov (United States)

    Kjøllesdal, M K R; Ariansen, I; Mortensen, L H; Davey Smith, G; Næss, Ø

    2016-12-01

    To explore the confounding effects of early family factors shared by siblings and cardiovascular risk factors in midlife on the educational differences in mortality from cardiovascular disease (CVD). Data from national and regional health surveys in Norway (1974-2003) were linked with data from the Norwegian Family Based Life Course Study, the National Educational Registry and the Cause of Death Registry. The study population consisted of participants with at least one full sibling among the health survey participants ( n=271,310). Data were available on CVD risk factors, including weight, height, blood pressure, total cholesterol and smoking. The hazards ratio (HR) of CVD mortality was 3.44 (95% confidence interval (CI) 2.98-3.96) in the lowest educational group relative to the highest. The HRs were little altered in the within-sibship analyses. Adjusted for risk factors, the HR for CVD mortality in the cohort analyses was 2.05 (CI 1.77-2.37) in the lowest educational group relative to the highest. The respective HR in the within-sibship analyses was 2.46 (CI 1.48-2.24). Using a sibling design, we did not find that the association between education and CVD mortality was confounded by early life factors shared by siblings, but it was explained to a large extent by CVD risk factors. These results suggest that reducing levels of CVD risk factors could have the greatest effect on mortality in less well-educated people.

  15. Scenarios for the risk of hunger in the twenty-first century using Shared Socioeconomic Pathways

    International Nuclear Information System (INIS)

    Hasegawa, Tomoko; Fujimori, Shinichiro; Takahashi, Kiyoshi; Masui, Toshihiko

    2015-01-01

    Shared socioeconomic pathways (SSPs) are being developed internationally for cross-sectoral assessments of climate change impacts, adaptation, and mitigation. These are five scenarios that include both qualitative and quantitative information for mitigation and adaptation challenges to climate change. In this study, we quantified scenarios for the risk of hunger in the 21st century using SSPs, and clarified elements that influence future hunger risk. There were two primary findings: (1) risk of hunger in the 21st-century greatly differed among five SSPs; and (2) population growth, improvement in the equality of food distribution within a country, and increases in food consumption mainly driven by income growth greatly influenced future hunger risk and were important elements in its long-term assessment. (letter)

  16. A risk-scoring scheme for suicide attempts among patients with bipolar disorder in a Thai patient cohort

    Directory of Open Access Journals (Sweden)

    Patumanond J

    2012-04-01

    Full Text Available Chidchanok Ruengorn1,2, Kittipong Sanichwankul3, Wirat Niwatananun2, Suwat Mahatnirunkul3, Wanida Pumpaisalchai3, Jayanton Patumanond11Clinical Epidemiology Program, Faculty of Medicine, Chiang Mai University, Chiang Mai, Thailand; 2Department of Pharmaceutical Care, Faculty of Pharmacy, Chiang Mai University, Chiang Mai, Thailand; 3Suanprung Psychiatric Hospital, Chiang Mai, ThailandBackground: In Thailand, risk factors associated with suicide attempts in bipolar disorder (BD are rarely investigated, nor has a specific risk-scoring scheme to assist in the identification of BD patients at risk for attempting suicide been proposed.Objective: To develop a simple risk-scoring scheme to identify patients with BD who may be at risk for attempting suicide.Methods: Medical files of 489 patients diagnosed with BD at Suanprung Psychiatric Hospital between October 2006 and May 2009 were reviewed. Cases included BD patients hospitalized due to attempted suicide (n = 58, and seven controls were selected (per suicide case among BD in- and out-patients who did not attempt suicide, with patients being visited the same day or within 1 week of case study (n = 431. Broad sociodemographic and clinical factors were gathered and analyzed using multivariate logistic regression, to obtain a set of risk factors. Scores for each indicator were weighted, assigned, and summed to create a total risk score, which was divided into low, moderate, and high-risk suicide attempt groups.Results: Six statistically significant indicators associated with suicide attempts were included in the risk-scoring scheme: depression, psychotic symptom(s, number of previous suicide attempts, stressful life event(s, medication adherence, and BD treatment years. A total risk score (possible range -1.5 to 11.5 explained an 88.6% probability of suicide attempts based on the receiver operating characteristic (ROC analysis. Likelihood ratios of suicide attempts with low risk scores (below 2

  17. Risk analysis of the proxy life-cycle investments in the second pillar pension scheme in Croatia

    Directory of Open Access Journals (Sweden)

    Renata Kovačević

    2015-03-01

    Full Text Available In this article we analyze the expected risk of pension funds with different risk profiles in the proxy life-cycle model of investments for the 2nd pillar pension scheme in Croatia. The benefits of implementing proxy life-cycle investments, compared to the previous model of mandatory pension funds investments, are clearly visible in the total expected amount of accumulated savings from the risk/return perspective. However, those benefits are partially diminished by the fact that the expected risk of a pension fund with the lowest risk profile is not substantially different from the expected risk of a pension fund with a medium risk profile, due to the lack of diversification. Additionally, we analyze the robustness of the proxy life-cycle model to a sudden and severe market shock, where we determine the presence of risk for those members who choose to switch to a pension fund with a lower risk profile at an unfavorable moment.

  18. A Risk-Based Approach for Asset Allocation with A Defaultable Share

    Directory of Open Access Journals (Sweden)

    Yang Shen

    2018-02-01

    Full Text Available This paper presents a novel risk-based approach for an optimal asset allocation problem with default risk, where a money market account, an ordinary share and a defaultable security are investment opportunities in a general non-Markovian economy incorporating random market parameters. The objective of an investor is to select an optimal mix of these securities such that a risk metric of an investment portfolio is minimized. By adopting a sub-additive convex risk measure, which takes into account interest rate risk, as a measure for risk, the investment problem is discussed mathematically in a form of a two-player, zero-sum, stochastic differential game between the investor and the market. A backward stochastic differential equation approach is used to provide a flexible and theoretically sound way to solve the game problem. Closed-form expressions for the optimal strategies of the investor and the market are obtained when the penalty function is a quadratic function and when the risk measure is a sub-additive coherent risk measure. An important case of the general non-Markovian model, namely the self-exciting threshold diffusion model with time delay, is considered. Numerical examples based on simulations for the self-exciting threshold diffusion model with and without time delay are provided to illustrate how the proposed model can be applied in this important case. The proposed model can be implemented using Excel spreadsheets.

  19. Sharing of Needles and Syringes among Men Who Inject Drugs: HIV Risk in Northwest Bangladesh.

    Directory of Open Access Journals (Sweden)

    M Kamal Pasa

    Full Text Available Injection drug use is prevalent in northwestern Bangladesh. We sought to explore the context of needle/syringe sharing among persons who inject drugs (PWID, examining risk exposures to blood-borne infections like the human immunodeficiency virus (HIV and hepatitis in a region where these dual epidemics are likely to expand.We used a qualitative research approach to learn about injection practices, conducting 60 in-depth interviews among PWID. We then conducted 12 focus group discussions (FGDs that generated a checklist of salient issues, and followed up with personal observations of typical days at the drug-use venues. Content and interpretative frameworks were used to analyze qualitative information and socio-demographic information, using SPSS software.We found that needle/syringe-sharing behaviours were integrated into the overall social and cultural lives of drug users. Sharing behaviours were an central component of PWID social organization. Sharing was perceived as an inherent element within reciprocal relationships, and sharing was tied to beliefs about drug effects, economic adversity, and harassment due to their drug user status. Carrying used needles/syringes to drug-use venues was deemed essential since user-unfriendly needle-syringe distribution schedules of harm reduction programmes made it difficult to access clean needles/syringes in off-hours. PWID had low self-esteem. Unequal power relationships were reported between the field workers of harm reduction programmes and PWID. Field workers expressed anti-PWID bias and judgmental attitudes, and also had had misconceptions about HIV and hepatitis transmission. PWID were especially disturbed that no assistance was forthcoming from risk reduction programme staff when drug users manifested withdrawal symptoms.Interventions must take social context into account when scaling up programmes in diverse settings. The social organization of PWID include values that foster needle

  20. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation: nationwide cohort study

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age≥75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to pre...

  1. Risk Stratification and Shared Decision Making for Colorectal Cancer Screening: A Randomized Controlled Trial.

    Science.gov (United States)

    Schroy, Paul C; Duhovic, Emir; Chen, Clara A; Heeren, Timothy C; Lopez, William; Apodaca, Danielle L; Wong, John B

    2016-05-01

    Eliciting patient preferences within the context of shared decision making has been advocated for colorectal cancer (CRC) screening, yet providers often fail to comply with patient preferences that differ from their own. To determine whether risk stratification for advanced colorectal neoplasia (ACN) influences provider willingness to comply with patient preferences when selecting a desired CRC screening option. Randomized controlled trial. Asymptomatic, average-risk patients due for CRC screening in an urban safety net health care setting. Patients were randomized 1:1 to a decision aid alone (n= 168) or decision aid plus risk assessment (n= 173) arm between September 2012 and September 2014. The primary outcome was concordance between patient preference and test ordered; secondary outcomes included patient satisfaction with the decision-making process, screening intentions, test completion rates, and provider satisfaction. Although providers perceived risk stratification to be useful in selecting an appropriate screening test for their average-risk patients, no significant differences in concordance were observed between the decision aid alone and decision aid plus risk assessment groups (88.1% v. 85.0%,P= 0.40) or high- and low-risk groups (84.5% v. 87.1%,P= 0.51). Concordance was highest for colonoscopy and relatively low for tests other than colonoscopy, regardless of study arm or risk group. Failure to comply with patient preferences was negatively associated with satisfaction with the decision-making process, screening intentions, and test completion rates. Single-institution setting; lack of provider education about the utility of risk stratification into their decision making. Providers perceived risk stratification to be useful in their decision making but often failed to comply with patient preferences for tests other than colonoscopy, even among those deemed to be at low risk of ACN. © The Author(s) 2016.

  2. The PREVIEW Global Risk Data Platform: a geoportal to serve and share global data on risk to natural hazards

    Directory of Open Access Journals (Sweden)

    G. Giuliani

    2011-01-01

    Full Text Available With growing world population and concentration in urban and coastal areas, the exposure to natural hazards is increasing and results in higher risk of human and economic losses. Improving the identification of areas, population and assets potentially exposed to natural hazards is essential to reduce the consequences of such events. Disaster risk is a function of hazard, exposure and vulnerability. Modelling risk at the global level requires accessing and processing a large number of data, from numerous collaborating centres.

    These data need to be easily updated, and there is a need for centralizing access to this information as well as simplifying its use for non GIS specialists. The Hyogo Framework for Action provides the mandate for data sharing, so that governments and international development agencies can take appropriate decision for disaster risk reduction.

    Timely access and easy integration of geospatial data are essential to support efforts in Disaster Risk Reduction. However various issues in data availability, accessibility and integration limit the use of such data. In consequence, a framework that facilitate sharing and exchange of geospatial data on natural hazards should improve decision-making process. The PREVIEW Global Risk Data Platform is a highly interactive web-based GIS portal supported by a Spatial Data Infrastructure that offers free and interoperable access to more than 60 global data sets on nine types of natural hazards (tropical cyclones and related storm surges, drought, earthquakes, biomass fires, floods, landslides, tsunamis and volcanic eruptions and related exposure and risk. This application portrays an easy-to-use online interactive mapping interface so that users can easily work with it and seamlessly integrate data in their own data flow using fully compliant OGC Web Services (OWS.

  3. The PREVIEW Global Risk Data Platform: a geoportal to serve and share global data on risk to natural hazards

    Science.gov (United States)

    Giuliani, G.; Peduzzi, P.

    2011-01-01

    With growing world population and concentration in urban and coastal areas, the exposure to natural hazards is increasing and results in higher risk of human and economic losses. Improving the identification of areas, population and assets potentially exposed to natural hazards is essential to reduce the consequences of such events. Disaster risk is a function of hazard, exposure and vulnerability. Modelling risk at the global level requires accessing and processing a large number of data, from numerous collaborating centres. These data need to be easily updated, and there is a need for centralizing access to this information as well as simplifying its use for non GIS specialists. The Hyogo Framework for Action provides the mandate for data sharing, so that governments and international development agencies can take appropriate decision for disaster risk reduction. Timely access and easy integration of geospatial data are essential to support efforts in Disaster Risk Reduction. However various issues in data availability, accessibility and integration limit the use of such data. In consequence, a framework that facilitate sharing and exchange of geospatial data on natural hazards should improve decision-making process. The PREVIEW Global Risk Data Platform is a highly interactive web-based GIS portal supported by a Spatial Data Infrastructure that offers free and interoperable access to more than 60 global data sets on nine types of natural hazards (tropical cyclones and related storm surges, drought, earthquakes, biomass fires, floods, landslides, tsunamis and volcanic eruptions) and related exposure and risk. This application portrays an easy-to-use online interactive mapping interface so that users can easily work with it and seamlessly integrate data in their own data flow using fully compliant OGC Web Services (OWS).

  4. A risk-based classification scheme for genetically modified foods. II: Graded testing.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    This paper presents a graded approach to the testing of crop-derived genetically modified (GM) foods based on concern levels in a proposed risk-based classification scheme (RBCS) and currently available testing methods. A graded approach offers the potential for more efficient use of testing resources by focusing less on lower concern GM foods, and more on higher concern foods. In this proposed approach to graded testing, products that are classified as Level I would have met baseline testing requirements that are comparable to what is widely applied to premarket assessment of GM foods at present. In most cases, Level I products would require no further testing, or very limited confirmatory analyses. For products classified as Level II or higher, additional testing would be required, depending on the type of the substance, prior dietary history, estimated exposure level, prior knowledge of toxicity of the substance, and the nature of the concern related to unintended changes in the modified food. Level III testing applies only to the assessment of toxic and antinutritional effects from intended changes and is tailored to the nature of the substance in question. Since appropriate test methods are not currently available for all effects of concern, future research to strengthen the testing of GM foods is discussed.

  5. An Integrated H-G Scheme Identifying Areas for Soil Remediation and Primary Heavy Metal Contributors: A Risk Perspective

    OpenAIRE

    Bin Zou; Xiaolu Jiang; Xiaoli Duan; Xiuge Zhao; Jing Zhang; Jingwen Tang; Guoqing Sun

    2017-01-01

    Traditional sampling for soil pollution evaluation is cost intensive and has limited representativeness. Therefore, developing methods that can accurately and rapidly identify at-risk areas and the contributing pollutants is imperative for soil remediation. In this study, we propose an innovative integrated H-G scheme combining human health risk assessment and geographical detector methods that was based on geographical information system technology and validated its feasibility in a renewabl...

  6. A risk-based classification scheme for genetically modified foods. III: Evaluation using a panel of reference foods.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    This paper presents an exploratory evaluation of four functional components of a proposed risk-based classification scheme (RBCS) for crop-derived genetically modified (GM) foods in a concordance study. Two independent raters assigned concern levels to 20 reference GM foods using a rating form based on the proposed RBCS. The four components of evaluation were: (1) degree of concordance, (2) distribution across concern levels, (3) discriminating ability of the scheme, and (4) ease of use. At least one of the 20 reference foods was assigned to each of the possible concern levels, demonstrating the ability of the scheme to identify GM foods of different concern with respect to potential health risk. There was reasonably good concordance between the two raters for the three separate parts of the RBCS. The raters agreed that the criteria in the scheme were sufficiently clear in discriminating reference foods into different concern levels, and that with some experience, the scheme was reasonably easy to use. Specific issues and suggestions for improvements identified in the concordance study are discussed.

  7. Do adolescent delinquency and problem drinking share psychosocial risk factors? A literature review.

    Science.gov (United States)

    Curcio, Angela L; Mak, Anita S; George, Amanda M

    2013-04-01

    Despite the prevalence and damaging effects of adolescent problem drinking, relative to delinquency, far less research has focused on drinking using an integrated theoretical approach. The aim of the current research was to review existing literature on psychosocial risk factors for delinquency and problem drinking, and explore whether integrating elements of social learning theory with an established psychosocial control theory of delinquency could explain adolescent problem drinking. We reviewed 71 studies published post-1990 with particular focus on articles that empirically researched risk factors for adolescent problem drinking and delinquency in separate and concurrent studies and meta-analytic reviews. We found shared risk factors for adolescent delinquency and problem drinking that are encompassed by an extension of psychosocial control theory. The potential of an extended psychosocial control theory providing a parsimonious theoretical approach to explaining delinquency, problem drinking and other adolescent problem behaviours, along with suggestions for future investigations, is discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  8. An Integrated H-G Scheme Identifying Areas for Soil Remediation and Primary Heavy Metal Contributors: A Risk Perspective.

    Science.gov (United States)

    Zou, Bin; Jiang, Xiaolu; Duan, Xiaoli; Zhao, Xiuge; Zhang, Jing; Tang, Jingwen; Sun, Guoqing

    2017-03-23

    Traditional sampling for soil pollution evaluation is cost intensive and has limited representativeness. Therefore, developing methods that can accurately and rapidly identify at-risk areas and the contributing pollutants is imperative for soil remediation. In this study, we propose an innovative integrated H-G scheme combining human health risk assessment and geographical detector methods that was based on geographical information system technology and validated its feasibility in a renewable resource industrial park in mainland China. With a discrete site investigation of cadmium (Cd), arsenic (As), copper (Cu), mercury (Hg) and zinc (Zn) concentrations, the continuous surfaces of carcinogenic risk and non-carcinogenic risk caused by these heavy metals were estimated and mapped. Source apportionment analysis using geographical detector methods further revealed that these risks were primarily attributed to As, according to the power of the determinant and its associated synergic actions with other heavy metals. Concentrations of critical As and Cd, and the associated exposed CRs are closed to the safe thresholds after remediating the risk areas identified by the integrated H-G scheme. Therefore, the integrated H-G scheme provides an effective approach to support decision-making for regional contaminated soil remediation at fine spatial resolution with limited sampling data over a large geographical extent.

  9. Impact of Publicly Financed Health Insurance Schemes on Healthcare Utilization and Financial Risk Protection in India: A Systematic Review.

    Science.gov (United States)

    Prinja, Shankar; Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh

    2017-01-01

    Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or

  10. The Stability of Interbank Market Network: A Perspective on Contagion and Risk Sharing

    Directory of Open Access Journals (Sweden)

    Chi Xie

    2016-01-01

    Full Text Available As an important part of the financial system, interbank market provides banks with liquidity and credit lending and also is the main channel for risk contagion. In this paper, we test the existence of systematic risk contagion within the Chinese interbank market. By building the networks of the Chinese interbank market for each year and using the measure of mutual information, we quantitatively detect the changes of interbank market networks and observe that the correlations between banks become increasingly tighter in recent years. With the bilateral risk exposure among Chinese listed commercial banks, we find that the possibility of systemic risk contagion in Chinese interbank market is fairly small. But of great concern on each individual bank, the matter is different. Our simulation shows that the failures of three special banks (i.e., Agricultural Bank of China and Bank of China and Industrial and Commercial Bank of China most likely lead to systemic risk contagion. Furthermore, we test the antirisk ability of the Chinese interbank market from the perspective of risk sharing and discover that the interbank market is stable when the loss scale is lower than forty percent of banks’ total core capital.

  11. Risk management frameworks: supporting the next generation of Murray-Darling Basin water sharing plans

    Directory of Open Access Journals (Sweden)

    G. M. Podger

    2014-09-01

    Full Text Available Water jurisdictions in Australia are required to prepare and implement water resource plans. In developing these plans the common goal is realising the best possible use of the water resources – maximising outcomes while minimising negative impacts. This requires managing the risks associated with assessing and balancing cultural, industrial, agricultural, social and environmental demands for water within a competitive and resource-limited environment. Recognising this, conformance to international risk management principles (ISO 31000:2009 have been embedded within the Murray-Darling Basin Plan. Yet, to date, there has been little strategic investment by water jurisdictions in bridging the gap between principle and practice. The ISO 31000 principles and the risk management framework that embodies them align well with an adaptive management paradigm within which to conduct water resource planning. They also provide an integrative framework for the development of workflows that link risk analysis with risk evaluation and mitigation (adaptation scenarios, providing a transparent, repeatable and robust platform. This study, through a demonstration use case and a series of workflows, demonstrates to policy makers how these principles can be used to support the development of the next generation of water sharing plans in 2019. The workflows consider the uncertainty associated with climate and flow inputs, and model parameters on irrigation and hydropower production, meeting environmental flow objectives and recreational use of the water resource. The results provide insights to the risks associated with meeting a range of different objectives.

  12. Financial "risk-sharing" or refund programs in assisted reproduction: an Ethics Committee opinion.

    Science.gov (United States)

    2016-10-01

    Financial "risk-sharing" fee structures in assisted reproduction programs charge patients a higher initial fee but provide reduced fees for subsequent cycles and often a partial or complete refund if treatment fails. This opinion of the ASRM Ethics Committee analyzes the ethical issues raised by these fee structures, including patient selection criteria, conflicts of interest, success rate transparency, and patient informed consent. This document replaces the document of the same name, last published in 2013 (Fertil Steril 2013;100:334-6). Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  13. Identifying Unique Versus Shared Pre- and Perinatal Risk Factors for ASD and ADHD Using a Simplex-Multiplex Stratification

    NARCIS (Netherlands)

    Oerlemans, Anoek M.; Burmanje, Marlot J.; Franke, Barbara; Buitelaar, Jan K.; Hartman, Catharina A.; Rommelse, Nanda N. J.

    Autism spectrum disorder (ASD) and attention-deficit/hyperactivity disorder (ADHD) frequently co-occur. Besides shared genetic factors, pre- and perinatal risk factors (PPFs) may determine if ASD, ADHD, or the combination of both disorders becomes manifest. This study aimed to test shared and unique

  14. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  15. Risk perception about medication sharing among patients: a focus group qualitative study on borrowing and lending of prescription analgesics

    Directory of Open Access Journals (Sweden)

    Markotic F

    2017-02-01

    Full Text Available Filipa Markotic,1 Davorka Vrdoljak,2 Marijana Puljiz,3 Livia Puljak,4 1Centre for Clinical Pharmacology, University Clinical Hospital Mostar, Mostar, Bosnia and Herzegovina; 2Department of Family Medicine, University of Split School of Medicine, Split, 3Family Medicine Clinic, Health Centre Imotski, Kamenmost, 4Laboratory for Pain Research, University of Split School of Medicine, Split, Croatia Background: One form of self-medication is sharing of medications, defined as borrowing or lending medications in situations where the receiver of these drugs is not the individual to whom the medications were allocated. Objective: To explore experiences and opinions of patients about sharing prescription analgesics, reasons for sharing prescription analgesics, the way in which patients choose to share those medications, their awareness of risk regarding sharing prescription analgesics, and how they estimated the potential risk.Methods: This qualitative study was conducted by focus group discussions with 40 participants led by a moderator trained in focus group methodology using a semi-structured moderator guide. Adults aged ≥18 years who had received a prescription for an analgesic at least once in a lifetime were included. Six separate focus groups were conducted to discuss participants’ perception of risks associated with sharing of prescription analgesics among patients. Additionally, participants filled out two questionnaires on demographic data, their own behavior regarding sharing analgesics, and their attitudes about risks associated with sharing prescription analgesics.Results: In a questionnaire, 55% of the participants indicated that they personally shared prescription analgesics, while subsequently in the focus group discussions, 76% confessed to such behavior. Participants recognized certain risks related to sharing of prescription analgesics, mentioned a number of reasons for engaging in such behavior, and indicated certain positive

  16. On the management of life insurance company risk by strategic choice of product mix, investment strategy and surplus appropriation schemes

    DEFF Research Database (Denmark)

    Bohnert, Alexander; Gatzert, Nadine; Jørgensen, Peter Løchte

    2015-01-01

    The aim of this paper is to analyze the impact of management’s strategic choice of asset and liability composition in life insurance on shortfall risk and the shareholders’ fair risk charge. In contrast to previous work, we focus on the effectiveness of management decisions regarding the product...... mix and the riskiness of the asset side under different surplus appropriation schemes. We propose a model setting that comprises temporary life annuities and endowment insurance contracts. Our numerical results show that the effectiveness of management decisions in regard to risk reduction strongly...

  17. Infectious Cognition: Risk Perception Affects Socially Shared Retrieval-Induced Forgetting of Medical Information.

    Science.gov (United States)

    Coman, Alin; Berry, Jessica N

    2015-12-01

    When speakers selectively retrieve previously learned information, listeners often concurrently, and covertly, retrieve their memories of that information. This concurrent retrieval typically enhances memory for mentioned information (the rehearsal effect) and impairs memory for unmentioned but related information (socially shared retrieval-induced forgetting, SSRIF), relative to memory for unmentioned and unrelated information. Building on research showing that anxiety leads to increased attention to threat-relevant information, we explored whether concurrent retrieval is facilitated in high-anxiety real-world contexts. Participants first learned category-exemplar facts about meningococcal disease. Following a manipulation of perceived risk of infection (low vs. high risk), they listened to a mock radio show in which some of the facts were selectively practiced. Final recall tests showed that the rehearsal effect was equivalent between the two risk conditions, but SSRIF was significantly larger in the high-risk than in the low-risk condition. Thus, the tendency to exaggerate consequences of news events was found to have deleterious consequences. © The Author(s) 2015.

  18. Anorexia nervosa and major depression: shared genetic and environmental risk factors.

    Science.gov (United States)

    Wade, T D; Bulik, C M; Neale, M; Kendler, K S

    2000-03-01

    The authors sought to derive heritability estimates for anorexia nervosa and to explore the etiology of the comorbid relationship between anorexia nervosa and major depression. They applied bivariate structural equation modeling to a broad definition of anorexia nervosa and lifetime major depression as assessed in a population-based sample of 2,163 female twins. Anorexia nervosa was estimated to have a heritability of 58% (95% confidence interval=33%-84%). The authors were unable to completely rule out a contribution of shared environment. The comorbidity between anorexia nervosa and major depression is likely due to genetic factors that influence the risk for both disorders. Although the study was limited by the small number of affected twins, the results suggest that genetic factors significantly influence the risk for anorexia nervosa and substantially contribute to the observed comorbidity between anorexia nervosa and major depression.

