WorldWideScience

Sample records for risk sharing scheme

  1. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  2. Intergenerational risk sharing and endogenous labour supply within funded pension schemes

    NARCIS (Netherlands)

    Bonenkamp, J.; Westerhout, E.

    2014-01-01

    Funded defined-benefit pensions add to welfare on account of providing intergenerational risk sharing, but lower it on account of inducing labour supply distortions. We show that a properly designed funded defined-benefit pension scheme involves a welfare improvement even if contributions are

  3. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  4. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  5. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  6. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  7. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  8. Impact of a financial risk-sharing scheme on budget-impact estimations: a game-theoretic approach.

    Science.gov (United States)

    Gavious, Arieh; Greenberg, Dan; Hammerman, Ariel; Segev, Ella

    2014-06-01

    As part of the process of updating the National List of Health Services in Israel, health plans (the 'payers') and manufacturers each provide estimates on the expected number of patients that will utilize a new drug. Currently, payers face major financial consequences when actual utilization is higher than the allocated budget. We suggest a risk-sharing model between the two stakeholders; if the actual number of patients exceeds the manufacturer's prediction, the manufacturer will reimburse the payers by a rebate rate of α from the deficit. In case of under-utilization, payers will refund the government at a rate of γ from the surplus budget. Our study objective was to identify the optimal early estimations of both 'players' prior to and after implementation of the risk-sharing scheme. Using a game-theoretic approach, in which both players' statements are considered simultaneously, we examined the impact of risk-sharing within a given range of rebate proportions, on players' early budget estimations. When increasing manufacturer's rebate α to be over 50 %, then manufacturers will announce a larger number, and health plans will announce a lower number of patients than they would without risk sharing, thus substantially decreasing the gap between their estimates. Increasing γ changes players' estimates only slightly. In reaction to applying a substantial risk-sharing rebate α on the manufacturer, both players are expected to adjust their budget estimates toward an optimal equilibrium. Increasing α is a better vehicle for reaching the desired equilibrium rather than increasing γ, as the manufacturer's rebate α substantially influences both players, whereas γ has little effect on the players behavior.

  9. [Risk sharing methods in middle income countries].

    Science.gov (United States)

    Inotai, András; Kaló, Zoltán

    2012-01-01

    The pricing strategy of innovative medicines is based on the therapeutic value in the largest pharmaceutical markets. The cost-effectiveness of new medicines with value based ex-factory price is justifiable. Due to the international price referencing and parallel trade the ex-factory price corridor of new medicines has been narrowed in recent years. Middle income countries have less negotiation power to change the narrow drug pricing corridor, although their fair intention is to buy pharmaceuticals at lower price from their scarce public resources compared to higher income countries. Therefore the reimbursement of new medicines at prices of Western-European countries may not be justifiable in Central-Eastern European countries. Confidential pricing agreements (i.e. confidential price discounts, claw-back or rebate) in lower income countries of the European Union can alleviate this problem, as prices of new medicines can be adjusted to local purchasing power without influencing the published ex-factory price and so the accessibility of patients to these drugs in other countries. In order to control the drug budget payers tend to apply financial risk sharing agreements for new medicines in more and more countries to shift the consequences of potential overspending to pharmaceutical manufacturers. The major paradox of financial risk-sharing schemes is that increased mortality, poor persistence of patients, reduced access to healthcare providers, and no treatment reduce pharmaceutical spending. Consequently, payers have started to apply outcome based risk sharing agreements for new medicines recently to improve the quality of health care provision. Our paper aims to review and assess the published financial and outcome based risk sharing methods. Introduction of outcome based risk-sharing schemes can be a major advancement in the drug reimbursement strategy of payers in middle income countries. These schemes can help to reduce the medical uncertainty in coverage

  10. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  11. Risk:reward sharing contracts in the oil industry: the effects of bonus:penalty schemes

    International Nuclear Information System (INIS)

    Kemp, A.G.; Stephen, L.

    1999-01-01

    Partnering and alliancing among oil companies and their contractors have become common in the oil industry in recent years. The risk:reward mechanisms established very often incorporate bonus/penalty schemes in relation to agreed base values. This paper examines the efficiency requirements of such schemes. The effects of project cost and completion risks on the risk: reward positions of field investors and contractors with and without bonus/penalty schemes are examined with the aid of Monte Carlo simulation analysis. The schemes increase the total risk for contractors and have consequence for their cost of capital and optimal risk-bearing arrangements within the industry. (author)

  12. Security and efficiency data sharing scheme for cloud storage

    International Nuclear Information System (INIS)

    Han, Ke; Li, Qingbo; Deng, Zhongliang

    2016-01-01

    With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.

  13. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  14. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  15. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  16. Financial risk-sharing in updating the National List of Health Services in Israel: stakeholders' perceived interests.

    Science.gov (United States)

    Hammerman, Ariel; Feder-Bubis, Paula; Greenberg, Dan

    2012-01-01

    Risk-sharing is being considered by many health care systems to address the financial risk associated with the adoption of new technologies. We explored major stakeholders' views toward the potential implementation of a financial risk-sharing mechanism regarding budget-impact estimates for adding new technologies to the Israeli National List of Health Services. According to our proposed scheme, health plans will be partially compensated by technology sponsors if the actual use of a technology is substantially higher than what was projected and health plans will refund the government for budgets that were not fully utilized. By using a semi-structured protocol, we interviewed major stakeholders involved in the process of updating the National List of Health Services (N = 31). We inquired into participants' views toward our proposed risk-sharing mechanism, whether the proposed scheme would achieve its purpose, its feasibility of implementation, and their opinion on the other stakeholders' incentives. Participants' considerations were classified into four main areas: financial, administrative/managerial, impact on patients' health, and influence on public image. Most participants agreed that the conceptual risk-sharing scheme will improve the accuracy of early budget estimates and were in favor of the proposed scheme, although Ministry of Finance officials tended to object to it. The successful implementation of risk-sharing schemes depends mainly on their perception as a win-win situation by all stakeholders. The perception exposed by our participants that risk-sharing can be a tool for improving the accuracy of early budget-impact estimates and the challenges pointed by them are relevant to other health care systems also and should be considered when implementing similar schemes. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  17. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  18. Construction of a knowledge classification scheme for sharing and usage of knowledge

    International Nuclear Information System (INIS)

    Yoo, Jae Bok; Oh, Jeong Hoon; Lee, Ji Ho; Ko, Young Chul

    2003-12-01

    To efficiently share knowledge among our members on the basis of knowledge management system, first of all, we need to systematically design the knowledge classification scheme that we can classify these knowledge well. The objective of this project is to construct the most suitable knowledge classification scheme that all of us can share them in Korea Atomic Energy Research Institute(KAERI). To construct the knowledge classification scheme all over the our organization, we established a few principles to design it and examined related many classification schemes. And we carried out 3 steps to complete the best desirable KAERI's knowledge classification scheme, that is, 1) the step to design a draft of the knowledge classification scheme, 2) the step to revise a draft of the knowledge classification scheme, 3) the step to verify the revised scheme and to decide its scheme. The scheme completed as a results of this project is consisted of total 218 items, that is, sections of 8 items, classes of 43 items and sub-classes of 167 items. We expect that the knowledge classification scheme designed as the results of this project can be played an important role as the frame to share knowledge among our members when we introduce knowledge management system in our organization. In addition, we expect that methods to design its scheme as well as this scheme itself can be applied when design a knowledge classification scheme at the other R and D institutes and enterprises

  19. A new (k,n verifiable secret image sharing scheme (VSISS

    Directory of Open Access Journals (Sweden)

    Amitava Nag

    2014-11-01

    Full Text Available In this paper, a new (k,n verifiable secret image sharing scheme (VSISS is proposed in which third order LFSR (linear-feedback shift register-based public key cryptosystem is applied for the cheating prevention and preview before decryption. In the proposed scheme the secret image is first partitioned into several non-overlapping blocks of k pixels. Every k pixel is then used to form m=⌈k/4⌉+1 pixels of one encrypted share. The original secret image can be reconstructed by gathering any k or more encrypted shared images. The experimental results show that the proposed VSISS is an efficient and safe method.

  20. Secret Sharing Schemes with a large number of players from Toric Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    A general theory for constructing linear secret sharing schemes over a finite field $\\Fq$ from toric varieties is introduced. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. We present general methods for obtaining the reconstruction and privacy thresholds as well as conditions...... for multiplication on the associated secret sharing schemes. In particular we apply the method on certain toric surfaces. The main results are ideal linear secret sharing schemes where the number of players can be as large as $(q-1)^2-1$. We determine bounds for the reconstruction and privacy thresholds...

  1. Cryptanalysis of a semi-quantum secret sharing scheme based on Bell states

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong

    2018-03-01

    In the paper [Mod. Phys. Lett. B 31 (2017) 1750150], Yin et al. proposed a semi-quantum secret sharing scheme by using Bell states. We find that the proposed scheme cannot finish the quantum secret sharing task. In addition, we also find that the proposed scheme has a security loophole, that is, it will not be detected that the dishonest participant, Charlie attacks on the quantum channel.

  2. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  3. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  4. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  5. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  6. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  7. Mutuality and solidarity: assessing risks and sharing losses.

    Science.gov (United States)

    Wilkie, D

    1997-01-01

    Mutuality is the principle of private, commercial insurance; individuals enter the pool for sharing losses, and pay according to the best estimate of the risk they bring with them. Solidarity is the sharing of losses with payment according to some other scheme; this is the principle of state social insurance; essential features of solidarity are comprehensiveness and compulsion. Private insurance is subject to the uberrima fides principle, or utmost good faith; each side declares all it knows about the risk. The Disability Discrimination Act requires insurers to justify disability discrimination on the basis of relevant information, acturial, statistical or medical, on which it is reasonable to rely. It could be very damaging to private insurance to abandon uberrima fides. However, although some genetic information is clearly useful to underwriters, other information may be so general as to be of little use. The way in which mortality rates are assessed is also explained. PMID:9304668

  8. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-12-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  9. Joint multiuser switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, we devise two schemes for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme selects the user that reports the best channel quality. In order to alleviate the high feedback load associated with the first scheme, we develop a second scheme based on the concept of switched diversity where the base station scans the users in a sequential manner until an acceptable user is found. In addition to these two selection schemes, we consider two power adaptive settings at the secondary users based on the amount of interference available at the secondary transmitter. In the On/Off power setting, users are allowed to transmit based on whether the interference constraint is met or not, while in the full power adaptive setting, the users are allowed to vary their transmission power to satisfy the interference constraint. Finally, we present numerical results for our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load for both schemes. © 2012 IEEE.

  10. Agent-based power sharing scheme for active hybrid power sources

    Science.gov (United States)

    Jiang, Zhenhua

    The active hybridization technique provides an effective approach to combining the best properties of a heterogeneous set of power sources to achieve higher energy density, power density and fuel efficiency. Active hybrid power sources can be used to power hybrid electric vehicles with selected combinations of internal combustion engines, fuel cells, batteries, and/or supercapacitors. They can be deployed in all-electric ships to build a distributed electric power system. They can also be used in a bulk power system to construct an autonomous distributed energy system. An important aspect in designing an active hybrid power source is to find a suitable control strategy that can manage the active power sharing and take advantage of the inherent scalability and robustness benefits of the hybrid system. This paper presents an agent-based power sharing scheme for active hybrid power sources. To demonstrate the effectiveness of the proposed agent-based power sharing scheme, simulation studies are performed for a hybrid power source that can be used in a solar car as the main propulsion power module. Simulation results clearly indicate that the agent-based control framework is effective to coordinate the various energy sources and manage the power/voltage profiles.

  11. A load-sharing control scheme for a microgrid with a fixed frequency inverter

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Zhihao; Huang, Xinhong; Jiang, Jin [Department of Electrical and Computer Engineering, The University of Western Ontario, 1151 Richmond St., London, Ontario (Canada); Wu, Bin [Department of Electrical and Computer Engineering, Ryerson University, Toronto, Ontario (Canada)

    2010-03-15

    In this paper, a load-sharing control strategy is developed for a microgrid consisting of a fuel cell power module and two synchronous generators in a stand-alone environment. The fuel cell is interfaced with the synchronous generators through a DC/AC inverter to convert unregulated DC to a three-phase AC. Since the frequency of the DC/AC inverter is fixed, the conventional load-frequency control scheme cannot be used for load-sharing control. To alleviate this problem, a load-voltage control scheme is developed. The theoretical analysis and experimental validation of the proposed scheme are presented. It is shown, by theoretical analysis and experiments, that this control strategy can effectively distribute the load among the different energy sources based on their individual pre-defined load-voltage droop characteristics. (author)

  12. SECRET SHARING SCHEMES WITH STRONG MULTIPLICATION AND A LARGE NUMBER OF PLAYERS FROM TORIC VARIETIES

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    2017-01-01

    This article consider Massey's construction for constructing linear secret sharing schemes from toric varieties over a finite field $\\Fq$ with $q$ elements. The number of players can be as large as $(q-1)^r-1$ for $r\\geq 1$. The schemes have strong multiplication, such schemes can be utilized in ...

  13. Trial of car-sharing scheme at CERN

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    On 6 July, a sample group of approximately 500 users started a six-month trial of a new car-sharing scheme. The project is an initiative of the General Infrastructure Services Department (GS), in collaboration with the Physics Department (PH) and Hertz car rentals.   One of the Hertz share cars.   How many times have you found yourself searching fruitlessly for a parking space? How many times have you decided against using your car to run a short errand because you were worried about being able to find another parking space? Over the last 50 years, the number of users at CERN has grown steadily, and it is gratifying that the total number now exceeds 10,000. Other contributing factors include the re-start of the LHC and the introduction of the new tram line in May 2011, which is expected to lead to people parking their vehicles at CERN for the purpose of taking the tram into Geneva.. This is why transportation has become an important priority. The present trial is an integral part of CERN...

  14. Bicycle and Car Share Schemes as Inclusive Modes of Travel? A Socio-Spatial Analysis in Glasgow, UK

    Directory of Open Access Journals (Sweden)

    Julie Clark

    2016-06-01

    Full Text Available Public bicycle and car sharing schemes have proliferated in recent years and are increasingly part of the urban transport landscape. Shared transport options have the potential to support social inclusion by improving accessibility: these initiatives could remove some of the barriers to car ownership or bicycle usage such as upfront costs, maintenance and storage. However, the existing evidence base indicates that, in reality, users are most likely to be white, male and middle class. This paper argues that there is a need to consider the social inclusivity of sharing schemes and to develop appropriate evaluation frameworks accordingly. We therefore open by considering ways in which shared transport schemes might be inclusive or not, using a framework developed from accessibility planning. In the second part of the paper, we use the case study of Glasgow in Scotland to undertake a spatial equity analysis of such schemes. We examine how well they serve different population groups across the city, using the locations of bicycle stations and car club parking spaces in Glasgow, comparing and contrasting bike and car. An apparent failure to deliver benefits across the demographic spectrum raises important questions about the socially inclusive nature of public investment in similar schemes.

  15. 24 CFR 266.15 - Risk-Sharing Agreement.

    Science.gov (United States)

    2010-04-01

    ... HOUSING FINANCE AGENCY RISK-SHARING PROGRAM FOR INSURED AFFORDABLE MULTIFAMILY PROJECT LOANS General Provisions § 266.15 Risk-Sharing Agreement. Execution of a Risk-Sharing Agreement is a prerequisite to... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Risk-Sharing Agreement. 266.15...

  16. Risk taking and risk sharing does responsibility matter?

    NARCIS (Netherlands)

    Cettolin, E.; Tausch, F.

    2013-01-01

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  17. Risk taking and risk sharing : does responsibility matter?

    NARCIS (Netherlands)

    Cettolin, Elena; Tausch, Franziska

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  18. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    KAUST Repository

    Sayed, Mostafa

    2012-12-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary licensed user under the condition that the interference at the the primary user receiver (PU-Rx) is below a predetermined threshold. Joint primary spectrum and transmit antenna selection diversity schemes can be utilized as an efficient way to meet the quality of service (QoS) demands of the SUs while satisfying the interference constraint. In this paper, we consider a secondary link comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with a number of primary users (PUs) operating at distinct spectra. We present a performance analysis for two primary spectrum and transmit antenna switched selection schemes with different amount of feedback requirements. In particular, assuming Rayleigh fading and BPSK transmission, we derive approximate BER expressions for the presented schemes. For the sake of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified with numerical simulations. © 2012 IEEE.

  19. CERN car sharing scheme now open to everyone

    CERN Multimedia

    GS Department

    2011-01-01

    The CERN car sharing service is a self-service scheme providing a pool of 30 CERN cars available for pick-up free of charge from 13 points around the Meyrin and Prévessin sites. From Thursday, 1st December 2011, the service will be open to all members of the CERN personnel and contractors' personnel, in the framework of their professional activities at CERN only. The conditions of use can be consulted at: http://gs-dep.web.cern.ch/en/content/Mobility/Car_sharing To be able to use the service, members of the CERN personnel and contractors' personnel must: have a contractual link to CERN, possess an e-mail address registered in the CERN databases; hold an RFID access card, which can be obtained from the CERN Car Pool on presentation of a valid CERN access card. Car Pool, Building 130-R-012, open Monday-Friday, 8.00 a.m.-12.00 noon/1.00 p.m.-5.00 p.m. https://gs-dep.web.cern.ch/en/content/car-pool GS-IS

  20. Multiple sclerosis risk sharing scheme: two year results of clinical cohort study with historical comparator.

    Science.gov (United States)

    Boggild, Mike; Palace, Jackie; Barton, Pelham; Ben-Shlomo, Yoav; Bregenzer, Thomas; Dobson, Charles; Gray, Richard

    2009-12-02

    To generate evidence on the longer term cost effectiveness of disease modifying treatments in patients with relapsing-remitting multiple sclerosis. Prospective cohort study with historical comparator. Specialist multiple sclerosis clinics in 70 centres in the United Kingdom. Patients with relapsing-remitting multiple sclerosis who started treatment from May 2002 to April 2005 under the UK risk sharing scheme. Treatment with interferon beta or glatiramer acetate in accordance with guidelines of the UK Association of British Neurologists. Observed utility weighted progression in disability at two years' follow-up assessed on the expanded disability status scale (EDSS) compared with that expected by applying the progression rates in a comparator dataset, modified for patients receiving treatment by multiplying by the hazard ratio derived separately for each disease modifying treatment from the randomised trials. In the primary per protocol analysis, progression in disability was worse than that predicted and worse than that in the untreated comparator dataset ("deviation score" of 113%; excess in mean disability status scale 0.28). In sensitivity analyses, however, the deviation score varied from -72% (using raw baseline disability status scale scores, rather than applying a "no improvement" algorithm) to 156% (imputing missing data for year two from progression rates for year one). It is too early to reach any conclusion about the cost effectiveness of disease modifying treatments from this first interim analysis. Important methodological issues, including the need for additional comparator datasets, the potential bias from missing data, and the impact of the "no improvement" rule, will need to be addressed and long term follow-up of all patients is essential to secure meaningful results. Future analyses of the cohort are likely to be more informative, not least because they will be less sensitive to short term fluctuations in disability.

  1. A novel lost packets recovery scheme based on visual secret sharing

    Science.gov (United States)

    Lu, Kun; Shan, Hong; Li, Zhi; Niu, Zhao

    2017-08-01

    In this paper, a novel lost packets recovery scheme which encrypts the effective parts of an original packet into two shadow packets based on (2, 2)-threshold XOR-based visual Secret Sharing (VSS) is proposed. The two shadow packets used as watermarks would be embedded into two normal data packets with digital watermarking embedding technology and then sent from one sensor node to another. Each shadow packet would reveal no information of the original packet, which can improve the security of original packet delivery greatly. The two shadow packets which can be extracted from the received two normal data packets delivered from a sensor node can recover the original packet lossless based on XOR-based VSS. The Performance analysis present that the proposed scheme provides essential services as long as possible in the presence of selective forwarding attack. The proposed scheme would not increase the amount of additional traffic, namely, lower energy consumption, which is suitable for Wireless Sensor Network (WSN).

  2. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  3. Risk Aversion and Engagement in the Sharing Economy

    Directory of Open Access Journals (Sweden)

    Jessica Santana

    2015-10-01

    Full Text Available The sharing economy is a new online community that has important implications for offline behavior. This study evaluates whether engagement in the sharing economy is associated with an actor’s aversion to risk. Using a web-based survey and a field experiment, we apply an adaptation of Holt and Laury’s (2002 risk lottery game to a representative sample of sharing economy participants. We find that frequency of activity in the sharing economy predicts risk aversion, but only in interaction with satisfaction. While greater satisfaction with sharing economy websites is associated with a decrease in risk aversion, greater frequency of usage is associated with greater risk aversion. This analysis shows the limitations of a static perspective on how risk attitudes relate to participation in the sharing economy.

  4. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2014-04-01

    This paper focuses on the development of multiuser access schemes for spectrum sharing systems whereby secondary users are allowed to share the spectrum with primary users under the condition that the interference observed at the primary receiver is below a predetermined threshold. In particular, two scheduling schemes are proposed for selecting a user among those that satisfy the interference constraint and achieve an acceptable signal-to-noise ratio level. The first scheme focuses on optimizing the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base station (BS) scans the secondary users in a sequential manner until a user whose channel quality is above an acceptable predetermined threshold is found. We develop expressions for the statistics of the signal-to-interference and noise ratio as well as the average spectral efficiency, average feedback load, and the delay at the secondary BS. We then present numerical results for the effect of the number of users and the interference constraint on the optimal switching threshold and the system performance and show that our analysis results are in perfect agreement with the numerical results. © 2014 John Wiley & Sons, Ltd.

  5. A Hierarchical Control Scheme for Reactive Power and Harmonic Current Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Firoozabadi, Mehdi Savaghebi; Askarian Abyaneh, Hossein

    2015-01-01

    In this paper, a hierarchical control scheme consisting of primary and secondary levels is proposed for achieving accurate reactive power and harmonic currents sharing among interface inverters of distributed generators (DGs) in islanded microgrids. Firstly, fundamental and main harmonic componen...

  6. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  7. Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

    Science.gov (United States)

    Pang, Liaojun; Miao, Deyu; Li, Huixian; Wang, Qiong

    2015-01-01

    Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

  8. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  9. The Political Economy of Intergenerational Risk Sharing

    NARCIS (Netherlands)

    Hollanders, D.A.

    2010-01-01

    This paper analyses the political constraints of intergenerational risk sharing. The rst result is that the political process generally does not lead to ex ante optimal insurance. The second result is that in a second best political setting PAYG still contributes to intergenerational risk sharing.

  10. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  11. A Mathematical Model of Profit-Loss Sharing Scheme of Small Investment for Traditional Market Traders using The Semi-Fuzzy Logic Approach

    Directory of Open Access Journals (Sweden)

    Novriana Sumarti

    2017-02-01

    Full Text Available A mathematical model of micro-finance investment using profit-loss sharing scheme are made and implemented to simulated data. Here profits from the venture will be shared in a portion between the investor and the entity running the business. The scheme can be classified as Musharaka type of investment in Sharia economy. The proposed model is theoretically implemented with data from small-scale traders at a local traditional market who have small turnover. They are common target of usurers who lend money with high interest rate and penalties. If the traders are in unfortunate conditions, they are potentially in poorer condition than before committing themselves to the usurer. In the conventional practices of the profit sharing scheme, the investor will get a fixed portion of the trader’s income, which is applied for all kind of small-scale traders. If the traders are diligent and hard worker and have very high turnover, then the investor will gain much more profit whether the contributed capital is small or large. In this paper, the scheme is implemented using Semi-Fuzzy Logic Approach so that the profit-loss sharing scheme can achieve its intended goal, which is to make a profitable investment not only for the investor but also for traders. The approach is not fully using Fuzzy Logic because some variables are still in crisp numbers and the optimization problem is regular in the form of crisp numbers. Based on the existing data, the results show that the optimal profit share is depended on the income of the traders. The higher the income coming from the venture, the lesser the profit share for the investor which is reasonable with the fixed initial contributed capital.