  19. Shared risk: who engages in substance use with American homeless youth?

    Science.gov (United States)

    Green, Harold D; de la Haye, Kayla; Tucker, Joan S; Golinelli, Daniela

    2013-09-01

    To identify characteristics of social network members with whom homeless youth engage in drinking and drug use. A multi-stage probability sample of homeless youth completed a social network survey. Forty-one shelters, drop-in centers and known street hangouts in Los Angeles County. A total of 419 homeless youth, aged 13-24 years (mean age = 20.09, standard deviation = 2.80). Respondents described 20 individuals in their networks, including their substance use and demographics, and the characteristics of the relationships they shared, including with whom they drank and used drugs. Dyadic, multi-level regressions identified predictors of shared substance use. Shared drinking was more likely to occur with recent sex partners [odds ratio (OR) = 2.64, confidence interval (CI): 1.67, 4.18], drug users (OR = 4.57, CI: 3.21, 6.49), sexual risk takers (OR = 1.71, CI: 1.25, 2.33), opinion leaders (OR = 1.69, CI: 1.42, 2.00), support providers (OR = 1.41, CI: 1.03, 1.93) and popular people (those with high degree scores in the network) (OR = 1.07, CI: 1.01, 1.14). Shared drug use was more likely to occur with recent sex partners (OR = 2.44, CI: 1.57, 3.80), drinkers (OR = 4.53, CI: 3.05, 6.74), sexual risk takers (OR = 1.51, CI: 1.06, 2.17), opinion leaders (OR = 1.24, CI: 1.03, 1.50), support providers (OR = 1.83, CI: 1.29, 2.60) and popular people (OR = 1.16, CI: 1.08, 1.24). Homeless youth in the United States are more likely to drink or use drugs with those who engage in multiple risk behaviors and who occupy influential social roles (popular, opinion leaders, support providers, sex partners). Understanding these social networks may be helpful in designing interventions to combat substance misuse. © 2013 Society for the Study of Addiction.

  20. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation: nationwide cohort study.

    Science.gov (United States)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock; Hansen, Peter Riis; Tolstrup, Janne Schurmann; Lindhardsen, Jesper; Selmer, Christian; Ahlehoff, Ole; Olsen, Anne-Marie Schjerning; Gislason, Gunnar Hilmar; Torp-Pedersen, Christian

    2011-01-31

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age ≥ 75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to predict thromboembolism. Registry based cohort study. Nationwide data on patients admitted to hospital with atrial fibrillation. Population All patients with atrial fibrillation not treated with vitamin K antagonists in Denmark in the period 1997-2006. Stroke and thromboembolism. Of 121,280 patients with non-valvular atrial fibrillation, 73,538 (60.6%) fulfilled the study inclusion criteria. In patients at "low risk" (score = 0), the rate of thromboembolism per 100 person years was 1.67 (95% confidence interval 1.47 to 1.89) with CHADS(2) and 0.78 (0.58 to 1.04) with CHA(2)DS(2)-VASc at one year's follow-up. In patients at "intermediate risk" (score = 1), this rate was 4.75 (4.45 to 5.07) with CHADS(2) and 2.01 (1.70 to 2.36) with CHA(2)DS(2)-VASc. The rate of thromboembolism depended on the individual risk factors composing the scores, and both schemes underestimated the risk associated with previous thromboembolic events. When patients were categorised into low, intermediate, and high risk groups, C statistics at 10 years' follow-up were 0.812 (0.796 to 0.827) with CHADS(2) and 0.888 (0.875 to 0.900) with CHA(2)DS(2)-VASc. The risk associated with a specific risk stratification score depended on the risk factors composing the score. CHA(2)DS(2)-VASc performed better than CHADS(2) in predicting patients at high risk, and those categorised as low risk by CHA(2)DS(2)-VASc were truly at low risk for thromboembolism.

  1. Exploring shared risks through public-private partnerships in public health programs: a mixed method.

    Science.gov (United States)

    Alonazi, Wadi B

    2017-06-12

    The natural assimilation of the process through which health partners sustain long-term relationships is a key issue in maintaining social well-being, reducing health risk factors, and sustaining public health programs. One global initiative in building effective healthcare systems is public-private partnerships (PPPs). This study elucidates the proposed key performance indicators initiated by the Ministry of Health of Saudi Arabia based on the projections of the government, known as Vision 2030, from the perspective of health risk factors. Through an inductive content analysis, this study assessed primary and secondary data in relation to the Saudi National Transformation Program (NTP). To identify the institutions that played a role in formulating the new Saudi Healthcare System, health policies, regulations, and reports published between 1996 and 2016 were categorized. After ranking the risk factors, the investigator selected 13 healthcare professionals in four focus group interviews to insightfully explore the challenges that the NTP faces from a health risk perspective. Thus, the study employed qualitative data gathered through focus group interviews with key figures as well as data extracted from written sources to identify distinct but interrelated partnerships practiced within risk management. A methodological overview of NTP priority and implementation offered practical guidance in the healthcare context. The five critical factors in maintaining successful and sustainable PPPs were (1) trustworthiness, (2) technological capability, (3) patient-centeredness, (4) competence, and (5) flexibility. Concession on primary and secondary healthcare services might be a good option based on the literature review and considering its popularity in other countries. A high outcome-based risk of PPPs was found as the most commonly shared perspective in risk management. Although the impact of the NTP rise has yet to be explored, its potential for challenging health

  2. Building shared understandings in introductory physics tutorials through risk, repair, conflict & comedy

    Science.gov (United States)

    Conlin, Luke D.

    Collaborative inquiry learning environments, such as The Tutorials in Physics Sensemaking, are designed to provide students with opportunities to partake in the authentic disciplinary practices of argumentation and sensemaking. Through these practices, groups of students in tutorial can build shared conceptual understandings of the mechanisms behind physical phenomena. In order to do so, they must also build a shared epistemological understanding of what they are doing together, such that their activity includes collaboratively making sense of mechanisms. Previous work (Conlin, Gupta, Scherr, & Hammer, 2007; Scherr & Hammer, 2009) has demonstrated that tutorial students do not settle upon only one way of understanding their activity together, but instead build multiple shared ways of understanding, or framing (Scherr & Hammer, 2009; Tannen, 1993a), their activity. I build upon this work by substantiating a preliminary finding that one of these shared ways of framing corresponds with increased evidence of the students' collaboratively making sense of physical mechanisms. What previous research has not yet addressed is how the students come to understand their activity as including collaborative sensemaking discussions in the first place, and how that understanding develops over the course of the semester. In this dissertation, I address both of these questions through an in-depth video analysis of three groups' discussions throughout the semester. To build shared understandings through scientific argumentation and collaborative sensemaking, the students need to continually make repairs of each other's understanding, but this comes with the risk of affective damage that can shut down further sensemaking discussions. By analyzing the discourse of the three groups' discussions throughout the semester, I show how each group is able to manage this essential tension as they each build and maintain a safe space to sensemake together. I find that the three groups differ in

  3. Risk-based assessment of the cost-efficiency and the effectivity of renewable energy support schemes: Certificate markets versus feed-in tariffs

    International Nuclear Information System (INIS)

    Fagiani, Riccardo; Barquín, Julián; Hakvoort, Rudi

    2013-01-01

    The introduction of renewable energy sources in the electricity generation mix has the potential to reduce power sector's emissions and countries' dependence on imported oil. Climate change concerns and highly volatile oil prices have attracted governments' interest and support to sustain investments in renewable energy capacity, and different support policies have been implemented in many countries around the world. This paper analyzes the effects of investors' risk aversion on the performance of support schemes. The analysis compares two policy options, a feed-in tariff mechanism with a certificate market system. Results show that while a tariff mechanism could obtain better results than a certificate market, its performance is strictly dependent on regulator choices. A certificate market instead, permits to obtain the desired level of renewable energy market share with good cost-efficiency as long as investors' risk aversion is moderate. Moreover, discounting future cash flows with higher social discount rates further benefits a certificate system making it preferable to feed-in tariffs. - Highlights: ► Paper analyzes the performance of feed-in tariffs and certificate markets. ► Model simulates the evolution of a power system considering investors' risk aversion. ► Tariffs could obtain better efficiency but also low effectiveness or over-investment. ► Barriers to entrance could result in higher certificates prices. ► Certificate performances benefit from higher social discount rates

  4. The Optimal Configuration Scheme of the Virtual Power Plant Considering Benefits and Risks of Investors

    Directory of Open Access Journals (Sweden)

    Jingmin Wang

    2017-07-01

    Full Text Available A virtual power plant (VPP is a special virtual unit that integrates various distributed energy resources (DERs distributed in the generation and consumption sides. The optimal configuration scheme of the VPP needs to break the geographical restrictions to make full use of DERs, considering the uncertainties. First, the components of the DERs and the structure of the VPP are briefly introduced. Next, the cubic exponential smoothing method is adopted to predict the VPP load requirement. Finally, the optimal configuration of the DER capacities inside the VPP is calculated by using portfolio theory and genetic algorithms (GA. The results show that the configuration scheme can optimize the DER capacities considering uncertainties, guaranteeing economic benefits of investors, and fully utilizing the DERs. Therefore, this paper provides a feasible reference for the optimal configuration scheme of the VPP from the perspective of investors.

  5. [Evidence-based Risk and Benefit Communication for Shared Decision Making].

    Science.gov (United States)

    Nakayama, Takeo

    2018-01-01

     Evidence-based medicine (EBM) can be defined as "the integration of the best research evidence with clinical expertise and a patient's unique values and circumstances". However, even with the best research evidence, many uncertainties can make clinical decisions difficult. As the social requirement of respecting patient values and preferences has been increasingly recognized, shared decision making (SDM) and consensus development between patients and clinicians have attracted attention. SDM is a process by which patients and clinicians make decisions and arrive at a consensus through interactive conversations and communications. During the process of SDM, patients and clinicians share information with each other on the goals they hope to achieve and responsibilities in meeting those goals. From the clinician's standpoint, information regarding the benefits and risks of potential treatment options based on current evidence and professional experience is provided to patients. From the patient's standpoint, information on personal values, preferences, and social roles is provided to clinicians. SDM is a sort of "wisdom" in the context of making autonomous decisions in uncertain, difficult situations through interactions and cooperation between patients and clinicians. Joint development of EBM and SDM will help facilitate patient-clinician relationships and improve the quality of healthcare.

  6. Cost sharing and hereditary cancer risk: predictors of willingness-to-pay for genetic testing.

    Science.gov (United States)

    Matro, Jennifer M; Ruth, Karen J; Wong, Yu-Ning; McCully, Katen C; Rybak, Christina M; Meropol, Neal J; Hall, Michael J

    2014-12-01

    Increasing use of predictive genetic testing to gauge hereditary cancer risk has been paralleled by rising cost-sharing practices. Little is known about how demographic and psychosocial factors may influence individuals' willingness-to-pay for genetic testing. The Gastrointestinal Tumor Risk Assessment Program Registry includes individuals presenting for genetic risk assessment based on personal/family cancer history. Participants complete a baseline survey assessing cancer history and psychosocial items. Willingness-to-pay items include intention for: genetic testing only if paid by insurance; testing with self-pay; and amount willing-to-pay ($25-$2,000). Multivariable models examined predictors of willingness-to-pay out-of-pocket (versus only if paid by insurance) and willingness-to-pay a smaller versus larger sum (≤$200 vs. ≥$500). All statistical tests are two-sided (α = 0.05). Of 385 evaluable participants, a minority (42%) had a personal cancer history, while 56% had ≥1 first-degree relative with colorectal cancer. Overall, 21.3% were willing to have testing only if paid by insurance, and 78.7% were willing-to-pay. Predictors of willingness-to-pay were: 1) concern for positive result; 2) confidence to control cancer risk; 3) fewer perceived barriers to colorectal cancer screening; 4) benefit of testing to guide screening (all p testing (all p testing, and anticipate benefits to reducing cancer risk. Identifying factors associated with willingness-to-pay for genetic services is increasingly important as testing is integrated into routine cancer care.

  7. Shared Genetic Aetiology between Cognitive Ability and Cardiovascular Disease Risk Factors: Generation Scotland's Scottish Family Health Study

    Science.gov (United States)

    Luciano, Michelle; Batty, G. David; McGilchrist, Mark; Linksted, Pamela; Fitzpatrick, Bridie; Jackson, Cathy; Pattie, Alison; Dominiczak, Anna F.; Morris, Andrew D.; Smith, Blair H.; Porteous, David; Deary, Ian J.

    2010-01-01

    People with higher general cognitive ability in early life have more favourable levels of cardiovascular disease (CVD) risk factors in adulthood and CVD itself. The mechanism of these associations is not known. Here we examine whether general cognitive ability and CVD risk factors share genetic and/or environmental aetiology. In this large,…

  8. Cost shared wildfire risk mitigation in Log Hill Mesa, Colorado: Survey evidence on participation and willingness to pay

    Science.gov (United States)

    James R. Meldrum; Patricia A. Champ; Travis Warziniack; Hannah Brenkert-Smith; Christopher M. Barth; Lilia C. Falk

    2014-01-01

    Wildland-urban interface (WUI) homeowners who do not mitigate the wildfire risk on their properties impose a negative externality on society. To reduce the social costs of wildfire and incentivise homeowners to take action, cost sharing programs seek to reduce the barriers that impede wildfire risk mitigation. Using survey data from a WUI community in western Colorado...

  9. Exploring shared risks through public-private partnerships in public health programs: a mixed method

    Directory of Open Access Journals (Sweden)

    Wadi B. Alonazi

    2017-06-01

    Full Text Available Abstract Background The natural assimilation of the process through which health partners sustain long-term relationships is a key issue in maintaining social well-being, reducing health risk factors, and sustaining public health programs. One global initiative in building effective healthcare systems is public-private partnerships (PPPs. This study elucidates the proposed key performance indicators initiated by the Ministry of Health of Saudi Arabia based on the projections of the government, known as Vision 2030, from the perspective of health risk factors. Methods Through an inductive content analysis, this study assessed primary and secondary data in relation to the Saudi National Transformation Program (NTP. To identify the institutions that played a role in formulating the new Saudi Healthcare System, health policies, regulations, and reports published between 1996 and 2016 were categorized. After ranking the risk factors, the investigator selected 13 healthcare professionals in four focus group interviews to insightfully explore the challenges that the NTP faces from a health risk perspective. Thus, the study employed qualitative data gathered through focus group interviews with key figures as well as data extracted from written sources to identify distinct but interrelated partnerships practiced within risk management. Results A methodological overview of NTP priority and implementation offered practical guidance in the healthcare context. The five critical factors in maintaining successful and sustainable PPPs were (1 trustworthiness, (2 technological capability, (3 patient-centeredness, (4 competence, and (5 flexibility. Concession on primary and secondary healthcare services might be a good option based on the literature review and considering its popularity in other countries. A high outcome-based risk of PPPs was found as the most commonly shared perspective in risk management. Conclusions Although the impact of the NTP rise has yet

  10. Stroke Health and Risk Education (SHARE): design, methods, and theoretical basis.

    Science.gov (United States)

    Brown, Devin L; Conley, Kathleen M; Resnicow, Kenneth; Murphy, Jillian; Sánchez, Brisa N; Cowdery, Joan E; Sais, Emma; Lisabeth, Lynda D; Skolarus, Lesli E; Zahuranec, Darin B; Williams, Geoffrey C; Morgenstern, Lewis B

    2012-07-01

    Stroke is a disease with tremendous individual, family, and societal impact across all race/ethnic groups. Mexican Americans, the largest subgroup of Hispanic Americans, are at even higher risk of stroke than European Americans. To test the effectiveness of a culturally sensitive, church-based, multi-component, motivational enhancement intervention for Mexican Americans and European Americans in reducing stroke risk factors. Participants enroll in family or friendship pairs, from the same Catholic church in the Corpus Christi Texas area, and are encouraged to change diet and physical activity behaviors and provide support for behavior change to their partners. Churches are randomized to either the intervention or control group. Goal enrollment for each of the 10 participating churches is 40 participant pairs. The intervention consists of self-help materials (including a motivational short film, cookbook/healthy eating guide, physical activity guide with pedometer, and photonovella), five motivational interviewing calls, two tailored newsletters, parish health promotion activities and environmental changes, and a peer support workshop where participants learn to provide autonomy supportive counseling to their partner. SHARE's three primary outcomes are self-reported sodium intake, fruit and vegetable intake, and level of physical activity. Participants complete questionnaires and have measurements at baseline, six months, and twelve months. Persistence testing is performed at 18 months in the intervention group. The trial is registered with clinicaltrials.gov (NCT01378780). Copyright © 2012 Elsevier Inc. All rights reserved.

  11. Optimal sharing of quantity risk for a coalition of wind power producers facing nodal prices

    KAUST Repository

    Bitar, E. Y.; Baeyens, E.; Khargonekar, P. P.; Poolla, K.; Varaiya, P.

    2012-01-01

    It is widely accepted that aggregation of geographically diverse wind energy resources offers compelling potential to mitigate wind power variability, as wind speed at different geographic locations tends to decorrelate with increasing spatial separation. In this paper, we explore the extent to which a coalition of wind power producers can exploit the statistical benefits of aggregation to mitigate the risk of quantity shortfall with respect to forward contract offerings for energy. We propose a simple augmentation of the existing two-settlement market system with nodal pricing to permit quantity risk sharing among wind power producers by affording the group a recourse opportunity to utilize improved forecasts of their ensuing wind energy production to collectively modify their forward contracted positions so as to utilize the projected surplus in generation at certain buses to balance the projected shortfall in generation at complementary buses. Working within this framework, we show that the problem of optimally sizing a set of forward contracts for a group of wind power producers reduces to convex programming and derive closed form expressions for the set of optimal recourse policies. We also asses the willingness of individual wind power producers to form a coalition to cooperatively offer contracts for energy. We first show that the expected profit derived from coalitional contract offerings with recourse is greater than that achievable through independent contract offerings. And, using tools from coalitional game theory, we show that the core for our game is non-empty.

  12. Optimal sharing of quantity risk for a coalition of wind power producers facing nodal prices

    KAUST Repository

    Bitar, E. Y.

    2012-06-01

    It is widely accepted that aggregation of geographically diverse wind energy resources offers compelling potential to mitigate wind power variability, as wind speed at different geographic locations tends to decorrelate with increasing spatial separation. In this paper, we explore the extent to which a coalition of wind power producers can exploit the statistical benefits of aggregation to mitigate the risk of quantity shortfall with respect to forward contract offerings for energy. We propose a simple augmentation of the existing two-settlement market system with nodal pricing to permit quantity risk sharing among wind power producers by affording the group a recourse opportunity to utilize improved forecasts of their ensuing wind energy production to collectively modify their forward contracted positions so as to utilize the projected surplus in generation at certain buses to balance the projected shortfall in generation at complementary buses. Working within this framework, we show that the problem of optimally sizing a set of forward contracts for a group of wind power producers reduces to convex programming and derive closed form expressions for the set of optimal recourse policies. We also asses the willingness of individual wind power producers to form a coalition to cooperatively offer contracts for energy. We first show that the expected profit derived from coalitional contract offerings with recourse is greater than that achievable through independent contract offerings. And, using tools from coalitional game theory, we show that the core for our game is non-empty.

  13. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  14. Performance-based risk-sharing arrangements-good practices for design, implementation, and evaluation: report of the ISPOR good practices for performance-based risk-sharing arrangements task force.

    Science.gov (United States)

    Garrison, Louis P; Towse, Adrian; Briggs, Andrew; de Pouvourville, Gerard; Grueger, Jens; Mohr, Penny E; Severens, J L Hans; Siviero, Paolo; Sleeper, Miguel

    2013-01-01

    There is a significant and growing interest among both payers and producers of medical products for agreements that involve a "pay-for-performance" or "risk-sharing" element. These payment schemes-called "performance-based risk-sharing arrangements" (PBRSAs)-involve a plan by which the performance of the product is tracked in a defined patient population over a specified period of time and the amount or level of reimbursement is based on the health and cost outcomes achieved. There has always been considerable uncertainty at product launch about the ultimate real-world clinical and economic performance of new products, but this appears to have increased in recent years. PBRSAs represent one mechanism for reducing this uncertainty through greater investment in evidence collection while a technology is used within a health care system. The objective of this Task Force report was to set out the standards that should be applied to "good practices"-both research and operational-in the use of a PBRSA, encompassing questions around the desirability, design, implementation, and evaluation of such an arrangement. This report provides practical recommendations for the development and application of state-of-the-art methods to be used when considering, using, or reviewing PBRSAs. Key findings and recommendations include the following. Additional evidence collection is costly, and there are numerous barriers to establishing viable and cost-effective PBRSAs: negotiation, monitoring, and evaluation costs can be substantial. For good research practice in PBRSAs, it is critical to match the appropriate study and research design to the uncertainties being addressed. Good governance processes are also essential. The information generated as part of PBRSAs has public good aspects, bringing ethical and professional obligations, which need to be considered from a policy perspective. The societal desirability of a particular PBRSA is fundamentally an issue as to whether the cost of

  15. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence

    Science.gov (United States)

    McNaughton Reyes, H. Luz; Chen, May S.; Ennett, Susan T.; Basile, Kathleen C.; DeGue, Sarah; Vivolo-Kantor, Alana M.; Moracco, Kathryn E.; Bowling, J. Michael

    2016-01-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother–adolescent discord, family conflict, low maternal monitoring, low mother–adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study’s implications for the development of interventions and future research are discussed. PMID:26746242

  16. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence.

    Science.gov (United States)

    Foshee, Vangie A; McNaughton Reyes, H Luz; Chen, May S; Ennett, Susan T; Basile, Kathleen C; DeGue, Sarah; Vivolo-Kantor, Alana M; Moracco, Kathryn E; Bowling, J Michael

    2016-04-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother-adolescent discord, family conflict, low maternal monitoring, low mother-adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study's implications for the development of interventions and future research are discussed.

  17. Proof of concept for a banding scheme to support risk assessments related to multi-product biologics manufacturing.

    Science.gov (United States)

    Card, Jeffrey W; Fikree, Hana; Haighton, Lois A; Blackwell, James; Felice, Brian; Wright, Teresa L

    2015-11-01

    A banding scheme theory has been proposed to assess the potency/toxicity of biologics and assist with decisions regarding the introduction of new biologic products into existing manufacturing facilities. The current work was conducted to provide a practical example of how this scheme could be applied. Information was identified for representatives from the following four proposed bands: Band A (lethal toxins); Band B (toxins and apoptosis signals); Band C (cytokines and growth factors); and Band D (antibodies, antibody fragments, scaffold molecules, and insulins). The potency/toxicity of the representative substances was confirmed as follows: Band A, low nanogram quantities exert lethal effects; Band B, repeated administration of microgram quantities is tolerated in humans; Band C, endogenous substances and recombinant versions administered to patients in low (interferons), intermediate (growth factors), and high (interleukins) microgram doses, often on a chronic basis; and Band D, endogenous substances present or produced in the body in milligram quantities per day (insulin, collagen) or protein therapeutics administered in milligram quantities per dose (mAbs). This work confirms that substances in Bands A, B, C, and D represent very high, high, medium, and low concern with regard to risk of cross-contamination in manufacturing facilities, thus supporting the proposed banding scheme. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Knowledge sharing behaviour among non-academic staff in higher learning institutes: The role of trust and perceived risk

    Directory of Open Access Journals (Sweden)

    Muhammad Sabbir Rahman

    2018-03-01

    Full Text Available The purpose of the paper is to analyse knowledge sharing behaviour among non-academic staff of higher learning institutions. This research focuses on the mediation impact of perceived risk on trust and knowledge sharing behaviour. The research also proposes actions that can be taken by higher learning institutions to enhance trust among the staff in order to create a knowledge sharing environment at the workplace. This research applied confirmatory factor analysis and Structural Equation Modeling (SEM to evaluate the proposed measurement model and proved the research hypotheses. The findings from the research show that perceived risk plays a strong mediating role between trust and knowledge sharing behaviour among the non-academic staff of higher learning institutions. The SEM analysis also confirmed that the research model shows a good fit. This research highlights issues concerning knowledge sharing practices among non-academic staff and provides some recommendations to the managers to address these issues. The researchers agreed that more research needs to be done in this area as there are aspects that are yet to be explored. The findings of this research serve to add to the literature on knowledge sharing focussing on non-academic staff of higher learning institutions.

  19. Does market integration buffer risk, erode traditional sharing practices and increase inequality? A test among Bolivian forager-farmers.

    Science.gov (United States)

    Gurven, Michael; Jaeggi, Adrian V; von Rueden, Chris; Hooper, Paul L; Kaplan, Hillard

    2015-08-01

    Sharing and exchange are common practices for minimizing food insecurity in rural populations. The advent of markets and monetization in egalitarian indigenous populations presents an alternative means of managing risk, with the potential impact of eroding traditional networks. We test whether market involvement buffers several types of risk and reduces traditional sharing behavior among Tsimane Amerindians of the Bolivian Amazon. Results vary based on type of market integration and scale of analysis (household vs. village), consistent with the notion that local culture and ecology shape risk management strategies. Greater wealth and income were unassociated with the reliance on others for food, or on reciprocity, but wealth was associated with a greater proportion of food given to others (i.e., giving intensity) and a greater number of sharing partners (i.e., sharing breadth). Across villages, greater mean income was negatively associated with reciprocity, but economic inequality was positively associated with giving intensity and sharing breadth. Incipient market integration does not necessarily replace traditional buffering strategies but instead can often enhance social capital.

  20. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  1. Investigation of factors determining risk-taking strategies in Pension fund investment of Defined Benefit schemes in the UK corporate pension system

    OpenAIRE

    Hu, Chunan

    2014-01-01

    This paper investigates various incentives determining risk taking strategies of the corporate pension fund investment from the perspective of sponsors. In the United Kingdom, occupational pension plans especially defined benefit (DB) pension schemes play important roles in the financial market. Comparing with the conventional framework managing pension risk as a contained part of the whole firm risk, recent studies start to focus on pension risk especially investment risk as an individual to...

  2. Evidence for shared genetic risk between ADHD symptoms and reduced mathematics ability: a twin study.

    Science.gov (United States)

    Greven, Corina U; Kovas, Yulia; Willcutt, Erik G; Petrill, Stephen A; Plomin, Robert

    2014-01-01

    Attention-deficit/hyperactivity disorder (ADHD) symptoms and mathematics ability are associated, but little is known about the genetic and environmental influences underlying this association. Data came from more than 6,000 twelve-year-old twin pairs from the UK population-representative Twins Early Development Study. Parents rated each twin's behaviour using a DSM-IV-based 18-item questionnaire of inattentive and hyperactive-impulsive ADHD symptoms. Mathematics tests based on the UK National Curriculum were completed by each twin. The twins also completed standardised tests of reading and general cognitive ability. Multivariate twin model fitting was applied. Inattentive and hyperactive-impulsive ADHD symptoms were highly heritable (67% and 73% respectively). Mathematics ability was moderately heritable (46%). Mathematics ability and inattentiveness showed a significantly greater phenotypic correlation (r(p) = -.26) and genetic correlation (r(A) = -.41) than mathematics ability and hyperactivity-impulsivity (r(p) = -.18; r(A) = -.22). The genetic correlation between inattentiveness and mathematics ability was largely independent from hyperactivity-impulsivity, and was only partially accounted for by genetic influences related to reading and general cognitive ability. Results revealed the novel finding that mathematics ability shows significantly stronger phenotypic and genetic associations with inattentiveness than with hyperactivity-impulsivity. Genetic associations between inattentiveness and mathematics ability could only partially be accounted for by hyperactivity-impulsivity, reading and general cognitive ability. Results suggest that mathematics ability is associated with ADHD symptoms largely because it shares genetic risk factors with inattentiveness, and provide further evidence for considering inattentiveness and hyperactivity-impulsivity separately. DNA markers for ADHD symptoms (especially inattentiveness) may also be candidate risk factors for

  3. The European Banking Union: Will It Be a True Union without Risk Sharing?

    Directory of Open Access Journals (Sweden)

    Mario Sarcinelli

    2013-06-01

    Full Text Available The recent developments of the Euro crisis reveal the lack of clear or coherent thinking on the part of both the Eurozone finance ministers and the European Commission. The crisis in Cyprus is partly the consequence of decisions made on private sector involvement in the previous Greek bailout, and other such examples may be made. It is time, therefore, to look reality in the face and strengthen the structures of the EMU. The article is devoted to what has been done and what must still be done to make the European banking system more robust and less permeable to crises, and to preserve the single financial market. It looks at the initiatives of both the European Commission and the European Council to complete the EMU by creating a banking union, the doubts on the wisdom of entrusting banking oversight to the ECB, the organization of the ECB’s new tasks, the continuing absence of facilities for the recovery or liquidation of banks, as well as for a Euro-wide deposit insurance, the need for some form of risk-sharing in order to stabilise the economy, and thus the recourse to a common budget and the possibility of joint debt for the Eurozone.

  4. Knowledge Sharing and Collaboration in Volcanic Risk Mitigation at Galeras Volcano, Colombia: A Participative Workshop to Reduce Volcanic Risk

    Science.gov (United States)

    Sheridan, M. F.; Cordoba, G. A.

    2009-12-01

    Galeras has been in nearly constant activity during modern historic times (roughly the past 500 years). Approximately 10,000 people live within an area designated as the highest-hazard and nearly 400,000 people are within areas of potential harmful effects. A wide variety of stakeholders are affected by the hazards, including: farmers, indigenous villagers, and people in urban environments. Hazards assessment and volcano monitoring are the responsibility of the Colombian Geological Survey (INGEOMINAS), whereas decisions regarding mitigation and response procedures are the responsibility of various governmental offices and the national emergency system (SNPAD). According to the current plan, when the risk level rises to a high level the people in the highest risk zone are required to evacuate. The volcano currently is in a very active, but fluctuating, condition and a future large eruption in a medium time frame (years to decades) is possible. There is a growing level of discomfort among many of the affected groups, including indigenous communities, farmers, and urban dwellers, related to the risk assessment. The general opinion prior to July 2009 was quite polarized as the decision makers saw the people of the region as poorly prepared to understand this hazard, whereas the population felt that their views were not being heard. The result was that the people in the hazardous areas decided not to evacuate, even during the current period of explosive activity. To resolve this situation the University of Nariño (Colombia) and the State University of New York at Buffalo organized a workshop named "Knowledge, Sharing and Collaboration in Volcanic Risk Mitigation at Galeras Volcano, Colombia" that was held in Pasto (Colombia), between 6 and 11 July, 2009. The general objective of this workshop was to analyze the existing hazard maps and safety plans for Galeras and form a bridge connecting scientists, decision makers, and other stake holders to promote a better

  5. Performance-Based Risk-Sharing Arrangements: U.S. Payer Experience.

    Science.gov (United States)

    Goble, Joseph A; Ung, Brian; van Boemmel-Wegmann, Sascha; Navarro, Robert P; Parece, Andrew

    2017-10-01

    As a result of global concern about rising drug costs, many U.S. payers and European agencies such as the National Health Service have partnered with pharmaceutical companies in performance-based risk-sharing arrangements (PBRSAs) by which manufacturers share financial risk with health care purchasing entities and authorities. However, PBRSAs present many administrative and legal challenges that have minimized successful contract experiences in the United States. To (a) identify drug and disease characteristics and contract components that contribute to successful PBRSA experiences and the primary barriers to PBRSA execution and (b) explore solutions to facilitate contract negotiation and execution. A 37-item, web-based survey instrument (Qualtrics), approximately 20 minutes in duration, was open during July and August 2016. The survey was emailed to 90 pharmacy and medical directors of various health care organizations. Statistical analysis included the Kruskal-Wallis test and chi-square tests to examine differences among payer responses. Survey responses were anonymized and data were aggregated. Twenty-seven individuals completed the survey (30% completion rate). The majority of respondents worked for regional health plans (52%, n = 14), covering at least 1 million lives (63%, n = 17), with at least 7 years of managed care experience (81%, n = 22). A total of 51 PBRSAs were active among respondents at the time of the survey. Easily obtainable and evaluable drug data and medical data were the most important drug and disease attributes for successful PBRSAs, respectively. Pharmacy claims and patient demographic data were assessed as "very easy and inexpensive" to collect. Type and amount of manufacturer payment for drug outcome performance failure, endpoint measurement, and necessary clinical data for drug performance measurement were all critical factors for successful PBRSAs. Standardized contract templates and transparent contract financial risk evaluation and

  6. Resource effects of training general practitioners in risk communication skills and shared decision making competences.

    Science.gov (United States)

    Cohen, David; Longo, M F; Hood, Kerenza; Edwards, Adrian; Elwyn, Glyn

    2004-08-01

    Involving patients more in decisions about their own care requires doctors to be trained in effective ways of communicating information and in developing competences to negotiate levels of patient involvement which are most appropriate for each case. The aim of this study was to determine the cost of such training and identify which service resource variables are subsequently affected. An explanatory cluster randomized crossover trial was carried out which involved training general practitioners (GPs) in the use of risk communication (RC) tools, shared decision making (SDM) competences or both. Continuing care by GPs of patients with one of four chronic conditions (menopausal symptoms, menorrhagia, atrial fibrillation, prostatism) was reviewed before and after training. Cost of training was assessed by prospective monitoring of resources used. Data on prescribing, referrals and investigations were collected via questionnaires to participating practitioners. Data on follow-up GP consultations were extracted from medical records. Three two-level logistic models were performed to investigate the probability of training having an effect on prescribing, referrals and investigations ordered at the review consultation. Training cost pound 1218 per practitioner which increased the cost of a consultation by pound 2.89. Training in SDM or combined with RC significantly affected the probability of a prescription being issued to women with menopausal symptoms and menorrhagia (although RC on its own had no effect) but did not significantly affect prescribing for patients with prostatism or atrial fibrillation. It did not significantly affect the probability of investigations, referrals or follow-up GP visits for any of the conditions. Unless training has a major influence on consultation length, it is unlikely to have any major impacts on cost.

  7. Private sector risk-sharing agreements in the United States: trends, barriers, and prospects.

    Science.gov (United States)

    Garrison, Louis P; Carlson, Josh J; Bajaj, Preeti S; Towse, Adrian; Neumann, Peter J; Sullivan, Sean D; Westrich, Kimberly; Dubois, Robert W

    2015-09-01

    Risk-sharing agreements (RSAs) between drug manufacturers and payers link coverage and reimbursement to real-world performance or utilization of medical products. These arrangements have garnered considerable attention in recent years. However, greater use outside the United States raises questions as to why their use has been limited in the US private sector, and whether their use might increase in the evolving US healthcare system. To understand current trends, success factors, and challenges in the use of RSAs, we conducted a review of RSAs, interviews, and a survey to understand key stakeholders' experiences and expectations for RSAs in the US private sector. Trends in the numbers of RSAs were assessed using a database of RSAs. We also conducted in-depth interviews with stakeholders from pharmaceutical companies, payer organizations, and industry experts in the United States and European Union. In addition, we administered an online survey with a broader audience to identify perceptions of the future of RSAs in the United States. Most manufacturers and payers expressed interest in RSAs and see potential value in their use. Due to numerous barriers associated with outcomes-based agreements, stakeholders were more optimistic about financial-based RSAs. In the US private sector, however, there remains considerable interest--improved data systems and shifting incentives (via health reform and accountable care organizations) may generate more action. In the US commercial payer markets, there is continued interest among some manufacturers and payers in outcomes-based RSAs. Despite continued discussion and activity, the number of new agreements is still small.

  8. Shared Responsibility for Type 1 Diabetes Care Is Associated With Glycemic Variability and Risk of Glycemic Excursions in Youth.

    Science.gov (United States)

    Marker, Arwen M; Noser, Amy E; Clements, Mark A; Patton, Susana R

    2018-01-01

    We examined how parent and youth responsibility for type 1 diabetes (T1D) care is related to adherence and glycemic outcomes, namely, glycemic variability and risk of glycemic excursions. One hundred thirty-five parent-youth dyads (10-16 years old; diagnosed with T1D for at least 6 months) participated in this study. Percent responsibility of T1D care attributed to the youth, parent, or shared was measured using the Diabetes Family Responsibility Questionnaire. We collected youth's hemoglobin A1c (HbA1c) and glucometer downloads to examine relationships between responsibility and HbA1c, frequency of blood glucose monitoring (self-monitoring blood glucose, SMBG), risk of glycemic excursions, and actual glycemic variability using bivariate correlations and path analysis. Participants reported shared responsibility for almost half of T1D self-care tasks. Bivariate correlations showed shared responsibility was associated with less variability, whereas parent responsibility was associated with greater glycemic variability and risk for glycemic excursions. Youth responsibility was associated with lower frequency of SMBG. The path analyses confirmed our correlational findings (pshypothesis that shared T1D responsibility is associated with better diabetes outcomes in youth. © The Author 2017. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  9. Decreased Risk of Preeclampsia After the Introduction of Universal Voucher Scheme for Antenatal Care and Birth Services in the Republic of Korea.

    Science.gov (United States)

    Choe, Seung-Ah; Min, Hye Sook; Cho, Sung-Il

    2017-01-01

    Objectives A number of interventions to reduce disparities in maternal health have been introduced and implemented without concrete evidence to support them. In Korea, a universal voucher scheme for antenatal care and birth services was initiated in December 2008 to improve Korea's fertility rate. This study explores the risk of preeclampsia after the introduction of a universal voucher scheme. Methods Population-based cohort data from the National Health Insurance Service-National Sample Cohort (NHIS-NSC) covering 2002-2013 were analysed. A generalized linear mixed model (GLMM) was used to estimate the relationship between the risk of preeclampsia and voucher scheme introduction. Results The annual age-adjusted incidence of preeclampsia showed no significant unidirectional change during the study period. In the GLMM analysis, the introduction of a voucher scheme was associated with a reduced risk of preeclampsia, controlling for potential confounding factors. The interaction between household income level and voucher scheme was not significant. Conclusions for Practice This finding suggests that the introduction of a voucher scheme for mothers is related to a reduced risk of preeclampsia even under universal health coverage.

  10. Applying a new computer-aided detection scheme generated imaging marker to predict short-term breast cancer risk

    Science.gov (United States)

    Mirniaharikandehei, Seyedehnafiseh; Hollingsworth, Alan B.; Patel, Bhavika; Heidari, Morteza; Liu, Hong; Zheng, Bin

    2018-05-01

    This study aims to investigate the feasibility of identifying a new quantitative imaging marker based on false-positives generated by a computer-aided detection (CAD) scheme to help predict short-term breast cancer risk. An image dataset including four view mammograms acquired from 1044 women was retrospectively assembled. All mammograms were originally interpreted as negative by radiologists. In the next subsequent mammography screening, 402 women were diagnosed with breast cancer and 642 remained negative. An existing CAD scheme was applied ‘as is’ to process each image. From CAD-generated results, four detection features including the total number of (1) initial detection seeds and (2) the final detected false-positive regions, (3) average and (4) sum of detection scores, were computed from each image. Then, by combining the features computed from two bilateral images of left and right breasts from either craniocaudal or mediolateral oblique view, two logistic regression models were trained and tested using a leave-one-case-out cross-validation method to predict the likelihood of each testing case being positive in the next subsequent screening. The new prediction model yielded the maximum prediction accuracy with an area under a ROC curve of AUC  =  0.65  ±  0.017 and the maximum adjusted odds ratio of 4.49 with a 95% confidence interval of (2.95, 6.83). The results also showed an increasing trend in the adjusted odds ratio and risk prediction scores (p  breast cancer risk.

  11. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  12. Proposals to overcome limitations in the EU chemical risk assessment scheme

    DEFF Research Database (Denmark)

    Trapp, Stefan; Schwartz, S.

    2000-01-01

    The noti®cation of new chemicals in the European Union requires a risk assessment. A Technical Guidance Document (TGD) was prepared for assistance. The TGD proposes QSARs, regressions and models from various sources. Each method has its own range of applicability and its own restrictions. Regress......The noti®cation of new chemicals in the European Union requires a risk assessment. A Technical Guidance Document (TGD) was prepared for assistance. The TGD proposes QSARs, regressions and models from various sources. Each method has its own range of applicability and its own restrictions...

  13. Finite difference schemes for a nonlinear black-scholes model with transaction cost and volatility risk

    DEFF Research Database (Denmark)

    Mashayekhi, Sima; Hugger, Jens

    2015-01-01

    Several nonlinear Black-Scholes models have been proposed to take transaction cost, large investor performance and illiquid markets into account. One of the most comprehensive models introduced by Barles and Soner in [4] considers transaction cost in the hedging strategy and risk from an illiquid...

  14. Risk Aversion and Effort in an Incentive Pay Scheme with Multiplicative Noise: Theory and Experimental Evidence

    NARCIS (Netherlands)

    N.V. Zubanov (Nick)

    2012-01-01

    textabstractThe application of the classical "linear" model of incentive pay to the case when the noise is multiplicative to effort generates two predictions for a given strength of incentives: 1) more risk-averse workers will put in less effort, and 2) setting a performance target will weaken the

  15. The use of copula functions for modeling the risk of investment in shares traded on the Warsaw Stock Exchange

    Science.gov (United States)

    Domino, Krzysztof; Błachowicz, Tomasz

    2014-11-01

    In our work copula functions and the Hurst exponent calculated using the local Detrended Fluctuation Analysis (DFA) were used to investigate the risk of investment made in shares traded on the Warsaw Stock Exchange. The combination of copula functions and the Hurst exponent calculated using local DFA is a new approach. For copula function analysis bivariate variables composed of shares prices of the PEKAO bank (a big bank with high capitalization) and other banks (PKOBP, BZ WBK, MBANK and HANDLOWY in decreasing capitalization order) and companies from other branches (KGHM-mining industry, PKNORLEN-petrol industry as well as ASSECO-software industry) were used. Hurst exponents were calculated for daily shares prices and used to predict high drops of those prices. It appeared to be a valuable indicator in the copula selection procedure, since Hurst exponent’s low values were pointing on heavily tailed copulas e.g. the Clayton one.

  16. Child Sexual Abuse and Negative Affect as Shared Risk Factors for Sexual Aggression and Sexual HIV Risk Behavior in Heterosexual Men.

    Science.gov (United States)

    Peterson, Zoё D; Janssen, Erick; Goodrich, David; Fortenberry, J Dennis; Hensel, Devon J; Heiman, Julia R

    2018-02-01

    Previous research has suggested that sexually aggressive behavior and sexual HIV risk behavior are associated. Childhood sexual abuse (CSA) is a well-established risk factor for both types of problematic sexual behavior. Negative affect (i.e., anxiety, depression, and anger) is a less well-studied risk factor, but it has been theorized to relate to both sexual aggression and HIV risk behavior. Thus, this study sought to (1) confirm the relationship between sexual aggression and HIV risk behavior, (2) establish CSA and negative affect as shared risk factors for sexual aggression and HIV risk behavior, and (3) evaluate whether negative affect mediates the relationship between CSA and sexual aggression and between CSA and HIV sexual risk in a sample of heterosexual men. We recruited 18- to 30-year-old heterosexual men (N = 377) from urban sexually transmitted infection clinics. Men completed measures of sexual HIV risk history (number of partners and condom use), sexual aggression history, CSA history, and trait negative affect (anger, anxiety, and depression). Structural equation modeling was used to examine hypothesized direct and indirect relationships. In the final SEM model, sexual aggression history and sexual HIV risk behavior were correlated. CSA was associated with both types of problematic sexual behavior. Anxiety significantly mediated the relationship between CSA and sexual aggression and between CSA and sexual HIV risk behavior (χ 2 [1300] = 2121.79, p Sexual aggression appears to be part of a constellation of sexual risk behaviors; thus, it may be possible to develop prevention programs that target both sexual HIV risk and sexual aggression. CSA is a shared risk factor for sexual aggression and HIV risk behavior through the pathway of anxiety. Thus, anxiety might be one promising target for intervention.

  17. Identification of risk loci with shared effects on five major psychiatric disorders

    DEFF Research Database (Denmark)

    Steinhausen, Hans-Christoph E.; Strauss, John; Strohmaier, Jana

    2013-01-01

    Findings from family and twin studies suggest that genetic contributions to psychiatric disorders do not in all cases map to present diagnostic categories. We aimed to identify specific variants underlying genetic effects shared between the five disorders in the Psychiatric Genomics Consortium: a......: autism spectrum disorder, attention deficit-hyperactivity disorder, bipolar disorder, major depressive disorder, and schizophrenia.......Findings from family and twin studies suggest that genetic contributions to psychiatric disorders do not in all cases map to present diagnostic categories. We aimed to identify specific variants underlying genetic effects shared between the five disorders in the Psychiatric Genomics Consortium...

  18. ORRION: A specific information sharing tool to (rebuild a “flood risk culture” in the Rhine Graben (France - Germany

    Directory of Open Access Journals (Sweden)

    Martin Brice

    2016-01-01

    Full Text Available When is led a prevention initiative concerning flood risk, the recall of old events allows just as much to act as pedagogy to legitimize the initiative. So as it is written in the information leaflet on the “Plan de Prévention des Risques d’Inondation” (PPRI:«Alsace did not know any more exceptional floods since 1910. In almost a century, the flood risk thus naturally faded of our memory”. A paradoxical assertion because the floods of 1910 are not taken into account for risk mapping. Only the recent floods (1983, 1990 are used as benchmarks. We were able to show [1] that, although legitimate as reference events, the floods of 1910 and many others had become manifestly underestimated for multiple reasons connected to the history of Alsace, or due to disorganization of the archives. Worse, these riks unawareness is shared by all the actors, causing problems of acceptance of the risk and their management, and an additional vulnerability in terms of population behavior before, during and after the crises. This is the reason why an online participative database (ORRION has been created. the objective of this database is to inform and to share the information about floods history, in the particular context of a cross-border territory (France, Germany, Switzerland. This tool has been immediately involved into risks prevention actions (PAPI, PPRI.

  19. The effect of discounting, different mortality reduction schemes and predictive cohort life tables on risk acceptability criteria

    International Nuclear Information System (INIS)

    Rackwitz, Ruediger

    2006-01-01

    Technical facilities should be optimal with respect to benefits and cost. Optimization of technical facilities involving risks for human life and limb require an acceptability criterion and suitable discount rates both for the public and the operator depending on for whom the optimization is carried out. The life quality index is presented and embedded into modem socio-economic concepts. A general risk acceptability criterion is derived. The societal life saving cost to be used in optimization as life saving or compensation cost and the societal willingness-to-pay based on the societal value of a statistical life or on the societal life quality index are developed. Different mortality reduction schemes are studied. Also, predictive cohort life tables are derived and applied. Discount rates γ must be long-term averages in view of the time horizon of some 20 to more than 100 years for the facilities of interest and net of inflation and taxes. While the operator may use long-term averages from the financial market for his cost-benefit analysis the assessment of interest rates for investments of the public into risk reduction is more difficult. The classical Ramsey model decomposes the real interest rate (=output growth rate) into the rate of time preference of consumption and the rate of economical growth multiplied by the elasticity of marginal utility of consumption. It is proposed to use a relatively small interest rate of 3% implying a rate of time preference of consumption of about 1%. This appears intergenerationally acceptable from an ethical point of view. Risk-consequence curves are derived for an example

  20. No evidence that common genetic risk variation is shared between schizophrenia and autism

    NARCIS (Netherlands)

    Vorstman, Jacob A. S.; Anney, Richard J. L.; Derks, Eske M.; Gallagher, Louise; Gill, Michael; de Jonge, Maretha V.; van Engeland, Herman; Kahn, René S.; Ophoff, Roel A.

    2013-01-01

    The similarity between aspects of the clinical presentation of schizophrenia and autism spectrum disorders (ASD) suggests that elements of the biological etiology may also be shared between these two disorders. Recently, an increasing number of rare, mostly structural genetic variants are reported

  1. Additive genetic variation in schizophrenia risk is shared by populations of African and European descent

    NARCIS (Netherlands)

    De Candia, T.r.; Lee, S.H.; Yang, J.; Browning, B.L.; Gejman, P. V.; Levinson, D. F.; Mowry, B. J.; Hewitt, J.K.; Goddard, M.E.; O'Donovan, M.C.; Purcell, S.M.; Posthuma, D.; Visscher, P. M.; Wray, N.R.; Keller, M. C.

    2013-01-01

    To investigate the extent to which the proportion of schizophrenia's additive genetic variation tagged by SNPs is shared by populations of European and African descent, we analyzed the largest combined African descent (AD [n = 2,142]) and European descent (ED [n = 4,990]) schizophrenia case-control

  2. The educational gradient in cardiovascular risk factors: impact of shared family factors in 228,346 Norwegian siblings

    Directory of Open Access Journals (Sweden)

    Inger Ariansen

    2017-03-01

    Full Text Available Abstract Background Various indicators of childhood socioeconomic position have been related to cardiovascular disease (CVD risk in adulthood. We investigated the impact of shared family factors on the educational gradient in midlife CVD risk factors by assessing within sibling similarities in the gradient using a discordant sibling design. Methods Norwegian health survey data (1980–2003 was linked to educational and generational data. Participants with a full sibling in the health surveys (228,346 individuals in 98,046 sibships were included. Associations between attained educational level (7–9 years, 10–11 years, 12 years, 13–16 years, or >16 years and CVD risk factor levels in the study population was compared with the corresponding associations within siblings. Results Educational gradients in risk factors were attenuated when factors shared by siblings was taken into account: A one category lower educational level was associated with 0.7 (95% confidence interval 0.6 to 0.8 mm Hg higher systolic blood pressure (27% attenuation, 0.4 (0.4 to 0.5 mmHg higher diastolic blood pressure (30%, 1.0 (1.0 to 1.1 more beats per minute higher heart rate (21%, 0.07 (0.06 to 0.07 mmol/l higher serum total cholesterol (32%, 0.2 (0.2 to 0.2 higher smoking level (5 categories (30%, 0.15 (0.13 to 0.17 kg/m2 higher BMI (43%, and 0.2 (0.2 to 0.2 cm lower height (52%. Attenuation increased with shorter age-difference between siblings. Conclusion About one third of the educational gradients in modifiable CVD risk factors may be explained by factors that siblings share. This implies that childhood environment is important for the prevention of CVD.

  3. The educational gradient in cardiovascular risk factors: impact of shared family factors in 228,346 Norwegian siblings.

    Science.gov (United States)

    Ariansen, Inger; Mortensen, Laust Hvas; Graff-Iversen, Sidsel; Stigum, Hein; Kjøllesdal, Marte Karoline Råberg; Næss, Øyvind

    2017-03-30

    Various indicators of childhood socioeconomic position have been related to cardiovascular disease (CVD) risk in adulthood. We investigated the impact of shared family factors on the educational gradient in midlife CVD risk factors by assessing within sibling similarities in the gradient using a discordant sibling design. Norwegian health survey data (1980-2003) was linked to educational and generational data. Participants with a full sibling in the health surveys (228,346 individuals in 98,046 sibships) were included. Associations between attained educational level (7-9 years, 10-11 years, 12 years, 13-16 years, or >16 years) and CVD risk factor levels in the study population was compared with the corresponding associations within siblings. Educational gradients in risk factors were attenuated when factors shared by siblings was taken into account: A one category lower educational level was associated with 0.7 (95% confidence interval 0.6 to 0.8) mm Hg higher systolic blood pressure (27% attenuation), 0.4 (0.4 to 0.5) mmHg higher diastolic blood pressure (30%), 1.0 (1.0 to 1.1) more beats per minute higher heart rate (21%), 0.07 (0.06 to 0.07) mmol/l higher serum total cholesterol (32%), 0.2 (0.2 to 0.2) higher smoking level (5 categories) (30%), 0.15 (0.13 to 0.17) kg/m 2 higher BMI (43%), and 0.2 (0.2 to 0.2) cm lower height (52%). Attenuation increased with shorter age-difference between siblings. About one third of the educational gradients in modifiable CVD risk factors may be explained by factors that siblings share. This implies that childhood environment is important for the prevention of CVD.

  4. Effective mine risk education in war-zone areas--a shared responsibility.

    Science.gov (United States)

    Durham, Joanne; Gillieatt, Sue; Sisavath, Bounpheng

    2005-09-01

    The focus of this paper is effective health education and promotion in the field of mine awareness, or what has more recently been re-titled 'mine risk education'. According to the United Nations, mine risk education comprises educational activities that aim to reduce the risk of injury from landmine/unexploded ordnance (UXO) through raising awareness and promoting behavioural change and includes public information dissemination, education and training, and community mine action liaison. Specifically, this paper is an empirical study of mine risk education practices using data collected during the implementation of a mine risk education programme that commenced in Lao PDR in 1996 and is ongoing. In particular, it considers lessons learned from the programme's monitoring and evaluation process. The authors argue that in a country such as Lao PDR, where communities have lived with UXO infestation for over 25 years, more mine risk education is not necessarily needed. This paper concludes that common programmes of mine risk education using top-down educational methods, based on the assumption that ignorance of landmine/UXO risk is the key factor in mine accidents, are inadequate. Evidence from the literature on health promotion and the experience of the programme indicate that there is a need to supplement or replace existing common mine risk education practices with techniques that incorporate an understanding of the economic, social and political circumstances faced by communities at risk.

  5. Financing, risk covering and sharing; Financement, couverture et partage des risques

    Energy Technology Data Exchange (ETDEWEB)

    Gouze, J.R. [Sinerg, Societe d`Investissement en Energie, 92 - Boulogne Billancourt (France)

    1996-07-01

    The risks and constraints of a cogeneration project are studied, and it is shown that investments in cogeneration are restrained by the technical complexity, the high financial costs and the industrial and economical risks. These risks are identified in the various phases of the project (design, realization and operation). An innovative investment solution, known as third-party-investment which offers the client all the technical and financial charges and the operating assistance, is presented. Technical and industrial risks are covered by assistance, insurance, supply contracts and covering contracts

  6. Is periodontitis a comorbidity of COPD or can associations be explained by shared risk factors/behaviors?

    Science.gov (United States)

    Hobbins, Stephanie; Chapple, Iain Lc; Sapey, Elizabeth; Stockley, Robert A

    2017-01-01

    COPD is recognized as having a series of comorbidities potentially related to common inflammatory processes. Periodontitis is one of the most common human inflammatory diseases and has previously been associated with COPD in numerous observational studies. As periodontitis and COPD are both chronic, progressive conditions characterized by neutrophilic inflammation with subsequent proteolytic destruction of connective tissue, it has been proposed that they share common pathophysiological processes. The mechanisms proposed to link COPD and periodontitis include mechanical aspiration of oral contents into the respiratory tree, overspill of locally produced inflammatory mediators into the systemic circulation or oral or lung-derived bacteremia activating an acute-phase response and also reactive oxygen species (ROS) and cytokine release by systemic neutrophils at distant sites. Studies of systemic neutrophils in COPD and chronic periodontitis describe altered cellular functions that would predispose to inflammation and tissue destruction both in the lung and in the mouth, again potentially connecting these conditions. However, COPD and periodontitis also share risk factors such as age, chronic tobacco smoke exposure, and social deprivation that are not always considered in observational and interventional studies. Furthermore, studies reporting associations have often utilized differing definitions of both COPD and periodontitis. This article reviews the current available evidence supporting the hypothesis that COPD and inflammatory periodontal disease (periodontitis) could be pathologically associated, including a review of shared inflammatory mechanisms. It highlights the potential limitations of previous studies, in particular, the lack of uniformly applied case definitions for both COPD and periodontitis and poor recognition of shared risk factors. Understanding associations between these conditions may inform why patients with COPD suffer such a burden of comorbid

  7. Risk factors for oral diseases among workers with and without dental insurance in a national social security scheme in India.