  12. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation

    NARCIS (Netherlands)

    R.J.F. Cramer (Ronald); I.B. Damgård (Ivan); Y. Ishai

    2005-01-01

    htmlabstractWe present a method for converting shares of a secret into shares of the same secret in a different secret-sharing scheme using only local computation and no communication between players. In particular, shares in a replicated scheme based on a CNF representation of the access structure

  13. Efficient quantum secret sharing scheme with two-particle entangled states

    International Nuclear Information System (INIS)

    Zhu Zhen-Chao; Fu An-Min; Zhang Yu-Qing

    2011-01-01

    This paper proposes a protocol for multi-party quantum secret sharing utilizing four non-orthogonal two-particle entangled states following some ideas in the schemes proposed by Liu et al. (2006 Chin. Phys. Lett. 23 3148) and Zhang et al. (2009 Chin. Phys. B 18 2149) respectively. The theoretical efficiency for qubits of the new protocol is improved from 50% to approaching 100%. All the entangled states can be used for generating the private key except those used for the eavesdropping check. The validity of a probable attack called opaque cheat attack to this kind of protocols is considered in the paper for the first time. (general)

  14. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  15. A secure data outsourcing scheme based on Asmuth-Bloom secret sharing

    Science.gov (United States)

    Idris Muhammad, Yusuf; Kaiiali, Mustafa; Habbal, Adib; Wazan, A. S.; Sani Ilyasu, Auwal

    2016-11-01

    Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users' queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients' data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth-Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing.

  16. An Enhanced Power Sharing Scheme for Voltage unbalance and harmonics compensation in an islanded AC microgrid

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2016-01-01

    In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled to autonomou......In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled...... to autonomously compensate voltage unbalance and harmonics while sharing the compensation effort for the real power, reactive power, unbalance and harmonic powers. The proposed control system of the microgrid mainly consists of the positive sequence real and reactive power droop controllers, voltage and current......) technique is adopted to send the compensation command of the secondary control and auxiliary control from the microgrid control center (MGCC) to the local controllers of DG unit. Finally, the hardware-in-the-loop (HIL) results using dSPACE 1006 platform are presented to demonstrate the effectiveness...

  17. Modifiable risk factors for prescription medicine sharing behaviours.

    Science.gov (United States)

    Beyene, Kebede; Aspden, Trudi; McNeill, Rob; Sheridan, Janie

    2018-04-06

    Prescription medicine sharing has been defined as giving one's own medicine to someone else (lending) or taking someone else's medicine (borrowing). Medicines can be shared for non-medical purposes (recreational sharing or drug abuse) or for their intended therapeutic benefits (non-recreational sharing, e.g. sharing antibiotics to self-treat); the latter is the focus of this research. Limited research evidence is available about modifiable risk factors for non-recreational medicine sharing and addressing this issue was the main aim of this research. An online, cross-sectional survey design was used. The study population comprised a convenience sample of 233 adults, who were primarily recruited through patient support groups across New Zealand. Principal component analysis was used to develop scales assessing attitudes toward medicine lending and borrowing. Logistic regression was used to examine the relationship between explanatory (demographics, medical conditions, and attitudes towards medicine sharing) and outcome (medicine sharing behaviours) variables. Half of the study participants reported ever borrowing/lending medicines, and approximately a third of participants reported borrowing/lending in the past year. Modifiable risk factors associated with an increased risk of medicine borrowing behaviour were having more difficulty with accessing medicine ('access-related issue'), stronger 'emotional beliefs about borrowing', and greater 'concern about missing doses.' Greater 'concern for the wellbeing of others' and stronger 'beliefs about the benefits and safety of lending' were associated with an increased risk of medicine lending behaviour. Those with a higher 'perceived risk of harm' were less likely to borrow or lend medicines. This research expands the current knowledge of medicine sharing by examining underlying behavioural factors which predict sharing behaviours and that can be modified by interventions. This research suggests using multifaceted

  18. Contract of Shared Risk. New investment opportunities

    International Nuclear Information System (INIS)

    Carta Petrolera

    1997-01-01

    In order to offering to the private capital, new investment opportunities in exploration and production in Colombia, ECOPETROL settled down since 1996 the Contract of Shared Risk. This is a novel recruiting modality, because the shared risk is applied to the exploratory areas that are assigned for the direct operation of ECOPETROL

  19. Framework for Shared Drinking Water Risk Assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Lowry, Thomas Stephen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Tidwell, Vincent C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Peplinski, William John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Roger [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Binning, David [AEM Corp., Herndon, VA (United States); Meszaros, Jenny [AEM Corp., Herndon, VA (United States)

    2017-01-01

    Central to protecting our nation's critical infrastructure is the development of methodologies for prioritizing action and supporting resource allocation decisions associated with risk-reduction initiatives. Toward this need a web-based risk assessment framework that promotes the anonymous sharing of results among water utilities is demonstrated. Anonymous sharing of results offers a number of potential advantages such as assistance in recognizing and correcting bias, identification of 'unknown, unknowns', self-assessment and benchmarking for the local utility, treatment of shared assets and/or threats across multiple utilities, and prioritization of actions beyond the scale of a single utility. The constructed framework was demonstrated for three water utilities. Demonstration results were then compared to risk assessment results developed using a different risk assessment application by a different set of analysts.

  20. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    Energy Technology Data Exchange (ETDEWEB)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V. [Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam (India). Computer Div.; Aghila, G. [National Institute of Technology, Karaikal (India). Dept. of Computer Science and Engineering

    2015-05-15

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  1. Shamir secret sharing scheme with dynamic access structure (SSSDAS). Case study on nuclear power plant

    International Nuclear Information System (INIS)

    Thiyagarajan, P.; Thandra, Prasanth Kumar; Rajan, J.; Satyamurthy, S.A.V.; Aghila, G.

    2015-01-01

    In recent years, due to the sophistication offered by the Internet, strategic organizations like nuclear power plants are linked to the outside world communication through the Internet. The entry of outside world communication into strategic organization (nuclear power plant) increases the hacker's attempts to crack its security and to trace any information which is being sent among the top level officials. Information security system in nuclear power plant is very crucial as even small loophole in the security system will lead to a major disaster. Recent cyber attacks in nuclear power plant provoked information security professionals to look deeply into the information security aspects of strategic organizations (nuclear power plant). In these lines, Shamir secret sharing scheme with dynamic access structure (SSSDAS) is proposed in the paper which provides enhanced security by providing dynamic access structure for each node in different hierarchies. The SSSDAS algorithm can be applied to any strategic organizations with hierarchical structures. In this paper the possible scenarios where SSSDAS algorithm can be applied to nuclear power plant is explained as a case study. The proposed SSSDAS scheme identifies the wrong shares, if any, used for reconstruction of the secret. The SSSDAS scheme also address the three major security parameters namely confidentiality, authentication and integrity.

  2. Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

    Science.gov (United States)

    Liu, Cheng-Ji; Li, Zhi-Hui; Bai, Chen-Ming; Si, Meng-Meng

    2018-02-01

    The concept of judgment space was proposed by Wang et al. (Phys. Rev. A 95, 022320, 2017), which was used to study some important properties of quantum entangled states based on local distinguishability. In this study, we construct 15 kinds of seven-qudit quantum entangled states in the sense of permutation, calculate their judgment space and propose a distinguishability rule to make the judgment space more clearly. Based on this rule, we study the local distinguishability of the 15 kinds of seven-qudit quantum entangled states and then propose a ( k, n) threshold quantum secret sharing scheme. Finally, we analyze the security of the scheme.

  3. Capital Market Integration and Consumption Risk Sharing over the Long Run

    DEFF Research Database (Denmark)

    Rangvid, Jesper; Santa-Clara, Pedro; Schmeling, Maik

    integration. We also calculate the welfare costs of imperfect capital market integration and risk sharing and find that these costs vary a lot over time. Finally, we show that consumption risk sharing is higher during times of crises, i.e. at times when marginal utility is high and risk sharing is most......We empirically investigate time variation in capital market integration and consumption risk sharing using data for 16 countries from 1875 to 2012. We show that there has been considerable variation over time in the degrees of capital market integration and consumption risk sharing and that higher...... capital market integration forecasts more consumption risk sharing in the future. This finding is robust is to controlling for trade openness and exchange rate volatilities. Hence, financial integration seems to drive consumption risk sharing whereas we find no evidence that risk sharing forecasts market...

  4. Risk taking and risk sharing: does responsibility matter? (RM/13/045-revised-)

    NARCIS (Netherlands)

    Cettolin, Elena; Tausch, Franziska

    2016-01-01

    Risk sharing arrangements diminish individuals’ vulnerability to probabilistic events that negatively affect their financial situation. This is because risk sharing implies redistribution, as lucky individuals support the unlucky ones. We hypothesize that responsibility for risky choices decreases

  5. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  6. Risk sharing, public policy and the contribution of Islamic finance

    Directory of Open Access Journals (Sweden)

    Hossein Askari

    2014-12-01

    Full Text Available A major reason for the recurrent episodes of financial instability is the predominance of interest-based debt and leveraging. Financial stability is achievable through risk sharing finance instead of risk shifting that characterizes contemporary finance. A risk sharing system serves the true function of finance as facilitator of real sector activities and avoids the emergence of a “paper economy” where there is gradual decoupling of finance from the real sector. Islamic finance was initially proposed as a profit-loss sharing system, but its core principle is risk sharing. In prohibiting interest-based debt instruments, Islam grounds finance on a strong risk sharing footing. Although still a young industry that has come a long way, it has not managed to develop truly risk-sharing instruments that would allow individuals, households, and firms as well as whole economies to mitigate systematic and un-systematic risks. It is suggested that governments should intervene and issue macro-market instruments to provide their treasuries with a significant source of non-interest rate based financing while promoting risk sharing. Moreover, given that evidence across the world suggests that monetary policy’s transmission mechanism may be impaired, it is suggested that these government issued securities could also impart added potency to monetary policy.

  7. Capital Market Integration and Consumption Risk Sharing over the Long Run

    DEFF Research Database (Denmark)

    Rangvid, Jesper; Santa-Clara, Pedro; Schmeling, Maik

    2016-01-01

    capital market integration forecasts more consumption risk sharing in the future. This finding is robust to controlling for trade openness and exchange rate volatility as alternative drivers of risk sharing. Finally, we calculate the welfare costs of imperfect consumption risk sharing and find......We empirically investigate time variation in capital market integration and consumption risk sharing using data for 16 countries from 1875 to 2012. We show that there has been considerable variation over time in the degrees of capital market integration and consumption risk sharing and that higher...

  8. Online Information Sharing About Risks: The Case of Organic Food.

    Science.gov (United States)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-03-23

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic food products. An online survey among 535 respondents was conducted in the Netherlands to examine the determinants of information sharing behavior, and their relationships. Structural equation modeling was applied to test both the measurement model and the structural model. Results showed that the intention to share information online about the risks of organic food was low. Conversations and email were the preferred channels to share information; of the social media Facebook stood out. The developed model was found to provide an adequate description of the data. It explained 41% of the variance in information sharing. Injunctive norms and outcome expectancies were most important in predicting online information sharing, followed by information-related determinants. Risk-perception-related determinants showed a significant, but weak, positive relationship with online information sharing. Implications for authorities communicating on risks associated with food are addressed. © 2018 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  9. Adaptive transmission schemes for MISO spectrum sharing systems: Tradeoffs and performance analysis

    KAUST Repository

    Bouida, Zied

    2014-10-01

    In this paper, we propose a number of adaptive transmission techniques in order to improve the performance of the secondary link in a spectrum sharing system. We first introduce the concept of minimum-selection maximum ratio transmission (MS-MRT) as an adaptive variation of the existing MRT (MRT) technique. While in MRT all available antennas are used for transmission, MS-MRT uses the minimum subset of antennas verifying both the interference constraint (IC) to the primary user and the bit error rate (BER) requirements. Similar to MRT, MS-MRT assumes that perfect channel state information (CSI) is available at the secondary transmitter (ST), which makes this scheme challenging from a practical point of view. To overcome this challenge, we propose another transmission technique based on orthogonal space-time block codes with transmit antenna selection (TAS). This technique uses the full-rate full-diversity Alamouti scheme in order to maximize the secondary\\'s transmission rate. The performance of these techniques is analyzed in terms of the average spectral efficiency (ASE), average number of transmit antennas, average delay, average BER, and outage performance. In order to give the motivation behind these analytical results, the tradeoffs offered by the proposed schemes are summarized and then demonstrated through several numerical examples.

  10. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  11. 12 CFR 955.3 - Required credit risk-sharing structure.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Required credit risk-sharing structure. 955.3...-BALANCE SHEET ITEMS ACQUIRED MEMBER ASSETS § 955.3 Required credit risk-sharing structure. (a... conducting a rating review of the asset or pool of assets in a securitization transaction. (b) Credit risk...

  12. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  13. Iterative schemes for parallel Sn algorithms in a shared-memory computing environment

    International Nuclear Information System (INIS)

    Haghighat, A.; Hunter, M.A.; Mattis, R.E.

    1995-01-01

    Several two-dimensional spatial domain partitioning S n transport theory algorithms are developed on the basis of different iterative schemes. These algorithms are incorporated into TWOTRAN-II and tested on the shared-memory CRAY Y-MP C90 computer. For a series of fixed-source r-z geometry homogeneous problems, it is demonstrated that the concurrent red-black algorithms may result in large parallel efficiencies (>60%) on C90. It is also demonstrated that for a realistic shielding problem, the use of the negative flux fixup causes high load imbalance, which results in a significant loss of parallel efficiency

  14. Benefits and risks of shared services in healthcare.

    Science.gov (United States)

    Kennewell, Suzanne; Baker, Laura

    2016-05-16

    Purpose - The purpose of this paper is to explore the experiences of staff in a large, public health service involved in transitioning support services to a shared services model. It aims to understand their perceptions of the benefits and risks arising from this change. Design/methodology/approach - Thematic analysis of qualitative data from semi-structured interviews with both service provider and customer agency staff was used to identify, analyze and report patterns of benefits and risks within data. Findings - Staff expressed the need for relevant subject-matter-experts to work within customer agencies to facilitate effective communication between the customer agency and shared services provider, reflecting observations found in out-sourcing literature. Research limitations/implications - Results point to significant challenges continuing to occur for shared services in healthcare. Risks identified suggest a more intimate relationship between clinical and support services than previously discussed. Originality/value - Previous discussion of the shared services model has not considered the skills, knowledge and ability required by staff in the customer agency. This research indicates that in the absence of such consideration, the concepts of the shared services model are weakened.

  15. The Foreign Investment Risks of Chinese B Share Market

    OpenAIRE

    JIANG, MINCHANG

    2014-01-01

    The objective of this dissertation is to investigate and analyse the risks existing in Chinese B share market for foreign investment. Based on the brief history of B share market as well as background information such as characteristics of Chinese stock exchange, several areas of risks are identified as: macroeconomic risks, stock volatility and return including cross-impacts among market segmentations and different countries’ markets, financial market and currency risks, and finally the poli...

  16. A supply chain contract with flexibility as a risk-sharing mechanism for demand forecasting

    Science.gov (United States)

    Kim, Whan-Seon

    2013-06-01

    Demand forecasting is one of the main causes of the bullwhip effect in a supply chain. As a countermeasure for demand uncertainty as well as a risk-sharing mechanism for demand forecasting in a supply chain, this article studies a bilateral contract with order quantity flexibility. Under the contract, the buyer places orders in advance for the predetermined horizons and makes minimum purchase commitments. The supplier, in return, provides the buyer with the flexibility to adjust the order quantities later, according to the most updated demand information. To conduct comparative simulations, four-echelon supply chain models, that employ the contracts and different forecasting techniques under dynamic market demands, are developed. The simulation outcomes show that demand fluctuation can be effectively absorbed by the contract scheme, which enables better inventory management and customer service. Furthermore, it has been verified that the contract scheme under study plays a role as an effective coordination mechanism in a decentralised supply chain.

  17. Game-theoretic approaches to optimal risk sharing

    NARCIS (Netherlands)

    Boonen, T.J.

    2014-01-01

    This Ph.D. thesis studies optimal risk capital allocation and optimal risk sharing. The first chapter deals with the problem of optimally allocating risk capital across divisions within a financial institution. To do so, an asymptotic approach is used to generalize the well-studied Aumann-Shapley

  18. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  19. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  20. Radical uncertainty, non-predictability, antifragility and risk-sharing Islamic finance

    Directory of Open Access Journals (Sweden)

    Umar Rafi

    2016-12-01

    Full Text Available Under conditions of radical uncertainty, risk sharing renders financial systems anti-fragile. Our goal in this paper is to show that risk-sharing Islamic finance (RSIF shares the characteristics defined by Taleb for an anti-fragile system, by mapping some characteristics of anti-fragility onto those of risk-sharing Islamic finance. A key insight around which such a connection can be established is by relating the principle of “no risk-no gain”from Islamic finance to the concept of skin-in-the-game from anti-fragility theory. The relationship is then extended to other characteristics of the two frameworks, to show that RSIF overlaps with anti-fragility over many dimensions. The broader case for an antifragile system includes another important characteristic, namely “soul in the game” and concern for social justice. It is the authors’ hope that emerging research on anti-fragility, combined with the emerging research on RSIF, can have a lasting impact on the field of finance by laying the foundations for a compelling case that it is time for humanity to replace the dominant debt-based risk transfer/risk shifting financial system with a system in which everyone shares the risks faced by society. JEL: D81, D89, E44, F34, G32

  1. Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate

    International Nuclear Information System (INIS)

    Chau, H.F.

    2002-01-01

    A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1√(5)≅27.6%, thereby making it the most error resistant scheme known to date

  2. A Discussion of a Risk-Sharing Pension Plan

    Directory of Open Access Journals (Sweden)

    Catherine Donnelly

    2017-02-01

    Full Text Available I show that risk-sharing pension plans can reduce some of the shortcomings of defined benefit and defined contributions plans. The risk-sharing pension plan presented aims to improve the stability of benefits paid to generations of members, while allowing them to enjoy the expected advantages of a risky investment strategy. The plan does this by adjusting the investment strategy and benefits in response to a changing funding level, motivated by the with-profits contract proposed by Goecke (2013. He suggests a mean-reverting log reserve (or funding ratio, where mean reversion occurs through adjustments to the investment strategy and declared bonuses. To measure the robustness of the plan to human factors, I introduce a measurement of disappointment, where disappointment is high when there are many consecutive years over which benefit payments are declining. Another measure introduced is devastation, where devastation occurs when benefit payments are zero. The motivation is that members of a pension plan who are easily disappointed or likely to get no benefit, are more likely to exit the plan. I find that the risk-sharing plan offers more disappointment than a defined contribution plan, but it eliminates the devastation possible in a plan that tries to accumulate contributions at a steadily increasing rate. The proposed risk-sharing plan can give a narrower range of benefits than in a defined contribution plan. Thus it can offer a stable benefit to members without the risk of running out of money.

  3. Globalization and Risk Sharing

    OpenAIRE

    Jaume Ventura; Fernando A. Broner

    2006-01-01

    We study the effects of globalization on risk sharing and welfare. Like the previous literature, we assume that governments cannot commit to enforce the repayment of debts owed by their citizens. Unlike the previous literature, we assume that governments cannot discriminate between domestic and foreign creditors when enforcing debt payments. This creates novel interactions between domestic and international trade in assets. (i) Increases in domestic trade raise the benefits of enforcement and...

  4. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing

    Directory of Open Access Journals (Sweden)

    Daisuke Mashima

    2018-03-01

    Full Text Available Thanks to the roll-out of smart meters, availability of fine-grained electricity usage data has rapidly grown. Such data has enabled utility companies to perform robust and efficient grid operations. However, at the same time, privacy concerns associated with sharing and disclosure of such data have been raised. In this paper, we first demonstrate the feasibility of estimating privacy-sensitive household attributes based solely on the energy usage data of residential customers. We then discuss a framework to measure privacy gain and evaluate the effectiveness of customer-centric privacy-protection schemes, namely redaction of data irrelevant to services and addition of bounded artificial noise. Keywords: Privacy, Smart meter data, Quantitative evaluation

  5. Risk sharing relations and enforcement mechanisms

    NARCIS (Netherlands)

    Barr, A.; Dekker, M.; Fafchamps, M.

    2008-01-01

    We investigate whether the set of available enforcement mechanisms affects the formation of risk sharing relations by applying dyadic regression analysis to data from a specifically designed behavioural experiment, two surveys and a genealogical mapping exercise. During the experiment participants

  6. Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop

    Directory of Open Access Journals (Sweden)

    Su-Hyun Kim

    2014-07-01

    Full Text Available In a cloud computing environment, user data is encrypted and stored using a large number of distributed servers. Global Internet service companies such as Google and Yahoo have recognized the importance of Internet service platforms and conducted their own research and development to utilize large cluster-based cloud computing platform technologies based on low-cost commercial off-the-shelf nodes. Accordingly, as various data services are now allowed over a distributed computing environment, distributed management of big data has become a major issue. On the other hand, security vulnerability and privacy infringement due to malicious attackers or internal users can occur by means of various usage types of big data. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. To solve this problem, we have proposed a weight-applied XOR-based efficient distribution storage and recovery scheme in this paper. In particular, various security vulnerabilities can occur in the block access token, which is used for the permission control of data blocks in Hadoop. In this paper, a secret sharing-based block access token management scheme is proposed to overcome such security vulnerabilities.

  7. Exploring Quantum Supremacy in Access Structures of Secret Sharing by Coding Theory

    OpenAIRE

    Matsumoto, Ryutaroh

    2018-01-01

    We consider secret sharing schemes with a classical secret and quantum shares. One example of such schemes was recently reported whose access structure cannot be realized by any secret sharing schemes with classical shares. In this paper, we report further quantum secret sharing schemes whose access structures cannot be realized by any classical secret sharing schemes.

  8. Risk Sharing Partnerships With Suppliers: The Case of EMBRAER

    Directory of Open Access Journals (Sweden)

    Paulo Figueiredo

    2008-04-01

    Full Text Available Since the mid 1990s, the global aircraft industry has been creating new solutions for product development. Risk-sharing partnerships with suppliers began to be established in an attempt to reduce investments and, consequentially, the dependence on loans. The partners began not only to invest in tooling, engineering and infrastructure, but also to participate more directly in the projects, in the investments and design activities, acquiring rights to future sales income of products. This contractual modality, called risk-sharing partnership, is the focus of this study. Specifically, it analyzes the risk-sharing partnerships made by Embraer during the projects of the ERJ-170/190 family of aircrafts. It also aims to justify these partnerships, considering the current global aircraft market conditions, evaluating the critical success factors, requirements and macro-economic conditions which supported the adoption of this new policy.

  9. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  10. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  11. [Incentive for Regional Risk Selection in the German Risk Structure Compensation Scheme].

    Science.gov (United States)

    Wende, Danny

    2017-10-01

    The introduction of the new law GKV-FQWG strengthens the competition between statutory health insurance. If incentives for risk selection exist, they may force a battle for cheap customers. This study aims to document and discuss incentives for regional risk selection in the German risk structure compensation scheme. Identify regional autocorrelation with Moran's l on financial parameters of the risk structure compensation schema. Incentives for regional risk selection do indeed exist. The risk structure compensation schema reduces 91% of the effect and helps to reduce risk selection. Nevertheless, a connection between regional situation and competition could be shown (correlation: 69.5%). Only the integration of regional control variables into the risk compensation eliminates regional autocorrelation. The actual risk structure compensation is leading to regional inequalities and as a consequence to risk selection and distortion in competition. © Georg Thieme Verlag KG Stuttgart · New York.

  12. Sharing of risks in Islamic finance

    OpenAIRE

    Sekreter, Ahmet

    2011-01-01

    For most of the people the prohibition on interest is the well known part of Islamic finance. Indeed, the concept of Islamic finance was not being discussed enough till financial crisis, after crisis it started to be seen as an alternative financial system for conventional finance. Sharing the risks is the main concept of Islamic finance and one of the main differences between conventional and Islamic finance. Depositors/savers do not bear any risk in conventional finance however Islamic fina...

  13. Risk-sharing agreements in the EU

    DEFF Research Database (Denmark)

    Traulsen, Janine Marie; Traulsen, Janine Marie; Holm-Larsen, Tove

    2017-01-01

    Abstract Objective Our objectives were to explore the changes in the level of interest in risk-sharing agreements (RSAs) in the EU during the last 15 years and the underlying reasons for these changes. Methods A systematic literature review was conducted using PubMed, Scopus, Web of Science...

  14. Risk sources and attitude among the tenants of the Gezira Scheme – Sudan

    Directory of Open Access Journals (Sweden)

    Adam Elhag Ahmed

    2011-06-01

    Full Text Available In this paper, the variance and the expected income–variance risk analysis concepts are used to identify risk sources and attitudes among the Gezira Scheme tenants. Moreover, the study aimed at identifying which crop combination under risk consideration is closer to tenants’ preference. The results showed that sorghum has a high yield variance followed by cotton, wheat, and groundnut. Cotton has the highest output price variance and cost variance than the other crops produced in the scheme. Main risk sources of wheat are output prices, input prices and yield. Although sorghum is riskier in terms of its own variance of gross margins, it remains attractive to the tenants. This is because its gross margins are negatively covariate with the cotton resulting in a more stable total aggregate gross margin. Comparing the results of quadratic risk programming with crop combinations from the tenants point of view scenario, the fourth scenario (with target income of US $994 is the closest crop combination to the tenants’ preference and the tenants in the Gezira Scheme behave in a risk aversion way.

  15. How to Split a Shared Secret into Shared Bits in Constant-Round

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fitzi, Matthias; Nielsen, Jesper Buus

    $ such that $l = \\lceil \\log_2(p) \\rceil$, $a_0, \\ldots, a_{l-1} \\in \\{0,1\\}$ and $a = \\sum_{i=0}^{l-1} a_i 2^i$. Our protocol is secure against active adversaries and works for any linear secret sharing scheme with a multiplication protocol. This result immediately implies solutions to other long-standing open...... problems, such as constant-round and unconditionally secure protocols for comparing shared numbers and deciding whether a shared number is zero. The complexity of our protocol is $O(l \\log(l))$ invocations of the multiplication protocol for the underlying secret sharing scheme, carried out in $O(1)$....

  16. Clarification of nuclear risk recognition scheme through dialogue forum

    International Nuclear Information System (INIS)

    Yagi, Ekou; Takahashi, Makoto; Kitamura, Masaharu

    2007-01-01

    The design framework and operational guidelines for conducting repetitive dialogue between public and nuclear engineers are described in this paper. An action research project named repetitive dialogue forum has been conducted in two municipalities where nuclear facilities were sited. The qualitative evaluation by public participants indicated that the public trust in the nuclear experts, known as the crucial factor for meaningful communication, was successfully established through the dialogue forum. In addition, the expert showed a marked psychological change from distrust to trust in public. Through a detailed analysis of the comments of the participants raised during the forums, the nuclear risk recognition scheme of the public was clarified. The constituents of the risk recognition scheme about nuclear facilities were identified as follows. The first is related to the technical risk recognition factor including purely technical risk, organizational elements and regulatory elements. The second is the social risk recognition factor including economical and mental elements. The last is the communication factor including the influence of mass media, difficulty in frank communication in local community etc. It became clear that the information provision activities conducted by the government and the nuclear industry were lack of in-depth understanding of actual information needs in the public. Provision of information contents consistent with our observations is recommended for reestablishment of public trust in expert and for more informative dialogical interactions. (author)

  17. Esquemas innovadores de mejora del acceso al mercado de nuevas tecnologías: los acuerdos de riesgo compartido Innovative patient access schemes for the adoption of new technology: risk-sharing agreements

    Directory of Open Access Journals (Sweden)

    Jaime Espín

    2010-12-01

    . However, traditional schemes based on fixed prices that fail to consider the product´s appropriacy of use or its results in terms of effectiveness may lead to inefficient decision-making processes. Recently, risk-sharing agreements have appeared as new access schemes based on results that aim to reduce the uncertainty of the distinct health care players involved in reaching an agreement on new health technology financing and conditions of use. Key elements in the debate on these instruments are the huge variety of instruments available (especially those based on results, the implications for different players involved in their design and supervision, and their possible implementation in Spain. Our main conclusion is that risk-sharing agreements should be used in highly limited cases when standard conditions of access cannot be applied due to uncertainty about long-term effectiveness. These measures are aimed not only at regulating price but also at acting on the appropriate use of new technology. However, because international experience is limited, drawing a solid conclusion on the final results of the application of risk-sharing agreements would be premature.

  18. Expert opinion on risks to the long-term viability of residential recycled water schemes: An Australian study.

    Science.gov (United States)

    West, Camilla; Kenway, Steven; Hassall, Maureen; Yuan, Zhiguo

    2017-09-01

    The water sector needs to make efficient and prudent investment decisions by carefully considering the long-term viability of water infrastructure projects. To support the assessment and planning of residential recycled water schemes in Australia, we have sought to clarify scheme objectives and to further define the array of critical risks that can impact the long-term viability of schemes. Building on historical information, we conducted a national survey which elicited responses from 88 Australian expert practitioners, of which 64% have over 10 years of industry experience and 42% have experience with more than five residential recycled water schemes. On the basis of expert opinion, residential recycled water schemes are considered to be highly relevant for diversifying and improving water supply security, reducing wastewater effluent discharge and pollutant load to waterways and contributing to sustainable urban development. At present however, the inability to demonstrate an incontestable business case is posing a significant risk to the long-term viability of residential recycled water schemes. Political, regulatory, organisational and financial factors were also rated as critical risks, in addition to community risk perception and fall in demand. The survey results shed further light on the regulatory environment of residential recycled water schemes, with regulatory participants rating the level and impact of risk factors higher than other survey participants in most cases. The research outcomes provide a comprehensive understanding of the critical risks to the long-term viability of residential recycled water schemes, thereby enabling the specification of targeted risk management measures at the assessment and planning stage of a scheme. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  20. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  1. International Risk-Sharing: Macroeconomic and Financial Aspects

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.

    2008-01-01

    International risk-sharing is one of the most important benefits from the process of international financial integration, which gained in speed, scope, and geographical coverage during the past decades. As long as different national economies are not perfectly correlated, there are possibilities for

  2. Modifiable risk factors for schizophrenia and autism--shared risk factors impacting on brain development.

    Science.gov (United States)

    Hamlyn, Jess; Duhig, Michael; McGrath, John; Scott, James

    2013-05-01

    Schizophrenia and autism are two poorly understood clinical syndromes that differ in age of onset and clinical profile. However, recent genetic and epidemiological research suggests that these two neurodevelopmental disorders share certain risk factors. The aims of this review are to describe modifiable risk factors that have been identified in both disorders, and, where available, collate salient systematic reviews and meta-analyses that have examined shared risk factors. Based on searches of Medline, Embase and PsycINFO, inspection of review articles and expert opinion, we first compiled a set of candidate modifiable risk factors associated with autism. Where available, we next collated systematic-reviews (with or without meta-analyses) related to modifiable risk factors associated with both autism and schizophrenia. We identified three modifiable risk factors that have been examined in systematic reviews for both autism and schizophrenia. Advanced paternal age was reported as a risk factor for schizophrenia in a single meta-analysis and as a risk factor in two meta-analyses for autism. With respect to pregnancy and birth complications, for autism one meta-analysis identified maternal diabetes and bleeding during pregnancy as risks factors for autism whilst a meta-analysis of eight studies identified obstetric complications as a risk factor for schizophrenia. Migrant status was identified as a risk factor for both autism and schizophrenia. Two separate meta-analyses were identified for each disorder. Despite distinct clinical phenotypes, the evidence suggests that at least some non-genetic risk factors are shared between these two syndromes. In particular, exposure to drugs, nutritional excesses or deficiencies and infectious agents lend themselves to public health interventions. Studies are now needed to quantify any increase in risk of either autism or schizophrenia that is associated with these modifiable environmental factors. Copyright © 2012 Elsevier Inc

  3. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  4. Can't get no satisfaction? Will pay for performance help?: toward an economic framework for understanding performance-based risk-sharing agreements for innovative medical products.

    Science.gov (United States)

    Towse, Adrian; Garrison, Louis P

    2010-01-01

    --in principle--risk sharing can provide manufacturers and payers additional real options that increase overall efficiency. Given the lack of empirical evidence on the success of schemes already agreed and on the issues we set out above, it is too early to tell if the recent surge of interest in these arrangements is likely to be a trend or only a fad.

  5. Pension systems, intergenerational risk sharing and inflation

    NARCIS (Netherlands)

    Beetsma, R.M.W.J.; Bovenberg, A.L.

    2006-01-01

    We investigate intergenerational risk sharing in two-pillar pension systems with a pay-as-you-go pillar and a funded pillar. We consider shocks in productivity, depreciation of capital and inflation. The funded pension pillar can be either defined contribution or defined benefit, with benefits

  6. The simple economics of risk-sharing agreements between the NHS and the pharmaceutical industry.

    Science.gov (United States)

    Barros, Pedro Pita

    2011-04-01

    The introduction of new (and expensive) pharmaceutical products is one of the major challenges for health systems. The search for new institutional arrangements is natural. The use of the so-called risk-sharing agreements is one example. Recent discussions have somewhat neglected the economic fundamentals underlying risk-sharing agreements. We argue here that risk-sharing agreements, although attractive due to the principle of paying by results, also entail risks. Too many patients may be put under treatment. Prices are likely to be adjusted upward, in anticipation of future risk-sharing agreements between the pharmaceutical company and the third-party payer. An available instrument is a verification cost per patient treated, which allows obtaining the first-best allocation of patients to the new treatment, under the agreement. Overall, the welfare effects of risk-sharing agreements are ambiguous, and caution is urged regarding their use. Copyright © 2010 John Wiley & Sons, Ltd.

  7. Quantum state sharing against the controller's cheating

    Science.gov (United States)

    Shi, Run-hua; Zhong, Hong; Huang, Liu-sheng

    2013-08-01

    Most existing QSTS schemes are equivalent to the controlled teleportation, in which a designated agent (i.e., the recoverer) can recover the teleported state with the help of the controllers. However, the controller may attempt to cheat the recoverer during the phase of recovering the secret state. How can we detect this cheating? In this paper, we considered the problem of detecting the controller's cheating in Quantum State Sharing, and further proposed an effective Quantum State Sharing scheme against the controller's cheating. We cleverly use Quantum Secret Sharing, Multiple Quantum States Sharing and decoy-particle techniques. In our scheme, via a previously shared entanglement state Alice can teleport multiple arbitrary multi-qubit states to Bob with the help of Charlie. Furthermore, by the classical information shared previously, Alice and Bob can check whether there is any cheating of Charlie. In addition, our scheme only needs to perform Bell-state and single-particle measurements, and to apply C-NOT gate and other single-particle unitary operations. With the present techniques, it is feasible to implement these necessary measurements and operations.

  8. Impact of renewables on electricity markets – Do support schemes matter?

    International Nuclear Information System (INIS)

    Winkler, Jenny; Gaio, Alberto; Pfluger, Benjamin; Ragwitz, Mario

    2016-01-01

    Rising renewable shares influence electricity markets in several ways: among others, average market prices are reduced and price volatility increases. Therefore, the “missing money problem” in energy-only electricity markets is more likely to occur in systems with high renewable shares. Nevertheless, renewables are supported in many countries due to their expected benefits. The kind of support instrument can however influence the degree to which renewables influence the market. While fixed feed-in tariffs lead to higher market impacts, more market-oriented support schemes such as market premiums, quota systems and capacity-based payments decrease the extent to which markets are affected. This paper analyzes the market impacts of different support schemes. For this purpose, a new module is added to an existing bottom-up simulation model of the electricity market. In addition, different degrees of flexibility in the electricity system are considered. A case study for Germany is used to derive policy recommendations regarding the choice of support scheme. - Highlights: •Renewable support schemes matter regarding the impact on electricity markets. •Market-oriented support schemes reduce the impact on electricity markets. •More flexible electricity systems reduce the need for market participation. •Sliding premiums combine market integration with a productive risk allocation.

  9. Multi-group dynamic quantum secret sharing with single photons

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongwei [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Ma, Haiqiang, E-mail: hqma@bupt.edu.cn [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Wei, Kejin [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Yang, Xiuqing [School of Science, Beijing Jiaotong University, Beijing 100044 (China); Qu, Wenxiu; Dou, Tianqi; Chen, Yitian; Li, Ruixue; Zhu, Wu [School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2016-07-15

    In this letter, we propose a novel scheme for the realization of single-photon dynamic quantum secret sharing between a boss and three dynamic agent groups. In our system, the boss can not only choose one of these three groups to share the secret with, but also can share two sets of independent keys with two groups without redistribution. Furthermore, the security of communication is enhanced by using a control mode. Compared with previous schemes, our scheme is more flexible and will contribute to a practical application. - Highlights: • A multi-group dynamic quantum secret sharing with single photons scheme is proposed. • Any one of the groups can be chosen to share secret through controlling the polarization of photons. • Two sets of keys can be shared simultaneously without redistribution.

  10. Current status and trends in performance-based risk-sharing arrangements between healthcare payers and medical product manufacturers.

    Science.gov (United States)

    Carlson, Josh J; Gries, Katharine S; Yeung, Kai; Sullivan, Sean D; Garrison, Louis P

    2014-06-01

    Our objective was to identify and characterize publicly available cases and related trends for performance-based risk-sharing arrangements (PBRSAs). We performed a review of PBRSAs over the past 20 years (1993-2013) using available databases and reports from colleagues and healthcare experts. These were categorized according to a previously published taxonomy of scheme types and assessed in terms of the underlying product and market attributes for each scheme. Macro-level trends were identified related to the timing of scheme adoption, countries involved, types of arrangements, and product and market factors. Our search yielded 148 arrangements. From this set, 65 arrangements included a coverage with an evidence development component, 20 included a conditional treatment continuation component, 54 included a performance-linked reimbursement component, and 42 included a financial utilization component. Each type of scheme addresses fundamental uncertainties that exist when products enter the market. The pace of adoption appears to be slowing, but new countries continue to implement PBRSAs. Over this 20-year period, there has been a consistent movement toward arrangements that minimize administrative burden. In conclusion, the pace of PBRSA adoption appears to be slowing but still has traction in many health systems. These remain a viable coverage and reimbursement mechanism for a wide range of medical products. The long-term viability and growth of these arrangements will rest in the ability of the parties to develop mutually beneficial arrangements that entail minimal administrative burden in their development and implementation.

  11. Online Information Sharing About Risks : The Case of Organic Food

    NARCIS (Netherlands)

    Hilverda, Femke; Kuttschreuter, Margôt

    2018-01-01

    Individuals have to make sense of an abundance of information to decide whether or not to purchase certain food products. One of the means to sense-making is information sharing. This article reports on a quantitative study examining online information sharing behavior regarding the risks of organic

  12. Sharing possibilities amongst CDMA Mobile Satellite Systems, and impacts of terminal characteristics on sharing

    Science.gov (United States)

    Bambace, Luís Antonio Waack; Ceballos, Décio Castilho

    CDMA Mobile Satellite Systems (CDMA MSS) are able to co-directional, co-frequency and co-coverage sharing, and they are strongly interdependent in case of such a sharing. It is also known that the success of any telecommunication project is the use of the correct media to each task. Operators have a clear sight of such a media adequacy in traditional systems, but not necessarily in the case of Mobile Satellite Systems. This creates a risk that a wrong market objective operator causes trouble to other systems. This paper deals with the sharing alternatives for up to four CDMA MSS operating in the same frequency band, and analysts both: satellite to user downlink and user to satellite uplink. The influence of several items in capacity is here treated. The scope includes: downlink power flux density: code availability; single system internal interference; inter-system interference; diversity schemes: average link impairments, margins; user cooperation; terminal specifications and the dependence of the insulation between RHCP and LHCP with fade.

  13. Risk Management Collaboration through Sharing Interactive Graphics

    Science.gov (United States)

    Slingsby, Aidan; Dykes, Jason; Wood, Jo; Foote, Matthew

    2010-05-01

    Risk management involves the cooperation of scientists, underwriters and actuaries all of whom analyse data to support decision-making. Results are often disseminated through static documents with graphics that convey the message the analyst wishes to communicate. Interactive graphics are increasingly popular means of communicating the results of data analyses because they enable other parties to explore and visually analyse some of the data themselves prior to and during discussion. Discussion around interactive graphics can occur synchronously in face-to-face meetings or with video-conferencing and screen sharing or they can occur asynchronously through web-sites such as ManyEyes, web-based fora, blogs, wikis and email. A limitation of approaches that do not involve screen sharing is the difficulty in sharing the results of insights from interacting with the graphic. Static images accompanied can be shared but these themselves cannot be interacted, producing a discussion bottleneck (Baker, 2008). We address this limitation by allowing the state and configuration of graphics to be shared (rather than static images) so that a user can reproduce someone else's graphic, interact with it and then share the results of this accompanied with some commentary. HiVE (Slingsby et al, 2009) is a compact and intuitive text-based language that has been designed for this purpose. We will describe the vizTweets project (a 9-month project funded by JISC) in which we are applying these principles to insurance risk management in the context of the Willis Research Network, the world's largest collaboration between the insurance industry and the academia). The project aims to extend HiVE to meet the needs of the sector, design, implement free-available web services and tools and to provide case studies. We will present a case study that demonstrate the potential of this approach for collaboration within the Willis Research Network. Baker, D. Towards Transparency in Visualisation Based

  14. Coordination Scheme for Restructuring Business Operation of the Single Period Newsvendor Problem

    Directory of Open Access Journals (Sweden)

    Chiuh-Cheng Chyu

    2013-01-01

    Full Text Available This paper presents a coordination scheme for a single period newsvendor problem when both supplier and retailer of the supply chain agree to change the business operation from a market decision power sharing system (Model 1 to a unique decision maker system (Model 2. The supplier is assumed to be a risk-averse decision maker and he will undertake the product quality risk in both models. Model 1 is game theoretic, where the supplier controls the wholesale price, but the retailer controls the order quantity and market price. The bargaining process ends when the supplier has found a wholesale price that maximizes the value of his sales revenue minus the product quality cost. Model 2 is a centralized system where the supplier possesses all decision powers of the market. In general, Model 2 will generate higher total revenue than Model 1. The aim of this research is to propose a satisfying compromise based on consignment policy to resolve the revenue-sharing conflict in Model 2 due to the additional revenue. An example is provided to illustrate the two models and the proposed coordination scheme, along with managerial insights on the models’ benefits. The impacts of several parameters on the scheme are also presented and discussed.

  15. Multi-period risk sharing under financial fairness

    NARCIS (Netherlands)

    Bao, Hailong; Ponds, Eduard; Schumacher, Hans

    We work with a multi-period system where a finite number of agents need to share multiple monetary risks. We look for the solutions that are both Pareto efficient utility-wise and financially fair value-wise. A buffer enables the inter-temporal capital transfer. Expected utility is used to evaluate

  16. Multi-Period Risk Sharing under Financial Fairness

    NARCIS (Netherlands)

    Bao, Hailong; Ponds, Eduard; Schumacher, Hans

    2015-01-01

    We work with a multi-period system where a finite number of agents need to share multiple monetary risks. We look for the solutions that are both Pareto efficient utility-wise and financially fair value-wise. A buffer enables the inter-temporal capital transfer. Expected utility is used to evaluate

  17. A risk-based classification scheme for genetically modified foods. I: Conceptual development.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    The predominant paradigm for the premarket assessment of genetically modified (GM) foods reflects heightened public concern by focusing on foods modified by recombinant deoxyribonucleic acid (rDNA) techniques, while foods modified by other methods of genetic modification are generally not assessed for safety. To determine whether a GM product requires less or more regulatory oversight and testing, we developed and evaluated a risk-based classification scheme (RBCS) for crop-derived GM foods. The results of this research are presented in three papers. This paper describes the conceptual development of the proposed RBCS that focuses on two categories of adverse health effects: (1) toxic and antinutritional effects, and (2) allergenic effects. The factors that may affect the level of potential health risks of GM foods are identified. For each factor identified, criteria for differentiating health risk potential are developed. The extent to which a GM food satisfies applicable criteria for each factor is rated separately. A concern level for each category of health effects is then determined by aggregating the ratings for the factors using predetermined aggregation rules. An overview of the proposed scheme is presented, as well as the application of the scheme to a hypothetical GM food.

  18. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge

    2002-01-01

    A black-box secret sharing scheme for the threshold access structure T t,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say, a given finite field) in that distribution matrix and reconstruction vectors...... are defined over ℤ and are designed independently of the group G from which the secret and the shares are sampled. This means that perfect completeness and perfect privacy are guaranteed regardless of which group G is chosen. We define the black-box secret sharing problem as the problem of devising......, for an arbitrary given T t,n , a scheme with minimal expansion factor, i.e., where the length of the full vector of shares divided by the number of players n is minimal. Such schemes are relevant for instance in the context of distributed cryptosystems based on groups with secret or hard to compute group order...

  19. Balancing the risks and benefits of genomic data sharing: genome research participants' perspectives.

    Science.gov (United States)

    Oliver, J M; Slashinski, M J; Wang, T; Kelly, P A; Hilsenbeck, S G; McGuire, A L

    2012-01-01

    Technological advancements are rapidly propelling the field of genome research forward, while lawmakers attempt to keep apace with the risks these advances bear. Balancing normative concerns of maximizing data utility and protecting human subjects, whose privacy is at risk due to the identifiability of DNA data, are central to policy decisions. Research on genome research participants making real-time data sharing decisions is limited; yet, these perspectives could provide critical information to ongoing deliberations. We conducted a randomized trial of 3 consent types affording varying levels of control over data release decisions. After debriefing participants about the randomization process, we invited them to a follow-up interview to assess their attitudes toward genetic research, privacy and data sharing. Participants were more restrictive in their reported data sharing preferences than in their actual data sharing decisions. They saw both benefits and risks associated with sharing their genomic data, but risks were seen as less concrete or happening in the future, and were largely outweighed by purported benefits. Policymakers must respect that participants' assessment of the risks and benefits of data sharing and their privacy-utility determinations, which are associated with their final data release decisions, vary. In order to advance the ethical conduct of genome research, proposed policy changes should carefully consider these stakeholder perspectives. Copyright © 2011 S. Karger AG, Basel.

  20. A no-key-exchange secure image sharing scheme based on Shamir's three-pass cryptography protocol and the multiple-parameter fractional Fourier transform.

    Science.gov (United States)

    Lang, Jun

    2012-01-30

    In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.

  1. 75 FR 16821 - Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2010-04-02

    ...The proposed information collection requirement described below has been submitted to the Office of Management and Budget (OMB) for review, as required by the Paperwork Reduction Act. The Department is soliciting public comments on the subject proposal. Section 542(c) of the Risk Sharing Program authorizes qualified Housing Finance Agencies (HFAs) to underwrite and process loans. HUD provides full mortgage insurance on affordable multifamily housing project processed by HFAs under this program. Qualified HFAs are vested with the maximum amount of processing responsibilities. By entering into Risk-Sharing Agreement with HUD, HFAs contract to reimburse HUD for a portion of the loss from any defaults that occur while HUD insurance is in force.

  2. Security of a kind of quantum secret sharing with entangled states.

    Science.gov (United States)

    Wang, Tian-Yin; Liu, Ying-Zhao; Wei, Chun-Yan; Cai, Xiao-Qiu; Ma, Jian-Feng

    2017-05-30

    We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others' cooperation. Furthermore, we establish a general model for this kind of quantum secret sharing schemes and then give some necessary conditions to design a secure quantum secret sharing scheme under this model.