    Science.gov (United States)

    Singh, Abhinav; Purohit, Bharathi M; Masih, Nitin; Kahndelwal, Praveen Kumar

    2014-04-01

    The target population for this cross sectional study comprises subjects with and without social security in a national social security scheme. The study aimed to compare and assess the risk factors for oral diseases among insured (organised sector) and non-insured workers (unorganised sector) in New Delhi, India. The sample comprised a total of 2,752 subjects. Of these, 960 workers belonged to the formal or organised sector with a social security and dental health insurance and 1,792 had no social security or dental insurance from the informal or unorganised sector. Significant differences were noted between the two groups for literacy levels, between-meal sugar consumption, tobacco-related habits and utilisation of dental care. Bleeding/calculus and periodontal pockets were present among 25% and 65.4% of insured workers, respectively. Similarly, 13.6% and 84.5% of non-insured workers had bleeding/calculus and periodontal pockets, respectively. The mean DMFT (decayed, missing, filled teeth) value among the insured workers and non-insured workers was 3.27 ± 1.98 and 3.75 ± 1.80, respectively. The association between absence of health insurance and dental caries was evident with an odds ratio (OR) of 1.94. Subjects with below graduate education were more prone to dental caries (OR = 1.62). Subjects who cleaned their teeth two or more times a day were less likely to have dental caries (OR = 1.47). Utilisation of dental care was inversely related to dental caries (OR = 1.25). The major risk factors for oral diseases in both the groups with similar socio-economic status were the lack of social security and health insurance, low literacy levels, high tobacco consumption and low levels of dental care utilisation. © 2013 FDI World Dental Federation.

  8. The effect of a new lifetime-cardiovascular-risk display on patients' motivation to participate in shared decision-making.

    Science.gov (United States)

    Jegan, Nikita Roman A; Kürwitz, Sarah Anna; Kramer, Lena Kathrin; Heinzel-Gutenbrunner, Monika; Adarkwah, Charles Christian; Popert, Uwe; Donner-Banzhoff, Norbert

    2018-06-09

    This study investigated the effects of three different risk displays used in a cardiovascular risk calculator on patients' motivation for shared decision-making (SDM). We compared a newly developed time-to-event (TTE) display with two established absolute risk displays (i.e. emoticons and bar charts). The accessibility, that is, how understandable, helpful, and trustworthy patients found each display, was also investigated. We analysed a sample of 353 patients recruited in general practices. After giving consent, patients were introduced to one of three fictional vignettes with low, medium or high cardiovascular risk. All three risk displays were shown in a randomized order. Patients were asked to rate each display with regard to motivation for SDM and accessibility. Two-factorial repeated measures analyses of variance were conducted to compare the displays and investigate possible interactions with age. Regarding motivation for SDM, the TTE elicited the highest motivation, followed by the emoticons and bar chart (p motivation for SDM and accessibility when compared to established displays using emoticons and a bar chart. If future research can replicate these results in real-life consultations, the TTE display will be a valuable addition to current risk calculators and decision aids by improving patients' participation.

  9. Comorbidity of depression with levels of smoking: an exploration of the shared familial risk hypothesis.

    Science.gov (United States)

    Johnson, Eric O; Rhee, Soo Hyun; Chase, Gary A; Breslau, Naomi

    2004-12-01

    Comorbidity of depression and smoking is well recognized, but results from studies that have assessed alternative explanations have varied by the level of smoking and the study method. We examined all 13 etiology models of comorbidity described by Neale and Kendler (American Journal of Genetics, 57, 935-953, 1995) for depression and each of four levels of smoking to shed light on the role that differing definitions might have played in generating the conflicting findings. Data came from 979 young adults aged 26-35 years who participated in an epidemiological cohort study in southeastern Michigan. Respondent and family history data on parental smoking and depression were analyzed using the biometric modeling method for family data, which Rhee and colleagues (Journal of Child Psychology and Psychiatry and Allied Disciplines, 44, 612-636, 2003; Behavior Genetics, 34, 251-265, 2004) have shown to be valid more frequently than traditional prevalence analyses. Results of the biometric model fitting suggested that for ever smoking, the comorbidity with depression may be related to chance or a high liability threshold for smoking only. In contrast, a correlated liabilities model fit the data best for the comorbidity of depression with daily, heavy, and nicotine-dependent smoking. The familial correlations accounted for 73%-95% of the total variance shared between depression and these levels of smoking. These results differ from analyses of these data using a traditional prevalence approach, which found no evidence of shared familial liability. The conflicting findings of the studies that have examined the relationship between smoking and depression may be attributable to differences in definition of the disorders and the methods used to analyze them.

  10. The RISAP-study: a complex intervention in risk communication and shared decision-making in general practice

    DEFF Research Database (Denmark)

    Kirkegaard, Pia; Edwards, Adrian G K; Hansen, Bo

    2010-01-01

    decision satisfaction (Provider Decision Process Assessment Instrument). The patients will receive a questionnaire at baseline and after 3 and 6 months. It includes questions about adherence to chosen treatment (Morisky Compliance Scale), self-rated health (SF-12), enablement (Patient Enablement Instrument...... training are needed. Aim:1) to systematically develop, describe and evaluate a complex intervention comprising a training programme for GPs in risk communication and shared decision-making, 2) to evaluate the effect of the training programme on real-life consultations between GPs and patients with high......), and risk communication and decision-making effectiveness (COMRADE Scale). Prescriptions, contacts to the health services, and cholesterol level will be drawn from the registers.In each group, 12 consultations will be observed and tape-recorded. The patients from these 24 consultations will be interviewed...

  11. A PUBLIC PLATFORM FOR GEOSPATIAL DATA SHARING FOR DISASTER RISK MANAGEMENT

    Directory of Open Access Journals (Sweden)

    S. Balbo

    2014-01-01

    This paper presents a case study scenario of setting up a Web platform based on GeoNode. It is a public platform called MASDAP and promoted by the Government of Malawi in order to support development of the country and build resilience against natural disasters. A substantial amount of geospatial data has already been collected about hydrogeological risk, as well as several other-disasters related information. Moreover this platform will help to ensure that the data created by a number of past or ongoing projects is maintained and that this information remains accessible and useful. An Integrated Flood Risk Management Plan for a river basin has already been included in the platform and other data from future disaster risk management projects will be added as well.

  12. Connecting the Dots: State Health Department Approaches to Addressing Shared Risk and Protective Factors Across Multiple Forms of Violence

    Science.gov (United States)

    Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci

    2018-01-01

    Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, “siloed” approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states. PMID:29189502

  13. Connecting the Dots: State Health Department Approaches to Addressing Shared Risk and Protective Factors Across Multiple Forms of Violence.

    Science.gov (United States)

    Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci

    Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, "siloed" approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states.

  14. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  15. A multi-scale energy demand model suggests sharing market risks with intelligent energy cooperatives

    NARCIS (Netherlands)

    G. Methenitis (Georgios); M. Kaisers (Michael); J.A. La Poutré (Han)

    2015-01-01

    textabstractIn this paper, we propose a multi-scale model of energy demand that is consistent with observations at a macro scale, in our use-case standard load profiles for (residential) electric loads. We employ the model to study incentives to assume the risk of volatile market prices for

  16. Risk assessment by client and case manager for shared decision making in outpatient forensic psychiatry

    NARCIS (Netherlands)

    van den Brink, Rob H. S.; Troquete, Nadine A. C.; Beintema, Harry; Mulder, Tamara; van Os, Titus W. D. P.; Schoevers, Robert A.; Wiersma, Durk

    2015-01-01

    Background: In outpatient forensic psychiatry, assessment of re-offending risk and treatment needs by case managers may be hampered by an incomplete view of client functioning. The client's appreciation of his own problem behaviour is not systematically used for these purposes. The current study

  17. Genetic sharing with cardiovascular disease risk factors and diabetes reveals novel bone mineral density loci

    NARCIS (Netherlands)

    S. Reppe (Sjur); Y. Wang (Yunpeng); W.K. Thompson (Wesley K.); L.K. McEvoy (Linda K.); N.J. Schork (Nicholas); V. Zuber (Verena); M. Leblanc (Marissa); F. Bettella (Francesco); I.G. Mills (Ian G.); R.S. Desikan (Rahul S.); S. Djurovic (Srdjan); K.M. Gautvik (Kaare); A.M. Dale (Anders); O.A. Andreassen (Ole); K. Estrada Gil (Karol); U. Styrkarsdottir (Unnur); E. Evangelou (Evangelos); Y.-H. Hsu (Yi-Hsiang); E.L. Duncan (Emma); E.E. Ntzani (Evangelia); L. Oei (Ling); O.M.E. Albagha (Omar M.); N. Amin (Najaf); J.P. Kemp (John); D.L. Koller (Daniel); G. Li (Guo); C.-T. Liu (Ching-Ti); R.L. Minster (Ryan); A. Moayyeri (Alireza); L. Vandenput (Liesbeth); D. Willner (Dana); S.-M. Xiao (Su-Mei); L.M. Yerges-Armstrong (Laura); H.-F. Zheng (Hou-Feng); N. Alonso (Nerea); J. Eriksson (Joel); C.M. Kammerer (Candace); S. Kaptoge (Stephen); P.J. Leo (Paul); G. Thorleifsson (Gudmar); S.G. Wilson (Scott); J.F. Wilson (James F); V. Aalto (Ville); M. Alen (Markku); A.K. Aragaki (Aaron); T. Aspelund (Thor); J.R. Center (Jacqueline); Z. Dailiana (Zoe); C. Duggan; M. Garcia (Melissa); N. Garcia-Giralt (Natàlia); S. Giroux (Sylvie); G. Hallmans (Göran); L.J. Hocking (Lynne); L.B. Husted (Lise Bjerre); K. Jameson (Karen); R. Khusainova (Rita); G.S. Kim (Ghi Su); C. Kooperberg (Charles); T. Koromila (Theodora); M. Kruk (Marcin); M. Laaksonen (Marika); A.Z. Lacroix (Andrea Z.); S.H. Lee (Seung Hun); P.C. Leung (Ping C.); J.R. Lewis (Joshua); L. Masi (Laura); S. Mencej-Bedrac (Simona); T.V. Nguyen (Tuan); X. Nogues (Xavier); M.S. Patel (Millan); J. Prezelj (Janez); L.M. Rose (Lynda); S. Scollen (Serena); K. Siggeirsdottir (Kristin); G.D. Smith; O. Svensson (Olle); S. Trompet (Stella); O. Trummer (Olivia); N.M. van Schoor (Natasja); J. Woo (Jean); K. Zhu (Kun); S. Balcells (Susana); M.L. Brandi; B.M. Buckley (Brendan M.); S. Cheng (Sulin); C. Christiansen; C. Cooper (Charles); G.V. Dedoussis (George); I. Ford (Ian); M. Frost (Morten); D. Goltzman (David); J. González-Macías (Jesús); M. Kähönen (Mika); M. Karlsson (Magnus); E.K. Khusnutdinova (Elza); J.-M. Koh (Jung-Min); P. Kollia (Panagoula); B.L. Langdahl (Bente); W.D. Leslie (William D.); P. Lips (Paul); O. Ljunggren (Östen); R. Lorenc (Roman); J. Marc (Janja); D. Mellström (Dan); B. Obermayer-Pietsch (Barbara); D. Olmos (David); U. Pettersson-Kymmer (Ulrika); D.M. Reid (David); J.A. Riancho (José); P.M. Ridker (Paul); M.F. Rousseau (Francois); P.E. Slagboom (Eline); N.L.S. Tang (Nelson L.S.); R. Urreizti (Roser); W. Van Hul (Wim); J. Viikari (Jorma); M.T. Zarrabeitia (María); Y.S. Aulchenko (Yurii); M.C. Castaño Betancourt (Martha); E. Grundberg (Elin); L. Herrera (Lizbeth); T. Ingvarsson (Torvaldur); H. Johannsdottir (Hrefna); T. Kwan (Tony); R. Li (Rui); R.N. Luben (Robert); M.C. Medina-Gomez (Carolina); S.T. Palsson (Stefan Th); J.I. Rotter (Jerome I.); G. Sigurdsson (Gunnar); J.B.J. van Meurs (Joyce); D.J. Verlaan (Dominique); F.M. Williams (Frances); A.R. Wood (Andrew); Y. Zhou (Yanhua); T. Pastinen (Tomi); S. Raychaudhuri (Soumya); J.A. Cauley (Jane); D.I. Chasman (Daniel); G.R. Clark (Graeme); S.R. Cummings (Steven R.); P. Danoy (Patrick); E.M. Dennison (Elaine); R. Eastell (Richard); J.A. Eisman (John); V. Gudnason (Vilmundur); A. Hofman (Albert); R.D. Jackson (Rebecca); G. Jones (Graeme); J.W. Jukema (Jan Wouter); K.T. Khaw; T. Lehtimäki (Terho); Y. Liu (YongMei); M. Lorentzon (Mattias); E. McCloskey (Eugene); B.D. Mitchell (Braxton); K. Nandakumar (Kannabiran); G.C. Nicholson (Geoffrey); B.A. Oostra (Ben); M. Peacock (Munro); H.A.P. Pols (Huib); R.L. Prince (Richard); O. Raitakari (Olli); I.R. Reid (Ian); J. Robbins (John); P.N. Sambrook (Philip); P.C. Sham (Pak Chung); A.R. Shuldiner (Alan); F.A. Tylavsky (Frances); C.M. van Duijn (Cornelia); N.J. Wareham (Nicholas J.); L.A. Cupples (Adrienne); M.J. Econs (Michael); D.M. Evans (David); T.B. Harris (Tamara B.); A.W.C. Kung (Annie Wai Chee); B.M. Psaty (Bruce); J. Reeve (Jonathan); T.D. Spector (Timothy); E.A. Streeten (Elizabeth); M.C. Zillikens (Carola); U. Thorsteinsdottir (Unnur); C. Ohlsson (Claes); D. Karasik (David); J.B. Richards (Brent); M.A. Brown (Matthew); J-A. Zwart (John-Anker); A.G. Uitterlinden (André); S.H. Ralston (Stuart); J.P.A. Ioannidis (John P.A.); D.P. Kiel (Douglas P.); F. Rivadeneira Ramirez (Fernando)

    2015-01-01

    textabstractBone Mineral Density (BMD) is a highly heritable trait, but genome-wide association studies have identified few genetic risk factors. Epidemiological studies suggest associations between BMD and several traits and diseases, but the nature of the suggestive comorbidity is still unknown.

  18. Consolidating the shared area of investigation between planning theory, risk theory and ethical inquiry

    NARCIS (Netherlands)

    Basta, C.

    2012-01-01

    Although it is perhaps the most prominent interdisciplinary theme to have emerged in the past decades, in the domain of planning studies the prevention of technological risks has only recently started the pathway towards a rigorous theoretical definition (Boholm and Lofsted 2004; Hayden Lesbirel and

  19. Individual and shared effects of social environment and polygenic risk scores on adolescent body mass index.

    Science.gov (United States)

    Coleman, Jonathan R I; Krapohl, Eva; Eley, Thalia C; Breen, Gerome

    2018-04-20

    Juvenile obesity is associated with adverse health outcomes. Understanding genetic and environmental influences on body mass index (BMI) during adolescence could inform interventions. We investigated independent and interactive effects of parenting, socioeconomic status (SES) and polygenic risk on BMI pre-adolescence, and on the rate of change in BMI across adolescence. Genome-wide genotype data, BMI and child perceptions of parental warmth and punitive discipline were available at 11 years old, and parental SES was available from birth on 3,414 unrelated participants. Linear models were used to test the effects of social environment and polygenic risk on pre-adolescent BMI. Change in BMI across adolescence was assessed in a subset (N = 1943). Sex-specific effects were assessed. Higher genetic risk was associated with increased BMI pre-adolescence and across adolescence (p parenting was not significantly associated with either phenotype, but lower SES was associated with increased BMI pre-adolescence. No interactions passed correction for multiple testing. Polygenic risk scores from adult GWAS meta-analyses are associated with BMI in juveniles, suggesting a stable genetic component. Pre-adolescent BMI was associated with social environment, but parental style has, at most, a small effect.

  20. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  1. Abundance in Capital: Global Risk Sharing and Insurance in a Changing Financial Environment

    Science.gov (United States)

    Michel, Gero; Schaper, Christopher

    2014-05-01

    Insurance has played a viable role in the hedging of homeowners and commercial risks around the world. Countries that have significant penetration in insurance have in addition performed better after large regional or over-regional catastrophic losses. Insurance has hence increased the resilience of western societies. This is opposed to emerging or developing markets with low insurance penetration which have suffered significant drawbacks in their development after large catastrophic events. Examples include the recent Typhoon(s) in the Philippines and the 2010 Haiti earthquake. This presentation will provide insights into the opportunities, views and risk management features a global reinsurance company must assume in order to hedge and mitigate risk across the world. During the past year, an unprecedented amount of new capital has been entering the insurance market, looking for profitable investments outside the much wider capital market. Catastrophe insurance is seen as a valuable alternative to investing in assets that that have shown low returns and high correlation in the recent financial meltdown. The new capital is mostly deployed - or competing with already deployed capital - in the US where insurance penetration is already high. This is opposed to more than half of the world including all developing and most emerging countries which have low insurance penetration and often lack infrastructure hindering new capital to be deployed effectively. What is needed to overcome this obvious deficiency in capital supply and demand? One reason why it is difficult to deploy capital in developing countries is the lack of available exposure information and catastrophe models. This presentation sheds light on the potential science needs of our market and gives an overview of what is being done at Montpelier, a global reinsurance company, to understand catastrophe risk around the globe.

  2. Achieving involvement: process outcomes from a cluster randomized trial of shared decision making skill development and use of risk communication aids in general practice.

    NARCIS (Netherlands)

    Elwyn, G.; Edwards, A.; Hood, K.; Robling, M.; Atwell, C.; Russell, I.; Wensing, M.J.P.; Grol, R.P.T.M.

    2004-01-01

    BACKGROUND: A consulting method known as 'shared decision making' (SDM) has been described and operationalized in terms of several 'competences'. One of these competences concerns the discussion of the risks and benefits of treatment or care options-'risk communication'. Few data exist on

  3. Functional variants in the LRRK2 gene confer shared effects on risk for Crohn's disease and Parkinson's disease.

    Science.gov (United States)

    Hui, Ken Y; Fernandez-Hernandez, Heriberto; Hu, Jianzhong; Schaffner, Adam; Pankratz, Nathan; Hsu, Nai-Yun; Chuang, Ling-Shiang; Carmi, Shai; Villaverde, Nicole; Li, Xianting; Rivas, Manual; Levine, Adam P; Bao, Xiuliang; Labrias, Philippe R; Haritunians, Talin; Ruane, Darren; Gettler, Kyle; Chen, Ernie; Li, Dalin; Schiff, Elena R; Pontikos, Nikolas; Barzilai, Nir; Brant, Steven R; Bressman, Susan; Cheifetz, Adam S; Clark, Lorraine N; Daly, Mark J; Desnick, Robert J; Duerr, Richard H; Katz, Seymour; Lencz, Todd; Myers, Richard H; Ostrer, Harry; Ozelius, Laurie; Payami, Haydeh; Peter, Yakov; Rioux, John D; Segal, Anthony W; Scott, William K; Silverberg, Mark S; Vance, Jeffery M; Ubarretxena-Belandia, Iban; Foroud, Tatiana; Atzmon, Gil; Pe'er, Itsik; Ioannou, Yiannis; McGovern, Dermot P B; Yue, Zhenyu; Schadt, Eric E; Cho, Judy H; Peter, Inga

    2018-01-10

    Crohn's disease (CD), a form of inflammatory bowel disease, has a higher prevalence in Ashkenazi Jewish than in non-Jewish European populations. To define the role of nonsynonymous mutations, we performed exome sequencing of Ashkenazi Jewish patients with CD, followed by array-based genotyping and association analysis in 2066 CD cases and 3633 healthy controls. We detected association signals in the LRRK2 gene that conferred risk for CD (N2081D variant, P = 9.5 × 10 -10 ) or protection from CD (N551K variant, tagging R1398H-associated haplotype, P = 3.3 × 10 -8 ). These variants affected CD age of onset, disease location, LRRK2 activity, and autophagy. Bayesian network analysis of CD patient intestinal tissue further implicated LRRK2 in CD pathogenesis. Analysis of the extended LRRK2 locus in 24,570 CD cases, patients with Parkinson's disease (PD), and healthy controls revealed extensive pleiotropy, with shared genetic effects between CD and PD in both Ashkenazi Jewish and non-Jewish cohorts. The LRRK2 N2081D CD risk allele is located in the same kinase domain as G2019S, a mutation that is the major genetic cause of familial and sporadic PD. Like the G2019S mutation, the N2081D variant was associated with increased kinase activity, whereas neither N551K nor R1398H variants on the protective haplotype altered kinase activity. We also confirmed that R1398H, but not N551K, increased guanosine triphosphate binding and hydrolyzing enzyme (GTPase) activity, thereby deactivating LRRK2. The presence of shared LRRK2 alleles in CD and PD provides refined insight into disease mechanisms and may have major implications for the treatment of these two seemingly unrelated diseases. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  4. Genetic Sharing with Cardiovascular Disease Risk Factors and Diabetes Reveals Novel Bone Mineral Density Loci.

    Directory of Open Access Journals (Sweden)

    Sjur Reppe

    Full Text Available Bone Mineral Density (BMD is a highly heritable trait, but genome-wide association studies have identified few genetic risk factors. Epidemiological studies suggest associations between BMD and several traits and diseases, but the nature of the suggestive comorbidity is still unknown. We used a novel genetic pleiotropy-informed conditional False Discovery Rate (FDR method to identify single nucleotide polymorphisms (SNPs associated with BMD by leveraging cardiovascular disease (CVD associated disorders and metabolic traits. By conditioning on SNPs associated with the CVD-related phenotypes, type 1 diabetes, type 2 diabetes, systolic blood pressure, diastolic blood pressure, high density lipoprotein, low density lipoprotein, triglycerides and waist hip ratio, we identified 65 novel independent BMD loci (26 with femoral neck BMD and 47 with lumbar spine BMD at conditional FDR < 0.01. Many of the loci were confirmed in genetic expression studies. Genes validated at the mRNA levels were characteristic for the osteoblast/osteocyte lineage, Wnt signaling pathway and bone metabolism. The results provide new insight into genetic mechanisms of variability in BMD, and a better understanding of the genetic underpinnings of clinical comorbidity.

  5. Identification of novel genetic risk loci in Maltese dogs with necrotizing meningoencephalitis and evidence of a shared genetic risk across toy dog breeds.

    Science.gov (United States)

    Schrauwen, Isabelle; Barber, Renee M; Schatzberg, Scott J; Siniard, Ashley L; Corneveaux, Jason J; Porter, Brian F; Vernau, Karen M; Keesler, Rebekah I; Matiasek, Kaspar; Flegel, Thomas; Miller, Andrew D; Southard, Teresa; Mariani, Christopher L; Johnson, Gayle C; Huentelman, Matthew J

    2014-01-01

    Necrotizing meningoencephalitis (NME) affects toy and small breed dogs causing progressive, often fatal, inflammation and necrosis in the brain. Genetic risk loci for NME previously were identified in pug dogs, particularly associated with the dog leukocyte antigen (DLA) class II complex on chromosome 12, but have not been investigated in other susceptible breeds. We sought to evaluate Maltese and Chihuahua dogs, in addition to pug dogs, to identify novel or shared genetic risk factors for NME development. Genome-wide association testing of single nucleotide polymorphisms (SNPs) in Maltese dogs with NME identified 2 regions of genome-wide significance on chromosomes 4 (chr4:74522353T>A, p = 8.1×10-7) and 15 (chr15:53338796A>G, p = 1.5×10-7). Haplotype analysis and fine-mapping suggests that ILR7 and FBXW7, respectively, both important for regulation of immune system function, could be the underlying associated genes. Further evaluation of these regions and the previously identified DLA II locus across all three breeds, revealed an enrichment of nominal significant SNPs associated with chromosome 15 in pug dogs and DLA II in Maltese and Chihuahua dogs. Meta-analysis confirmed effect sizes the same direction in all three breeds for both the chromosome 15 and DLA II loci (p = 8.6×10-11 and p = 2.5×10-7, respectively). This suggests a shared genetic background exists between all breeds and confers susceptibility to NME, but effect sizes might be different among breeds. In conclusion, we identified the first genetic risk factors for NME development in the Maltese, chromosome 4 and chromosome 15, and provide evidence for a shared genetic risk between breeds associated with chromosome 15 and DLA II. Last, DLA II and IL7R both have been implicated in human inflammatory diseases of the central nervous system such as multiple sclerosis, suggesting that similar pharmacotherapeutic targets across species should be investigated.

  6. Identification of novel genetic risk loci in Maltese dogs with necrotizing meningoencephalitis and evidence of a shared genetic risk across toy dog breeds.

    Directory of Open Access Journals (Sweden)

    Isabelle Schrauwen

    Full Text Available Necrotizing meningoencephalitis (NME affects toy and small breed dogs causing progressive, often fatal, inflammation and necrosis in the brain. Genetic risk loci for NME previously were identified in pug dogs, particularly associated with the dog leukocyte antigen (DLA class II complex on chromosome 12, but have not been investigated in other susceptible breeds. We sought to evaluate Maltese and Chihuahua dogs, in addition to pug dogs, to identify novel or shared genetic risk factors for NME development. Genome-wide association testing of single nucleotide polymorphisms (SNPs in Maltese dogs with NME identified 2 regions of genome-wide significance on chromosomes 4 (chr4:74522353T>A, p = 8.1×10-7 and 15 (chr15:53338796A>G, p = 1.5×10-7. Haplotype analysis and fine-mapping suggests that ILR7 and FBXW7, respectively, both important for regulation of immune system function, could be the underlying associated genes. Further evaluation of these regions and the previously identified DLA II locus across all three breeds, revealed an enrichment of nominal significant SNPs associated with chromosome 15 in pug dogs and DLA II in Maltese and Chihuahua dogs. Meta-analysis confirmed effect sizes the same direction in all three breeds for both the chromosome 15 and DLA II loci (p = 8.6×10-11 and p = 2.5×10-7, respectively. This suggests a shared genetic background exists between all breeds and confers susceptibility to NME, but effect sizes might be different among breeds. In conclusion, we identified the first genetic risk factors for NME development in the Maltese, chromosome 4 and chromosome 15, and provide evidence for a shared genetic risk between breeds associated with chromosome 15 and DLA II. Last, DLA II and IL7R both have been implicated in human inflammatory diseases of the central nervous system such as multiple sclerosis, suggesting that similar pharmacotherapeutic targets across species should be investigated.