  3. A decision-support scheme for mapping endangered areas in pest risk analysis

    NARCIS (Netherlands)

    Baker, R.H.A.; Benninga, J.; Bremmer, J.; Brunel, S.; Dupin, M.; Eyre, D.; Ilieva, Z.; Jarosik, V.; Kehlenbeck, H.; Kriticos, D.J.; Makowski, D.; Pergl, J.; Reynaud, P.; Robinet, C.; Soliman, T.; Werf, van der W.; Worner, S.

    2012-01-01

    This paper describes a decision-support scheme (DSS) for mapping the area where economically important loss is likely to occur (the endangered area). It has been designed by the PRATIQUE project to help pest risk analysts address the numerous risk mapping challenges and decide on the most suitable

  4. ACCESS TO FINANCE FOR SMEs BY CREDIT GUARANTEE SCHEMES IN TURKEY

    OpenAIRE

    Sarigul, Hasmet

    2013-01-01

    Credit guarantee schemes assist banks in lending to SMEs by overcoming collateral problems. The guarantees are used to share the risk between the bank and the guarantee institution in an agreed ratio. Thus, the bank’s risk and operation costs are lowered and its returns increased. This encourages banks to lend to SMEs who are unable to provide adequate collateral. In our study, we investigate the relationship between SMEs, banks and CGSs. We also aimed to explain the functioning of CGSs...

  5. The Influence of Employee Share Ownership Schemes on Firm Performance: the Case of Zimbabwean Firms

    Directory of Open Access Journals (Sweden)

    Maxwell Sandada

    2016-04-01

    Full Text Available The purpose of this study was to examine the influence of employee share ownership schemes on firm performance in the case of Zimbabwean companies. The study sought to provide valuable insights on the influence of this initiative on employee productivity and organisational performance in Zimbabwe. A cross sectional design was employed to collect data from Confederation of Zimbabwe Industry listed companies using simple random sampling. The study revealed that financial benefits from EOSs, employee participation, ECOS communication and percentage of shareholding have a significant positive relationship with firm performance. The study has important implications for the implementation and management of ESOs in the context of a development country such as Zimbabwe.

  6. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Nam Kim

    2008-07-01

    Full Text Available The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  7. 78 FR 52962 - 60-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-08-27

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Assistant Secretary... Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of Request (i.e. new, revision... Secretary to implement risk sharing with State and local housing finance agencies (HFAs). Under this program...

  8. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  9. From Risks to Shared Value? Corporate Strategies in Building a Global Water Accounting and Disclosure Regime

    Directory of Open Access Journals (Sweden)

    Marco A. Daniel

    2012-10-01

    Full Text Available The current debate on water accounting and accountability among transnational actors such as corporations and NGOs is likely to contribute to the emergence of a global water governance regime. Corporations within the food and beverage sector (F-B are especially vulnerable to water risks; therefore, in this article we analyse motivations and strategies of the major F-B corporations participating in the debate and developing different water accounting, disclosure and risk-assessment tools. Neo-institutionalism and neo-Gramscian regime theory provide the basis for our framework to analyse the discursive, material and organisational corporate water strategies. Findings based on an analysis of the chosen F-B corporations’ sustainability reports and interviews with key informants suggest that the corporations share similar goals and values with regard to the emerging regime. They seek a standardisation that is practical and supportive in improving their water efficiency and communication with stakeholders. This indicates that some harmonisation has taken place over time and new actors have been pursuing the path of the pioneering companies, but the lead corporations are also differentiating their strategies, thus engaging in hegemonic positioning. However, so far the plethora of NGO-driven accountability initiatives and tools has fragmented the field more than 'war of position' amongst the corporations. Furthermore, several companies claim to have proceeded from internal water-risk management to reducing risks throughout their value chains and watersheds. As a result they are 'creating shared value' with stakeholders, and potentially manifesting an emergent paradigm that goes beyond a private regime framework. Nevertheless, in the absence of verification schemes, questions of sustainability and legitimacy of such actions on the ground prevail and remain a topic for further research.

  10. Single-Qubit Operation Sharing with Bell and W Product States

    International Nuclear Information System (INIS)

    Ji Qi-Bin; Liu Xian-Song; Yin Xiao-Feng; Zhang Zhan-Jun; Liu Yi-Min

    2013-01-01

    Two tripartite schemes are put forward with shared entanglements and Local Operation and Classical Communication (LOCC) for sharing an operation on a remote target sate. The first scheme uses a Bell and a symmetric W states as quantum channels, while the second replaces the symmetric W state by an asymmetric one. Both schemes are treated and compared from the aspects of quantum resource consumption, operation complexity, classical resource consumption, success probability and efficiency. It is found that the latter scheme is better than the former one. Particularly, the sharing can be achieved only probabilistically with the first scheme deterministically with the second one. (general)

  11. Secret Sharing and Secure Computing from Monotone Formulae

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Miltersen, Peter Bro

    2012-01-01

    We present a construction of log-depth formulae for various threshold functions based on atomic threshold gates of constant size. From this, we build a new family of linear secret sharing schemes that are multiplicative, scale well as the number of players increases and allows to raise a shared...... of our scheme for pseudorandom secret sharing as defined by Cramer, Damgård and Ishai...

  12. An Evaluation of Interference Mitigation Schemes for HAPS Systems

    Directory of Open Access Journals (Sweden)

    Kim Nam

    2008-01-01

    Full Text Available Abstract The International Telecommunication Union-Radiocommunication sector (ITU-R has conducted frequency sharing studies between fixed services (FSs using a high altitude platform station (HAPS and fixed-satellite services (FSSs. In particular, ITU-R has investigated the power limitations related to HAPS user terminals (HUTs to facilitate frequency sharing with space station receivers. To reduce the level of interference from the HUTs that can harm a geostationary earth orbit (GEO satellite receiver in a space station, previous studies have taken two approaches: frequency sharing using a separated distance (FSSD and frequency sharing using power control (FSPC. In this paper, various performance evaluation results of interference mitigation schemes are presented. The results include performance evaluations using a new interference mitigation approach as well as conventional approaches. An adaptive beamforming scheme (ABS is introduced as a new scheme for efficient frequency sharing, and the interference mitigation effect on the ABS is examined considering pointing mismatch errors. The results confirm that the application of ABS enables frequency sharing between two systems with a smaller power reduction of HUTs in a cocoverage area compared to this reduction when conventional schemes are utilized. In addition, the analysis results provide the proper amount of modification at the transmitting power level of the HUT required for the suitable frequency sharing.

  13. Rural health prepayment schemes in China: towards a more active role for government.

    Science.gov (United States)

    Bloom, G; Shenglan, T

    1999-04-01

    A large majority of China's rural population were members of health prepayment schemes in the 1970's. Most of these schemes collapsed during the transition to a market economy. Some localities subsequently reestablished schemes. In early 1997 a new government policy identified health prepayment as a major potential source of rural health finance. This paper draws on the experience of existing schemes to explore how government can support implementation of this policy. The decision to support the establishment of health prepayment schemes is part of the government's effort to establish new sources of finance for social services. It believes that individuals are more likely to accept voluntary contributions to a prepayment scheme than tax increases. The voluntary nature of the contributions limits the possibilities for risk-sharing and redistribution between rich and poor. This underlines the need for the government to fund a substantial share of health expenditure out of general revenues, particularly in poor localities. The paper notes that many successful prepayment schemes depend on close supervision by local political leaders. It argues that the national programme will have to translate these measures into a regulatory system which defines the responsibilities of scheme management bodies and local governments. A number of prepayment schemes have collapsed because members did not feel they got value for money. Local health bureaux will have to cooperate with prepayment schemes to ensure that health facilities provide good quality services at a reasonable cost. Users' representatives can also monitor performance. The paper concludes that government needs to clarify the relationship between health prepayment schemes and other actors in rural localities in order to increase the chance that schemes will become a major source rural health finance.

  14. Perception and Management of Risk in Internet-Based Peer-to-Peer Milk-Sharing

    Science.gov (United States)

    Gribble, Karleen D.

    2014-01-01

    The perception and management of the risks of peer-to-peer milk sharing was explored via a written questionnaire administered to 97 peer milk donors and 41 peer milk recipients who were recruited via Facebook. All recipients' respondents were aware that there were risks associated with using peer-shared milk and took action to mitigate these…

  15. 78 FR 64145 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-10-25

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Title of Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502... sharing with State and local housing finance agencies (HFAs). Under this program, HUD provides full...

  16. (t, n) Threshold d-Level Quantum Secret Sharing.

    Science.gov (United States)

    Song, Xiu-Li; Liu, Yan-Bing; Deng, Hong-Yao; Xiao, Yong-Gang

    2017-07-25

    Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected. In this paper, we propose a (t, n) threshold d-level QSS scheme, in which the d-level secret can be reconstructed only if at least t shares are collected. Compared with (n, n) threshold 2-level QSS, the proposed QSS provides better universality, flexibility, and practicability. Moreover, in this scheme, any one of the participants does not know the other participants' shares, even the trusted reconstructor Bob 1 is no exception. The transformation of the particles includes some simple operations such as d-level CNOT, Quantum Fourier Transform(QFT), Inverse Quantum Fourier Transform(IQFT), and generalized Pauli operator. The transformed particles need not to be transmitted from one participant to another in the quantum channel. Security analysis shows that the proposed scheme can resist intercept-resend attack, entangle-measure attack, collusion attack, and forgery attack. Performance comparison shows that it has lower computation and communication costs than other similar schemes when 2 < t < n - 1.

  17. Stochastic Discount Factor Approach to International Risk-Sharing: Evidence from Fixed Exchange Rate Episodes

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.; Kool, C.J.M.

    2007-01-01

    This paper presents evidence of the stochastic discount factor approach to international risk-sharing applied to fixed exchange rate regimes. We calculate risk-sharing indices for two episodes of fixed or very rigid exchange rates: the Eurozone before and after the introduction of the Euro, and

  18. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  19. Is parent-child bed-sharing a risk for wheezing and asthma in early childhood?

    Science.gov (United States)

    Luijk, Maartje P C M; Sonnenschein-van der Voort, Agnes M M; Mileva-Seitz, Viara R; Jansen, Pauline W; Verhulst, Frank C; Hofman, Albert; Jaddoe, Vincent W V; de Jongste, Johan C; van IJzendoorn, Marinus H; Duijts, Liesbeth; Tiemeier, Henning

    2015-03-01

    Household crowding can place young children at risk for respiratory infections which subsequently provoke asthma symptoms. However, crowding might also protect against asthma, in accordance with the hygiene hypothesis. We tested if parent-infant bed-sharing, an important dimension of household crowding, increases or decreases the risk for asthma. In a population-based prospective cohort (N = 6160) we assessed bed-sharing at 2 and 24 months; wheezing between 1 and 6 years of age; and asthma at 6 years of age. Generalised estimating equation models were used to assess repeated measures of wheezing and asthma. We found no association between bed-sharing in early infancy and wheezing or diagnosis of asthma. By contrast, we found a positive association between bed-sharing in toddlerhood and both wheezing (OR 1.42, 95% CI 1.15-1.74) and asthma (OR 1.57, 95% CI 1.03-2.38). Wheezing was not associated with bed-sharing when using cross-lagged modelling. This study suggests that bed-sharing in toddlerhood is associated with an increased risk of asthma at later ages, and not vice versa. Further studies are needed to explore the underlying causal mechanisms. Copyright ©ERS 2015.

  20. Threshold quantum state sharing based on entanglement swapping

    Science.gov (United States)

    Qin, Huawang; Tso, Raylin

    2018-06-01

    A threshold quantum state sharing scheme is proposed. The dealer uses the quantum-controlled-not operations to expand the d-dimensional quantum state and then uses the entanglement swapping to distribute the state to a random subset of participants. The participants use the single-particle measurements and unitary operations to recover the initial quantum state. In our scheme, the dealer can share different quantum states among different subsets of participants simultaneously. So the scheme will be very flexible in practice.

  1. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  2. Assessing the evidence for shared genetic risks across psychiatric disorders and traits.

    Science.gov (United States)

    Martin, Joanna; Taylor, Mark J; Lichtenstein, Paul

    2017-12-04

    Genetic influences play a significant role in risk for psychiatric disorders, prompting numerous endeavors to further understand their underlying genetic architecture. In this paper, we summarize and review evidence from traditional twin studies and more recent genome-wide molecular genetic analyses regarding two important issues that have proven particularly informative for psychiatric genetic research. First, emerging results are beginning to suggest that genetic risk factors for some (but not all) clinically diagnosed psychiatric disorders or extreme manifestations of psychiatric traits in the population share genetic risks with quantitative variation in milder traits of the same disorder throughout the general population. Second, there is now evidence for substantial sharing of genetic risks across different psychiatric disorders. This extends to the level of characteristic traits throughout the population, with which some clinical disorders also share genetic risks. In this review, we summarize and evaluate the evidence for these two issues, for a range of psychiatric disorders. We then critically appraise putative interpretations regarding the potential meaning of genetic correlation across psychiatric phenotypes. We highlight several new methods and studies which are already using these insights into the genetic architecture of psychiatric disorders to gain additional understanding regarding the underlying biology of these disorders. We conclude by outlining opportunities for future research in this area.

  3. Public policy and risk financing strategies for global catastrophe risk management - the role of global risk initiatives

    Science.gov (United States)

    McSharry, Patrick; Mitchell, Andrew; Anderson, Rebecca

    2010-05-01

    Decision-makers in both public and private organisations depend on accurate data and scientific understanding to adequately address climate change and the impact of extreme events. The financial impacts of catastrophes on populations and infrastructure can be offset through effective risk transfer mechanisms, structured to reflect the specific perils and levels of exposure to be covered. Optimal strategies depend on the likely socio-econonomic impact, the institutional framework, the overall objectives of the covers placed and the level of both the frequency and severity of loss potential expected. The diversity of approaches across different countries has been documented by the Spanish "Consorcio de Compensación de Seguros". We discuss why international public/private partnerships are necessary for addressing the risk of natural catastrophes. International initiatives such as the Global Earthquake Model (GEM) and the World Forum of Catastrophe Programmes (WFCP) can provide effective guidelines for constructing natural catastrophe schemes. The World Bank has been instrumental in the creation of many of the existing schemes such as the Turkish Catastrophe Insurance Pool, the Caribbean Catastrophe Risk Insurance Facility and the Mongolian Index-Based Livestock Insurance Program. We review existing schemes and report on best practice in relation to providing protection against natural catastrophe perils. The suitability of catastrophe modelling approaches to support schemes across the world are discussed and we identify opportunities to improve risk assessment for such schemes through transparent frameworks for quantifying, pricing, sharing and financing catastrophe risk on a local and global basis.

  4. Facilitating Shared Understandings of Risk

    DEFF Research Database (Denmark)

    Mitchell, Robb

    This thesis contributes an identification of a key mechanism and its constituent qualities, for facilitating shared understandings of risk. Globalisation and the pace of technological change increases the uncertainties of decision making within many design and innovation practices. Accordingly......, the focus of participatory workshops has expanded towards addressing broader questions of strategy, business models and other organizational and inter-organisational issues. To develop effective partnerships across the boundaries separating companies, I argue that is necessary for those involved to gain...... or proxy for absent others, 4) an incomplete comic with which children could contribute sketched ideas to a design process 5) a table top tool kits for discussing business relationship issues and 5) a number of bespoke interactive sculpture-like artifacts for provoking insights concerning business dilemmas...

  5. Stochastic Discount Factor Approach to International Risk-Sharing:A Robustness Check of the Bilateral Setting

    NARCIS (Netherlands)

    Hadzi-Vaskov, M.; Kool, C.J.M.

    2007-01-01

    This paper presents a robustness check of the stochastic discount factor approach to international (bilateral) risk-sharing given in Brandt, Cochrane, and Santa-Clara (2006). We demonstrate two main inherent limitations of the bilateral SDF approach to international risk-sharing. First, the discount

  6. Pricing schemes for new drugs: a welfare analysis.

    Science.gov (United States)

    Levaggi, Rosella

    2014-02-01

    Drug price regulation is acquiring increasing significance in the investment choices of the pharmaceutical sector. The overall objective is to determine an optimal trade-off between the incentives for innovation, consumer protection, and value for money. However, price regulation is itself a source of distortion. In this study, we examine the welfare properties of listing through a bargaining process and value-based pricing schemes. The latter are superior instruments to uncertain listing processes for maximising total welfare, but the distribution of the benefits between consumers and the industry depends on rate of rebate chosen by the regulator. However, through an appropriate choice, it is always possible to define a value-based pricing scheme with risk sharing, which both consumers and the industry prefer to an uncertain bargaining process. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. A risk-scoring scheme for suicide attempts among patients with bipolar disorder in a Thai patient cohort

    Directory of Open Access Journals (Sweden)

    Patumanond J

    2012-04-01

    Full Text Available Chidchanok Ruengorn1,2, Kittipong Sanichwankul3, Wirat Niwatananun2, Suwat Mahatnirunkul3, Wanida Pumpaisalchai3, Jayanton Patumanond11Clinical Epidemiology Program, Faculty of Medicine, Chiang Mai University, Chiang Mai, Thailand; 2Department of Pharmaceutical Care, Faculty of Pharmacy, Chiang Mai University, Chiang Mai, Thailand; 3Suanprung Psychiatric Hospital, Chiang Mai, ThailandBackground: In Thailand, risk factors associated with suicide attempts in bipolar disorder (BD are rarely investigated, nor has a specific risk-scoring scheme to assist in the identification of BD patients at risk for attempting suicide been proposed.Objective: To develop a simple risk-scoring scheme to identify patients with BD who may be at risk for attempting suicide.Methods: Medical files of 489 patients diagnosed with BD at Suanprung Psychiatric Hospital between October 2006 and May 2009 were reviewed. Cases included BD patients hospitalized due to attempted suicide (n = 58, and seven controls were selected (per suicide case among BD in- and out-patients who did not attempt suicide, with patients being visited the same day or within 1 week of case study (n = 431. Broad sociodemographic and clinical factors were gathered and analyzed using multivariate logistic regression, to obtain a set of risk factors. Scores for each indicator were weighted, assigned, and summed to create a total risk score, which was divided into low, moderate, and high-risk suicide attempt groups.Results: Six statistically significant indicators associated with suicide attempts were included in the risk-scoring scheme: depression, psychotic symptom(s, number of previous suicide attempts, stressful life event(s, medication adherence, and BD treatment years. A total risk score (possible range -1.5 to 11.5 explained an 88.6% probability of suicide attempts based on the receiver operating characteristic (ROC analysis. Likelihood ratios of suicide attempts with low risk scores (below 2

  8. Global bike share: What the data tells us about road safety.

    Science.gov (United States)

    Fishman, Elliot; Schepers, Paul

    2016-02-01

    Bike share has emerged as a rapidly growing mode of transport in over 800 cities globally, up from just a handful in the 1990s. Some analysts had forecast a rise in the number of bicycle crashes after the introduction of bike share, but empirical research on bike share safety is rare. The goal of this study is to examine the impact of bike share programs on cycling safety. The paper has two substudies. Study 1 was a secondary analysis of longitudinal hospital injury data from the Graves et al. (2014) study. It compared cycling safety in cities that introduced bike share programs with cities that did not. Study 2 combined ridership data with crash data of selected North American and European cities to compare bike share users to other cyclists. Study 1 indicated that the introduction of a bike share system was associated with a reduction in cycling injury risk. Study 2 found that bike share users were less likely than other cyclists to sustain fatal or severe injuries. On a per kilometer basis, bike share is associated with decreased risk of both fatal and non-fatal bicycle crashes when compared to private bike riding. The results of this study suggest that concerns of decreased levels of cycling safety are unjustified and should not prevent decision makers from introducing public bike share schemes, especially if combined with other safety measures like traffic calming. Copyright © 2015 Elsevier Ltd and National Safety Council. All rights reserved.

  9. European insurance scheme to cover geological risk related to geothermal operations

    Energy Technology Data Exchange (ETDEWEB)

    Tiberi, U [European Community, General Directorate XVII, ALTERNER Program, Bruxelles (Belgium); Demange, J [BRGM, Orleans (France)

    1997-12-01

    The development of geothermal energy can contribute significantly to the growth of NRE (new and renewable energies that are non-nuclear and non-combustible) within the European Community and within Europe as a whole. However, the `mining risk` related to this type of operation still constitutes a major obstacle to its development. Operators find it difficult to raise the necessary financing without a guarantee against the risk of failure during the drilling stage. Standard insurance companies will not cover this type of risk, due to its very nature. We must thus therefore find a specific solution. As a result of the oil crises during the 1970s, the French Government decided promote the use of renewable energies in France. The support provided to these energies, or at least to geothermal energy, was to set up a scheme whereby the resource is guaranteed. Thus the operator, by subscribing to the scheme, benefits from a guarantee of the resource. The insurance works at two level: - in the first place, it covers the mining risk during the drilling stage, i.e. should the resource prove to be insufficient, whether in discharge or temperature, for an economically viable operation, then the totality of the costs are reimbursed, apart form the premium and any government subsidy that might have been received. - A second level of guarantee covers the risk of change in the resource`s parameters over a period of 15 years (a study is in progress to consider the possibility of extending this period to 25 years). (orig.)

  10. Human and animal sentinels for shared health risks

    Directory of Open Access Journals (Sweden)

    Peter Rabinowitz, MD, MPH

    2009-03-01

    Full Text Available The tracking of sentinel health events in humans in order to detect and manage disease risks facing a larger population is a well accepted technique applied to influenza, occupational conditions and emerging infectious diseases. Similarly, animal health professionals routinely track disease events in sentinel animal colonies and sentinel herds. The use of animals as sentinels for human health threats, or of humans as sentinels for animal disease risk, dates back at least to the era when coal miners brought caged canaries into mines to provide early warning of toxic gases. Yet the full potential of linking animal and human health information to provide warning of such ‘shared risks’ from environmental hazards has not been realised. Reasons appear to include the professional segregation of human and animal health communities, the separation of human and animal surveillance data and evidence gaps in the linkages between human and animal responses to environmental health hazards. The ‘One Health initiative’ and growing international collaboration in response to pandemic threats, coupled with development in the fields of informatics and genomics, hold promise for improved sentinel event coordination in order to detect and reduce environmental health threats shared between species.

  11. Who Should I Share Risk with? Gifts can tell : Theory and Evidence from Rural China

    NARCIS (Netherlands)

    Wang, Ruixin

    2016-01-01

    This paper studies how gift exchange may help to overcome limited commitment problem in risk sharing. When efficient contract enforcement is lacking, people rely on friends (or relatives) to share risk since emotional or moral cost of defaulting between friends can help to prevent moral hazard. The

  12. Sharing as risk pooling in a social dilemma experiment

    Directory of Open Access Journals (Sweden)

    Todd L. Cherry

    2015-03-01

    Full Text Available In rural economies with missing or incomplete markets, idiosyncratic risk is frequently pooled through informal networks. Idiosyncratic shocks, however, are not limited to private goods but can also restrict an individual from partaking in or benefiting from a collective activity. In these situations, a group must decide whether to provide insurance to the affected member. We describe results of a laboratory experiment designed to test whether a simple sharing institution can sustain risk pooling in a social dilemma with idiosyncratic risk. We tested whether risk could be pooled without a commitment device and, separately, whether effective risk pooling induced greater cooperation in the social dilemma. We found that even in the absence of a commitment device or reputational considerations, subjects voluntarily pooled risk, thereby reducing variance in individual earnings. In spite of effective risk pooling, however, cooperation in the social dilemma was unaffected.

  13. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  14. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  15. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.

    2014-11-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary receiver (PU-Rx). In this paper, we consider a secondary link composed of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx). The secondary link is allowed to share the spectrum with a primary network composed of multiple PUs communicating over distinct frequency spectra with a primary base station. We develop a transmission scheme where the SU-Tx initially broadcasts a set of random beams over all the available primary spectra for which the PU-Rx sends back the index of the spectrum with the minimum interference level, as well as information that describes the interference value, for each beam. Based on the feedback information on the PU-Rx, the SU-Tx adapts the transmitted beams and then resends the new beams over the best primary spectrum for each beam to the SU-Rx. The SU-Rx selects the beam that maximizes the received signal-to-interference-plus-noise ratio (SINR) to be used in transmission over the next frame. We consider three cases for the level of feedback information describing the interference level. In the first case, the interference level is described by both its magnitude and phase; in the second case, only the magnitude is considered; and in the third case, we focus on a q-bit description of its magnitude. In the latter case, we propose a technique to find the optimal quantizer thresholds in a mean-square-error sense. We also develop a statistical analysis for the SINR statistics and the capacity and bit error rate of the secondary link and present numerical results that study the impact of the different system parameters.

  16. Accounting for Households' Perceived Income Uncertainty in Consumption Risk Sharing

    NARCIS (Netherlands)

    Singh, S.; Stoltenberg, C.A.

    2017-01-01

    We develop a consumption risk-sharing model that distinguishes households' perceived income uncertainty from income uncertainty as measured by an econometrician. Households receive signals on their future disposable income that can drive a gap between the two uncertainties. Accounting for the

  17. A risk-based classification scheme for genetically modified foods. III: Evaluation using a panel of reference foods.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    This paper presents an exploratory evaluation of four functional components of a proposed risk-based classification scheme (RBCS) for crop-derived genetically modified (GM) foods in a concordance study. Two independent raters assigned concern levels to 20 reference GM foods using a rating form based on the proposed RBCS. The four components of evaluation were: (1) degree of concordance, (2) distribution across concern levels, (3) discriminating ability of the scheme, and (4) ease of use. At least one of the 20 reference foods was assigned to each of the possible concern levels, demonstrating the ability of the scheme to identify GM foods of different concern with respect to potential health risk. There was reasonably good concordance between the two raters for the three separate parts of the RBCS. The raters agreed that the criteria in the scheme were sufficiently clear in discriminating reference foods into different concern levels, and that with some experience, the scheme was reasonably easy to use. Specific issues and suggestions for improvements identified in the concordance study are discussed.

  18. Research on Liquidity Risk Evaluation of Chinese A-Shares Market Based on Extension Theory

    Science.gov (United States)

    Bai-Qing, Sun; Peng-Xiang, Liu; Lin, Zhang; Yan-Ge, Li

    This research defines the liquidity risk of stock market in matter-element theory and affair-element theory, establishes the indicator system of the forewarning for liquidity risks,designs the model and the process of early warning using the extension set method, extension dependent function and the comprehensive evaluation model. And the paper studies empirically A-shares market through the data of 1A0001, which prove that the model can better describe liquidity risk of China’s A-share market. At last, it gives the corresponding policy recommendations.

  19. A Regional Decision Support Scheme for Pest Risk Analysis in Southeast Asia.

    Science.gov (United States)

    Soliman, T; MacLeod, A; Mumford, J D; Nghiem, T P L; Tan, H T W; Papworth, S K; Corlett, R T; Carrasco, L R

    2016-05-01

    A key justification to support plant health regulations is the ability of quarantine services to conduct pest risk analyses (PRA). Despite the supranational nature of biological invasions and the close proximity and connectivity of Southeast Asian countries, PRAs are conducted at the national level. Furthermore, some countries have limited experience in the development of PRAs, which may result in inadequate phytosanitary responses that put their plant resources at risk to pests vectored via international trade. We review existing decision support schemes for PRAs and, following international standards for phytosanitary measures, propose new methods that adapt existing practices to suit the unique characteristics of Southeast Asia. Using a formal written expert elicitation survey, a panel of regional scientific experts was asked to identify and rate unique traits of Southeast Asia with respect to PRA. Subsequently, an expert elicitation workshop with plant protection officials was conducted to verify the potential applicability of the developed methods. Rich biodiversity, shortage of trained personnel, social vulnerability, tropical climate, agriculture-dependent economies, high rates of land-use change, and difficulties in implementing risk management options were identified as challenging Southeast Asian traits. The developed methods emphasize local Southeast Asian conditions and could help support authorities responsible for carrying out PRAs within the region. These methods could also facilitate the creation of other PRA schemes in low- and middle-income tropical countries. © 2016 Society for Risk Analysis.

  20. Risk perception about medication sharing among patients: a focus group qualitative study on borrowing and lending of prescription analgesics

    Directory of Open Access Journals (Sweden)

    Markotic F

    2017-02-01

    Full Text Available Filipa Markotic,1 Davorka Vrdoljak,2 Marijana Puljiz,3 Livia Puljak,4 1Centre for Clinical Pharmacology, University Clinical Hospital Mostar, Mostar, Bosnia and Herzegovina; 2Department of Family Medicine, University of Split School of Medicine, Split, 3Family Medicine Clinic, Health Centre Imotski, Kamenmost, 4Laboratory for Pain Research, University of Split School of Medicine, Split, Croatia Background: One form of self-medication is sharing of medications, defined as borrowing or lending medications in situations where the receiver of these drugs is not the individual to whom the medications were allocated. Objective: To explore experiences and opinions of patients about sharing prescription analgesics, reasons for sharing prescription analgesics, the way in which patients choose to share those medications, their awareness of risk regarding sharing prescription analgesics, and how they estimated the potential risk.Methods: This qualitative study was conducted by focus group discussions with 40 participants led by a moderator trained in focus group methodology using a semi-structured moderator guide. Adults aged ≥18 years who had received a prescription for an analgesic at least once in a lifetime were included. Six separate focus groups were conducted to discuss participants’ perception of risks associated with sharing of prescription analgesics among patients. Additionally, participants filled out two questionnaires on demographic data, their own behavior regarding sharing analgesics, and their attitudes about risks associated with sharing prescription analgesics.Results: In a questionnaire, 55% of the participants indicated that they personally shared prescription analgesics, while subsequently in the focus group discussions, 76% confessed to such behavior. Participants recognized certain risks related to sharing of prescription analgesics, mentioned a number of reasons for engaging in such behavior, and indicated certain positive

  1. 78 FR 65696 - 30-Day Notice of Proposed Information Collection: Housing Finance Agency Risk-Sharing Program

    Science.gov (United States)

    2013-11-01

    ... Information Collection: Housing Finance Agency Risk-Sharing Program AGENCY: Office of the Chief Information... Information Collection: Housing Finance Agency Risk- Sharing Program. OMB Approval Number: 2502-0500. Type of... housing finance agencies (HFAs). Under this program, HUD provides full mortgage insurance on multifamily...

  2. Radioactively contaminated areas: Bioindicator species and biomarkers of effect in an early warning scheme for a preliminary risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Lourenço, Joana, E-mail: joanalourenco@ua.pt [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Mendo, Sónia [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Pereira, Ruth [Department of Biology, Faculty of Sciences of the University of Porto & CIIMAR – Interdisciplinary Centre of Marine and Environmental Research & GreenUP/CITAB-UP, Porto (Portugal)

    2016-11-05

    Highlights: • Knowing the most used biomarkers and bioindicators used in radioactive areas. • Understanding of the response similarities between human and non-human biota. • Identifying the knowledge gaps. • Proposing an early warning scheme, to perform a screening evaluation of radioactive areas. • Permitting routine assessments without disturbing and alarming local populations. - Abstract: Concerns about the impacts on public health and on the natural environment have been raised regarding the full range of operational activities related to uranium mining and the rest of the nuclear fuel cycle (including nuclear accidents), nuclear tests and depleted uranium from military ammunitions. However, the environmental impacts of such activities, as well as their ecotoxicological/toxicological profile, are still poorly studied. Herein, it is discussed if organisms can be used as bioindicators of human health effects, posed by lifetime exposure to radioactively contaminated areas. To do so, information was gathered from several studies performed on vertebrates, invertebrate species and humans, living in these contaminated areas. The retrieved information was compared, to determine which are the most used bioindicators and biomarkers and also the similarities between human and non-human biota responses. The data evaluated are used to support the proposal for an early warning scheme, based on bioindicator species and on the most sensitive and commonly shared biomarkers, to perform a screening evaluation of radioactively contaminated sites. This scheme could be used to support decision-making for a deeper evaluation of risks to human health, making it possible to screen a large number of areas, without disturbing and alarming local populations.

  3. Patients who share transparent visit notes with others: characteristics, risks, and benefits.

    Science.gov (United States)

    Jackson, Sara L; Mejilla, Roanne; Darer, Jonathan D; Oster, Natalia V; Ralston, James D; Leveille, Suzanne G; Walker, Jan; Delbanco, Tom; Elmore, Joann G

    2014-11-12

    Inviting patients to read their primary care visit notes may improve communication and help them engage more actively in their health care. Little is known about how patients will use the opportunity to share their visit notes with family members or caregivers, or what the benefits might be. Our goal was to evaluate the characteristics of patients who reported sharing their visit notes during the course of the study, including their views on associated benefits and risks. The OpenNotes study invited patients to access their primary care providers' visit notes in Massachusetts, Pennsylvania, and Washington. Pre- and post-intervention surveys assessed patient demographics, standardized measures of patient-doctor communication, sharing of visit notes with others during the study, and specific health behaviors reflecting the potential benefits and risks of offering patients easy access to their visit notes. More than half (55.43%, 2503/4516) of the participants who reported viewing at least one visit note would like the option of letting family members or friends have their own Web access to their visit notes, and 21.70% (980/4516) reported sharing their visit notes with someone during the study year. Men, and those retired or unable to work, were significantly more likely to share visit notes, and those sharing were neither more nor less concerned about their privacy than were non-sharers. Compared to participants who did not share clinic notes, those who shared were more likely to report taking better care of themselves and taking their medications as prescribed, after adjustment for age, gender, employment status, and study site. One in five OpenNotes patients shared a visit note with someone, and those sharing Web access to their visit notes reported better adherence to self-care and medications. As health information technology systems increase patients' ability to access their medical records, facilitating access to caregivers may improve perceived health

  4. Decreased Risk of Preeclampsia After the Introduction of Universal Voucher Scheme for Antenatal Care and Birth Services in the Republic of Korea.

    Science.gov (United States)

    Choe, Seung-Ah; Min, Hye Sook; Cho, Sung-Il

    2017-01-01

    Objectives A number of interventions to reduce disparities in maternal health have been introduced and implemented without concrete evidence to support them. In Korea, a universal voucher scheme for antenatal care and birth services was initiated in December 2008 to improve Korea's fertility rate. This study explores the risk of preeclampsia after the introduction of a universal voucher scheme. Methods Population-based cohort data from the National Health Insurance Service-National Sample Cohort (NHIS-NSC) covering 2002-2013 were analysed. A generalized linear mixed model (GLMM) was used to estimate the relationship between the risk of preeclampsia and voucher scheme introduction. Results The annual age-adjusted incidence of preeclampsia showed no significant unidirectional change during the study period. In the GLMM analysis, the introduction of a voucher scheme was associated with a reduced risk of preeclampsia, controlling for potential confounding factors. The interaction between household income level and voucher scheme was not significant. Conclusions for Practice This finding suggests that the introduction of a voucher scheme for mothers is related to a reduced risk of preeclampsia even under universal health coverage.

  5. Bleeding risk in 'real world' patients with atrial fibrillation: comparison of two established bleeding prediction schemes in a nationwide cohort

    DEFF Research Database (Denmark)

    Olesen, J B; Lip, G Y H; Hansen, P R

    2011-01-01

    Oral anticoagulation (OAC) in patients with atrial fibrillation (AF) is a double-edged sword, because it decreases the risk of stroke at the cost of an increased risk of bleeding. We compared the performance of a new bleeding prediction scheme, HAS-BLED, with an older bleeding prediction scheme...

  6. Shared Genetic Risk Factors of Intracranial, Abdominal, and Thoracic Aneurysms

    NARCIS (Netherlands)

    van 't Hof, Femke N G; Ruigrok, Ynte M; Lee, Cue Hyunkyu; Ripke, Stephan; Anderson, Graig; de Andrade, Mariza; Baas, Annette F; Blankensteijn, Jan D; Böttinger, Erwin P; Bown, Matthew J; Broderick, Joseph; Bijlenga, Philippe; Carrell, David S; Crawford, Dana C; Crosslin, David R; Ebeling, Christian; Eriksson, Johan G; Fornage, Myriam; Foroud, Tatiana; von Und Zu Fraunberg, Mikael; Friedrich, Christoph M; Gaál, Emília I; Gottesman, Omri; Guo, Dong-Chuan; Harrison, Seamus C; Hernesniemi, Juha; Hofman, Albert; Inoue, Ituro; Jääskeläinen, Juha E; Jones, Gregory T; Kiemeney, Lambertus A L M; Kivisaari, Riku; Ko, Nerissa; Koskinen, Seppo; Kubo, Michiaki; Kullo, Iftikhar J; Kuivaniemi, Helena; Kurki, Mitja I; Laakso, Aki; Lai, Dongbing; Leal, Suzanne M; Lehto, Hanna; LeMaire, Scott A; Low, Siew-Kee; Malinowski, Jennifer; McCarty, Catherine A; Milewicz, Dianna M; Mosley, Thomas H; Nakamura, Yusuke; Nakaoka, Hirofumi; Niemelä, Mika; Pacheco, Jennifer; Peissig, Peggy L; Pera, Joanna; Rasmussen-Torvik, Laura; Ritchie, Marylyn D; Rivadeneira, Fernando; van Rij, Andre M; Santos-Cortez, Regie Lyn P; Saratzis, Athanasios; Slowik, Agnieszka; Takahashi, Atsushi; Tromp, Gerard; Uitterlinden, André G; Verma, Shefali S; Vermeulen, Sita H; Wang, Gao T; Han, Buhm; Rinkel, Gabriël J E; de Bakker, Paul I W

    2016-01-01

    BACKGROUND: Intracranial aneurysms (IAs), abdominal aortic aneurysms (AAAs), and thoracic aortic aneurysms (TAAs) all have a familial predisposition. Given that aneurysm types are known to co-occur, we hypothesized that there may be shared genetic risk factors for IAs, AAAs, and TAAs. METHODS AND

  7. Shared genetic risk factors of intracranial, abdominal, and thoracic aneurysms

    NARCIS (Netherlands)

    van 't Hof, Femke N G; Ruigrok, Ynte M; Lee, Cue Hyunkyu; Ripke, Stephan; Anderson, Graig; de Andrade, Mariza; Baas, Annette F; Blankensteijn, Jan D; Böttinger, Erwin P; Bown, Matthew J; Broderick, Joseph; Bijlenga, Philippe; Carrell, David S; Crawford, Dana C; Crosslin, David R; Ebeling, Christian; Eriksson, Johan G; Fornage, Myriam; Foroud, Tatiana; von Und Zu Fraunberg, Mikael; Friedrich, Christoph M; Gaál, Emília I; Gottesman, Omri; Guo, Dong-Chuan; Harrison, Seamus C; Hernesniemi, Juha; Hofman, Albert; Inoue, Ituro; Jääskeläinen, Juha E; Jones, Gregory T; Kiemeney, Lambertus A L M; Kivisaari, Riku; Ko, Nerissa; Koskinen, Seppo; Kubo, Michiaki; Kullo, Iftikhar J; Kuivaniemi, Helena; Kurki, Mitja I; Laakso, Aki; Lai, Dongbing; Leal, Suzanne M; Lehto, Hanna; LeMaire, Scott A; Low, Siew-Kee; Malinowski, Jennifer; McCarty, Catherine A; Milewicz, Dianna M; Mosley, Thomas H; Nakamura, Yusuke; Nakaoka, Hirofumi; Niemelä, Mika; Pacheco, Jennifer; Peissig, Peggy L; Pera, Joanna; Rasmussen-Torvik, Laura; Ritchie, Marylyn D; Rivadeneira, Fernando; van Rij, Andre M; Santos-Cortez, Regie Lyn P; Saratzis, Athanasios; Slowik, Agnieszka; Takahashi, Atsushi; Tromp, Gerard; Uitterlinden, André G; Verma, Shefali S; Vermeulen, Sita H; Wang, Gao T; Han, Buhm; Rinkel, Gabriël J E; de Bakker, Paul I W

    2016-01-01

    Background--Intracranial aneurysms (IAs), abdominal aortic aneurysms (AAAs), and thoracic aortic aneurysms (TAAs) all have a familial predisposition. Given that aneurysm types are known to co-occur, we hypothesized that there may be shared genetic risk factors for IAs, AAAs, and TAAs. Methods and

  8. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  9. Internal validation of risk models in clustered data: a comparison of bootstrap schemes

    NARCIS (Netherlands)

    Bouwmeester, W.; Moons, K.G.M.; Kappen, T.H.; van Klei, W.A.; Twisk, J.W.R.; Eijkemans, M.J.C.; Vergouwe, Y.

    2013-01-01

    Internal validity of a risk model can be studied efficiently with bootstrapping to assess possible optimism in model performance. Assumptions of the regular bootstrap are violated when the development data are clustered. We compared alternative resampling schemes in clustered data for the estimation

  10. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  11. TEACHING WRITING USING THINK-PAIR-SHARE VIEWED FROM STUDENTS’ LEVEL OF RISK-TAKING

    Directory of Open Access Journals (Sweden)

    Ningtyas Orilina Argawati

    2017-12-01

    Full Text Available Writing is considered as the most difficult skill to master compared with the other skills because it involves many language elements such as content, organization, vocabulary, grammar and mechanics. The research examines the effect of two independent variables (Think-Pair-Share and Direct instruction method on dependent variable (Writing Descriptive skill. The samples were class A1 2016 as the experimental class and A3 2016 as the control class. Each class consisted of 32 students. The instruments used covered the risk-taking’s questionnaire and writing test. Before applying the questionnaire of risk-taking, it was tried out to class A2 2016 to find out the validity and the reliability of the instrument. Meanwhile, before conducting the writing test, it needs to test the readability of the writing instruction. The treatment was conducted in eight meetings, and the 9th meeting was allocated for the post-test. The data were then analyzed using ANOVA and Tukey test. From the analysis, it reveals that: (1 Think-Pair-Share is significantly different from direct instruction method to teach writing; (2 the students with high level of risk-taking have better writing than those with low level of risk-taking; and (3 there is an interaction between teaching methods and the students’ level of risk-taking. Even though Think-Pair-Share is effective to teach writing, teachers must consider about the students’ condition, in this case their level of risk-taking.

  12. Understanding the types of fraud in claims to South African medical schemes.

    Science.gov (United States)

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  13. Accounting for early action in the European Union Emission Trading Scheme

    International Nuclear Information System (INIS)

    Arto, Inaki; Gallastegui, Carmen; Ansuategi, Alberto

    2009-01-01

    In the context of emission markets, failure to include early action (EA) as a criterion when sharing out the reduction effort may be unfair. This paper presents (1) a method based on index decomposition that seeks to quantify EA and (2) a method for determining effort sharing considering EA. It is shown that, in the case of European industry (EU-15) and for the period 1995-2005, EA accounted for a reduction of 21% in energy-related CO 2 emissions. Considering two alternative schemes for sharing out the reduction effort in European industry, equal shares (all industries in all countries reduce their emissions by the same percentage) and taking EA into account, we find that Spain, Austria, Italy, the United Kingdom and Sweden would be better off under an equal shares scheme as opposed to one that takes EA into account. The efforts of the remaining countries would be greater than if EA was taken into account. An equal shares scheme would also greatly benefit the textile, non-metallic mineral, paper and 'other' industries, and would be particularly detrimental to the chemical, non-ferrous and other metal, and engineering industries.

  14. Accounting for early action in the European Union Emission Trading Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Arto, Inaki [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Gallastegui, Carmen [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Ansuategi, Alberto [Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain)

    2009-10-15

    In the context of emission markets, failure to include early action (EA) as a criterion when sharing out the reduction effort may be unfair. This paper presents (1) a method based on index decomposition that seeks to quantify EA and (2) a method for determining effort sharing considering EA. It is shown that, in the case of European industry (EU-15) and for the period 1995-2005, EA accounted for a reduction of 21% in energy-related CO{sub 2} emissions. Considering two alternative schemes for sharing out the reduction effort in European industry, equal shares (all industries in all countries reduce their emissions by the same percentage) and taking EA into account, we find that Spain, Austria, Italy, the United Kingdom and Sweden would be better off under an equal shares scheme as opposed to one that takes EA into account. The efforts of the remaining countries would be greater than if EA was taken into account. An equal shares scheme would also greatly benefit the textile, non-metallic mineral, paper and 'other' industries, and would be particularly detrimental to the chemical, non-ferrous and other metal, and engineering industries. (author)

  15. Indirect Reciprocity, Resource Sharing, and Environmental Risk: Evidence from Field Experiments in Siberia

    Science.gov (United States)

    Howe, E. Lance; Murphy, James J.; Gerkey, Drew; West, Colin Thor

    2016-01-01

    Integrating information from existing research, qualitative ethnographic interviews, and participant observation, we designed a field experiment that introduces idiosyncratic environmental risk and a voluntary sharing decision into a standard public goods game. Conducted with subsistence resource users in rural villages on the Kamchatka Peninsula in Northeast Siberia, we find evidence consistent with a model of indirect reciprocity and local social norms of helping the needy. When participants are allowed to develop reputations in the experiments, as is the case in most small-scale societies, we find that sharing is increasingly directed toward individuals experiencing hardship, good reputations increase aid, and the pooling of resources through voluntary sharing becomes more effective. We also find high levels of voluntary sharing without a strong commitment device; however, this form of cooperation does not increase contributions to the public good. Our results are consistent with previous experiments and theoretical models, suggesting strategic risks tied to rewards, punishments, and reputations are important. However, unlike studies that focus solely on strategic risks, we find the effects of rewards, punishments, and reputations are altered by the presence of environmental factors. Unexpected changes in resource abundance increase interdependence and may alter the costs and benefits of cooperation, relative to defection. We suggest environmental factors that increase interdependence are critically important to consider when developing and testing theories of cooperation PMID:27442434

  16. An Integrated H-G Scheme Identifying Areas for Soil Remediation and Primary Heavy Metal Contributors: A Risk Perspective.

    Science.gov (United States)

    Zou, Bin; Jiang, Xiaolu; Duan, Xiaoli; Zhao, Xiuge; Zhang, Jing; Tang, Jingwen; Sun, Guoqing

    2017-03-23

    Traditional sampling for soil pollution evaluation is cost intensive and has limited representativeness. Therefore, developing methods that can accurately and rapidly identify at-risk areas and the contributing pollutants is imperative for soil remediation. In this study, we propose an innovative integrated H-G scheme combining human health risk assessment and geographical detector methods that was based on geographical information system technology and validated its feasibility in a renewable resource industrial park in mainland China. With a discrete site investigation of cadmium (Cd), arsenic (As), copper (Cu), mercury (Hg) and zinc (Zn) concentrations, the continuous surfaces of carcinogenic risk and non-carcinogenic risk caused by these heavy metals were estimated and mapped. Source apportionment analysis using geographical detector methods further revealed that these risks were primarily attributed to As, according to the power of the determinant and its associated synergic actions with other heavy metals. Concentrations of critical As and Cd, and the associated exposed CRs are closed to the safe thresholds after remediating the risk areas identified by the integrated H-G scheme. Therefore, the integrated H-G scheme provides an effective approach to support decision-making for regional contaminated soil remediation at fine spatial resolution with limited sampling data over a large geographical extent.