  7. Risk, Benefit, and Moderators of the Affect Heuristic in a Widespread Unlawful Activity: Evidence from a Survey of Unlawful File-Sharing Behavior.

    Science.gov (United States)

    Watson, Steven J; Zizzo, Daniel J; Fleming, Piers

    2017-06-01

    Increasing the perception of legal risk via publicized litigation and lobbying for copyright law enforcement has had limited success in reducing unlawful content sharing by the public. We consider the extent to which engaging in file sharing online is motivated by the perceived benefits of this activity as opposed to perceived legal risks. Moreover, we explore moderators of the relationship between perceived risk and perceived benefits; namely, trust in industry and legal regulators, and perceived online anonymity. We examine these questions via a large two-part survey of consumers of music (n = 658) and eBooks (n = 737). We find that perceptions of benefit, but not of legal risk, predict stated file-sharing behavior. An affect heuristic is employed: as perceived benefit increases, perceived risk falls. This relationship is increased under high regulator and industry trust (which actually increases perceived risk in this study) and low anonymity (which also increases perceived risk). We propose that, given the limited impact of perceived legal risk upon unlawful downloading, it would be better for the media industries to target enhancing the perceived benefit and availability of lawful alternatives. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  8. Self-Harm and Suicide Attempts among High-Risk, Urban Youth in the U.S.: Shared and Unique Risk and Protective Factors

    Directory of Open Access Journals (Sweden)

    Angela C. Jones

    2012-01-01

    Full Text Available The extent to which self-harm and suicidal behavior overlap in community samples of vulnerable youth is not well known. Secondary analyses were conducted of the “linkages study” (N = 4,131, a cross-sectional survey of students enrolled in grades 7, 9, 11/12 in a high-risk community in the U.S. in 2004. Analyses were conducted to determine the risk and protective factors (i.e., academic grades, binge drinking, illicit drug use, weapon carrying, child maltreatment, social support, depression, impulsivity, self-efficacy, parental support, and parental monitoring associated with both self-harm and suicide attempt. Findings show that 7.5% of participants reported both self-harm and suicide attempt, 2.2% of participants reported suicide attempt only, and 12.4% of participants reported self-harm only. Shared risk factors for co-occurring self-harm and suicide attempt include depression, binge drinking, weapon carrying, child maltreatment, and impulsivity. There were also important differences by sex, grade level, and race/ethnicity that should be considered for future research. The findings show that there is significant overlap in the modifiable risk factors associated with self-harm and suicide attempt that can be targeted for future research and prevention strategies.

  9. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  10. HLA similarities indicate shared genetic risk in 21-hydroxylase autoantibody positive South African and United States Addison's disease.

    Science.gov (United States)

    Ross, I L; Babu, S; Armstrong, T; Zhang, L; Schatz, D; Pugliese, A; Eisenbarth, G; Baker Ii, P

    2014-10-01

    Genetic similarities between patients from the United States and South African (SA) Addison's Disease (AD) strengthen evidence for genetic association. SA-AD (n = 73), SA healthy controls (N = 78), and US-AD patients (N = 83) were genotyped for DQA1, DQB1, DRB1, and HLA-B alleles. Serum was tested for the quantity of 21OH-AA and IFNα-AA at the Barbara Davis Center. Although not as profound as in US-AD, in SA-AD 21OH-AA + subjects the predominantly associated risk haplotypes were DRB1*0301-DQB1*0201 (DR3), DRB1*04xx-DQB1*0302 (DR4), and the combined DR3/4 genotype. DQB1*0302 associated DRB1*04xx haplotypes conferred higher risk than those DRB1*04xx haplotypes associated with other DQB1 alleles. We found negative association in 21OH-AA + SA-AD for DQA1*0201-DQB1*0202 and DQA1*0101-DQB1*0501 vs SA controls, and positive association for DQA1*0401-DQB1*0402 vs US-AD. Apart from the class II DR3 haplotype, HLA-B8 did not have an independent effect; however together DR3 and HLA-B8 conferred the highest risk vs 21OH-AA negative SA-AD and SA-controls. HLA-B7 (often with DR4) conferred novel risk in 21OH-AA + SA-AD vs controls. This study represents the first comparison between South African and United States AD populations utilizing genotyping and serology performed at the same center. SA-AD and US-AD 21OH-AA + patients share common HLA risk haplotypes including DR4 (with HLA-B7) and DR3 (with HLA-B8), strengthening previously described HLA associations and implicating similar genetic etiology. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  11. Effects of Perceived Risks, Reputation and Electronic Word of Mouth (E-WOM) on Collaborative Consumption of Uber Car Sharing Service

    Science.gov (United States)

    Wati Hawapi, Mega; Sulaiman, Zuraidah; Kohar, Umar Haiyat Abdul; Abu Talib, Noraini

    2017-06-01

    Current transition from traditional economic model of selling and buying to sharing economic business creates a huge impact on consumers’ preferences to participate in collaborative consumption. The market entrance of sharing economic business is relatively new, thus it builds scepticism among consumers. Consumers’ trust becomes the most crucial aspect in determining their willingness to participate in collaborative consumption. This study will reveal the effects of perceived risks (performance and social), reputation and Electronic Word-of Mouth (E-WOM) on Malaysian consumers’ intention of collaborative consumption, especially for Uber car sharing service. This study inspires to enrich the literature for collaborative consumption and perceived risk theory. From the practical perspective, this study may provide insights in assisting the collaborative consumption service providers especially Uber car users on factors influencing the intention to engage in such service.

  12. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  13. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  14. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.

    Science.gov (United States)

    Mallinder, Jason; Drabwell, Peter

    Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.

  15. A Multi-Breed Genome-Wide Association Analysis for Canine Hypothyroidism Identifies a Shared Major Risk Locus on CFA12.

    Directory of Open Access Journals (Sweden)

    Matteo Bianchi

    Full Text Available Hypothyroidism is a complex clinical condition found in both humans and dogs, thought to be caused by a combination of genetic and environmental factors. In this study we present a multi-breed analysis of predisposing genetic risk factors for hypothyroidism in dogs using three high-risk breeds--the Gordon Setter, Hovawart and the Rhodesian Ridgeback. Using a genome-wide association approach and meta-analysis, we identified a major hypothyroidism risk locus shared by these breeds on chromosome 12 (p = 2.1x10(-11. Further characterisation of the candidate region revealed a shared ~167 kb risk haplotype (4,915,018-5,081,823 bp, tagged by two SNPs in almost complete linkage disequilibrium. This breed-shared risk haplotype includes three genes (LHFPL5, SRPK1 and SLC26A8 and does not extend to the dog leukocyte antigen (DLA class II gene cluster located in the vicinity. These three genes have not been identified as candidate genes for hypothyroid disease previously, but have functions that could potentially contribute to the development of the disease. Our results implicate the potential involvement of novel genes and pathways for the development of canine hypothyroidism, raising new possibilities for screening, breeding programmes and treatments in dogs. This study may also contribute to our understanding of the genetic etiology of human hypothyroid disease, which is one of the most common endocrine disorders in humans.

  16. Risks associated with borrowing and sharing of prescription analgesics among patients observed by pain management physicians in Croatia: a qualitative study

    Directory of Open Access Journals (Sweden)

    Markotic F

    2016-11-01

    Full Text Available Filipa Markotic,1 Livia Puljak2 1Centre for Clinical Pharmacology, University Clinical Hospital Mostar, Mostar, Bosnia and Herzegovina; 2Laboratory for Pain Research, University of Split School of Medicine, Split, Croatia Background: Understanding and improving patient safety is a key issue in medicine. One of the potential threats to patient safety is the sharing of medication among patients, which is a form of self-medication. This study analyzed experiences and attitudes of pain management physicians (PMPs about sharing prescription analgesics among patients.Methods: This qualitative study was conducted by semi-structured interviews among PMPs employed in Croatian pain clinics. The study involved two researchers and 15 PMPs.Results: Among PMPs, 80% have seen patients who share their prescription analgesics with other patients for whom prescription is not intended. Most PMPs consider prescription analgesics sharing a risky and negative behavior. Some of them, however, found certain positive aspects associated to it, such as being a benevolent behavior, helping patients to get medications when they need them, and helping them cope with pain.Conclusion: The majority of physicians specialized in pain management encountered patients sharing prescription analgesics. Most of them considered this as risky behavior with a number of potential consequences. It has been noted that this problem is neglected and that physicians should inquire about medication sharing. Direct-to-consumers advertising was perceived as a factor contributing to such behavior. Patient education and more involvement of physicians in identifying this behavior were cited as potential remedies for preventing sharing of prescription analgesics. Keywords: analgesics, sharing, lending, borrowing, risks

  17. Rural health prepayment schemes in China: towards a more active role for government.

    Science.gov (United States)

    Bloom, G; Shenglan, T

    1999-04-01

    A large majority of China's rural population were members of health prepayment schemes in the 1970's. Most of these schemes collapsed during the transition to a market economy. Some localities subsequently reestablished schemes. In early 1997 a new government policy identified health prepayment as a major potential source of rural health finance. This paper draws on the experience of existing schemes to explore how government can support implementation of this policy. The decision to support the establishment of health prepayment schemes is part of the government's effort to establish new sources of finance for social services. It believes that individuals are more likely to accept voluntary contributions to a prepayment scheme than tax increases. The voluntary nature of the contributions limits the possibilities for risk-sharing and redistribution between rich and poor. This underlines the need for the government to fund a substantial share of health expenditure out of general revenues, particularly in poor localities. The paper notes that many successful prepayment schemes depend on close supervision by local political leaders. It argues that the national programme will have to translate these measures into a regulatory system which defines the responsibilities of scheme management bodies and local governments. A number of prepayment schemes have collapsed because members did not feel they got value for money. Local health bureaux will have to cooperate with prepayment schemes to ensure that health facilities provide good quality services at a reasonable cost. Users' representatives can also monitor performance. The paper concludes that government needs to clarify the relationship between health prepayment schemes and other actors in rural localities in order to increase the chance that schemes will become a major source rural health finance.

  18. Report: Implementation Plan With Cost Sharing Methodology Needed for Region 8 Senior Environmental Employee Work on Lead Risk Reduction

    Science.gov (United States)

    Report #13-P-0430, September 24, 2013. The two Region 8 program offices that jointly implement the Lead Renovation, Repair and Painting Program do not have methodology or agreement for sharing SEE funding, which has led to confusion.

  19. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  20. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  1. Dizziness in older people: at risk of shared therapeutic nihilism between patient and physician. A qualitative study.

    Science.gov (United States)

    Stam, Hanneke; Wisse, Marjanne; Mulder, Bram; van der Wouden, Johannes C; Maarsingh, Otto R; van der Horst, Henriëtte E

    2016-07-16

    Dizziness-related impairment is a strong predictor for an unfavourable course of dizziness in older people. In this study we explored the experiences of older patients with significant dizziness-related impairment and their wishes and expectations regarding general practitioner (GP) care. Knowing the expectations and priorities of people with dizziness may enable the GP to provide tailor-made care, which in turn may substantially increase the quality of life and decrease the use and costs of health care. We conducted a qualitative study with semi-structured interviews. We selected patients from ten Dutch general practices. Patients were invited to participate in the study if they were ≥ 65 years, visited their GP because of dizziness and were significantly impaired due to dizziness (Dizziness Handicap Inventory ≥ 30). We applied content analysis to the semi-structured interviews. Thirteen participants participated, seven were female. Analysis of the interviews resulted in the overall theme "Dizziness in older people: at risk of shared therapeutic nihilism by the patient and the GP". Firstly, this can explained by the fact that participants frequently presented dizziness as a secondary complaint when they visited the GP for another complaint. Secondly, participants reported that the GP often could not help them with any treatment. Despite a poor therapeutic outcome, the vast majority of participants was satisfied how the GP handled their dizziness. Yet, understanding the cause of dizziness seems important for dizzy older patients. Despite significant dizziness-related impairment, older dizzy patients may not present dizziness as main reason for encounter. Presenting dizziness as a secondary complaint may give GPs the - wrong - impression that the dizziness-related impairment is only mild. GPs need to be aware of this potential underreporting. Knowing the cause of dizziness seems important for older patients. Yet, GPs regularly did not succeed in

  2. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  3. ACCESS TO FINANCE FOR SMEs BY CREDIT GUARANTEE SCHEMES IN TURKEY

    OpenAIRE

    Sarigul, Hasmet

    2013-01-01

    Credit guarantee schemes assist banks in lending to SMEs by overcoming collateral problems. The guarantees are used to share the risk between the bank and the guarantee institution in an agreed ratio. Thus, the bank’s risk and operation costs are lowered and its returns increased. This encourages banks to lend to SMEs who are unable to provide adequate collateral. In our study, we investigate the relationship between SMEs, banks and CGSs. We also aimed to explain the functioning of CGSs...

  4. Shared pledge shared vision

    International Nuclear Information System (INIS)

    Boussaha, Ali; Diatta, Christian Sina

    2005-01-01

    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  5. A scheme to scientifically and accurately assess cadmium pollution of river sediments, through consideration of bioavailability when assessing ecological risk.

    Science.gov (United States)

    Song, Zhixin; Tang, Wenzhong; Shan, Baoqing

    2017-10-01

    Evaluating heavy metal pollution status and ecological risk in river sediments is a complex task, requiring consideration of contaminant pollution levels, as well as effects of biological processes within the river system. There are currently no simple or low-cost approaches to heavy metal assessment in river sediments. Here, we introduce a system of assessment for pollution status of heavy metals in river sediments, using measurements of Cd in the Shaocun River sediments as a case study. This system can be used to identify high-risk zones of the river that should be given more attention. First, we evaluated the pollution status of Cd in the river sediments based on their total Cd content, and calculated a risk assessment, using local geochemical background values at various sites along the river. Using both acetic acid and ethylenediaminetetraacetic acid to extracted the fractions of Cd in sediments, and used DGT to evaluate the bioavailability of Cd. Thus, DGT provided a measure of potentially bioavailable concentrations of Cd concentrations in the sediments. Last, we measured Cd contents in plant tissue collected at the same site to compare with our other measures. A Pearson's correlation analysis showed that Cd-Plant correlated significantly with Cd-HAc, (r = 0.788, P < 0.01), Cd-EDTA (r = 0.925, P < 0.01), Cd-DGT (r = 0.976, P < 0.01), and Cd-Total (r = 0.635, P < 0.05). We demonstrate that this system of assessment is a useful means of assessing heavy metal pollution status and ecological risk in river sediments. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. The 'bankability' of the new waste technologies: an econometric method for risk sharing in private finance waste contracts.

    Science.gov (United States)

    Black, I; Seaton, R; Chackiath, S; Wagland, S T; Pollard, S J T; Longhurst, P J

    2011-12-01

    The identification of risk and its appropriate allocation to partners in project consortia is essential for minimizing overall project risks, ensuring timely delivery and maximizing benefit for money invested. Risk management guidance available from government bodies, especially in the UK, does not specify methodologies for quantitative risk assessment, nor does it offer a procedure for allocating risk among project partners. Here, a methodology to quantify project risk and potential approaches to allocating risk and their implications are discussed. Construction and operation of a waste management facility through a public-private finance contract are discussed. Public-private partnership contracts are special purpose vehicle (SPV) financing methods promoted by the UK government to boost private sector investment in facilities for public service enhancement. Our findings question the appropriateness of using standard deviation as a measure for project risk and confirm the concept of portfolio theory, suggesting the pooling of risk can reduce total risk and its impact.

  7. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  8. Understanding the types of fraud in claims to South African medical schemes.

    Science.gov (United States)

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  9. Identification of risk loci with shared effects on five major psychiatric disorders: a genome-wide analysis

    NARCIS (Netherlands)

    Smoller, J.W.; Craddock, N.; Kendler, K.; Lee, P.H.; Neale, B.M.; Nurnberger, J.I.; Ripke, S.; Santangelo, S.; Sullivan, P.F.; Buitelaar, J.K.; Franke, B.; et al.,

    2013-01-01

    BACKGROUND: Findings from family and twin studies suggest that genetic contributions to psychiatric disorders do not in all cases map to present diagnostic categories. We aimed to identify specific variants underlying genetic effects shared between the five disorders in the Psychiatric Genomics

  10. Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness

    Science.gov (United States)

    Buzzetto-More, Nicole; Johnson, Robert; Elobaid, Muna

    2015-01-01

    Empowered by and tethered to ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe online activities of teens and young adults. The following…

  11. Volcanic risk metrics at Mt Ruapehu, New Zealand: some background to a probabilistic eruption forecasting scheme and a cost/benefit analysis at an open conduit volcano

    Science.gov (United States)

    Jolly, Gill; Sandri, Laura; Lindsay, Jan; Scott, Brad; Sherburn, Steve; Jolly, Art; Fournier, Nico; Keys, Harry; Marzocchi, Warner

    2010-05-01

    setting up BET_EF for Mt Ruapehu we are forced to define quantitatively what the background activity is. This will result in a quantitative evaluation of what changes in long time monitored parameters may influence the probability of future eruptions. The slopes of Mt Ruapehu host the largest ski area in North Island, New Zealand. Lahars have been generated as a result of several eruptions in the last 50 years, and some of these have reached the ski runs in a very short time frame (around 90 seconds from the beginning of the eruption). In the light of these potentially hazardous lahars, we use the output probabilities provided by BET_EF in a practical and rational decision scheme recently proposed by Marzocchi and Woo (2009) based on a cost/benefit analysis (CBA). In such scheme, a C/L ratio is computed, based on the costs (C) of practical mitigation actions to reduce risk (e.g., a public warning scheme and other means of raising awareness, and a call for a temporary and/or partial closure of the ski area) and on the potential loss (L) if no mitigation action is taken and an eruption occurs causing lahars down the ski fields. By comparing the probability of eruption-driven lahars and the C/L ratio, it is possible to define the most rational mitigation actions that can be taken to reduce the risk to skiers, snowboarders and staff on skifield. As BET_EF probability of eruption changes dynamically as updated monitoring data are received, the authorities can decide, at any specific point in time, what is the best action according to the current monitoring of the volcano. In this respect, CBA represents a bridge linking scientific output (probabilities) and Decision Makers (practical mitigation actions).

  12. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  13. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  14. Effective pseudonymisation and explicit statements of public interest to ensure the benefits of sharing health data for research, quality improvement and health service management outweigh the risks

    Directory of Open Access Journals (Sweden)

    Simon de Lusignan

    2014-05-01

    Full Text Available This journal strongly supports the sharing of data to support research and quality improvement. However, this needs to be done in a way that ensures the benefits vastly outweigh the risks, and vitally using methods which are inspire both public and professional confidences – robust pseudonymisation is needed to achieve this. The case for using routine data for research has already been well made and probably also for quality improvement; however, clearer mechanisms are needed of how we test that the public interest is served. Ensuring that the public interest is served is essential if we are to maintain patients’ and public’s trust, especially in the English National Health Service where the realpolitik is that patients can opt out of data sharing.  

  15. .: Risk sharing in the paper ticket distribution system on the example of municipal transport union of the upper Silesian industrial district in Katowice

    Directory of Open Access Journals (Sweden)

    Anna URBANEK

    2015-03-01

    Full Text Available Properly organized ticket distribution is a crucial tool to realize tariff policy of public passenger transport provider in the given area, as well as the factor influencing the ticket sale profits. Providing the proper accessibility of public communication ticket sale network requires signing contracts with third parties, which is consequently connected with the necessity to divide the tasks and responsibilities among them, which generates certain risk for each of the parties. In the article the types of risks have been discussed, as well as the methods of its sharing in case of agreements concerning public communication paper ticket distribution. Based on the example of the Municipal Transport Union of the Upper Silesian Industrial District in Katowice, the types of such agreements have been presented as well as their influence on organizing urban communication ticket distribution system in Silesian agglomeration. The paper presents a new approach to risk management as an important part of integration strategy of urban transport organizer.

  16. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    ‘File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  17. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  18. SCHEME FOR COMBINED USE OF STATINS AND URSODEOXYCHOLIC ACID IN PATIENTS WITH A HIGH RISK OF CARDIOVASCULAR EVENTS AND CONCOMITANT NON-ALCOHOLIC FATTY LIVER DISEASE: PROBLEMS OF PRACTICAL APPLICATION

    Directory of Open Access Journals (Sweden)

    S. N. Bel'diev

    2017-01-01

    Full Text Available Russian physicians often afraid to use statins in patients with high cardiovascular risk and nonalcoholic fatty liver disease (NAFLD or other hepatobiliary diseases, especially in cases when elevated levels of serum transaminases are detected. To expand the use of statins in these patients, a scheme of statins and ursodeoxycholic acid (UDCA co-administration was developed in 2014 and subsequently in 2016 it was included into the Russian clinical guidelines for the diagnosis and treatment of NAFLD. In addition to the scheme, the guidelines contain the results of clinical trials that demonstrated hepatoprotective, lipid-lowering and anti-atherogenic effects of UDCA in patients with NAFLD. This paper  presents a critical review of these trials, as well as it discusses the points of the scheme, which may contribute to unduly delayed prescribing and insufficiently intensive use of statins in patients with high risk of cardiovascular complications and associated NAFLD.

  19. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  20. Supporting evidence-based analysis for modified risk tobacco products through a toxicology data-sharing infrastructure [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Stéphanie Boué

    2017-09-01

    Full Text Available The US FDA defines modified risk tobacco products (MRTPs as products that aim to reduce harm or the risk of tobacco-related disease associated with commercially marketed tobacco products.  Establishing a product’s potential as an MRTP requires scientific substantiation including toxicity studies and measures of disease risk relative to those of cigarette smoking.  Best practices encourage verification of the data from such studies through sharing and open standards. Building on the experience gained from the OpenTox project, a proof-of-concept database and website (INTERVALS has been developed to share results from both in vivo inhalation studies and in vitro studies conducted by Philip Morris International R&D to assess candidate MRTPs. As datasets are often generated by diverse methods and standards, they need to be traceable, curated, and the methods used well described so that knowledge can be gained using data science principles and tools. The data-management framework described here accounts for the latest standards of data sharing and research reproducibility. Curated data and methods descriptions have been prepared in ISA-Tab format and stored in a database accessible via a search portal on the INTERVALS website. The portal allows users to browse the data by study or mechanism (e.g., inflammation, oxidative stress and obtain information relevant to study design, methods, and the most important results. Given the successful development of the initial infrastructure, the goal is to grow this initiative and establish a public repository for 21st-century preclinical systems toxicology MRTP assessment data and results that supports open data principles.

  1. Global bike share: What the data tells us about road safety.

    Science.gov (United States)

    Fishman, Elliot; Schepers, Paul

    2016-02-01

    Bike share has emerged as a rapidly growing mode of transport in over 800 cities globally, up from just a handful in the 1990s. Some analysts had forecast a rise in the number of bicycle crashes after the introduction of bike share, but empirical research on bike share safety is rare. The goal of this study is to examine the impact of bike share programs on cycling safety. The paper has two substudies. Study 1 was a secondary analysis of longitudinal hospital injury data from the Graves et al. (2014) study. It compared cycling safety in cities that introduced bike share programs with cities that did not. Study 2 combined ridership data with crash data of selected North American and European cities to compare bike share users to other cyclists. Study 1 indicated that the introduction of a bike share system was associated with a reduction in cycling injury risk. Study 2 found that bike share users were less likely than other cyclists to sustain fatal or severe injuries. On a per kilometer basis, bike share is associated with decreased risk of both fatal and non-fatal bicycle crashes when compared to private bike riding. The results of this study suggest that concerns of decreased levels of cycling safety are unjustified and should not prevent decision makers from introducing public bike share schemes, especially if combined with other safety measures like traffic calming. Copyright © 2015 Elsevier Ltd and National Safety Council. All rights reserved.

  2. Crop-emptying rate and the design of pesticide risk assessment schemes in the honey bee and wild bees (Hymenoptera: Apidae).

    Science.gov (United States)

    Fournier, Alice; Rollin, Orianne; Le Féon, Violette; Decourtye, Axel; Henry, Mickaël

    2014-02-01

    Recent scientific literature and reports from official sanitary agencies have pointed out the deficiency of current pesticide risk assessment processes regarding sublethal effects on pollinators. Sublethal effects include troubles in learning performance, orientation skills, or mobility, with possible contribution to substantial dysfunction at population scale. However, the study of sublethal effects is currently limited by considerable knowledge gaps, particularly for the numerous pollinators other than the honey bee Apis mellifera L.--the traditional model for pesticide risk assessment in pollinators. Here, we propose to use the crop-emptying time as a rule of thumb to guide the design of oral exposure experiments in the honey bee and wild bees. The administration of contaminated sucrose solutions is typically followed by a fasting time lapse to allow complete assimilation before the behavioral tests. The fasting duration should at least encompass the crop-emptying time, because no absorption takes place in the crop. We assessed crop-emptying rate in fasted bees and how it relates 1) with sucrose solution concentration in the honey bee and 2) with body mass in wild bees. Fasting duration required for complete crop emptying in honey bees fed 20 microl of a 50% sucrose solution was nearly 2 h. Actual fasting durations are usually shorter in toxicological studies, suggesting incomplete crop emptying, and therefore partial assimilation of experimental solutions that could imply underestimation of sublethal effects. We also found faster crop-emptying rates in large wild bees compared with smaller wild bees, and suggest operative rules to adapt sublethal assessment schemes accordingly.

  3. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  4. Decision Support and Shared Decision Making About Active Surveillance Versus Active Treatment Among Men Diagnosed with Low-Risk Prostate Cancer: a Pilot Study.

    Science.gov (United States)

    Myers, Ronald E; Leader, Amy E; Censits, Jean Hoffman; Trabulsi, Edouard J; Keith, Scott W; Petrich, Anett M; Quinn, Anna M; Den, Robert B; Hurwitz, Mark D; Lallas, Costas D; Hegarty, Sarah E; Dicker, Adam P; Zeigler-Johnson, Charnita M; Giri, Veda N; Ayaz, Hasan; Gomella, Leonard G

    2018-02-01

    This study aimed to explore the effects of a decision support intervention (DSI) and shared decision making (SDM) on knowledge, perceptions about treatment, and treatment choice among men diagnosed with localized low-risk prostate cancer (PCa). At a multidisciplinary clinic visit, 30 consenting men with localized low-risk PCa completed a baseline survey, had a nurse-mediated online DS session to clarify preference for active surveillance (AS) or active treatment (AT), and met with clinicians for SDM. Participants also completed a follow-up survey at 30 days. We assessed change in treatment knowledge, decisional conflict, and perceptions and identified predictors of AS. At follow-up, participants exhibited increased knowledge (p decision. Perceived support of the decision facilitated patient choice of AS.

  5. Pricing schemes for new drugs: a welfare analysis.

    Science.gov (United States)

    Levaggi, Rosella

    2014-02-01

    Drug price regulation is acquiring increasing significance in the investment choices of the pharmaceutical sector. The overall objective is to determine an optimal trade-off between the incentives for innovation, consumer protection, and value for money. However, price regulation is itself a source of distortion. In this study, we examine the welfare properties of listing through a bargaining process and value-based pricing schemes. The latter are superior instruments to uncertain listing processes for maximising total welfare, but the distribution of the benefits between consumers and the industry depends on rate of rebate chosen by the regulator. However, through an appropriate choice, it is always possible to define a value-based pricing scheme with risk sharing, which both consumers and the industry prefer to an uncertain bargaining process. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Assessment of National Health Insurance Scheme's (NHIS) Effectiveness in a Tertiary Teaching Hospital in Southeast Nigeria

    OpenAIRE

    N. Ele Grace; O. Ogbonna Brian; M. Ochei Uche; U. Odili Valentine

    2017-01-01

    Background: The fundamental concept of health insurance is risk sharing and burden bearing. The scheme is undermined by limitations ranging from very frequent use of the services more than necessary by enrollees, to cost escalation, poor management, and skimming. Assessment of services is a quality control measure in patients’ care and service delivery. It helps to identify gaps for improvement of care and services. Objective: This study assessed the effectiveness of NHIS from the perspec...

  7. Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness

    Directory of Open Access Journals (Sweden)

    Nicole A. Buzzetto-More

    2015-05-01

    Full Text Available Empowered by and tethered to ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe online activities of teens and young adults. The following paper presents the findings of a study examining the social networking activities of undergraduate students and also highlights a program to increase awareness of the dangers and safe practices when using and communicating, via social media. According to the survey results, young adults practice risky social networking site (SNS behaviors with most having experienced at least one negative consequence. Further, females were more likely than males to engage in oversharing as well as to have experienced negative consequences. Finally, results of a post-treatment survey found that a targeted program that includes flyers, posters, YouTube videos, handouts, and in-class information sessions conducted at a Mid-Atlantic Historically Black College or University (HBCU increased student awareness of the dangers of social media as well as positively influenced students to practice more prudent online behaviors.

  8. Moving toward comprehensive acute heart failure risk assessment in the emergency department: the importance of self-care and shared decision making.

    Science.gov (United States)

    Collins, Sean P; Storrow, Alan B

    2013-08-01

    Nearly 700,000 emergency department (ED) visits were due to acute heart failure (AHF) in 2009. Most visits result in a hospital admission and account for the largest proportion of a projected $70 billion to be spent on heart failure care by 2030. ED-based risk prediction tools in AHF rarely impact disposition decision making. This is a major factor contributing to the 80% admission rate for ED patients with AHF, which has remained unchanged over the last several years. Self-care behaviors such as symptom monitoring, medication taking, dietary adherence, and exercise have been associated with decreased hospital readmissions, yet self-care remains largely unaddressed in ED patients with AHF and thus represents a significant lost opportunity to improve patient care and decrease ED visits and hospitalizations. Furthermore, shared decision making encourages collaborative interaction between patients, caregivers, and providers to drive a care path based on mutual agreement. The observation that “difficult decisions now will simplify difficult decisions later” has particular relevance to the ED, given this is the venue for many such issues. We hypothesize patients as complex and heterogeneous as ED patients with AHF may need both an objective evaluation of physiologic risk as well as an evaluation of barriers to ideal self-care, along with strategies to overcome these barriers. Combining physician gestalt, physiologic risk prediction instruments, an evaluation of self-care, and an information exchange between patient and provider using shared decision making may provide the critical inertia necessary to discharge patients home after a brief ED evaluation.

  9. Optimization of the fractionated irradiation scheme considering physical doses to tumor and organ at risk based on dose–volume histograms

    Energy Technology Data Exchange (ETDEWEB)

    Sugano, Yasutaka [Graduate School of Health Sciences, Hokkaido University, Kita-12, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0812 (Japan); Mizuta, Masahiro [Laboratory of Advanced Data Science, Information Initiative Center, Hokkaido University, Kita-11, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0811 (Japan); Takao, Seishin; Shirato, Hiroki; Sutherland, Kenneth L. [Department of Radiation Medicine, Graduate School of Medicine, Hokkaido University, Kita-15, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-8638 (Japan); Date, Hiroyuki, E-mail: date@hs.hokudai.ac.jp [Faculty of Health Sciences, Hokkaido University, Kita-12, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0812 (Japan)

    2015-11-15

    Purpose: Radiotherapy of solid tumors has been performed with various fractionation regimens such as multi- and hypofractionations. However, the ability to optimize the fractionation regimen considering the physical dose distribution remains insufficient. This study aims to optimize the fractionation regimen, in which the authors propose a graphical method for selecting the optimal number of fractions (n) and dose per fraction (d) based on dose–volume histograms for tumor and normal tissues of organs around the tumor. Methods: Modified linear-quadratic models were employed to estimate the radiation effects on the tumor and an organ at risk (OAR), where the repopulation of the tumor cells and the linearity of the dose-response curve in the high dose range of the surviving fraction were considered. The minimization problem for the damage effect on the OAR was solved under the constraint that the radiation effect on the tumor is fixed by a graphical method. Here, the damage effect on the OAR was estimated based on the dose–volume histogram. Results: It was found that the optimization of fractionation scheme incorporating the dose–volume histogram is possible by employing appropriate cell surviving models. The graphical method considering the repopulation of tumor cells and a rectilinear response in the high dose range enables them to derive the optimal number of fractions and dose per fraction. For example, in the treatment of prostate cancer, the optimal fractionation was suggested to lie in the range of 8–32 fractions with a daily dose of 2.2–6.3 Gy. Conclusions: It is possible to optimize the number of fractions and dose per fraction based on the physical dose distribution (i.e., dose–volume histogram) by the graphical method considering the effects on tumor and OARs around the tumor. This method may stipulate a new guideline to optimize the fractionation regimen for physics-guided fractionation.

  10. Knowledge Sharing for Disaster Risk Reduction: Insights from a Glacier Lake Workshop in the Ladakh Region, Indian Himalayas

    Directory of Open Access Journals (Sweden)

    Naho Ikeda

    2016-02-01

    Full Text Available Small glacier lakes are distributed in the Ladakh Range in northwestern India. This area has experienced several glacier lake outburst floods (GLOFs since the 1970s, damaging settlements along streams. To reduce GLOF risk through a knowledge-based approach focused on nonstructural measures, we held a workshop in May 2012 for residents of Domkhar Village in the northwestern part of the Ladakh Range. More than 100 villagers participated in the workshop, which conveyed useful disaster information to participants while enabling the researchers to understand local knowledge and beliefs about floods. A survey conducted 3 months later confirmed an improvement in residents’ knowledge of natural disasters. The researchers also learned useful lessons, such as the need to adjust the program design for diverse participants and the importance of clearly communicating disaster risks and supporting local residents’ attempts to incorporate new scientific knowledge into existing local knowledge. Challenges to implementing flood countermeasures in this area included problems relating to land use and emergency communications and the need for coordination of efforts by the government and local residents.

  11. Achieving involvement: process outcomes from a cluster randomized trial of shared decision making skill development and use of risk communication aids in general practice.

    Science.gov (United States)

    Elwyn, G; Edwards, A; Hood, K; Robling, M; Atwell, C; Russell, I; Wensing, M; Grol, R

    2004-08-01

    A consulting method known as 'shared decision making' (SDM) has been described and operationalized in terms of several 'competences'. One of these competences concerns the discussion of the risks and benefits of treatment or care options-'risk communication'. Few data exist on clinicians' ability to acquire skills and implement the competences of SDM or risk communication in consultations with patients. The aims of this study were to evaluate the effects of skill development workshops for SDM and the use of risk communication aids on the process of consultations. A cluster randomized trial with crossover was carried out with the participation of 20 recently qualified GPs in urban and rural general practices in Gwent, South Wales. A total of 747 patients with known atrial fibrillation, prostatism, menorrhagia or menopausal symptoms were invited to a consultation to review their condition or treatments. Half the consultations were randomly selected for audio-taping, of which 352 patients attended and were audio-taped successfully. After baseline, participating doctors were randomized to receive training in (i) SDM skills or (ii) the use of simple risk communication aids, using simulated patients. The alternative training was then provided for the final study phase. Patients were allocated randomly to a consultation during baseline or intervention 1 (SDM or risk communication aids) or intervention 2 phases. A randomly selected half of the consultations were audio-taped from each phase. Raters (independent, trained and blinded to study phase) assessed the audio-tapes using a validated scale to assess levels of patient involvement (OPTION: observing patient involvement), and to analyse the nature of risk information discussed. Clinicians completed questionnaires after each consultation, assessing perceived clinician-patient agreement and level of patient involvement in decisions. Multilevel modelling was carried out with the OPTION score as the dependent variable, and

  12. Patients with first-episode, drug-naive schizophrenia and subjects at ultra-high risk of psychosis shared increased cerebellar-default mode network connectivity at rest.

    Science.gov (United States)

    Wang, Houliang; Guo, Wenbin; Liu, Feng; Wang, Guodong; Lyu, Hailong; Wu, Renrong; Chen, Jindong; Wang, Shuai; Li, Lehua; Zhao, Jingping

    2016-05-18

    Increased cerebellar-default mode network (DMN) connectivity has been observed in first-episode, drug-naive patients with schizophrenia. However, it remains unclear whether increased cerebellar-DMN connectivity starts earlier than disease onset. Thirty-four ultra-high risk (UHR) subjects, 31 first-episode, drug-naive patients with schizophrenia and 37 healthy controls were enrolled for a resting-state scan. The imaging data were analyzed using the seed-based functional connectivity (FC) method. Compared with the controls, UHR subjects and patients with schizophrenia shared increased connectivity between the right Crus I and bilateral posterior cingulate cortex/precuneus and between Lobule IX and the left superior medial prefrontal cortex. There are positive correlations between the right Crus I-bilateral precuneus connectivity and clinical variables (Structured Interview for Prodromal Syndromes/Positive and Negative Symptom Scale negative symptoms/total scores) in the UHR subjects. Increased cerebellar-DMN connectivity shared by the UHR subjects and the patients not only highlights the importance of the DMN in the pathophysiology of psychosis but also may be a trait alteration for psychosis.

  13. Disruption of Fetal Hormonal Programming (Prenatal Stress) Implicates Shared Risk for Sex Differences in Depression and Cardiovascular Disease

    Science.gov (United States)

    Goldstein, JM; Handa, RJ; Tobet, SA

    2014-01-01

    Comorbidity of major depressive disorder (MDD) and cardiovascular disease (CVD) represents the fourth leading cause of morbidity and mortality worldwide, and women have a two times greater risk than men. Thus understanding the pathophysiology has widespread implications for attenuation and prevention of disease burden. We suggest that sex-dependent MDD-CVD comorbidity may result from alterations in fetal programming consequent to the prenatal maternal environments that produce excess glucocorticoids, which then drive sex-dependent developmental alterations of the fetal hypothalamic-pituitary-adrenal (HPA) axis circuitry impacting mood, stress regulation, autonomic nervous system (ANS), and the vasculature in adulthood. Evidence is consistent with the hypothesis that disruptions of pathways associated with gamma aminobutyric acid (GABA) in neuronal and vascular development and growth factors have critical roles in key developmental periods and adult responses to injury in heart and brain. Understanding the potential fetal origins of these sex differences will contribute to development of novel sex-dependent therapeutics. PMID:24355523

  14. Analysis of risk reduction measures applied to shared essential service water systems at multi-unit sites

    International Nuclear Information System (INIS)

    Kohut, P.; Musicki, Z.; Fitzpatrick, R.

    1991-06-01

    This report summarizes a study performed by Brookhaven National Laboratory for the US Nuclear Regulatory Commission in support of the resolution of NRC Generic Issue 130. GI-130 is concerned with the potential core damage vulnerability resulting from failure of the emergency service water (ESW) system in selected multiplant units. These multiplant units are all twin pressurized water reactor designs that have only two ESW pumps per unit (one per train) backed up by a unit crosstie capability. This generic issue applies to seven US sites (14 plants). The study established and analyzed the core damage vulnerability and identified potential improvements for the ESW system. It obtained generic estimates of the risk reduction potential and cost effectiveness of each potential improvement. The analysis also investigated the cost/benefit aspects of selected combinations of potential improvements. 4 figs., 62 tabs

  15. Shared effects of the clusterin gene on the default mode network among individuals at risk for Alzheimer's disease.

    Science.gov (United States)

    Ye, Qing; Su, Fan; Shu, Hao; Gong, Liang; Xie, Chun-Ming; Zhou, Hong; Zhang, Zhi-Jun; Bai, Feng

    2017-05-01

    To explore the common effects of the clusterin (CLU) rs11136000 variant on the default mode network (DMN) in amnestic mild cognitive impairment (aMCI) subjects and remitted geriatric depression (RGD) subjects. Fifty-one aMCI subjects, 38 RGD subjects, and 64 cognitively normal elderly subjects underwent resting-state fMRI scans and neuropsychological tests at both baseline and a 35-month follow-up. Posterior cingulate cortex seed-based functional connectivity (FC) analysis was used to obtain the DMN patterns. A CLU gene×disease×time interaction for aMCI subjects was mainly detected in the core cortical midline structures of the DMN, and the interaction for RGD subjects was mainly detected in the limbic system. However, they overlapped in two frontal regions, where consistent effects of the CLU gene on FC alterations were found between aMCI and RGD groups. Furthermore, the alterations of FC with frontal, parietal, and limbic regions compensated for episodic memory impairments in CLU-CT/TT carriers, while no such compensation was found in CLU-CC carriers. The CLU gene could consistently affect the DMN FC with frontal regions among individuals at risk for Alzheimer's disease, and the CLU-T allele was associated with more compensatory neural processes in DMN changes. © 2017 John Wiley & Sons Ltd.

  16. Impact of renewables on electricity markets – Do support schemes matter?

    International Nuclear Information System (INIS)

    Winkler, Jenny; Gaio, Alberto; Pfluger, Benjamin; Ragwitz, Mario

    2016-01-01

    Rising renewable shares influence electricity markets in several ways: among others, average market prices are reduced and price volatility increases. Therefore, the “missing money problem” in energy-only electricity markets is more likely to occur in systems with high renewable shares. Nevertheless, renewables are supported in many countries due to their expected benefits. The kind of support instrument can however influence the degree to which renewables influence the market. While fixed feed-in tariffs lead to higher market impacts, more market-oriented support schemes such as market premiums, quota systems and capacity-based payments decrease the extent to which markets are affected. This paper analyzes the market impacts of different support schemes. For this purpose, a new module is added to an existing bottom-up simulation model of the electricity market. In addition, different degrees of flexibility in the electricity system are considered. A case study for Germany is used to derive policy recommendations regarding the choice of support scheme. - Highlights: •Renewable support schemes matter regarding the impact on electricity markets. •Market-oriented support schemes reduce the impact on electricity markets. •More flexible electricity systems reduce the need for market participation. •Sliding premiums combine market integration with a productive risk allocation.

  17. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  18. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  19. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  20. Multivariate analysis of structure and contribution per shares made by potential risk factors at malignant neoplasms in trachea, bronchial tubes and lung

    Directory of Open Access Journals (Sweden)

    G.T. Aydinov

    2017-03-01

    Full Text Available The article gives the results of multivariate analysis of structure and contribution per shares made by potential risk factors at malignant neoplasms in trachea, bronchial tubes and lung. The authors used specialized databases comprising personified records on oncologic diseases in Taganrog, Rostov region, over 1986-2015 (30,684 registered cases of malignant neoplasms, including 3,480 cases of trachea cancer, bronchial tubes cancer, and lung cancer. When carrying out analytical research we applied both multivariate statistical techniques (factor analysis and hierarchical cluster correlation analysis and conventional techniques of epidemiologic analysis including etiologic fraction calculation (EF, as well as an original technique of assessing actual (epidemiologic risk. Average long-term morbidity with trachea, bronchial tubes and lung cancer over 2011-2015 amounts to 46.64 o / oooo . Over the last 15 years a stable decreasing trend has formed, annual average growth being – 1.22 %. This localization holds the 3rd rank place in oncologic morbidity structure, its specific weight being 10.02 %. We determined etiological fraction (EF for smoking as a priority risk factor causing trachea, bronchial tubes and lung cancer; this fraction amounts to 76.19 % for people aged 40 and older, and to 81.99 % for those aged 60 and older. Application of multivariate statistical techniques (factor analysis and cluster correlation analysis in this research enabled us to make factor structure more simple; namely, to highlight, interpret, give a quantitative estimate of self-descriptiveness and rank four group (latent potential risk factors causing lung cancer.

  1. Instant Social Ride-Sharing

    OpenAIRE

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben

    2008-01-01

    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  2. Share capitalism and worker wellbeing.

    Science.gov (United States)

    Bryson, Alex; Clark, Andrew E; Freeman, Richard B; Green, Colin P

    2016-10-01

    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the "gift"; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as "bad" aspects of job quality.

  3. Shared epitope alleles remain a risk factor for anti-citrullinated proteins antibody (ACPA--positive rheumatoid arthritis in three Asian ethnic groups.

    Directory of Open Access Journals (Sweden)

    Too Chun-Lai

    Full Text Available BACKGROUND: To investigate the associations between HLA-DRB1 shared epitope (SE alleles and rheumatoid arthritis in subsets of rheumatoid arthritis defined by autoantibodies in three Asian populations from Malaysia. METHODS: 1,079 rheumatoid arthritis patients and 1,470 healthy controls were included in the study. Levels of antibodies to citrullinated proteins (ACPA and rheumatoid factors were assessed and the PCR-SSO method was used for HLA-DRB1 genotyping. RESULTS: The proportion of ACPA positivity among Malay, Chinese and Indian rheumatoid arthritis patients were 62.9%, 65.2% and 68.6%, respectively. An increased frequency of SE alleles was observed in ACPA-positive rheumatoid arthritis among the three Asian ethnic groups. HLA-DRB1*10 was highly associated with rheumatoid arthritis susceptibility in these Asian populations. HLA-DRB1*0405 was significantly associated with susceptibility to rheumatoid arthritis in Malays and Chinese, but not in Indians. HLA-DRB1*01 did not show any independent effect as a risk factor for rheumatoid arthritis in this study and HLA-DRB1*1202 was protective in Malays and Chinese. There was no association between SE alleles and ACPA- negative rheumatoid arthritis in any of the three Asian ethnic groups. CONCLUSION: The HLA-DRB1 SE alleles increase the risk of ACPA-positive rheumatoid arthritis in all three Asian populations from Malaysia.

  4. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  5. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  6. Threshold quantum state sharing based on entanglement swapping

    Science.gov (United States)

    Qin, Huawang; Tso, Raylin

    2018-06-01

    A threshold quantum state sharing scheme is proposed. The dealer uses the quantum-controlled-not operations to expand the d-dimensional quantum state and then uses the entanglement swapping to distribute the state to a random subset of participants. The participants use the single-particle measurements and unitary operations to recover the initial quantum state. In our scheme, the dealer can share different quantum states among different subsets of participants simultaneously. So the scheme will be very flexible in practice.

  7. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  8. Shared familial risk factors between attention-deficit/hyperactivity disorder and overweight/obesity - a population-based familial coaggregation study in Sweden.

    Science.gov (United States)

    Chen, Qi; Kuja-Halkola, Ralf; Sjölander, Arvid; Serlachius, Eva; Cortese, Samuele; Faraone, Stephen V; Almqvist, Catarina; Larsson, Henrik

    2017-06-01

    Despite meta-analytic evidence for the association between attention-deficit/hyperactivity disorder (ADHD) and overweight/obesity, the mechanisms underlying the association are yet to be fully understood. By linking multiple Swedish national and regional registers, we identified 472,735 index males born during 1973-1992, with information on body weight and height directly measured before they were conscripted for military service. We further identified 523,237 full siblings born during 1973-2002 for the index males. All individuals were followed up from their third birthday to December 31, 2009 for ADHD diagnosis. Logistic regression models were used to estimate the association between overweight/obesity in index males and ADHD in their full siblings. Siblings of index males with overweight/obesity had increased risk for ADHD (overweight: OR = 1.14, 95% CI = 1.05-1.24; obesity: OR = 1.42, 95% CI = 1.24-1.63), compared with siblings of index males with normal weight. The results were adjusted for birth year of the index male and sex of the sibling. After further adjustment for ADHD status of the index male, the familial coaggregation remained significant (overweight: OR = 1.13, 95% CI = 1.04-1.22; obesity: OR = 1.38, 95% CI = 1.21-1.57). The results were similar across sex of the siblings. Attention-deficit/hyperactivity disorder and overweight/obesity share familial risk factors, which are not limited to those causing overweight/obesity through the mediation of ADHD. Future research aiming at identifying family-wide environmental risk factors as well as common pleiotropic genetic variants contributing to both traits is warranted. © 2017 Association for Child and Adolescent Mental Health.

  9. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  10. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  11. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  12. Sharing knowledge

    Energy Technology Data Exchange (ETDEWEB)

    2009-07-01

    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  13. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  14. [Susceptibility to strategy of the drug component of the IPHCC+RxGroups classification system in a risk-adjusted morbidity compensation scheme--a conceptional and data-supported analysis].

    Science.gov (United States)

    Behrend, C; Felder, S; Busse, R

    2007-01-01

    A report commissioned by the German Ministry of Health recommends to the existing scheme for calculating risk-adjusted transfers to sickness funds supplement with the IPHCC+RxGroups method. The method is based on inpatient diagnoses and prescribed drugs as health status measures deduced from prior use. The present study investigates the sickness fund's expected net return from gaming based on the drug component of the risk adjuster. The study explores three possible strategies using the RxGroups method. For the stimulations, insurees are assigned to additional indications or to higher valued RxGroups within the same indication. Then, costs and financial benefits attributable to the altered drug use are estimated and compared with the status quo. The study uses 2000 and 2001 sample data of more than 370,000 insurees of Germany's company-based sickness funds system (BKK). While upgrading increases overall costs, it can be beneficial for the individual sickness funds. Their net return crucially depends on the number of sickness funds gaming the system: the more participating in the game, the smaller is the average net return. Moreover, not participating often is even worse, which in turn points to a prisoner's dilemma. When extending the risk adjustment scheme in social health insurance, the German legislator should take into account the perverse incentives of risk adjusters such as the described prescription drug model.

  15. Voluntary Disclosure and Risk Sharing

    NARCIS (Netherlands)

    Suijs, J.P.M.

    2001-01-01

    This paper analyzes the disclosure strategy of firms that face uncertainty regarding the investor's response to a voluntary disclosure of the firm's private information.This paper distinguishes itself from the existing disclosure literature in that firms do not use voluntary disclosures to separate

  16. Connect. Risk. Ask. Share. Lead!

    Science.gov (United States)

    Lieberman, Daina S.

    2014-01-01

    Teachers are encouraged to "Step into Leadership" because they have a lot to offer, but also a lot to learn. However, many teachers need a push to get started on the path to teacher leadership beyond their classroom walls; therefore, this article provides teachers 10 tips on how to get started and where to look to expand their effect on…

  17. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  18. Sharing possibilities amongst CDMA Mobile Satellite Systems, and impacts of terminal characteristics on sharing

    Science.gov (United States)

    Bambace, Luís Antonio Waack; Ceballos, Décio Castilho

    CDMA Mobile Satellite Systems (CDMA MSS) are able to co-directional, co-frequency and co-coverage sharing, and they are strongly interdependent in case of such a sharing. It is also known that the success of any telecommunication project is the use of the correct media to each task. Operators have a clear sight of such a media adequacy in traditional systems, but not necessarily in the case of Mobile Satellite Systems. This creates a risk that a wrong market objective operator causes trouble to other systems. This paper deals with the sharing alternatives for up to four CDMA MSS operating in the same frequency band, and analysts both: satellite to user downlink and user to satellite uplink. The influence of several items in capacity is here treated. The scope includes: downlink power flux density: code availability; single system internal interference; inter-system interference; diversity schemes: average link impairments, margins; user cooperation; terminal specifications and the dependence of the insulation between RHCP and LHCP with fade.

  19. Adipocyte hypertrophy, fatty liver and metabolic risk factors in South Asians: the Molecular Study of Health and Risk in Ethnic Groups (mol-SHARE.

    Directory of Open Access Journals (Sweden)

    Sonia S Anand

    Full Text Available OBJECTIVE: We sought to determine if differences in the distribution and characteristics of adipose tissue between South Asians and white Caucasians account for differences in risk factors for cardiovascular disease. RESEARCH DESIGN AND METHODS: We recruited 108 healthy South Asians (36.8 years and white Caucasians (34.2 years within three BMI strata. Body composition, adipocyte size, abdominal fat area, and hepatic adiposity were assessed and related to fasting glucose, insulin, lipids and adiponectin. RESULTS: After adjustment for age, sex, and BMI, South Asians compared to white Caucasians had higher ln fasting insulin (mean difference (MD: 0.44; 95% CI: 0.20-0.69, lower HDL cholesterol (md: -0.13; 95% CI:-0.26 to -0.01, and lower adiponectin (md: -2.38; 95% CI: -3.59 to -1.17. South Asians also had more body fat (md: 2.69; 95% CI: 0.70 to 4.69, lower lean muscle mass (md: -3.25; 95%CI: -5.35 to -1.14, increased waist to hip ratio (md: 0.03; 95% CI: 0.01-0.05, less superficial subcutaneous abdominal adipose tissue (md: -2.94; 95% CI: -5.56 to-0.32, more deep/visceral to superficial adipose tissue ratio (md 0.34; 95% CI: 0.02 to 0.65, and more liver fat (md: 7.43%; 95% CI: 2.30 to 12.55%. Adipocyte area was increased in South Asians compared to white Caucasians (md: 64.26; 95% CI: 24.3 to 104.1 units(2. Adjustment for adipocyte area attenuated the ethnic differences in insulin (md: 0.22; 95% CI: -0.07 to 0.51, HDL (md: -0.01; 95% CI: -0.16 to 0.13 and adiponectin (md: -1.11; 95% CI: -2.61 to 0.39. Adjustment for differences in adipocyte area and fat distribution attenuated the ethnic difference in liver fat (md: 5.19; 95% CI: 0.31 to 10.06. CONCLUSION: South Asians have an increased adipocyte area compared to white Caucasians. This difference accounts for the ethnic differences in insulin, HDL cholesterol, adiponectin, and ectopic fat deposition in the liver.