  17. Risk aversion affects economic values of blue fox breeding scheme.

    Science.gov (United States)

    Peura, J; Kempe, R; Strandén, I; Rydhmer, L

    2016-12-01

    The profit and production of an average Finnish blue fox farm was simulated using a deterministic bio-economic farm model. Risk was included using Arrow-Prat absolute risk aversion coefficient and profit variance. Risk-rated economic values were calculated for pregnancy rate, litter loss, litter size, pelt size, pelt quality, pelt colour clarity, feed efficiency and eye infection. With high absolute risk aversion, economic values were lower than with low absolute risk aversion. Economic values were highest for litter loss (18.16 and 26.42 EUR), litter size (13.27 and 19.40 EUR), pregnancy (11.99 and 18.39 EUR) and eye infection (12.39 and 13.81 EUR). Sensitivity analysis showed that selection pressure for improved eye health depended strongly on proportion of culled animals among infected animals and much less on the proportion of infected animals. The economic value of feed efficiency was lower than expected (6.06 and 8.03 EUR). However, it was almost the same magnitude as pelt quality (7.30 and 7.30 EUR) and higher than the economic value of pelt size (3.37 and 5.26 EUR). Risk factors should be considered in blue fox breeding scheme because they change the relative importance of traits. © 2016 Blackwell Verlag GmbH.

  18. Impact of catch shares on diversification of fishers' income and risk.

    Science.gov (United States)

    Holland, Daniel S; Speir, Cameron; Agar, Juan; Crosson, Scott; DePiper, Geret; Kasperski, Stephen; Kitts, Andrew W; Perruso, Larry

    2017-08-29

    Many fishers diversify their income by participating in multiple fisheries, which has been shown to significantly reduce year-to-year variation in income. The ability of fishers to diversify has become increasingly constrained in the last few decades, and catch share programs could further reduce diversification as a result of consolidation. This could increase income variation and thus financial risk. However, catch shares can also offer fishers opportunities to enter or increase participation in catch share fisheries by purchasing or leasing quota. Thus, the net effect on diversification is uncertain. We tested whether diversification and variation in fishing revenues changed after implementation of catch shares for 6,782 vessels in 13 US fisheries that account for 20% of US landings revenue. For each of these fisheries, we tested whether diversification levels, trends, and variation in fishing revenues changed after implementation of catch shares, both for fishers that remained in the catch share fishery and for those that exited but remained active in other fisheries. We found that diversification for both groups was nearly always reduced. However, in most cases, we found no significant change in interannual variation of revenues, and, where changes were significant, variation decreased nearly as often as it increased.

  19. Patients Who Share Transparent Visit Notes With Others: Characteristics, Risks, and Benefits

    OpenAIRE

    Jackson, Sara L; Mejilla, Roanne; Darer, Jonathan D; Oster, Natalia V; Ralston, James D; Leveille, Suzanne G; Walker, Jan; Delbanco, Tom; Elmore, Joann G

    2014-01-01

    Background Inviting patients to read their primary care visit notes may improve communication and help them engage more actively in their health care. Little is known about how patients will use the opportunity to share their visit notes with family members or caregivers, or what the benefits might be. Objective Our goal was to evaluate the characteristics of patients who reported sharing their visit notes during the course of the study, including their views on associated benefits and risks....

  20. The Sharing Economy and the Future of Personal Mobility: New Models Based on Car Sharing

    Directory of Open Access Journals (Sweden)

    Olga Novikova

    2017-08-01

    Full Text Available The sharing economy is an emerging phenomenon that shapes the cultural, economic, and social landscape of our modern world. With variations of the concept of the sharing economy emerging in so many fields, the area of shared mobility – the shared use of a motor vehicle, bicycle, or other mode that enables travellers to gain short-term access to transportation modes on an on-demand basis – has developed as the forerunner of the transformation to be expected in other areas. This article examines how the sphere of personal mobility has been affected by the growth of sharing economy. It contributes to the growing body of shared mobility literature by uncovering innovative mobility-based models that represent solutions on the intersection of shared mobility, physical infrastructure, and integrated-mobility schemes.

  1. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed; Qaraqe, Khalid; Alouini, Mohamed-Slim

    2012-01-01

    users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a

  2. Two-out-of-two color matching based visual cryptography schemes.

    Science.gov (United States)

    Machizaud, Jacques; Fournel, Thierry

    2012-09-24

    Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.

  3. Risk Sharing in Corporate and Public Finance: The Contribution of Islamic Finance

    Directory of Open Access Journals (Sweden)

    Obiyathulla Ismath Bacha

    2015-09-01

    Full Text Available Financial crises have become a recurring problem for modern economies with increasingly detrimental fallouts. Risk-sharing finance (RSF contracts may be the best instrument for addressing the problem and its fallout, and in particular the risk-sharing principles of Islamic finance offer a potential alternative. This paper offers some preliminary thoughts on the design and implementation of RSF for both private and public sector funding, for revenue and non-revenue generating projects. It is argued that such form of financing avoids the leverage of conventional debt, minimizes the costs of dilution, reduces macroeconomic vulnerability, and enhances financial inclusion. It also has the potential to be a less risky alternative for developing countries to finance public spending and economic growth. JEL Classifications: G32, P43, O16

  4. Shared risk: who engages in substance use with American homeless youth?

    Science.gov (United States)

    Green, Harold D; de la Haye, Kayla; Tucker, Joan S; Golinelli, Daniela

    2013-09-01

    To identify characteristics of social network members with whom homeless youth engage in drinking and drug use. A multi-stage probability sample of homeless youth completed a social network survey. Forty-one shelters, drop-in centers and known street hangouts in Los Angeles County. A total of 419 homeless youth, aged 13-24 years (mean age = 20.09, standard deviation = 2.80). Respondents described 20 individuals in their networks, including their substance use and demographics, and the characteristics of the relationships they shared, including with whom they drank and used drugs. Dyadic, multi-level regressions identified predictors of shared substance use. Shared drinking was more likely to occur with recent sex partners [odds ratio (OR) = 2.64, confidence interval (CI): 1.67, 4.18], drug users (OR = 4.57, CI: 3.21, 6.49), sexual risk takers (OR = 1.71, CI: 1.25, 2.33), opinion leaders (OR = 1.69, CI: 1.42, 2.00), support providers (OR = 1.41, CI: 1.03, 1.93) and popular people (those with high degree scores in the network) (OR = 1.07, CI: 1.01, 1.14). Shared drug use was more likely to occur with recent sex partners (OR = 2.44, CI: 1.57, 3.80), drinkers (OR = 4.53, CI: 3.05, 6.74), sexual risk takers (OR = 1.51, CI: 1.06, 2.17), opinion leaders (OR = 1.24, CI: 1.03, 1.50), support providers (OR = 1.83, CI: 1.29, 2.60) and popular people (OR = 1.16, CI: 1.08, 1.24). Homeless youth in the United States are more likely to drink or use drugs with those who engage in multiple risk behaviors and who occupy influential social roles (popular, opinion leaders, support providers, sex partners). Understanding these social networks may be helpful in designing interventions to combat substance misuse. © 2013 Society for the Study of Addiction.

  5. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  6. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-09-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  7. Power adaptation for joint switched diversity and adaptive modulation schemes in spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Tourki, Kamel; Ghrayeb, Ali A.; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2012-01-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper an adaptive scheme using transmit power adaptation, switched transmit diversity, and adaptive modulation in order to improve the performance of existing switching efficient schemes (SES) and bandwidth efficient schemes (BES). Taking advantage of the channel reciprocity principle, we assume that the channel state information (CSI) of the interference link is available to the secondary transmitter. This information is then used by the secondary transmitter to adapt its transmit power, modulation constellation size, and used transmit branch. The goal of this joint adaptation is to minimize the average number of switched branches and the average system delay given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver. We analyze the proposed scheme in terms of the average number of branch switching, average delay, and we provide a closed-form expression of the average bit error rate (BER). We demonstrate through numerical examples that the proposed scheme provides a compromise between the SES and the BES schemes. © 2012 IEEE.

  8. Genome-wide association study identifies shared risk loci common to two malignancies in golden retrievers.

    Directory of Open Access Journals (Sweden)

    Noriko Tonomura

    2015-02-01

    Full Text Available Dogs, with their breed-determined limited genetic background, are great models of human disease including cancer. Canine B-cell lymphoma and hemangiosarcoma are both malignancies of the hematologic system that are clinically and histologically similar to human B-cell non-Hodgkin lymphoma and angiosarcoma, respectively. Golden retrievers in the US show significantly elevated lifetime risk for both B-cell lymphoma (6% and hemangiosarcoma (20%. We conducted genome-wide association studies for hemangiosarcoma and B-cell lymphoma, identifying two shared predisposing loci. The two associated loci are located on chromosome 5, and together contribute ~20% of the risk of developing these cancers. Genome-wide p-values for the top SNP of each locus are 4.6×10-7 and 2.7×10-6, respectively. Whole genome resequencing of nine cases and controls followed by genotyping and detailed analysis identified three shared and one B-cell lymphoma specific risk haplotypes within the two loci, but no coding changes were associated with the risk haplotypes. Gene expression analysis of B-cell lymphoma tumors revealed that carrying the risk haplotypes at the first locus is associated with down-regulation of several nearby genes including the proximal gene TRPC6, a transient receptor Ca2+-channel involved in T-cell activation, among other functions. The shared risk haplotype in the second locus overlaps the vesicle transport and release gene STX8. Carrying the shared risk haplotype is associated with gene expression changes of 100 genes enriched for pathways involved in immune cell activation. Thus, the predisposing germ-line mutations in B-cell lymphoma and hemangiosarcoma appear to be regulatory, and affect pathways involved in T-cell mediated immune response in the tumor. This suggests that the interaction between the immune system and malignant cells plays a common role in the tumorigenesis of these relatively different cancers.

  9. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  10. On multiuser switched diversity transmission for spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa

    2012-01-01

    In this paper, we develop multiuser access schemes for spectrum sharing systems whereby secondary users share the spectrum with primary users. In particular, we devise two schemes for selecting the user among those that satisfy the interference constraints and achieve an acceptable signal-to-noise ratio (SNR) level. The first scheme selects the user with the maximum SNR at the receiver, whereas in the second scheme the users are scanned in a sequential manner until an acceptable user is found. In addition, we consider two power adaptive settings. In the on/off power adaptive setting, the users transmit based on whether the interference constraint is met or not while in the full power adaptive setting, the users vary their transmission power to satisfy the interference constraint. Finally, we present numerical results of our proposed algorithms where we show the trade-off between the average spectral efficiency and average feedback load of both schemes. © 2012 ICST.

  11. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  12. Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks

    DEFF Research Database (Denmark)

    Fehr, Serge; Maurer, Ueli M.

    2002-01-01

    . VSS and DC are main building blocks for unconditional secure multi-party computation protocols. This general approach covers all known linear VSS and DC schemes. The main theorem states that the security of a scheme is equivalent to a pure linear-algebra condition on the linear mappings (e.......g. described as matrices and vectors) describing the scheme. The security of all known schemes follows as corollaries whose proofs are pure linear-algebra arguments, in contrast to some hybrid arguments used in the literature. Our approach is demonstrated for the CDM DC scheme, which we generalize to be secure......We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear veriable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer...

  13. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  14. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  15. Improving performance of breast cancer risk prediction using a new CAD-based region segmentation scheme

    Science.gov (United States)

    Heidari, Morteza; Zargari Khuzani, Abolfazl; Danala, Gopichandh; Qiu, Yuchen; Zheng, Bin

    2018-02-01

    Objective of this study is to develop and test a new computer-aided detection (CAD) scheme with improved region of interest (ROI) segmentation combined with an image feature extraction framework to improve performance in predicting short-term breast cancer risk. A dataset involving 570 sets of "prior" negative mammography screening cases was retrospectively assembled. In the next sequential "current" screening, 285 cases were positive and 285 cases remained negative. A CAD scheme was applied to all 570 "prior" negative images to stratify cases into the high and low risk case group of having cancer detected in the "current" screening. First, a new ROI segmentation algorithm was used to automatically remove useless area of mammograms. Second, from the matched bilateral craniocaudal view images, a set of 43 image features related to frequency characteristics of ROIs were initially computed from the discrete cosine transform and spatial domain of the images. Third, a support vector machine model based machine learning classifier was used to optimally classify the selected optimal image features to build a CAD-based risk prediction model. The classifier was trained using a leave-one-case-out based cross-validation method. Applying this improved CAD scheme to the testing dataset, an area under ROC curve, AUC = 0.70+/-0.04, which was significantly higher than using the extracting features directly from the dataset without the improved ROI segmentation step (AUC = 0.63+/-0.04). This study demonstrated that the proposed approach could improve accuracy on predicting short-term breast cancer risk, which may play an important role in helping eventually establish an optimal personalized breast cancer paradigm.

  16. RISK OF PROFIT LOSS SHARING FINANCING: THE CASE OF INDONESIA

    Directory of Open Access Journals (Sweden)

    Ernawati Ernawati

    2016-02-01

    Full Text Available This study analyzes the risk of profit-and-loss sharing finance in Indonesian Islamic banking. Data used is secondary data obtained from the Financial Services Authority’s 2009-2014 publication. Financing risk is measured by risk return and opportunity cost. Results of the study show that risk return in mudharaba financing is more volatile than that in musharaka as it is potentially driven by agency problems. In all groups of banks, higher incomes are more promising in mudharaba than musharaka; but individually musharaka is more attractive to Islamic Rural Bank groups, and vice versa for the Sharia Bank groups. The one side it is more secure for Islamic banking to allocate funds in musharaka contract, which is an alternative to murabaha. However, musharaka contract is less attractive due to lower potential returns. Although high returns are more promising in mudaraba, this financing mode has higher risk of returns.DOI: 10.15408/aiq.v8i1.1793

  17. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  18. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2012-01-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  19. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang

    2012-09-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with the licensed primary users under an interference temperature constraint. We assume that DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit-error rate performance. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an outage probability analysis for a random vector quantization (RVQ) design algorithm. Numerical results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  20. Multiparty Quantum Secret Sharing of Quantum States Using Entanglement States

    International Nuclear Information System (INIS)

    Ying, Guo; Da-Zu, Huang; Gui-Hua, Zeng; Ho, Lee Moon

    2008-01-01

    A multi-partite-controlled quantum secret sharing scheme using several non-orthogonal entanglement states is presented with unconditional security. In this scheme, the participants share the secret quantum state by exchanging the secret polarization angles of the disordered travel particles. The security of the secret quantum state is also guaranteed by the non-orthogonal multi-partite-controlled entanglement states, the participants' secret polarizations, and the disorder of the travelling particles. Moreover, the present scheme is secure against the particle-number splitting attack and the intercept-and-resend attack. It may be still secure even if the distributed quantum state is embedded in a not-so-weak coherent-state pulse

  1. Assessment of National Health Insurance Scheme's (NHIS) Effectiveness in a Tertiary Teaching Hospital in Southeast Nigeria

    OpenAIRE

    N. Ele Grace; O. Ogbonna Brian; M. Ochei Uche; U. Odili Valentine

    2017-01-01

    Background: The fundamental concept of health insurance is risk sharing and burden bearing. The scheme is undermined by limitations ranging from very frequent use of the services more than necessary by enrollees, to cost escalation, poor management, and skimming. Assessment of services is a quality control measure in patients’ care and service delivery. It helps to identify gaps for improvement of care and services. Objective: This study assessed the effectiveness of NHIS from the perspec...

  2. Performance-based risk-sharing arrangements-good practices for design, implementation, and evaluation: report of the ISPOR good practices for performance-based risk-sharing arrangements task force.

    Science.gov (United States)

    Garrison, Louis P; Towse, Adrian; Briggs, Andrew; de Pouvourville, Gerard; Grueger, Jens; Mohr, Penny E; Severens, J L Hans; Siviero, Paolo; Sleeper, Miguel

    2013-01-01

    There is a significant and growing interest among both payers and producers of medical products for agreements that involve a "pay-for-performance" or "risk-sharing" element. These payment schemes-called "performance-based risk-sharing arrangements" (PBRSAs)-involve a plan by which the performance of the product is tracked in a defined patient population over a specified period of time and the amount or level of reimbursement is based on the health and cost outcomes achieved. There has always been considerable uncertainty at product launch about the ultimate real-world clinical and economic performance of new products, but this appears to have increased in recent years. PBRSAs represent one mechanism for reducing this uncertainty through greater investment in evidence collection while a technology is used within a health care system. The objective of this Task Force report was to set out the standards that should be applied to "good practices"-both research and operational-in the use of a PBRSA, encompassing questions around the desirability, design, implementation, and evaluation of such an arrangement. This report provides practical recommendations for the development and application of state-of-the-art methods to be used when considering, using, or reviewing PBRSAs. Key findings and recommendations include the following. Additional evidence collection is costly, and there are numerous barriers to establishing viable and cost-effective PBRSAs: negotiation, monitoring, and evaluation costs can be substantial. For good research practice in PBRSAs, it is critical to match the appropriate study and research design to the uncertainties being addressed. Good governance processes are also essential. The information generated as part of PBRSAs has public good aspects, bringing ethical and professional obligations, which need to be considered from a policy perspective. The societal desirability of a particular PBRSA is fundamentally an issue as to whether the cost of

  3. Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds

    OpenAIRE

    JAJODIA , Sushil; Litwin , Witold; Schwarz , Thomas

    2013-01-01

    Encryption key loss problem is the Achilles's heel of cryptography. Key escrow helps, but favors disclosures. Schemes for recoverable encryption keys through noised secret sharing alleviate the dilemma. Key owner escrows a specifically encrypted backup. The recovery needs a large cloud. Cloud cost, money trail should rarefy illegal attempts. We now propose noised secret sharing schemes supporting discounts. The recovery request with discount code lowers the recovery complexity, easily by orde...

  4. A GPS-Based Control Framework for Accurate Current Sharing and Power Quality Improvement in Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Savaghebi, Mehdi; Lu, Dylan

    2017-01-01

    This paper proposes a novel hierarchical control strategy for improvement of load sharing and power quality in ac microgrids. This control framework is composed of a droop based controller at the primary level, and a combination of distributed power sharing and voltage conditioning schemes...... consensus protocol to ensure proportional sharing of average power. The voltage conditioning scheme produces compensation signals at fundamental and dominant harmonics to improve the voltage quality at a sensitive load bus. Experimental results are presented to validate the efficacy of the proposed method....... dynamic response. The droop coefficient, which acts as a virtual resistance is adaptively changed as a function of the peak current. This strategy not only simplifies the control design but also improves the current sharing accuracy at high loading conditions. The distributed power sharing scheme uses...

  5. INJECTING EQUPMENT SHARING AND PERCEPTION OF HIV AND HEPATITIS RISK AMONG INJECTING DRUG USERS IN BUDAPEST

    Science.gov (United States)

    Gyarmathy, V. Anna; Neaigus, Alan; Ujhelyi, Eszter

    2008-01-01

    In Central European states, rates of HIV among IDUs have been low although HCV infection is widespread. The goal of our study was to assess HIV infection, risk perceptions and injecting equipment sharing among injection drug users in Budapest, Hungary. Altogether 150 IDUs were interviewed (121 structured between 1999-2000 and 29 ethnographic between 2003-2004). The majority of them injected heroin (52% and 79%) and many injected amphetamines (51% and 35%). One person tested positive for HIV. Two thirds (68% of 121) shared injecting equipment (syringes, cookers and filters). Some participants said they shared syringes because they were not carrying them for fear of police harassment, and that they reused filters as a backup drug supply. In multivariate analysis, sharing of injecting equipment was associated with higher perceived susceptibility to HIV/AIDS, lower self-efficacy for sterile equipment use, higher motivation to comply with peer pressure to use dirty injecting equipment, and with having a criminal record. The high levels of injecting risk behaviors found in this study are a cause for serious concern. HIV prevention interventions need to address not only sharing syringes but also sharing and reusing other injecting equipment and drug filters. PMID:17129858

  6. Tacit Knowledge Sharing Modes of University Teachers from the Perspectives of Psychological Risk and Value

    Science.gov (United States)

    Yu, Dengke; Zhou, Rong

    2015-01-01

    Tacit knowledge sharing (TKS) is important to improve the teaching skill and researching knowledge of university teachers. In this paper, the tacit knowledge sharing of university teachers is catalogued as four modes from perspectives of the psychological risk and psychological value which are measured by two grades--high and low. The four modes…

  7. Does market integration buffer risk, erode traditional sharing practices and increase inequality? A test among Bolivian forager-farmers.

    Science.gov (United States)

    Gurven, Michael; Jaeggi, Adrian V; von Rueden, Chris; Hooper, Paul L; Kaplan, Hillard

    2015-08-01

    Sharing and exchange are common practices for minimizing food insecurity in rural populations. The advent of markets and monetization in egalitarian indigenous populations presents an alternative means of managing risk, with the potential impact of eroding traditional networks. We test whether market involvement buffers several types of risk and reduces traditional sharing behavior among Tsimane Amerindians of the Bolivian Amazon. Results vary based on type of market integration and scale of analysis (household vs. village), consistent with the notion that local culture and ecology shape risk management strategies. Greater wealth and income were unassociated with the reliance on others for food, or on reciprocity, but wealth was associated with a greater proportion of food given to others (i.e., giving intensity) and a greater number of sharing partners (i.e., sharing breadth). Across villages, greater mean income was negatively associated with reciprocity, but economic inequality was positively associated with giving intensity and sharing breadth. Incipient market integration does not necessarily replace traditional buffering strategies but instead can often enhance social capital.

  8. Impact of Publicly Financed Health Insurance Schemes on Healthcare Utilization and Financial Risk Protection in India: A Systematic Review.

    Science.gov (United States)

    Prinja, Shankar; Chauhan, Akashdeep Singh; Karan, Anup; Kaur, Gunjeet; Kumar, Rajesh

    2017-01-01

    Several publicly financed health insurance schemes have been launched in India with the aim of providing universalizing health coverage (UHC). In this paper, we report the impact of publicly financed health insurance schemes on health service utilization, out-of-pocket (OOP) expenditure, financial risk protection and health status. Empirical research studies focussing on the impact or evaluation of publicly financed health insurance schemes in India were searched on PubMed, Google scholar, Ovid, Scopus, Embase and relevant websites. The studies were selected based on two stage screening PRISMA guidelines in which two researchers independently assessed the suitability and quality of the studies. The studies included in the review were divided into two groups i.e., with and without a comparison group. To assess the impact on utilization, OOP expenditure and health indicators, only the studies with a comparison group were reviewed. Out of 1265 articles screened after initial search, 43 studies were found eligible and reviewed in full text, finally yielding 14 studies which had a comparator group in their evaluation design. All the studies (n-7) focussing on utilization showed a positive effect in terms of increase in the consumption of health services with introduction of health insurance. About 70% studies (n-5) studies with a strong design and assessing financial risk protection showed no impact in reduction of OOP expenditures, while remaining 30% of evaluations (n-2), which particularly evaluated state sponsored health insurance schemes, reported a decline in OOP expenditure among the enrolled households. One study which evaluated impact on health outcome showed reduction in mortality among enrolled as compared to non-enrolled households, from conditions covered by the insurance scheme. While utilization of healthcare did improve among those enrolled in the scheme, there is no clear evidence yet to suggest that these have resulted in reduced OOP expenditures or

  9. A New Quantum Communication Scheme by Using Bell States

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Jing; Song Heshan

    2006-01-01

    A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).

  10. Efficient schemes for deterministic joint remote preparation of an ...

    Indian Academy of Sciences (India)

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  11. Risk-based assessment of the cost-efficiency and the effectivity of renewable energy support schemes: Certificate markets versus feed-in tariffs

    International Nuclear Information System (INIS)

    Fagiani, Riccardo; Barquín, Julián; Hakvoort, Rudi

    2013-01-01

    The introduction of renewable energy sources in the electricity generation mix has the potential to reduce power sector's emissions and countries' dependence on imported oil. Climate change concerns and highly volatile oil prices have attracted governments' interest and support to sustain investments in renewable energy capacity, and different support policies have been implemented in many countries around the world. This paper analyzes the effects of investors' risk aversion on the performance of support schemes. The analysis compares two policy options, a feed-in tariff mechanism with a certificate market system. Results show that while a tariff mechanism could obtain better results than a certificate market, its performance is strictly dependent on regulator choices. A certificate market instead, permits to obtain the desired level of renewable energy market share with good cost-efficiency as long as investors' risk aversion is moderate. Moreover, discounting future cash flows with higher social discount rates further benefits a certificate system making it preferable to feed-in tariffs. - Highlights: ► Paper analyzes the performance of feed-in tariffs and certificate markets. ► Model simulates the evolution of a power system considering investors' risk aversion. ► Tariffs could obtain better efficiency but also low effectiveness or over-investment. ► Barriers to entrance could result in higher certificates prices. ► Certificate performances benefit from higher social discount rates

  12. Price Signals from Electricity Markets and Subsidy Schemes for Renewable Sources

    International Nuclear Information System (INIS)

    Sabolic, D.