  20. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  1. Hybrid Electricity Markets with Long-Term Risk-Sharing Arrangements: Adapting Market Design to Security of Supply and decarbonization Objectives

    International Nuclear Information System (INIS)

    ROQUES, Fabien; FINON, Dominique

    2017-01-01

    The re-emergence of policy interventionism in electricity markets raises questions as to how market design can best be adapted to meeting the investment challenge associated with security of supply (SoS) and decarbonization objectives. This paper takes an institutionalist approach in terms of modularity of the market design, and reviews the standard historical approach towards competitive markets, in order to analyse the roles and interactions of the initial and additional market 'modules'. We argue that a number of additional modules is required to achieve long-term policy objectives, such as decarbonization and security of supply (SoS). But, in turn, they destabilise the initial modules of the market design, in particular by the entries of renewables. We review the international experience with hybrid market design and draw a number of policy recommendations at to best practices, as well as suggesting ways in which the initial market modules can be improved to prevent inconsistencies with the new modules. The move towards a hybrid market regime, which relies on a combination of planning, long-term risk sharing arrangements and improved markets entrenched in a function of short-term coordination, appears to be unavoidable where decarbonization policies are adopted. (authors)

  2. Validation of the total dysphagia risk score (TDRS) in head and neck cancer patients in a conventional and a partially accelerated radiotherapy scheme

    NARCIS (Netherlands)

    Nevens, Daan; Deschuymer, Sarah; Langendijk, Johannes A.; Daisne, Jean -Francois; Duprez, Frederic; De Neve, Wilfried; Nuyts, Sandra

    Background and purpose: A risk model, the total dysphagia risk score (TDRS), was developed to predict which patients are most at risk to develop grade >= 2 dysphagia at 6 months following radiotherapy (RT) for head and neck cancer. The purpose of this study was to validate this model at 6 months and

  3. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  4. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  5. A New Quantum Communication Scheme by Using Bell States

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Jing; Song Heshan

    2006-01-01

    A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).

  6. Efficient schemes for deterministic joint remote preparation of an ...

    Indian Academy of Sciences (India)

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  7. A meta-analysis of genome-wide association scans identifies IL18RAP, PTPN2, TAGAP, and PUS10 as shared risk loci for Crohn's disease and celiac disease.

    Directory of Open Access Journals (Sweden)

    Eleonora A M Festen

    2011-01-01

    Full Text Available Crohn's disease (CD and celiac disease (CelD are chronic intestinal inflammatory diseases, involving genetic and environmental factors in their pathogenesis. The two diseases can co-occur within families, and studies suggest that CelD patients have a higher risk to develop CD than the general population. These observations suggest that CD and CelD may share common genetic risk loci. Two such shared loci, IL18RAP and PTPN2, have already been identified independently in these two diseases. The aim of our study was to explicitly identify shared risk loci for these diseases by combining results from genome-wide association study (GWAS datasets of CD and CelD. Specifically, GWAS results from CelD (768 cases, 1,422 controls and CD (3,230 cases, 4,829 controls were combined in a meta-analysis. Nine independent regions had nominal association p-value <1.0 x 10⁻⁵ in this meta-analysis and showed evidence of association to the individual diseases in the original scans (p-value < 1 x 10⁻² in CelD and < 1 x 10⁻³ in CD. These include the two previously reported shared loci, IL18RAP and PTPN2, with p-values of 3.37 x 10⁻⁸ and 6.39 x 10⁻⁹, respectively, in the meta-analysis. The other seven had not been reported as shared loci and thus were tested in additional CelD (3,149 cases and 4,714 controls and CD (1,835 cases and 1,669 controls cohorts. Two of these loci, TAGAP and PUS10, showed significant evidence of replication (Bonferroni corrected p-values <0.0071 in the combined CelD and CD replication cohorts and were firmly established as shared risk loci of genome-wide significance, with overall combined p-values of 1.55 x 10⁻¹⁰ and 1.38 x 10⁻¹¹ respectively. Through a meta-analysis of GWAS data from CD and CelD, we have identified four shared risk loci: PTPN2, IL18RAP, TAGAP, and PUS10. The combined analysis of the two datasets provided the power, lacking in the individual GWAS for single diseases, to detect shared loci with a

  8. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  9. Drivers of Microbial Risk for Direct Potable Reuse and de Facto Reuse Treatment Schemes: The Impacts of Source Water Quality and Blending

    Science.gov (United States)

    Chaudhry, Rabia M.; Hamilton, Kerry A.; Haas, Charles N.; Nelson, Kara L.

    2017-01-01

    Although reclaimed water for potable applications has many potential benefits, it poses concerns for chemical and microbial risks to consumers. We present a quantitative microbial risk assessment (QMRA) Monte Carlo framework to compare a de facto water reuse scenario (treated wastewater-impacted surface water) with four hypothetical Direct Potable Reuse (DPR) scenarios for Norovirus, Cryptosporidium, and Salmonella. Consumer microbial risks of surface source water quality (impacted by 0–100% treated wastewater effluent) were assessed. Additionally, we assessed risks for different blending ratios (0–100% surface water blended into advanced-treated DPR water) when source surface water consisted of 50% wastewater effluent. De facto reuse risks exceeded the yearly 10−4 infections risk benchmark while all modeled DPR risks were significantly lower. Contamination with 1% or more wastewater effluent in the source water, and blending 1% or more wastewater-impacted surface water into the advanced-treated DPR water drove the risk closer to the 10−4 benchmark. We demonstrate that de facto reuse by itself, or as an input into DPR, drives microbial risks more so than the advanced-treated DPR water. When applied using location-specific inputs, this framework can contribute to project design and public awareness campaigns to build legitimacy for DPR. PMID:28608808

  10. Drivers of Microbial Risk for Direct Potable Reuse and de Facto Reuse Treatment Schemes: The Impacts of Source Water Quality and Blending

    Directory of Open Access Journals (Sweden)

    Rabia M. Chaudhry

    2017-06-01

    Full Text Available Although reclaimed water for potable applications has many potential benefits, it poses concerns for chemical and microbial risks to consumers. We present a quantitative microbial risk assessment (QMRA Monte Carlo framework to compare a de facto water reuse scenario (treated wastewater-impacted surface water with four hypothetical Direct Potable Reuse (DPR scenarios for Norovirus, Cryptosporidium, and Salmonella. Consumer microbial risks of surface source water quality (impacted by 0–100% treated wastewater effluent were assessed. Additionally, we assessed risks for different blending ratios (0–100% surface water blended into advanced-treated DPR water when source surface water consisted of 50% wastewater effluent. De facto reuse risks exceeded the yearly 10−4 infections risk benchmark while all modeled DPR risks were significantly lower. Contamination with 1% or more wastewater effluent in the source water, and blending 1% or more wastewater-impacted surface water into the advanced-treated DPR water drove the risk closer to the 10−4 benchmark. We demonstrate that de facto reuse by itself, or as an input into DPR, drives microbial risks more so than the advanced-treated DPR water. When applied using location-specific inputs, this framework can contribute to project design and public awareness campaigns to build legitimacy for DPR.

  11. Drivers of Microbial Risk for Direct Potable Reuse and de Facto Reuse Treatment Schemes: The Impacts of Source Water Quality and Blending.

    Science.gov (United States)

    Chaudhry, Rabia M; Hamilton, Kerry A; Haas, Charles N; Nelson, Kara L

    2017-06-13

    Although reclaimed water for potable applications has many potential benefits, it poses concerns for chemical and microbial risks to consumers. We present a quantitative microbial risk assessment (QMRA) Monte Carlo framework to compare a de facto water reuse scenario (treated wastewater-impacted surface water) with four hypothetical Direct Potable Reuse (DPR) scenarios for Norovirus, Cryptosporidium , and Salmonella . Consumer microbial risks of surface source water quality (impacted by 0-100% treated wastewater effluent) were assessed. Additionally, we assessed risks for different blending ratios (0-100% surface water blended into advanced-treated DPR water) when source surface water consisted of 50% wastewater effluent. De facto reuse risks exceeded the yearly 10 -4 infections risk benchmark while all modeled DPR risks were significantly lower. Contamination with 1% or more wastewater effluent in the source water, and blending 1% or more wastewater-impacted surface water into the advanced-treated DPR water drove the risk closer to the 10 -4 benchmark. We demonstrate that de facto reuse by itself, or as an input into DPR, drives microbial risks more so than the advanced-treated DPR water. When applied using location-specific inputs, this framework can contribute to project design and public awareness campaigns to build legitimacy for DPR.

  12. Shared decision making

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  13. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  14. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  15. Coordination Scheme for Restructuring Business Operation of the Single Period Newsvendor Problem

    Directory of Open Access Journals (Sweden)

    Chiuh-Cheng Chyu

    2013-01-01

    Full Text Available This paper presents a coordination scheme for a single period newsvendor problem when both supplier and retailer of the supply chain agree to change the business operation from a market decision power sharing system (Model 1 to a unique decision maker system (Model 2. The supplier is assumed to be a risk-averse decision maker and he will undertake the product quality risk in both models. Model 1 is game theoretic, where the supplier controls the wholesale price, but the retailer controls the order quantity and market price. The bargaining process ends when the supplier has found a wholesale price that maximizes the value of his sales revenue minus the product quality cost. Model 2 is a centralized system where the supplier possesses all decision powers of the market. In general, Model 2 will generate higher total revenue than Model 1. The aim of this research is to propose a satisfying compromise based on consignment policy to resolve the revenue-sharing conflict in Model 2 due to the additional revenue. An example is provided to illustrate the two models and the proposed coordination scheme, along with managerial insights on the models’ benefits. The impacts of several parameters on the scheme are also presented and discussed.

  16. Systematic review with meta-analysis: risk factors for non-alcoholic fatty liver disease suggest a shared altered metabolic and cardiovascular profile between lean and obese patients.

    Science.gov (United States)

    Sookoian, S; Pirola, C J

    2017-07-01

    The pathogenesis of non-alcoholic fatty liver disease (NAFLD) is closely associated with the co-occurrence of multiple pathological conditions characterising the metabolic syndrome (MetS), obesity in particular. However, NAFLD also develops in lean subjects, whose risk factors remain poorly defined. We performed a meta-analysis of 15 studies, along with the data pertaining to our own population (n=336 patients). Data from lean (n=1966) and obese (n=5938) patients with NAFLD were analysed; lean (n=9946) and obese (n=6027) subjects without NAFLD served as controls. Relative to the lean non-NAFLD controls, lean patients with NAFLD were older (3.79±0.72 years, P=1.36×10 -6 ) and exhibited the entire spectrum of the MetS risk factors. Specifically, they had a significant (P=10 -10 ) increase in plasma glucose levels (6.44±1.12 mg/dL) and HOMA-IR (0.52±0.094-unit increment), blood lipids (triglycerides: 48.37±3.6, P=10 -10 and total cholesterol: 7.04±3.8, mg/dL, P=4.2×10 -7 ), systolic (5.64±0.7) and diastolic (3.37±0.9) blood pressure (mm Hg), P=10 -10 , and waist circumference (5.88±0.4 cm, P=10 -10 ); values denote difference in means±SE. Nevertheless, the overall alterations in the obese group were much more severe when compared to lean subjects, regardless of the presence of NAFLD. Meta-regression suggested that NAFLD is a modifier of the level of blood lipids. Lean and obese patients with NAFLD share a common altered metabolic and cardiovascular profile. The former, while having normal body weight, showed excess of abdominal adipose tissue as well as other MetS features. © 2017 John Wiley & Sons Ltd.

  17. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  18. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  19. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  20. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  1. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  2. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  3. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  4. Single-Qubit Operation Sharing with Bell and W Product States

    International Nuclear Information System (INIS)

    Ji Qi-Bin; Liu Xian-Song; Yin Xiao-Feng; Zhang Zhan-Jun; Liu Yi-Min

    2013-01-01

    Two tripartite schemes are put forward with shared entanglements and Local Operation and Classical Communication (LOCC) for sharing an operation on a remote target sate. The first scheme uses a Bell and a symmetric W states as quantum channels, while the second replaces the symmetric W state by an asymmetric one. Both schemes are treated and compared from the aspects of quantum resource consumption, operation complexity, classical resource consumption, success probability and efficiency. It is found that the latter scheme is better than the former one. Particularly, the sharing can be achieved only probabilistically with the first scheme deterministically with the second one. (general)

  5. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  6. The Sharing Economy and the Future of Personal Mobility: New Models Based on Car Sharing

    Directory of Open Access Journals (Sweden)

    Olga Novikova

    2017-08-01

    Full Text Available The sharing economy is an emerging phenomenon that shapes the cultural, economic, and social landscape of our modern world. With variations of the concept of the sharing economy emerging in so many fields, the area of shared mobility – the shared use of a motor vehicle, bicycle, or other mode that enables travellers to gain short-term access to transportation modes on an on-demand basis – has developed as the forerunner of the transformation to be expected in other areas. This article examines how the sphere of personal mobility has been affected by the growth of sharing economy. It contributes to the growing body of shared mobility literature by uncovering innovative mobility-based models that represent solutions on the intersection of shared mobility, physical infrastructure, and integrated-mobility schemes.

  7. Evaluation of spot and passive sampling for monitoring, flux estimation and risk assessment of pesticides within the constraints of a typical regulatory monitoring scheme.

    Science.gov (United States)

    Zhang, Zulin; Troldborg, Mads; Yates, Kyari; Osprey, Mark; Kerr, Christine; Hallett, Paul D; Baggaley, Nikki; Rhind, Stewart M; Dawson, Julian J C; Hough, Rupert L

    2016-11-01

    In many agricultural catchments of Europe and North America, pesticides occur at generally low concentrations with significant temporal variation. This poses several challenges for both monitoring and understanding ecological risks/impacts of these chemicals. This study aimed to compare the performance of passive and spot sampling strategies given the constraints of typical regulatory monitoring. Nine pesticides were investigated in a river currently undergoing regulatory monitoring (River Ugie, Scotland). Within this regulatory framework, spot and passive sampling were undertaken to understand spatiotemporal occurrence, mass loads and ecological risks. All the target pesticides were detected in water by both sampling strategies. Chlorotoluron was observed to be the dominant pesticide by both spot (maximum: 111.8ng/l, mean: 9.35ng/l) and passive sampling (maximum: 39.24ng/l, mean: 4.76ng/l). The annual pesticide loads were estimated to be 2735g and 1837g based on the spot and passive sampling data, respectively. The spatiotemporal trend suggested that agricultural activities were the primary source of the compounds with variability in loads explained in large by timing of pesticide applications and rainfall. The risk assessment showed chlorotoluron and chlorpyrifos posed the highest ecological risks with 23% of the chlorotoluron spot samples and 36% of the chlorpyrifos passive samples resulting in a Risk Quotient greater than 0.1. This suggests that mitigation measures might need to be taken to reduce the input of pesticides into the river. The overall comparison of the two sampling strategies supported the hypothesis that passive sampling tends to integrate the contaminants over a period of exposure and allows quantification of contamination at low concentration. The results suggested that within a regulatory monitoring context passive sampling was more suitable for flux estimation and risk assessment of trace contaminants which cannot be diagnosed by spot

  8. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  9. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  10. Switch and examine transmit diversity for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme

  11. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....

  12. Financial Disaster as a Risk Factor for Posttraumatic Stress Disorder: Internet Survey of Trauma in Victims of the Madoff Ponzi Scheme

    Science.gov (United States)

    Freshman, Audrey

    2012-01-01

    There are no known studies to date examining the risk of posttraumatic stress disorder (PTSD) associated with sudden and dramatic personal financial loss. A Web-based, online, nonprobability convenience survey of 172 Madoff victims (56 percent female; mean age, 60.9 years) using the Posttraumatic Stress List Checklist, civilian version was…

  13. Predicting invasions by woody species in a temperate zone: a test of three risk assessment schemes in the Czech Republic (Central Europe)

    Czech Academy of Sciences Publication Activity Database

    Křivánek, Martin; Pyšek, Petr

    2006-01-01

    Roč. 12, - (2006), s. 319-327 ISSN 1366-9516 Institutional research plan: CEZ:AV0Z60050516 Keywords : invasion by woody species * risk assessment * forestry Subject RIV: EF - Botanics Impact factor: 3.441, year: 2006

  14. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  15. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  16. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  17. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  18. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  19. Valuation and Hedging of Variable Annuities in Pension Schemes

    NARCIS (Netherlands)

    Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.

    2018-01-01

    This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable

  20. Social capital and active membership in the Ghana National Health Insurance Scheme - a mixed method study.

    Science.gov (United States)

    Fenenga, Christine J; Nketiah-Amponsah, Edward; Ogink, Alice; Arhinful, Daniel K; Poortinga, Wouter; Hutter, Inge

    2015-11-02

    People's decision to enroll in a health insurance scheme is determined by socio-cultural and socio-economic factors. On request of the National health Insurance Authority (NHIA) in Ghana, our study explores the influence of social relationships on people's perceptions, behavior and decision making to enroll in the National Health Insurance Scheme. This social scheme, initiated in 2003, aims to realize accessible quality healthcare services for the entire population of Ghana. We look at relationships of trust and reciprocity between individuals in the communities (so called horizontal social capital) and between individuals and formal health institutions (called vertical social capital) in order to determine whether these two forms of social capital inhibit or facilitate enrolment of clients in the scheme. Results can support the NHIA in exploiting social capital to reach their objective and strengthen their policy and practice. We conducted 20 individual- and seven key-informant interviews, 22 focus group discussions, two stakeholder meetings and a household survey, using a random sample of 1903 households from the catchment area of 64 primary healthcare facilities. The study took place in Greater Accra Region and Western Regions in Ghana between June 2011 and March 2012. While social developments and increased heterogeneity seem to reduce community solidarity in Ghana, social networks remain common in Ghana and are valued for their multiple benefits (i.e. reciprocal trust and support, information sharing, motivation, risk sharing). Trusting relations with healthcare and insurance providers are, according healthcare clients, based on providers' clear communication, attitude, devotion, encouragement and reliability of services. Active membership of the NHIS is positive associated with community trust, trust in healthcare providers and trust in the NHIS (p-values are .009, .000 and .000 respectively). Social capital can motivate clients to enroll in health insurance

  1. Price Signals from Electricity Markets and Subsidy Schemes for Renewable Sources

    International Nuclear Information System (INIS)

    Sabolic, D.

    2013-01-01

    Increasing share of renewable generation itself gives rise to price risks on the electricity markets. Subsidy schemes, in general, additionally distort price signals produced by economic mechanisms of otherwise free markets. In the electricity industry, subsidy schemes, once designed merely to incentivize electricity system decarbonization in its kick-off phase, seem to have grown to such a volume, that they, too, started to profoundly interfere with the whole market structure, and to distort price signals that used to govern long-term development of an adequately structured generation system. This article was made as an attempt to discuss contemporary electricity system policies in relation to RES integration. The economic relations in the sector are growingly influenced, or sometimes even hard-handedly guided, by political institutions, rather than by economic interests of the investors, which may in turn cause considerable problems in achieving ultimate policy goals due to unsustainability of such an economic arrangement.(author)

  2. California Earthquake Clearinghouse Crisis Information-Sharing Strategy in Support of Situational Awareness, Understanding Interdependencies of Critical Infrastructure, Regional Resilience, Preparedness, Risk Assessment/mitigation, Decision-Making and Everyday Operational Needs

    Science.gov (United States)

    Rosinski, A.; Morentz, J.; Beilin, P.

    2017-12-01

    The principal function of the California Earthquake Clearinghouse is to provide State and Federal disaster response managers, and the scientific and engineering communities, with prompt information on ground failure, structural damage, and other consequences from significant seismic events such as earthquakes and tsunamis. The overarching problem highlighted in discussions with Clearinghouse partners is the confusion and frustration of many of the Operational Area representatives, and some regional utilities throughout the state on what software applications they should be using and maintaining to meet State, Federal, and Local, requirements, and for what purposes, and how to deal with the limitations of these applications. This problem is getting in the way of making meaningful progress on developing multi-application interoperability and the necessary supporting cross-sector information-sharing procedures and dialogue on essential common operational information that entities need to share for different all hazards missions and related operational activities associated with continuity, security, and resilience. The XchangeCore based system the Clearinghouse is evolving helps deal with this problem, and does not compound it by introducing yet another end-user application; there is no end-user interface with which one views XchangeCore, all viewing of data provided through XchangeCore occurs in and on existing, third-party operational applications. The Clearinghouse efforts with XchangeCore are compatible with FEMA, which is currently using XchangeCore-provided data for regional and National Business Emergency Operations Center (source of business information sharing during emergencies) response. Also important, and should be emphasized, is that information-sharing is not just for response, but for preparedness, risk assessment/mitigation decision-making, and everyday operational needs for situational awareness. In other words, the benefits of the Clearinghouse

  3. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  4. Public policy and risk financing strategies for global catastrophe risk management - the role of global risk initiatives

    Science.gov (United States)

    McSharry, Patrick; Mitchell, Andrew; Anderson, Rebecca

    2010-05-01

    Decision-makers in both public and private organisations depend on accurate data and scientific understanding to adequately address climate change and the impact of extreme events. The financial impacts of catastrophes on populations and infrastructure can be offset through effective risk transfer mechanisms, structured to reflect the specific perils and levels of exposure to be covered. Optimal strategies depend on the likely socio-econonomic impact, the institutional framework, the overall objectives of the covers placed and the level of both the frequency and severity of loss potential expected. The diversity of approaches across different countries has been documented by the Spanish "Consorcio de Compensación de Seguros". We discuss why international public/private partnerships are necessary for addressing the risk of natural catastrophes. International initiatives such as the Global Earthquake Model (GEM) and the World Forum of Catastrophe Programmes (WFCP) can provide effective guidelines for constructing natural catastrophe schemes. The World Bank has been instrumental in the creation of many of the existing schemes such as the Turkish Catastrophe Insurance Pool, the Caribbean Catastrophe Risk Insurance Facility and the Mongolian Index-Based Livestock Insurance Program. We review existing schemes and report on best practice in relation to providing protection against natural catastrophe perils. The suitability of catastrophe modelling approaches to support schemes across the world are discussed and we identify opportunities to improve risk assessment for such schemes through transparent frameworks for quantifying, pricing, sharing and financing catastrophe risk on a local and global basis.

  5. Shared breastfeeding in central Africa

    NARCIS (Netherlands)

    Ramharter, Michael; Chai, Sanders K.; Adegnika, Ayola A.; Klöpfer, Anna; Längin, Matthias; Agnandji, Selidji T.; Oyakhirome, Sunny; Schwarz, Norbert G.; Grobusch, Martin P.; Issifou, Saadon; Kremsner, Peter G.

    2004-01-01

    In this study, shared breastfeeding is described asa novel risk factor for vertical HIV transmission. This cross-sectional survey conducted in the central African country Gabon found that 40% of lactating mothers also breastfed other children than their own, and as many children were additionally

  6. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  7. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  8. Bed-sharing in the absence of hazardous circumstances: is there a risk of sudden infant death syndrome? An analysis from two case-control studies conducted in the UK.

    Directory of Open Access Journals (Sweden)

    Peter S Blair

    Full Text Available The risk of sudden infant death syndrome (SIDS among infants who co-sleep in the absence of hazardous circumstances is unclear and needs to be quantified.Combined individual-analysis of two population-based case-control studies of SIDS infants and controls comparable for age and time of last sleep.Parents of 400 SIDS infants and 1386 controls provided information from five English health regions between 1993-6 (population: 17.7 million and one of these regions between 2003-6 (population:4.9 million.Over a third of SIDS infants (36% were found co-sleeping with an adult at the time of death compared to 15% of control infants after the reference sleep (multivariate OR = 3.9 [95% CI: 2.7-5.6]. The multivariable risk associated with co-sleeping on a sofa (OR = 18.3 [95% CI: 7.1-47.4] or next to a parent who drank more than two units of alcohol (OR = 18.3 [95% CI: 7.7-43.5] was very high and significant for infants of all ages. The risk associated with co-sleeping next to someone who smoked was significant for infants under 3 months old (OR = 8.9 [95% CI: 5.3-15.1] but not for older infants (OR = 1.4 [95% CI: 0.7-2.8]. The multivariable risk associated with bed-sharing in the absence of these hazards was not significant overall (OR = 1.1 [95% CI: 0.6-2.0], for infants less than 3 months old (OR = 1.6 [95% CI: 0.96-2.7], and was in the direction of protection for older infants (OR = 0.1 [95% CI: 0.01-0.5]. Dummy use was associated with a lower risk of SIDS only among co-sleepers and prone sleeping was a higher risk only among infants sleeping alone.These findings support a public health strategy that underlines specific hazardous co-sleeping environments parents should avoid. Sofa-sharing is not a safe alternative to bed-sharing and bed-sharing should be avoided if parents consume alcohol, smoke or take drugs or if the infant is pre-term.

  9. Regulatory aspects, an important factor for geothermal energy application for district heating development. European insurance scheme to cover geological risk related to geothermal operations

    International Nuclear Information System (INIS)

    Popovski, Kiril

    2000-01-01

    District heating is one of the most interesting fields of geothermal energy application development in Europe. However, besides the technical/technological/economical and organizational aspects of the problem in question, the related legal and regulatory aspects influence very much the real possibilities for wider introduction of this energy source in the state energy balances in most of the countries. Based on the official EU report for the State-of-the-art of the problem of the insurance to cover geological risks and necessary aspects to be developed and resolved in a better and 'common' way in order to enable higher investments in bigger projects (district heating) development, the paper presents the situation in different European countries in relation to the Macedonian one. Conclusions extracted should give a positive contribution to the process of the Macedonian laws accommodation to the common EU practice. (Author)

  10. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  11. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  12. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  13. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  14. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang

    2012-09-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  15. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  16. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  17. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  18. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  19. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  20. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  1. On multiuser switched diversity transmission for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users share the spectrum with primary users. In particular, we devise two schemes for selecting the user among those that satisfy the interference constraints and achieve an acceptable signal-to-noise ratio (SNR) level. The first scheme selects the user with the maximum SNR at the receiver, whereas in the second scheme the users are scanned in a sequential manner until an acceptable user is found. In addition, we consider two power adaptive settings. In the on/off power adaptive setting, the users transmit based on whether the interference constraint is met or not while in the full power adaptive setting, the users vary their transmission power to satisfy the interference constraint. Finally, we present numerical results of our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load of both schemes. © 2012 ICST.

  2. Determinants of attitudes to risk in Europeans : an empirical analysis based on Survey of Health, Ageing and Retirement in Europe (SHARE)

    OpenAIRE

    Madeira, Inês Margarida Pereira

    2012-01-01

    Mestrado em Finanças Esta tese investiga os determinantes da atitude face ao risco financeiro dos idosos europeus no contexto da Household Finance. Após a análise da literatura relevante, foram testados empiricamente os determinantes da atitude em relação ao risco com base nos dados do Survey of Health, Ageing and Retirement in Europe (SHARE) 2006/2007 de 14 países (N=17.587 observações de indivíduos entre os 50 e os 86 anos). Várias especificações foram testadas usando a modelação Probit,...

  3. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  4. Dynamic droop scheme considering effect of intermittent renewable energy source

    DEFF Research Database (Denmark)

    Wang, Yanbo; Chen, Zhe; Deng, Fujin

    2016-01-01

    This paper presents a dynamic droop control scheme for islanded microgrids dominated by intermittent renewable energy sources, which is able to perform desirable power sharing in the presence of renewable energy source fluctuation. First, allowable maximum power points of wind generator and PV...... flexibility and effectiveness in the presence of the renewable energy sources fluctuation....... controller of each DG unit is activated through local logic variable inferred by wind speed and solar insolation information. Simulation results are given for validating the droop control scheme. The proposed dynamic droop scheme preserves the advantage of conventional droop control method, and provides...