    2013-01-01

    Increasing share of renewable generation itself gives rise to price risks on the electricity markets. Subsidy schemes, in general, additionally distort price signals produced by economic mechanisms of otherwise free markets. In the electricity industry, subsidy schemes, once designed merely to incentivize electricity system decarbonization in its kick-off phase, seem to have grown to such a volume, that they, too, started to profoundly interfere with the whole market structure, and to distort price signals that used to govern long-term development of an adequately structured generation system. This article was made as an attempt to discuss contemporary electricity system policies in relation to RES integration. The economic relations in the sector are growingly influenced, or sometimes even hard-handedly guided, by political institutions, rather than by economic interests of the investors, which may in turn cause considerable problems in achieving ultimate policy goals due to unsustainability of such an economic arrangement.(author)

  13. Bike sharing: A review of evidence on impacts and processes of implementation and operation

    OpenAIRE

    Ricci, M.

    2015-01-01

    Despite the growing popularity of bike sharing, there is a lack of in-depth impact and process evaluations of existing schemes, especially with regard to measuring the ‘success’ of a scheme against its original objectives. This paper is concerned with identifying and critically interpreting the available evidence on bike sharing to date, on both impacts and processes of implementation and operation. The growing yet limited evidence base suggests that bike sharing can increase cycling levels b...

  14. An islanding microgrid reactive power sharing scheme enhanced by programmed virtual impedances

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2012-01-01

    harmonic currents. With the knowledge of feeder impedances, reactive power sharing performance can be enhanced by the regulation of DG unit output virtual impedance. The proposed method realizes accurate real and reactive power sharing in proportion to DG unit rated power. Simulated and experimental...

  15. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  16. Reinforcement Learning Based Data Self-Destruction Scheme for Secured Data Management

    Directory of Open Access Journals (Sweden)

    Young Ki Kim

    2018-04-01

    Full Text Available As technologies and services that leverage cloud computing have evolved, the number of businesses and individuals who use them are increasing rapidly. In the course of using cloud services, as users store and use data that include personal information, research on privacy protection models to protect sensitive information in the cloud environment is becoming more important. As a solution to this problem, a self-destructing scheme has been proposed that prevents the decryption of encrypted user data after a certain period of time using a Distributed Hash Table (DHT network. However, the existing self-destructing scheme does not mention how to set the number of key shares and the threshold value considering the environment of the dynamic DHT network. This paper proposes a method to set the parameters to generate the key shares needed for the self-destructing scheme considering the availability and security of data. The proposed method defines state, action, and reward of the reinforcement learning model based on the similarity of the graph, and applies the self-destructing scheme process by updating the parameter based on the reinforcement learning model. Through the proposed technique, key sharing parameters can be set in consideration of data availability and security in dynamic DHT network environments.

  17. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  18. Incentivizing intelligent customer behavior in smart-grids: a risk-sharing tariff & optimal strategies

    NARCIS (Netherlands)

    G. Methenitis (Georgios); M. Kaisers (Michael); J.A. La Poutré (Han)

    2016-01-01

    textabstractCurrent electricity tariffs for retail rarely provide incentives for intelligent demand response of flexible customers. Such customers could otherwise contribute to balancing supply and demand in future smart grids. This paper proposes an innovative risk-sharing tariff to incentivize

  19. Setting the Stage for Harmonized Risk Assessment by Seismic Hazard Harmonization in Europe (SHARE)

    Science.gov (United States)

    Woessner, Jochen; Giardini, Domenico; SHARE Consortium

    2010-05-01

    Probabilistic seismic hazard assessment (PSHA) is arguably one of the most useful products that seismology can offer to society. PSHA characterizes the best available knowledge on the seismic hazard of a study area, ideally taking into account all sources of uncertainty. Results form the baseline for informed decision making, such as building codes or insurance rates and provide essential input to each risk assessment application. Several large scale national and international projects have recently been launched aimed at improving and harmonizing PSHA standards around the globe. SHARE (www.share-eu.org) is the European Commission funded project in the Framework Programme 7 (FP-7) that will create an updated, living seismic hazard model for the Euro-Mediterranean region. SHARE is a regional component of the Global Earthquake Model (GEM, www.globalquakemodel.org), a public/private partnership initiated and approved by the Global Science Forum of the OECD-GSF. GEM aims to be the uniform, independent and open access standard to calculate and communicate earthquake hazard and risk worldwide. SHARE itself will deliver measurable progress in all steps leading to a harmonized assessment of seismic hazard - in the definition of engineering requirements, in the collection of input data, in procedures for hazard assessment, and in engineering applications. SHARE scientists will create a unified framework and computational infrastructure for seismic hazard assessment and produce an integrated European probabilistic seismic hazard assessment (PSHA) model and specific scenario based modeling tools. The results will deliver long-lasting structural impact in areas of societal and economic relevance, they will serve as reference for the Eurocode 8 (EC8) application, and will provide homogeneous input for the correct seismic safety assessment for critical industry, such as the energy infrastructures and the re-insurance sector. SHARE will cover the whole European territory, the

  20. Group Clustering Mechanism for P2P Large Scale Data Sharing Collaboration

    Institute of Scientific and Technical Information of China (English)

    DENGQianni; LUXinda; CHENLi

    2005-01-01

    Research shows that P2P scientific collaboration network will exhibit small-world topology, as do a large number of social networks for which the same pattern has been documented. In this paper we propose a topology building protocol to benefit from the small world feature. We find that the idea of Freenet resembles the dynamic pattern of social interactions in scientific data sharing and the small world characteristic of Freenet is propitious to improve the file locating performance in scientificdata sharing. But the LRU (Least recently used) datas-tore cache replacement scheme of Freenet is not suitableto be used in scientific data sharing network. Based onthe group locality of scientific collaboration, we proposean enhanced group clustering cache replacement scheme.Simulation shows that this scheme improves the request hitratio dramatically while keeping the small average hops per successful request comparable to LRU.

  1. Value at Risk on Composite Price Share Index Stock Data

    Science.gov (United States)

    Oktaviarina, A.

    2018-01-01

    The financial servicest authority was declared Let’s Save Campaign on n commemoration of the World Savings Day that falls on this day, October 31, 2016. The activity was greeted enthusiastically by Indonesia Stock Exchange by taking out the slogan Let’s Save The Stocks. Stock is a form of investment that is expected to benefit in the future despite has risks. Value at Risk (VaR) is a method that can measure how much the risk of a financial investment. Composite Stock Price Indeks is the stock price index used by Indonesia Stock Exchange as stock volatility benchmarks in Indonesia. This study aimed to estimate Value at Risk (VaR) on closing price Composite Price Share Index Stock data on the period 20 September 2016 until 20 September 2017. Box-Pierce test results p value=0.9528 which is greater than a, that shows homoskedasticity. Value at Risk (VaR) with Variance Covariance Method is Rp.3.054.916,07 which means with 99% confindence interval someone who invests Rp.100.000.000,00 will get Rp.3.054.916,07 as a maximum loss.

  2. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age ≥ 75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to p...

  3. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    Objectives To evaluate the individual risk factors composing the CHADS2 (Congestive heart failure, Hypertension, Age=75 years, Diabetes, previous Stroke) score and the CHA2DS2-VASc (CHA2DS2-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to pr...

  4. Performance analysis of joint multi-branch switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2012-12-01

    Under the scenario of an underlay cognitive radio network, we propose in this paper two adaptive schemes using switched transmit diversity and adaptive modulation in order to increase the spectral efficiency of the secondary link and maintain a desired performance for the primary link. The proposed switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan and wait combining technique (SWC) where a transmission occurs only when a branch with an acceptable performance is found, otherwise data is buffered. In these schemes, the modulation constellation size and the used transmit branch are determined to minimize the average number of switched branches and to achieve the highest spectral efficiency given the fading channel conditions, the required error rate performance, and a peak interference constraint to the primary receiver (PR). For delay-sensitive applications, we also propose two variations of the SES and BES schemes using power control (SES-PC and BES-PC) where the secondary transmitter (ST) starts sending data using a nominal power level which is selected in order to minimize the average delay introduced by the SWC technique. We demonstrate through numerical examples that the BES scheme increases the capacity of the secondary link when compared to the SES scheme. This spectral efficiency improvement comes at the expense of an increased average number of switched branches and thus an increased average delay. We also show that the SES-PC and the BES-PC schemes minimize the average delay while satisfying the same spectral efficiency as the SES and BES schemes, respectively. © 2012 IEEE.

  5. Sharing of Needles and Syringes among Men Who Inject Drugs: HIV Risk in Northwest Bangladesh.

    Directory of Open Access Journals (Sweden)

    M Kamal Pasa

    Full Text Available Injection drug use is prevalent in northwestern Bangladesh. We sought to explore the context of needle/syringe sharing among persons who inject drugs (PWID, examining risk exposures to blood-borne infections like the human immunodeficiency virus (HIV and hepatitis in a region where these dual epidemics are likely to expand.We used a qualitative research approach to learn about injection practices, conducting 60 in-depth interviews among PWID. We then conducted 12 focus group discussions (FGDs that generated a checklist of salient issues, and followed up with personal observations of typical days at the drug-use venues. Content and interpretative frameworks were used to analyze qualitative information and socio-demographic information, using SPSS software.We found that needle/syringe-sharing behaviours were integrated into the overall social and cultural lives of drug users. Sharing behaviours were an central component of PWID social organization. Sharing was perceived as an inherent element within reciprocal relationships, and sharing was tied to beliefs about drug effects, economic adversity, and harassment due to their drug user status. Carrying used needles/syringes to drug-use venues was deemed essential since user-unfriendly needle-syringe distribution schedules of harm reduction programmes made it difficult to access clean needles/syringes in off-hours. PWID had low self-esteem. Unequal power relationships were reported between the field workers of harm reduction programmes and PWID. Field workers expressed anti-PWID bias and judgmental attitudes, and also had had misconceptions about HIV and hepatitis transmission. PWID were especially disturbed that no assistance was forthcoming from risk reduction programme staff when drug users manifested withdrawal symptoms.Interventions must take social context into account when scaling up programmes in diverse settings. The social organization of PWID include values that foster needle

  6. Quantum secret sharing using orthogonal multiqudit entangled states

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Liu, Cheng-Ji; Li, Yong-Ming

    2017-12-01

    In this work, we investigate the distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication. According to these properties, we propose a quantum secret sharing scheme to realize three types of access structures, i.e., the ( n, n)-threshold, the restricted (3, n)-threshold and restricted (4, n)-threshold schemes (called LOCC-QSS scheme). All cooperating players in the restricted threshold schemes are from two disjoint groups. In the proposed protocol, the participants use the computational basis measurement and classical communication to distinguish between those orthogonal states and reconstruct the original secret. Furthermore, we also analyze the security of our scheme in four primary quantum attacks and give a simple encoding method in order to better prevent the participant conspiracy attack.

  7. Sequential Quantum Secret Sharing Using a Single Qudit

    Science.gov (United States)

    Bai, Chen-Ming; Li, Zhi-Hui; Li, Yong-Ming

    2018-05-01

    In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. Sponsored by the National Natural Science Foundation of China under Grant Nos. 61373150 and 61602291, and Industrial Research and Development Project of Science and Technology of Shaanxi Province under Grant No. 2013k0611

  8. Heuristic methods for shared backup path protection planning

    DEFF Research Database (Denmark)

    Haahr, Jørgen Thorlund; Stidsen, Thomas Riis; Zachariasen, Martin

    2012-01-01

    schemes are employed. In contrast to manual intervention, automatic protection schemes such as Shared Backup Path Protection (SBPP) can recover from failure quickly and efficiently. SBPP is a simple but efficient protection scheme that can be implemented in backbone networks with technology available...... present heuristic algorithms and lower bound methods for the SBPP planning problem. Experimental results show that the heuristic algorithms are able to find good quality solutions in minutes. A solution gap of less than 3.5% was achieved for more than half of the benchmark instances (and a gap of less...

  9. Cost-prioritized droop schemes for autonomous microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop schemes for parallel source control usually aims for proportional power sharing tuned in accordance to the source ratings. This works fine for sources with close similarity, but not really for an autonomous microgrid where different types of Distributed Generators (DGs) may be present without...

  10. Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing.

    Science.gov (United States)

    Bao, Long; Yi, Shuang; Zhou, Yicong

    2017-12-01

    This paper first introduces a (k,n) -sharing matrix S (k, n) and its generation algorithm. Mathematical analysis is provided to show its potential for secret image sharing. Combining sharing matrix with image encryption, we further propose a lossless (k,n) -secret image sharing scheme (SMIE-SIS). Only with no less than k shares, all the ciphertext information and security key can be reconstructed, which results in a lossless recovery of original information. This can be proved by the correctness and security analysis. Performance evaluation and security analysis demonstrate that the proposed SMIE-SIS with arbitrary settings of k and n has at least five advantages: 1) it is able to fully recover the original image without any distortion; 2) it has much lower pixel expansion than many existing methods; 3) its computation cost is much lower than the polynomial-based secret image sharing methods; 4) it is able to verify and detect a fake share; and 5) even using the same original image with the same initial settings of parameters, every execution of SMIE-SIS is able to generate completely different secret shares that are unpredictable and non-repetitive. This property offers SMIE-SIS a high level of security to withstand many different attacks.

  11. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  12. Child Sexual Abuse and Negative Affect as Shared Risk Factors for Sexual Aggression and Sexual HIV Risk Behavior in Heterosexual Men.

    Science.gov (United States)

    Peterson, Zoё D; Janssen, Erick; Goodrich, David; Fortenberry, J Dennis; Hensel, Devon J; Heiman, Julia R

    2018-02-01

    Previous research has suggested that sexually aggressive behavior and sexual HIV risk behavior are associated. Childhood sexual abuse (CSA) is a well-established risk factor for both types of problematic sexual behavior. Negative affect (i.e., anxiety, depression, and anger) is a less well-studied risk factor, but it has been theorized to relate to both sexual aggression and HIV risk behavior. Thus, this study sought to (1) confirm the relationship between sexual aggression and HIV risk behavior, (2) establish CSA and negative affect as shared risk factors for sexual aggression and HIV risk behavior, and (3) evaluate whether negative affect mediates the relationship between CSA and sexual aggression and between CSA and HIV sexual risk in a sample of heterosexual men. We recruited 18- to 30-year-old heterosexual men (N = 377) from urban sexually transmitted infection clinics. Men completed measures of sexual HIV risk history (number of partners and condom use), sexual aggression history, CSA history, and trait negative affect (anger, anxiety, and depression). Structural equation modeling was used to examine hypothesized direct and indirect relationships. In the final SEM model, sexual aggression history and sexual HIV risk behavior were correlated. CSA was associated with both types of problematic sexual behavior. Anxiety significantly mediated the relationship between CSA and sexual aggression and between CSA and sexual HIV risk behavior (χ 2 [1300] = 2121.79, p Sexual aggression appears to be part of a constellation of sexual risk behaviors; thus, it may be possible to develop prevention programs that target both sexual HIV risk and sexual aggression. CSA is a shared risk factor for sexual aggression and HIV risk behavior through the pathway of anxiety. Thus, anxiety might be one promising target for intervention.

  13. A New Quantum Secure Direct Communication Scheme with Authentication

    International Nuclear Information System (INIS)

    Dan, Liu; Chang-Xing, Pei; Dong-Xiao, Quan; Nan, Zhao

    2010-01-01

    A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting

  14. Performance analysis of switch-based multiuser scheduling schemes with adaptive modulation in spectrum sharing systems

    KAUST Repository

    Qaraqe, Marwa; Abdallah, Mohamed M.; Serpedin, Erchin; Alouini, Mohamed-Slim

    2014-01-01

    the average spectral efficiency by selecting the user that reports the best channel quality. In order to alleviate the relatively high feedback required by the first scheme, a second scheme based on the concept of switched diversity is proposed, where the base

  15. Share capitalism and worker wellbeing.

    Science.gov (United States)

    Bryson, Alex; Clark, Andrew E; Freeman, Richard B; Green, Colin P

    2016-10-01

    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the "gift"; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as "bad" aspects of job quality.

  16. Social trust, risk perceptions and public acceptance of recycled water: testing a social-psychological model.

    Science.gov (United States)

    Ross, Victoria L; Fielding, Kelly S; Louis, Winnifred R

    2014-05-01

    Faced with a severe drought, the residents of the regional city of Toowoomba, in South East Queensland, Australia were asked to consider a potable wastewater reuse scheme to supplement drinking water supplies. As public risk perceptions and trust have been shown to be key factors in acceptance of potable reuse projects, this research developed and tested a social-psychological model of trust, risk perceptions and acceptance. Participants (N = 380) were surveyed a few weeks before a referendum was held in which residents voted against the controversial scheme. Analysis using structural equation modelling showed that the more community members perceived that the water authority used fair procedures (e.g., consulting with the community and providing accurate information), the greater their sense of shared identity with the water authority. Shared social identity in turn influenced trust via increased source credibility, that is, perceptions that the water authority is competent and has the community's interest at heart. The findings also support past research showing that higher levels of trust in the water authority were associated with lower perceptions of risk, which in turn were associated with higher levels of acceptance, and vice versa. The findings have a practical application for improving public acceptance of potable recycled water schemes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Identifying Unique Versus Shared Pre- and Perinatal Risk Factors for ASD and ADHD Using a Simplex-Multiplex Stratification

    NARCIS (Netherlands)

    Oerlemans, Anoek M.; Burmanje, Marlot J.; Franke, Barbara; Buitelaar, Jan K.; Hartman, Catharina A.; Rommelse, Nanda N. J.

    Autism spectrum disorder (ASD) and attention-deficit/hyperactivity disorder (ADHD) frequently co-occur. Besides shared genetic factors, pre- and perinatal risk factors (PPFs) may determine if ASD, ADHD, or the combination of both disorders becomes manifest. This study aimed to test shared and unique

  18. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  19. Risk analysis of the proxy life-cycle investments in the second pillar pension scheme in Croatia

    Directory of Open Access Journals (Sweden)

    Renata Kovačević

    2015-03-01

    Full Text Available In this article we analyze the expected risk of pension funds with different risk profiles in the proxy life-cycle model of investments for the 2nd pillar pension scheme in Croatia. The benefits of implementing proxy life-cycle investments, compared to the previous model of mandatory pension funds investments, are clearly visible in the total expected amount of accumulated savings from the risk/return perspective. However, those benefits are partially diminished by the fact that the expected risk of a pension fund with the lowest risk profile is not substantially different from the expected risk of a pension fund with a medium risk profile, due to the lack of diversification. Additionally, we analyze the robustness of the proxy life-cycle model to a sudden and severe market shock, where we determine the presence of risk for those members who choose to switch to a pension fund with a lower risk profile at an unfavorable moment.

  20. A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud.

    Science.gov (United States)

    Seenivasagam, V; Velumani, R

    2013-01-01

    Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT)-Singular Value Decomposition (SVD) domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR) code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu's invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  1. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud

    Directory of Open Access Journals (Sweden)

    V. Seenivasagam

    2013-01-01

    Full Text Available Healthcare institutions adapt cloud based archiving of medical images and patient records to share them efficiently. Controlled access to these records and authentication of images must be enforced to mitigate fraudulent activities and medical errors. This paper presents a zero-watermarking scheme implemented in the composite Contourlet Transform (CT—Singular Value Decomposition (SVD domain for unambiguous authentication of medical images. Further, a framework is proposed for accessing patient records based on the watermarking scheme. The patient identification details and a link to patient data encoded into a Quick Response (QR code serves as the watermark. In the proposed scheme, the medical image is not subjected to degradations due to watermarking. Patient authentication and authorized access to patient data are realized on combining a Secret Share with the Master Share constructed from invariant features of the medical image. The Hu’s invariant image moments are exploited in creating the Master Share. The proposed system is evaluated with Checkmark software and is found to be robust to both geometric and non geometric attacks.

  2. The PREVIEW Global Risk Data Platform: a geoportal to serve and share global data on risk to natural hazards

    Directory of Open Access Journals (Sweden)

    G. Giuliani

    2011-01-01

    Full Text Available With growing world population and concentration in urban and coastal areas, the exposure to natural hazards is increasing and results in higher risk of human and economic losses. Improving the identification of areas, population and assets potentially exposed to natural hazards is essential to reduce the consequences of such events. Disaster risk is a function of hazard, exposure and vulnerability. Modelling risk at the global level requires accessing and processing a large number of data, from numerous collaborating centres.

    These data need to be easily updated, and there is a need for centralizing access to this information as well as simplifying its use for non GIS specialists. The Hyogo Framework for Action provides the mandate for data sharing, so that governments and international development agencies can take appropriate decision for disaster risk reduction.

    Timely access and easy integration of geospatial data are essential to support efforts in Disaster Risk Reduction. However various issues in data availability, accessibility and integration limit the use of such data. In consequence, a framework that facilitate sharing and exchange of geospatial data on natural hazards should improve decision-making process. The PREVIEW Global Risk Data Platform is a highly interactive web-based GIS portal supported by a Spatial Data Infrastructure that offers free and interoperable access to more than 60 global data sets on nine types of natural hazards (tropical cyclones and related storm surges, drought, earthquakes, biomass fires, floods, landslides, tsunamis and volcanic eruptions and related exposure and risk. This application portrays an easy-to-use online interactive mapping interface so that users can easily work with it and seamlessly integrate data in their own data flow using fully compliant OGC Web Services (OWS.

  3. The PREVIEW Global Risk Data Platform: a geoportal to serve and share global data on risk to natural hazards

    Science.gov (United States)

    Giuliani, G.; Peduzzi, P.

    2011-01-01

    With growing world population and concentration in urban and coastal areas, the exposure to natural hazards is increasing and results in higher risk of human and economic losses. Improving the identification of areas, population and assets potentially exposed to natural hazards is essential to reduce the consequences of such events. Disaster risk is a function of hazard, exposure and vulnerability. Modelling risk at the global level requires accessing and processing a large number of data, from numerous collaborating centres. These data need to be easily updated, and there is a need for centralizing access to this information as well as simplifying its use for non GIS specialists. The Hyogo Framework for Action provides the mandate for data sharing, so that governments and international development agencies can take appropriate decision for disaster risk reduction. Timely access and easy integration of geospatial data are essential to support efforts in Disaster Risk Reduction. However various issues in data availability, accessibility and integration limit the use of such data. In consequence, a framework that facilitate sharing and exchange of geospatial data on natural hazards should improve decision-making process. The PREVIEW Global Risk Data Platform is a highly interactive web-based GIS portal supported by a Spatial Data Infrastructure that offers free and interoperable access to more than 60 global data sets on nine types of natural hazards (tropical cyclones and related storm surges, drought, earthquakes, biomass fires, floods, landslides, tsunamis and volcanic eruptions) and related exposure and risk. This application portrays an easy-to-use online interactive mapping interface so that users can easily work with it and seamlessly integrate data in their own data flow using fully compliant OGC Web Services (OWS).