  5. A New Quantum Secure Direct Communication Scheme with Authentication

    International Nuclear Information System (INIS)

    Dan, Liu; Chang-Xing, Pei; Dong-Xiao, Quan; Nan, Zhao

    2010-01-01

    A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting

  6. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  7. Consideration of the FQPA Safety Factor and Other Uncertainty Factors in Cumulative Risk Assessment of Chemicals Sharing a Common Mechanism of Toxicity

    Science.gov (United States)

    This guidance document provides OPP's current thinking on application of the provision in FFDCA about an additional safety factor for the protection of infants and children in the context of cumulative risk assessments.

  8. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  9. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  10. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2014-01-01

    attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption......In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  11. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  12. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  13. Job Sharing in Education.

    Science.gov (United States)

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  14. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  15. The lipidome in major depressive disorder: Shared genetic influence for ether-phosphatidylcholines, a plasma-based phenotype related to inflammation, and disease risk.

    Science.gov (United States)

    Knowles, E E M; Huynh, K; Meikle, P J; Göring, H H H; Olvera, R L; Mathias, S R; Duggirala, R; Almasy, L; Blangero, J; Curran, J E; Glahn, D C

    2017-06-01

    The lipidome is rapidly garnering interest in the field of psychiatry. Recent studies have implicated lipidomic changes across numerous psychiatric disorders. In particular, there is growing evidence that the concentrations of several classes of lipids are altered in those diagnosed with MDD. However, for lipidomic abnormalities to be considered potential treatment targets for MDD (rather than secondary manifestations of the disease), a shared etiology between lipid concentrations and MDD should be demonstrated. In a sample of 567 individuals from 37 extended pedigrees (average size 13.57 people, range=3-80), we used mass spectrometry lipidomic measures to evaluate the genetic overlap between twenty-three biologically distinct lipid classes and a dimensional scale of MDD. We found that the lipid class with the largest endophenotype ranking value (ERV, a standardized parametric measure of pleiotropy) were ether-phosphodatidylcholines (alkylphosphatidylcholine, PC(O) and alkenylphosphatidylcholine, PC(P) subclasses). Furthermore, we examined the cluster structure of the twenty-five species within the top-ranked lipid class, and the relationship of those clusters with MDD. This analysis revealed that species containing arachidonic acid generally exhibited the greatest degree of genetic overlap with MDD. This study is the first to demonstrate a shared genetic etiology between MDD and ether-phosphatidylcholine species containing arachidonic acid, an omega-6 fatty acid that is a precursor to inflammatory mediators, such as prostaglandins. The study highlights the potential utility of the well-characterized linoleic/arachidonic acid inflammation pathway as a diagnostic marker and/or treatment target for MDD. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  16. Beslissingsprocessen van verkeersdeelnemers : covernota bij de rapporten van W.H. Janssen: "Risk compensation and the effect of an incentive : a laboratory study" (IFZ 1988 C-26), "An experimental evaluation of safety incentive schemes" (IZF 1989 C-19), en "Seat belt wearing and driving behaviour : an empirical investigation" (IZF 1991 C-15).

    NARCIS (Netherlands)

    Levelt, P.B.M.

    1993-01-01

    This cover note comments on the following three TNO Institute for Perception (IZF) Reports: (1) "Risk compensation and the effect of an incentive: a laboratory study"; (2) "An experimental evaluation of safety incentive schemes"; and (3) "Seat belt wearing and driving behaviour: an empirical

  17. Job Sharing in Geography.

    Science.gov (United States)

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  18. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  19. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  20. Bike sharing: A review of evidence on impacts and processes of implementation and operation

    OpenAIRE

    Ricci, M.

    2015-01-01

    Despite the growing popularity of bike sharing, there is a lack of in-depth impact and process evaluations of existing schemes, especially with regard to measuring the ‘success’ of a scheme against its original objectives. This paper is concerned with identifying and critically interpreting the available evidence on bike sharing to date, on both impacts and processes of implementation and operation. The growing yet limited evidence base suggests that bike sharing can increase cycling levels b...

  1. Testing for Expected Return and Market Price of Risk in Chinese A-B Share Market: A Geometric Brownian Motion and Multivariate GARCH Model Approach

    DEFF Research Database (Denmark)

    Zhu, Jie

    There exist dual-listed stocks which are issued by the same company in some stock markets. Although these stocks bare the same firm-specific risk and enjoy identical dividends and voting policies, they are priced differently. Some previous studies show this seeming deviation from the law of one p...

  2. Sharing family and household:

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  3. Bank Share Prices and Profitability

    OpenAIRE

    Daniel Daugaard; Tom Valentine

    1993-01-01

    This paper considers the influence of economic conditions and financial markets on Australian bank share prices and profitability. It uses time series analysis to obtain an indication of the effectiveness of banks in managing their exposure to interest rates and exchange rates. The results give rise to some comments on the extent to which banks actively manage their exposure to financial and economic variables. The discussion of risk management activities necessarily raises the question of ho...

  4. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  5. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  6. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  7. "It would be weird to have that on Facebook": young people's use of social media and the risk of sharing sexual health information.

    Science.gov (United States)

    Byron, Paul; Albury, Kath; Evers, Clifton

    2013-05-01

    In today's media environment, information is not simply passed from producers to consumers, but is mediated by participants of new media cultures, including information on sexual health. In focus groups held in Sydney and regional Australia in 2011, we asked young people aged 16-22 about the potential for sexual health promotion via Facebook and other social media. Our findings point to the complex ways in which young people use social media, and the unlikelihood of traditional take-home sexual health messages having traction in social media spaces. Five key aspects which emerged were: the participatory culture of social network sites; the stigma of sexual health, especially sexually transmitted infections (STIs); young people's careful presentations of self; privacy concerns; and the importance of humour in sexual health messaging. Fears of bullying and gossip (or 'drama') were also likely to prevent the dissemination of sexual health messages in this environment. However, humorous online videos were noted by participants as a significant way to avoid stigma and enable the sharing of sexual health information. The young people in our study were interested in sexual health information, but did not want to access it at the cost of their own sense of comfort and belonging in their social networks. Any sexual health promotion within these sites must be understood as a site-specific intervention. Copyright © 2013 Reproductive Health Matters. Published by Elsevier Ltd. All rights reserved.

  8. Cost-prioritized droop schemes for autonomous microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop schemes for parallel source control usually aims for proportional power sharing tuned in accordance to the source ratings. This works fine for sources with close similarity, but not really for an autonomous microgrid where different types of Distributed Generators (DGs) may be present without...

  9. System for Capturing/Storage/Retrieval/Sharing of Toxicological Information Required for Rapid Assessment of Risks Posed By Release of CBRN Materials in the Environment

    International Nuclear Information System (INIS)

    Taylor, M. L.; Ritondo, M.; Earp Singer, L.; Rogers, J. V.; Price, J. A.; Fleming, E. J.; Chappie, D.; McGonigle, D.; Nichols, T. L.; Sonich-Mullin, C.

    2007-01-01

    The Threat and Consequence Assessment Division (TCAD) of the U.S. Environmental Protection Agency's (EPA) National Homeland Security Research Center (NHSRC) is developing methodology for performing rapid risk assessments needed for incident management, cleanup, and mitigation of hazards in the aftermath of a terrorist event. TCAD, working with the Department of Defense's Chemical and Biological Defense Information Analysis Center (CBIAC, operated by Battelle) has developed SERRA - Support for Environmental Rapid Risk Assessment. This paper describes the methodology utilized to formulate SERRA, presents current contents of the SERRA database (information derived from assessments of over 3,000 publications selected from 10,000 citations), and describes SERRA implementation. The paper also discusses how an Internet-accessible version of the SERRA database could be utilized by a country or countries to prepare for and respond to the intentional release of chemical, biological or radiological materials.(author)

  10. .: Risk sharing in the paper ticket distribution system on the example of municipal transport union of the upper Silesian industrial district in Katowice

    OpenAIRE

    Anna URBANEK

    2015-01-01

    Properly organized ticket distribution is a crucial tool to realize tariff policy of public passenger transport provider in the given area, as well as the factor influencing the ticket sale profits. Providing the proper accessibility of public communication ticket sale network requires signing contracts with third parties, which is consequently connected with the necessity to divide the tasks and responsibilities among them, which generates certain risk for each of the parties. In the article...

  11. 我国股权众筹的风险分析与监管制度研究%Risk Analysis and Regulatory System Research on Chinese Share Crowdfunding

    Institute of Scientific and Technical Information of China (English)

    刘占辉

    2016-01-01

    Share crowdfunding is developing rapidly in recent years, but there are still many problems and risks in practice to restrict its further development, for example legal restriction, information asymmetry, platform risk, lack of exit mechanism, the rights and interests of small shareholders difficult to guarantee and so on. To solve the problems, we should use for reference the foreign regulatory experience of share crowdfunding to establish the Small Exemption System to facilitate enterprise financing, at the same time, by limiting the amount of investment of investors, implementing classification information disclosure, introducing the ADR mechanism, setting up investment hesitant period, improving and perfecting the exit mechanism, implementing platform licensing system and multi-level supervision to strengthen investor protection, perfect the regulatory system of share crowdfunding, and promote the healthy development of share crowdfunding.%我国股权众筹近年来发展迅速,但在实践中仍面临着法律制约、信息不对称、平台风险、缺乏退出机制、中小股东权益难以保障等诸多问题和风险,制约其进一步有序发展。为此,应借鉴国外股权众筹监管制度经验,在设立小额豁免制度便利企业融资的同时,通过限制投资者投资额度、实行信息分级披露、引入替代性纠纷解决机制、设置投资犹豫期、完善股权众筹的退出机制、实行平台许可准入制度和分层监管等措施来加强投资者保护,完善我国股权众筹的监管制度体系,促进股权众筹的良性发展。

  12. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  13. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  14. Job sharing. Part 1.

    Science.gov (United States)

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  15. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  16. BBSRC Data Sharing Policy

    OpenAIRE

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  17. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  18. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  19. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  20. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  1. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  2. Share your sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  3. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  4. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  5. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  6. Asignación óptima de capital en base al perfil de riesgo de las instituciones de inversión colectiva: una aplicación de las medidas de riesgo distorsionadas || Optimal Capital Allocation Based on the Risk Profile of Collective Investment Schemes: An Application of Distortion Risk Measures

    Directory of Open Access Journals (Sweden)

    Belles-Sampera, Jaume

    2013-01-01

    the liquidity coefficients of Collective Investment Schemes (IIC belonging to a Management Company of Collective Investment Schemes. In this new context, the risk undertaken by each IIC is assessed with alternative distortion risk measures. We develop a fictitious case where results suggest that the risk profile of institutions should be a key factor to determine liquidity coefficients in order to not penalize conservative strategies.

  7. The Effect of a Patient-Provider Educational Intervention to Reduce At-Risk Drinking on Changes in Health and Health-Related Quality of Life Among Older Adults: The Project SHARE Study.

    Science.gov (United States)

    Barnes, Andrew J; Xu, Haiyong; Tseng, Chi-Hong; Ang, Alfonso; Tallen, Louise; Moore, Alison A; Marshall, Deborah C; Mirkin, Michelle; Ransohoff, Kurt; Duru, O Kenrik; Ettner, Susan L

    2016-01-01

    At-risk drinking, defined as alcohol use that is excessive or potentially harmful in combination with select comorbidities or medications, affects about 10% of older adults in the United States and is associated with higher mortality. The Project SHARE intervention, which uses patient and provider educational materials, physician counseling, and health educator support, was designed to reduce at-risk drinking among this vulnerable population. Although an earlier study showed that this intervention was successful in reducing rates of at-risk drinking, it is unknown whether these reductions translate into improved health and health-related quality of life (HRQL). The aim of this study was to examine changes in health and HRQL of older adult at-risk drinkers resulting from a patient-provider educational intervention. A randomized controlled trial to compare the health and HRQL outcomes of patients assigned to the Project SHARE intervention vs. care as usual at baseline, 6- and 12-months post assignment. Control patients received usual care, which may or may not have included alcohol counseling. Intervention group patients received a personalized patient report, educational materials on alcohol and aging, a brief provider intervention, and a telephone health educator intervention. Current drinkers 60years and older accessing primary care clinics around Santa Barbara, California (N=1049). Data were collected from patients using baseline, 6- and 12-month mail surveys. Health and HRQL measures included mental and physical component scores (MCS and PCS) based on the Short Form-12v2 (SF-12v2), the SF-6D, which is also based on the SF-12, and the Geriatric Depression Scale (GDS). Adjusted associations of treatment assignment with these outcomes were estimated using generalized least squares regressions with random provider effects. Regressions controlled for age group, sex, race/ethnicity, marital status, education, household income, home ownership and the baseline value of

  8. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  9. 海洛因静脉吸毒者共用针具行为检出率及危险因素%Needle-sharing behavior among intravenous heroin users:prevalence and risk factors

    Institute of Scientific and Technical Information of China (English)

    张现国; 高艳杰; 张宝华; 方强; 范强; 钟宝亮; 禚传君

    2015-01-01

    Objective To investigate the prevalence and risk factors of needle-sharing behavior among intravenous drug users (IDUs).Methods Data regarding socio-demographics,drug abuse characteristics and HIV related health literacy of 474 heroin IDUs were collected.Antisocial personality disorder of IDUs was diagnosed through Mini international neuropsychiatric interview.Results The prevalence of needle sharing among IDUs was 53.8%.Needle-sharing behavior of IDUs was significantly associated with male gender,marital status of being single and separated/divorced,local dwelling,an early age of first drug abuse and antisocial personality disorder (OR =1.11 ~ 6.69,P<0.05).Conclusion Heroin IDUs have high prevalence of needle sharing.A comprehensive social,behavior and psychology based intervention is needed to effectively prevent HIV infection in IDUs.%目的 探讨海洛因静脉吸毒者共用针具行为的检出率及危险因素.方法 调查474例海洛因静脉吸毒者(IDUs)的社会人口学特征、吸毒特征和HIV知识知晓情况,并用简明国际神经精神访谈诊断IDUs的反社会人格障碍.结果 海洛因IDUs共用针具行为检出率为53.8%,IDUs共用针具吸毒的危险因素为男性、未婚、离异或丧偶、本地户籍、开始吸毒年龄小和反社会人格障碍(OR=1.11~6.69,P<0.05).结论 海洛因IDUs共用针具行为检出率高,有必要采取综合性的社会-行为-心理干预才能有效预防IDUs感染HIV.

  10. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  11. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  12. NCSU Reactor Sharing Program

    International Nuclear Information System (INIS)

    Perez, P.B.

    1993-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  13. 'An Arena for Sharing'

    DEFF Research Database (Denmark)

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  14. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  15. To share or not to share? Expected pros and cons of data sharing in radiological research.

    Science.gov (United States)

    Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni

    2018-06-01

    The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.

  16. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  17. Sharing Rare Attitudes Attracts.

    Science.gov (United States)

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  18. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  19. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  20. Heuristic methods for shared backup path protection planning

    DEFF Research Database (Denmark)

    Haahr, Jørgen Thorlund; Stidsen, Thomas Riis; Zachariasen, Martin

    2012-01-01

    schemes are employed. In contrast to manual intervention, automatic protection schemes such as Shared Backup Path Protection (SBPP) can recover from failure quickly and efficiently. SBPP is a simple but efficient protection scheme that can be implemented in backbone networks with technology available...... present heuristic algorithms and lower bound methods for the SBPP planning problem. Experimental results show that the heuristic algorithms are able to find good quality solutions in minutes. A solution gap of less than 3.5% was achieved for more than half of the benchmark instances (and a gap of less...

  1. Heuristic methods for single link shared backup path protection

    DEFF Research Database (Denmark)

    Haahr, Jørgen Thorlund; Stidsen, Thomas Riis; Zachariasen, Martin

    2014-01-01

    schemes are employed. In contrast to manual intervention, automatic protection schemes such as shared backup path protection (SBPP) can recover from failure quickly and efficiently. SBPP is a simple but efficient protection scheme that can be implemented in backbone networks with technology available...... heuristic algorithms and lower bound methods for the SBPP planning problem. Experimental results show that the heuristic algorithms are able to find good quality solutions in minutes. A solution gap of less than 3.5 % was achieved for 5 of 7 benchmark instances (and a gap of less than 11 % for the remaining...

  2. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  3. Protection of Cultural Heritage in Urban Areas during Peace and Conflict Times from Threats to Risk Preparedness as a Shared Responsibility

    Science.gov (United States)

    Cimino, C.

    2013-07-01

    In times of economic hardship, the support given by specialized civil society organisations to public institutions in the protection of cultural heritage has often proved very useful, and there is evidence that their contribution is essential in times of conflicts and natural disasters, if well-designed plans and measures are organized efficiently, thoroughly tested and properly implemented. The 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict (HC), its two Protocols and other international juridical instruments address these situations since decades, however, they remained widely not-applied in absence of proper regulatory instruments. In 2004, the Second Protocol of the Hague Convention (1999HP) entered into force and the Committee of the State Parties was formed. It became clear that a new trend started when, in 2009, draft Guidelines for the implementation of the 1999HP were issued. Meanwhile, WATCH, in partnership with the Council of the United Municipalitities of Jbail (Lebanon) and the Head of the Municipality of Mtskheta (Georgia) prepared a project proposal aimed to set a precedent in the governance of urban sites that are registered in the World Heritage List which are at risk of armed conflict. The project War Free World Heritage Listed Cities http://www.warfreeheritage.net/ was co-financed in 2010 with a grant within the framework of the EC CIUDAD programme and it is currently at an advanced level of implementation. This presentation will focus on achievements and contingencies faced during implementation as well as lessons learned that could be surely useful for pers pective applicants.

  4. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  5. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  6. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  7. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  8. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  9. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  10. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  11. Report endorses data sharing

    Science.gov (United States)

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  12. The production sharing contract in Indonesia

    International Nuclear Information System (INIS)

    Machmud, T.N.

    1994-01-01

    The basic concept of production sharing is that the petroleum resource is owned and controlled by the host country while all cost and risk of exploration are borne by the contractor who is freely allowed to lift his share of petroleum. The first Production Sharing Contract (PSC) was established by the government of Indonesia in 1967 and has since become an accepted pattern for petroleum exploration and exploitation agreements between host governments and private oil companies in many developing countries in addition to Indonesia. The history of the PSC in Indonesia is briefly reviewed and a new incentive package and new contractual arrangements for gas developments are discussed. (UK)

  13. A virtual network computer's optical storage virtualization scheme

    Science.gov (United States)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  14. Sharing best practice in partnerships

    DEFF Research Database (Denmark)

    Mosgaard, Mette; Remmen, Arne; Pedersen, Claus Stig

    In this paper, the promotion of sustainable products through the sharing of best practices in product chains is examined. The general understanding is that the interactions in the supply chain are changing from a traditional focus on the supply of goods “just in time” towards a focus on value...... creation for the different stakeholders and closer collaboration and communication between manufacturers, suppliers, consumers, and retailers. Supply Chain Management can be divided into two main categories with rather different focus areas: ”risk minimization” related to environmental and social impacts...... of and demand for sustainable products – in other words the creation of new markets....

  15. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  16. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  17. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  18. A Sharing Proposition.

    Science.gov (United States)

    Sturgeon, Julie

    2002-01-01

    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  19. Pricing Shared Appreciation Mortgages

    OpenAIRE

    Zhong, Yina

    2006-01-01

    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  20. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  1. SharePoint governance

    OpenAIRE

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  2. A quantitative study on factors influencing enrolment of dairy farmers in a community health insurance scheme.

    Science.gov (United States)

    Greef, Tineke de Groot-de; Monareng, Lydia V; Roos, Janetta H

    2016-12-09

    Access to affordable and effective health care is a challenge in low- and middle- income countries. Out-of-pocket expenditure for health care is a major cause of impoverishment. One way to facilitate access and overcome catastrophic expenditure is through a health insurance mechanism, whereby risks are shared and financial inputs pooled by way of contributions. This study examined factors that influenced the enrolment status of dairy farmers in Western Kenya to a community health insurance (CHI) scheme. Quantitative, cross-sectional research was used to describe factors influencing the enrolment in the CHI scheme. Quota and convenience sampling was used, recruiting a sample of 135 farmers who supply milk to a dairy cooperation. Data were collected using a structured interview schedule and analysed using Stata SE, Data Analysis and Statistical Software, Version 12. Factors influencing non-enrolment were identified as affordability (40%; n = 47), unfamiliarity with the management of the scheme (37%; n = 44) and a lack of understanding about the scheme (41%; n = 48). An exploratory factor analysis was used to reduce the variables to two factors: information provision and understanding community health insurance (CHI). Logistic regression identified factors associated with enrolment in the Tanykina Community Healthcare Plan (TCHP). Supplies of less than six litres of milk per day (OR: 0.22; 95% CI: 0.06-0.84) and information provision (OR: 8.77; 95% CI: 2.25-34.16) were significantly associated with enrolment in the TCHP. Nearly 30% (29.6%; n = 40) of the respondents remarked that TCHP is expensive and 17% (n = 23) asked for more education on CHI and TCHP in an open-ended question. Recommendations related to marketing strategies, financial approach, information provision and further research were outlined to be made to the management of the TCHP as well as to those involved in public health.

  3. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  4. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  5. Impact of global investment processes on ukrainian share market

    Directory of Open Access Journals (Sweden)

    O.К. Zotsenko

    2015-03-01

    Full Text Available The paper investigates the effects of financial and investment processes on the Ukrainian share market. The research analyzed and estimated investment climate in Ukraine. The study highlights a comparison of the domestic share market with share markets of other countries. In terms of share capitalization of listed companies in the GDP determined that equity is the most developed in the USA and UK. Largest share markets with highest capitalization rate characterized. The regional distribution of the share market capitalization by continents are shown. The study of the dynamics of Ukrainian and global share indexes revealed that the Ukrainian share market indexes show a constant volatility and unpredictability. Correlation Ukrainian stock indexes with indexes in Europe, Russia and America is very weak, which is a very negative trend of the stock market of Ukraine. The key problems and risks of the domestic investments are defined which are consequences of downturn in the Ukrainian share market.

  6. Infotech. Cyber security. Health care learns to share scares and solutions.

    Science.gov (United States)

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.

  7. Classification of cognitive systems dedicated to data sharing

    Science.gov (United States)

    Ogiela, Lidia; Ogiela, Marek R.

    2017-08-01

    In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and cryptographic threshold schemes will be used to improve processes of secure and efficient information management with application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information management and encryption will be also described.

  8. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  9. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  10. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  11. Sharing risk and reward - floating production contractorship

    International Nuclear Information System (INIS)

    Gisvold, K.M.

    1994-01-01

    The conference paper summarizes the contractual experience so far gained on Petrojarl 1 floating production system and the associated shuttling services on the Norwegian continental shelf. The paper attempts to draw some lines into the future with respect to development of the business format and the evolution of the relationship between the contractor and the various oil companies in question. Turnkey production services as well as transport and project services to the oil industry are provided. The scope of these services ranges from top of the sea bed wellhead to quayside at the refinery, and is based on ownership control of the employed vessels as well as complete manning of all services. 7 figs

  12. Labia Majora Share

    Directory of Open Access Journals (Sweden)

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  13. Collaborate, compete and share

    Science.gov (United States)

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano

    2009-02-01

    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  14. A GPS-Based Control Framework for Accurate Current Sharing and Power Quality Improvement in Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Savaghebi, Mehdi; Lu, Dylan

    2017-01-01

    This paper proposes a novel hierarchical control strategy for improvement of load sharing and power quality in ac microgrids. This control framework is composed of a droop based controller at the primary level, and a combination of distributed power sharing and voltage conditioning schemes...... consensus protocol to ensure proportional sharing of average power. The voltage conditioning scheme produces compensation signals at fundamental and dominant harmonics to improve the voltage quality at a sensitive load bus. Experimental results are presented to validate the efficacy of the proposed method....... dynamic response. The droop coefficient, which acts as a virtual resistance is adaptively changed as a function of the peak current. This strategy not only simplifies the control design but also improves the current sharing accuracy at high loading conditions. The distributed power sharing scheme uses...

  15. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  16. Human milk sharing practices in the U.S.

    Science.gov (United States)

    Palmquist, Aunchalee E L; Doehler, Kirsten

    2016-04-01

    The primary objective of this study is to describe human milk sharing practices in the U.S. Specifically, we examine milk sharing social networks, donor compensation, the prevalence of anonymous milk sharing interactions, recipients' concerns about specific milk sharing risks, and lay screening behaviors. Data on human milk sharing practices were collected via an online survey September 2013-March 2014. Chi-square analyses were used to test the association between risk perception and screening practices. A total of 867 (661 donors, 206 recipients) respondents were included in the analyses. Most (96.1%) reported sharing milk face-to-face. Only 10% of respondents reported giving or receiving milk through a non-profit human milk bank, respectively. There were no reports of anonymous purchases of human milk. A small proportion of recipients (4.0%) reported that their infant had a serious medical condition. Screening of prospective donors was common (90.7%) but varied with social relationship and familiarity. Likewise, concern about specific milk sharing risks was varied, and risk perception was significantly associated (P-values = 0.01 or less) with donor screening for all risk variables except diet. Understanding lay perceptions of milk sharing risk and risk reduction strategies that parents are using is an essential first step in developing public health interventions and clinical practices that promote infant safety. © 2015 The Authors. Maternal & Child Nutrition published by John Wiley & Sons Ltd.

  17. Incentive schemes and female leadership in financial firms

    Directory of Open Access Journals (Sweden)

    Björn Lantz

    2013-01-01

    Full Text Available Our purpose is to explore how performance in Swedish financial companies is affected by the presence of a female chief executive officer (CEO, the presence of an incentive scheme, and the proportion of female board members. The results indicate that a female CEO is associated with a lower return on equity (ROE and a lower Tobin’s Q, but we find no significant association between the proportion of female board members and firm performance. An incentive scheme is generally associated with a lower return on assets (ROA and a higher Tobin’s Q. In particular, a share-based incentive scheme is associated with a lower ROA, a lower ROE, and a higher Tobin’s Q.

  18. Economic Droop Scheme for Decentralized Power Management in DC Microgrids

    Directory of Open Access Journals (Sweden)

    E. Alizadeh

    2016-12-01

    Full Text Available This paper proposes an autonomous and economic droop control scheme for DC microgrid application. In this method, a cost-effective power sharing technique among various types of DG units is properly adopted. The droop settings are determined based on an algorithm to individually manage the power management without any complicated optimization methods commonly applied in the centralized control method. In the proposed scheme, the system retains all the advantages of the traditional droop method while minimizes the generation costs of the DC microgrid. In the proposed method, all DGs are classified in a sorting rule based on their total generation cost and the reference voltage of their droop equations is then determined. The proposed scheme is applied to a typical DC microgrid consisting of four different types of DGs and a controllable load. The simulation results are presented to verify the effectiveness of the proposed method using MATLAB/SIMULINK software.

  19. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  20. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.