  4. Incentive schemes and female leadership in financial firms

    Directory of Open Access Journals (Sweden)

    Björn Lantz

    2013-01-01

    Full Text Available Our purpose is to explore how performance in Swedish financial companies is affected by the presence of a female chief executive officer (CEO, the presence of an incentive scheme, and the proportion of female board members. The results indicate that a female CEO is associated with a lower return on equity (ROE and a lower Tobin’s Q, but we find no significant association between the proportion of female board members and firm performance. An incentive scheme is generally associated with a lower return on assets (ROA and a higher Tobin’s Q. In particular, a share-based incentive scheme is associated with a lower ROA, a lower ROE, and a higher Tobin’s Q.

  5. Interference-aware random beam selection for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.

    2012-09-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this paper, we develop interference-aware random beam selection schemes that provide enhanced throughput for the secondary link under the condition that the interference observed at the primary link is within a predetermined acceptable value. For a secondary transmitter equipped with multiple antennas, our schemes select a random beam, among a set of power- optimized orthogonal random beams, that maximizes the capacity of the secondary link while satisfying the interference constraint at the primary receiver for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the signal-to-noise and interference ratio (SINR) statistics as well as the capacity of the secondary link. Finally, we present numerical results that study the effect of system parameters including number of beams and the maximum transmission power on the capacity of the secondary link attained using the proposed schemes. © 2012 IEEE.

  6. Valuation and Hedging of Variable Annuities in Pension Schemes

    NARCIS (Netherlands)

    Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.

    2018-01-01

    This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable

  7. Distributed public key schemes secure against continual leakage

    DEFF Research Database (Denmark)

    Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit

    2012-01-01

    -secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...

  8. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  9. Knowledge sharing behaviour among non-academic staff in higher learning institutes: The role of trust and perceived risk

    Directory of Open Access Journals (Sweden)

    Muhammad Sabbir Rahman

    2018-03-01

    Full Text Available The purpose of the paper is to analyse knowledge sharing behaviour among non-academic staff of higher learning institutions. This research focuses on the mediation impact of perceived risk on trust and knowledge sharing behaviour. The research also proposes actions that can be taken by higher learning institutions to enhance trust among the staff in order to create a knowledge sharing environment at the workplace. This research applied confirmatory factor analysis and Structural Equation Modeling (SEM to evaluate the proposed measurement model and proved the research hypotheses. The findings from the research show that perceived risk plays a strong mediating role between trust and knowledge sharing behaviour among the non-academic staff of higher learning institutions. The SEM analysis also confirmed that the research model shows a good fit. This research highlights issues concerning knowledge sharing practices among non-academic staff and provides some recommendations to the managers to address these issues. The researchers agreed that more research needs to be done in this area as there are aspects that are yet to be explored. The findings of this research serve to add to the literature on knowledge sharing focussing on non-academic staff of higher learning institutions.

  10. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Science.gov (United States)

    Heffernan, Claire; Azbel-Jackson, Lena; Brownlie, Joe; Gunn, George

    2016-01-01

    The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such) and peer to peer monitoring (where individuals evaluate other's behaviour). Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme). The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  11. Farmer Attitudes and Livestock Disease: Exploring Citizenship Behaviour and Peer Monitoring across Two BVD Control Schemes in the UK.

    Directory of Open Access Journals (Sweden)

    Claire Heffernan

    Full Text Available The eradication of BVD in the UK is technically possible but appears to be socially untenable. The following study explored farmer attitudes to BVD control schemes in relation to advice networks and information sharing, shared aims and goals, motivation and benefits of membership, notions of BVD as a priority disease and attitudes toward regulation. Two concepts from the organisational management literature framed the study: citizenship behaviour where actions of individuals support the collective good (but are not explicitly recognised as such and peer to peer monitoring (where individuals evaluate other's behaviour. Farmers from two BVD control schemes in the UK participated in the study: Orkney Livestock Association BVD Eradication Scheme and Norfolk and Suffolk Cattle Breeders Association BVD Eradication Scheme. In total 162 farmers participated in the research (109 in-scheme and 53 out of scheme. The findings revealed that group helping and information sharing among scheme members was low with a positive BVD status subject to social censure. Peer monitoring in the form of gossip with regard to the animal health status of other farms was high. Interestingly, farmers across both schemes supported greater regulation with regard to animal health, largely due to the mistrust of fellow farmers following voluntary disease control measures. While group cohesiveness varied across the two schemes, without continued financial inducements, longer-term sustainability is questionable.

  12. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence

    Science.gov (United States)

    McNaughton Reyes, H. Luz; Chen, May S.; Ennett, Susan T.; Basile, Kathleen C.; DeGue, Sarah; Vivolo-Kantor, Alana M.; Moracco, Kathryn E.; Bowling, J. Michael

    2016-01-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother–adolescent discord, family conflict, low maternal monitoring, low mother–adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study’s implications for the development of interventions and future research are discussed. PMID:26746242

  13. Shared Risk Factors for the Perpetration of Physical Dating Violence, Bullying, and Sexual Harassment Among Adolescents Exposed to Domestic Violence.

    Science.gov (United States)

    Foshee, Vangie A; McNaughton Reyes, H Luz; Chen, May S; Ennett, Susan T; Basile, Kathleen C; DeGue, Sarah; Vivolo-Kantor, Alana M; Moracco, Kathryn E; Bowling, J Michael

    2016-04-01

    The high risk of perpetrating physical dating violence, bullying, and sexual harassment by adolescents exposed to domestic violence points to the need for programs to prevent these types of aggression among this group. This study of adolescents exposed to domestic violence examined whether these forms of aggression share risk factors that could be targeted for change in single programs designed to prevent all three types of aggression. Analyses were conducted on 399 mother victims of domestic violence and their adolescents, recruited through community advertising. The adolescents ranged in age from 12 to 16 years; 64 % were female. Generalized estimating equations was used to control for the covariation among the aggression types when testing for shared risk factors. Approximately 70 % of the adolescents reported perpetrating at least one of the three forms of aggression. In models examining one risk factor at a time, but controlling for demographics, adolescent acceptance of sexual violence, mother-adolescent discord, family conflict, low maternal monitoring, low mother-adolescent closeness, low family cohesion, depressed affect, feelings of anger, and anger reactivity were shared across all three aggression types. In multivariable models, which included all of the risk factors examined and the demographic variables, low maternal monitoring, depressed affect and anger reactivity remained significant shared risk factors. Our findings suggest that programs targeting these risk factors for change have the potential to prevent all three forms of aggression. In multivariable models, poor conflict management skills was a risk for bullying and sexual harassment, but not dating violence; acceptance of dating violence was a risk for dating violence and bullying, but not sexual harassment; and none of the examined risk factors were unique to aggression type. The study's implications for the development of interventions and future research are discussed.

  14. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation: nationwide cohort study.

    Science.gov (United States)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock; Hansen, Peter Riis; Tolstrup, Janne Schurmann; Lindhardsen, Jesper; Selmer, Christian; Ahlehoff, Ole; Olsen, Anne-Marie Schjerning; Gislason, Gunnar Hilmar; Torp-Pedersen, Christian

    2011-01-31

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age ≥ 75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to predict thromboembolism. Registry based cohort study. Nationwide data on patients admitted to hospital with atrial fibrillation. Population All patients with atrial fibrillation not treated with vitamin K antagonists in Denmark in the period 1997-2006. Stroke and thromboembolism. Of 121,280 patients with non-valvular atrial fibrillation, 73,538 (60.6%) fulfilled the study inclusion criteria. In patients at "low risk" (score = 0), the rate of thromboembolism per 100 person years was 1.67 (95% confidence interval 1.47 to 1.89) with CHADS(2) and 0.78 (0.58 to 1.04) with CHA(2)DS(2)-VASc at one year's follow-up. In patients at "intermediate risk" (score = 1), this rate was 4.75 (4.45 to 5.07) with CHADS(2) and 2.01 (1.70 to 2.36) with CHA(2)DS(2)-VASc. The rate of thromboembolism depended on the individual risk factors composing the scores, and both schemes underestimated the risk associated with previous thromboembolic events. When patients were categorised into low, intermediate, and high risk groups, C statistics at 10 years' follow-up were 0.812 (0.796 to 0.827) with CHADS(2) and 0.888 (0.875 to 0.900) with CHA(2)DS(2)-VASc. The risk associated with a specific risk stratification score depended on the risk factors composing the score. CHA(2)DS(2)-VASc performed better than CHADS(2) in predicting patients at high risk, and those categorised as low risk by CHA(2)DS(2)-VASc were truly at low risk for thromboembolism.

  15. An Integrated H-G Scheme Identifying Areas for Soil Remediation and Primary Heavy Metal Contributors: A Risk Perspective

    OpenAIRE

    Bin Zou; Xiaolu Jiang; Xiaoli Duan; Xiuge Zhao; Jing Zhang; Jingwen Tang; Guoqing Sun

    2017-01-01

    Traditional sampling for soil pollution evaluation is cost intensive and has limited representativeness. Therefore, developing methods that can accurately and rapidly identify at-risk areas and the contributing pollutants is imperative for soil remediation. In this study, we propose an innovative integrated H-G scheme combining human health risk assessment and geographical detector methods that was based on geographical information system technology and validated its feasibility in a renewabl...

  16. Investigation of factors determining risk-taking strategies in Pension fund investment of Defined Benefit schemes in the UK corporate pension system

    OpenAIRE

    Hu, Chunan

    2014-01-01

    This paper investigates various incentives determining risk taking strategies of the corporate pension fund investment from the perspective of sponsors. In the United Kingdom, occupational pension plans especially defined benefit (DB) pension schemes play important roles in the financial market. Comparing with the conventional framework managing pension risk as a contained part of the whole firm risk, recent studies start to focus on pension risk especially investment risk as an individual to...

  17. Dynamic droop scheme considering effect of intermittent renewable energy source

    DEFF Research Database (Denmark)

    Wang, Yanbo; Chen, Zhe; Deng, Fujin

    2016-01-01

    This paper presents a dynamic droop control scheme for islanded microgrids dominated by intermittent renewable energy sources, which is able to perform desirable power sharing in the presence of renewable energy source fluctuation. First, allowable maximum power points of wind generator and PV...... flexibility and effectiveness in the presence of the renewable energy sources fluctuation....... controller of each DG unit is activated through local logic variable inferred by wind speed and solar insolation information. Simulation results are given for validating the droop control scheme. The proposed dynamic droop scheme preserves the advantage of conventional droop control method, and provides...

  18. A Risk-Based Approach for Asset Allocation with A Defaultable Share

    Directory of Open Access Journals (Sweden)

    Yang Shen

    2018-02-01

    Full Text Available This paper presents a novel risk-based approach for an optimal asset allocation problem with default risk, where a money market account, an ordinary share and a defaultable security are investment opportunities in a general non-Markovian economy incorporating random market parameters. The objective of an investor is to select an optimal mix of these securities such that a risk metric of an investment portfolio is minimized. By adopting a sub-additive convex risk measure, which takes into account interest rate risk, as a measure for risk, the investment problem is discussed mathematically in a form of a two-player, zero-sum, stochastic differential game between the investor and the market. A backward stochastic differential equation approach is used to provide a flexible and theoretically sound way to solve the game problem. Closed-form expressions for the optimal strategies of the investor and the market are obtained when the penalty function is a quadratic function and when the risk measure is a sub-additive coherent risk measure. An important case of the general non-Markovian model, namely the self-exciting threshold diffusion model with time delay, is considered. Numerical examples based on simulations for the self-exciting threshold diffusion model with and without time delay are provided to illustrate how the proposed model can be applied in this important case. The proposed model can be implemented using Excel spreadsheets.

  19. Collective Recycling Responsibility in Closed-Loop Fashion Supply Chains with a Third Party: Financial Sharing or Physical Sharing?

    Directory of Open Access Journals (Sweden)

    Jiajia Nie

    2013-01-01

    Full Text Available We develop three closed-loop supply chain models where manufacturers can utilize financial or physical support to push a third party to collect the used fashion product for remanufacturing. We first examine two strategies for the collective recycling responsibility (CRR, namely, the financial sharing (FS and the physical sharing (PS, using the model with no CRR as a benchmark. After that, we conduct a detailed comparison among the three models in terms of the retail price, demand, return rate, and the profits received by the supply chain members. With this study, we find the following. (i The FS or PS support offered by the manufacturer to the third party will result in a lower retail price and a higher demand. (ii The optimal return rate with PS scheme is always higher than that without the CRR, and the one with FS scheme is at least as high as that without the CRR. (iii All the members in the closed-loop supply chain can always benefit from the CRR. In addition, (iv which scheme of the FS, PS, or no CRR is the best for the supply chain members will depend heavily on the transfer price of the used product.

  20. Performance analysis of joint multi-branch switched diversity and adaptive modulation schemes for spectrum sharing systems

    KAUST Repository

    Bouida, Zied; Qaraqe, Khalid A.; Abdallah, Mohamed M.; Alouini, Mohamed-Slim

    2012-01-01

    desired performance for the primary link. The proposed switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan and wait combining technique (SWC) where a transmission occurs only when a branch with an acceptable performance

  1. Development of Fault Detection and Diagnosis Schemes for Industrial Refrigeration Systems

    DEFF Research Database (Denmark)

    Thybo, C.; Izadi-Zamanabadi, Roozbeh

    2004-01-01

    The success of a fault detection and diagnosis (FDD) scheme depends not alone on developing an advanced detection scheme. To enable successful deployment in industrial applications, an economically optimal development of FDD schemes are required. This paper reviews and discusses the gained...... experiences achieved by employing a combination of various techniques, methods, and algorithms, which are proposed by academia, on an industrial application. The main focus is on sharing the "lessons learned" from developing and employing Faulttolerant functionalities to a controlled process in order to meet...... the industrial needs while satisfying economically motivated constraints....

  2. Financial risk sharing with providers in health maintenance organizations, 1999.

    Science.gov (United States)

    Gold, Marsha R; Lake, Timothy; Hurley, Robert; Sinclair, Michael

    2002-01-01

    The transfer of financial risk from health maintenance organizations (HMOs) to providers is controversial. To provide timely national data on these practices, we conducted a telephone survey in 1999 of a multi-staged probability sample of HMOs in 20 of the nation's 60 largest markets, accounting for 86% of all HMO enrollees nationally. Among those sampled, 82% responded. We found that HMOs' provider networks with physicians, hospitals, skilled nursing homes, and home health agencies are complex and multi-tiered Seventy-six percent of HMOs in our study use contracts for their HMO products that involve global, professional services, or hospital risk capitation to intermediate entities. These arrangements account for between 24.5 million and 27.4 million of the 55.9 million commercial and Medicare HMO enrollees in the 60 largest markets. While capitation arrangements are particularly common in California, they are more common elsewhere than many assume. The complex layering of risk sharing and delegation of care management responsibility raise questions about accountability and administrative costs in managed care. Do complex structures provide a way to involve providers more directly in managed care, or do they diffuse authority and add to administrative costs?

  3. Comment on ‘Authenticated quantum secret sharing with quantum dialogue based on Bell states’

    Science.gov (United States)

    Gao, Gan; Wang, Yue; Wang, Dong; Ye, Liu

    2018-02-01

    In the paper (2016 Phys. Scr. 91 085101), Abulkasim et al proposed a authenticated quantum secret sharing scheme. We study the security of the multiparty case in the proposed scheme and find that it is not secure.

  4. Classification of cognitive systems dedicated to data sharing

    Science.gov (United States)

    Ogiela, Lidia; Ogiela, Marek R.

    2017-08-01

    In this paper will be presented classification of new cognitive information systems dedicated to cryptographic data splitting and sharing processes. Cognitive processes of semantic data analysis and interpretation, will be used to describe new classes of intelligent information and vision systems. In addition, cryptographic data splitting algorithms and cryptographic threshold schemes will be used to improve processes of secure and efficient information management with application of such cognitive systems. The utility of the proposed cognitive sharing procedures and distributed data sharing algorithms will be also presented. A few possible application of cognitive approaches for visual information management and encryption will be also described.

  5. Performance analysis of distributed beamforming in a spectrum sharing system

    KAUST Repository

    Yang, Liang

    2013-05-01

    In this paper, we consider a distributed beamforming scheme (DBF) in a spectrum sharing system where multiple secondary users share the spectrum with some licensed primary users under an interference temperature constraint. We assume that the DBF is applied at the secondary users. We first consider optimal beamforming and compare it with the user selection scheme in terms of the outage probability and bit error rate performance metrics. Since perfect feedback is difficult to obtain, we then investigate a limited feedback DBF scheme and develop an analysis for a random vector quantization design algorithm. Specifically, the approximate statistics functions of the squared inner product between the optimal and quantized vectors are derived. With these statistics, we analyze the outage performance. Furthermore, the effects of channel estimation error and number of primary users on the system performance are investigated. Finally, optimal power adaptation and cochannel interference are considered and analyzed. Numerical and simulation results are provided to illustrate our mathematical formalism and verify our analysis. © 2012 IEEE.

  6. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  7. Heuristic methods for single link shared backup path protection

    DEFF Research Database (Denmark)

    Haahr, Jørgen Thorlund; Stidsen, Thomas Riis; Zachariasen, Martin

    2014-01-01

    schemes are employed. In contrast to manual intervention, automatic protection schemes such as shared backup path protection (SBPP) can recover from failure quickly and efficiently. SBPP is a simple but efficient protection scheme that can be implemented in backbone networks with technology available...... heuristic algorithms and lower bound methods for the SBPP planning problem. Experimental results show that the heuristic algorithms are able to find good quality solutions in minutes. A solution gap of less than 3.5 % was achieved for 5 of 7 benchmark instances (and a gap of less than 11 % for the remaining...

  8. [Evidence-based Risk and Benefit Communication for Shared Decision Making].

    Science.gov (United States)

    Nakayama, Takeo

    2018-01-01

     Evidence-based medicine (EBM) can be defined as "the integration of the best research evidence with clinical expertise and a patient's unique values and circumstances". However, even with the best research evidence, many uncertainties can make clinical decisions difficult. As the social requirement of respecting patient values and preferences has been increasingly recognized, shared decision making (SDM) and consensus development between patients and clinicians have attracted attention. SDM is a process by which patients and clinicians make decisions and arrive at a consensus through interactive conversations and communications. During the process of SDM, patients and clinicians share information with each other on the goals they hope to achieve and responsibilities in meeting those goals. From the clinician's standpoint, information regarding the benefits and risks of potential treatment options based on current evidence and professional experience is provided to patients. From the patient's standpoint, information on personal values, preferences, and social roles is provided to clinicians. SDM is a sort of "wisdom" in the context of making autonomous decisions in uncertain, difficult situations through interactions and cooperation between patients and clinicians. Joint development of EBM and SDM will help facilitate patient-clinician relationships and improve the quality of healthcare.

  9. Joint opportunistic beam and spectrum selection schemes for spectrum sharing systems with limited feedback

    KAUST Repository

    Sayed, Mostafa M.; Abdallah, Mohamed M.; Qaraqe, Khalid A.; Tourki, Kamel; Alouini, Mohamed-Slim

    2014-01-01

    Spectrum sharing systems have been introduced to alleviate the problem of spectrum scarcity by allowing an unlicensed secondary user (SU) to share the spectrum with a licensed primary user (PU) under acceptable interference levels to the primary

  10. Infectious Cognition: Risk Perception Affects Socially Shared Retrieval-Induced Forgetting of Medical Information.

    Science.gov (United States)

    Coman, Alin; Berry, Jessica N

    2015-12-01

    When speakers selectively retrieve previously learned information, listeners often concurrently, and covertly, retrieve their memories of that information. This concurrent retrieval typically enhances memory for mentioned information (the rehearsal effect) and impairs memory for unmentioned but related information (socially shared retrieval-induced forgetting, SSRIF), relative to memory for unmentioned and unrelated information. Building on research showing that anxiety leads to increased attention to threat-relevant information, we explored whether concurrent retrieval is facilitated in high-anxiety real-world contexts. Participants first learned category-exemplar facts about meningococcal disease. Following a manipulation of perceived risk of infection (low vs. high risk), they listened to a mock radio show in which some of the facts were selectively practiced. Final recall tests showed that the rehearsal effect was equivalent between the two risk conditions, but SSRIF was significantly larger in the high-risk than in the low-risk condition. Thus, the tendency to exaggerate consequences of news events was found to have deleterious consequences. © The Author(s) 2015.

  11. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  12. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  13. A Finite Equivalence of Verifiable Multi-secret Sharing

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2012-02-01

    Full Text Available We give an abstraction of verifiable multi-secret sharing schemes that is accessible to a fully mechanized analysis. This abstraction is formalized within the applied pi-calculus by using an equational theory which characterizes the cryptographic semantics of secret share. We also present an encoding from the equational theory into a convergent rewriting system, which is suitable for the automated protocol verifier ProVerif. Based on that, we verify the threshold certificate protocol in ProVerif.

  14. Human milk sharing practices in the U.S.

    Science.gov (United States)

    Palmquist, Aunchalee E L; Doehler, Kirsten

    2016-04-01

    The primary objective of this study is to describe human milk sharing practices in the U.S. Specifically, we examine milk sharing social networks, donor compensation, the prevalence of anonymous milk sharing interactions, recipients' concerns about specific milk sharing risks, and lay screening behaviors. Data on human milk sharing practices were collected via an online survey September 2013-March 2014. Chi-square analyses were used to test the association between risk perception and screening practices. A total of 867 (661 donors, 206 recipients) respondents were included in the analyses. Most (96.1%) reported sharing milk face-to-face. Only 10% of respondents reported giving or receiving milk through a non-profit human milk bank, respectively. There were no reports of anonymous purchases of human milk. A small proportion of recipients (4.0%) reported that their infant had a serious medical condition. Screening of prospective donors was common (90.7%) but varied with social relationship and familiarity. Likewise, concern about specific milk sharing risks was varied, and risk perception was significantly associated (P-values = 0.01 or less) with donor screening for all risk variables except diet. Understanding lay perceptions of milk sharing risk and risk reduction strategies that parents are using is an essential first step in developing public health interventions and clinical practices that promote infant safety. © 2015 The Authors. Maternal & Child Nutrition published by John Wiley & Sons Ltd.

  15. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  16. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  17. Shared Genetic Aetiology between Cognitive Ability and Cardiovascular Disease Risk Factors: Generation Scotland's Scottish Family Health Study

    Science.gov (United States)

    Luciano, Michelle; Batty, G. David; McGilchrist, Mark; Linksted, Pamela; Fitzpatrick, Bridie; Jackson, Cathy; Pattie, Alison; Dominiczak, Anna F.; Morris, Andrew D.; Smith, Blair H.; Porteous, David; Deary, Ian J.

    2010-01-01

    People with higher general cognitive ability in early life have more favourable levels of cardiovascular disease (CVD) risk factors in adulthood and CVD itself. The mechanism of these associations is not known. Here we examine whether general cognitive ability and CVD risk factors share genetic and/or environmental aetiology. In this large,…

  18. Anorexia nervosa and major depression: shared genetic and environmental risk factors.

    Science.gov (United States)

    Wade, T D; Bulik, C M; Neale, M; Kendler, K S

    2000-03-01

    The authors sought to derive heritability estimates for anorexia nervosa and to explore the etiology of the comorbid relationship between anorexia nervosa and major depression. They applied bivariate structural equation modeling to a broad definition of anorexia nervosa and lifetime major depression as assessed in a population-based sample of 2,163 female twins. Anorexia nervosa was estimated to have a heritability of 58% (95% confidence interval=33%-84%). The authors were unable to completely rule out a contribution of shared environment. The comorbidity between anorexia nervosa and major depression is likely due to genetic factors that influence the risk for both disorders. Although the study was limited by the small number of affected twins, the results suggest that genetic factors significantly influence the risk for anorexia nervosa and substantially contribute to the observed comorbidity between anorexia nervosa and major depression.

  19. Social capital and active membership in the Ghana National Health Insurance Scheme - a mixed method study.

    Science.gov (United States)

    Fenenga, Christine J; Nketiah-Amponsah, Edward; Ogink, Alice; Arhinful, Daniel K; Poortinga, Wouter; Hutter, Inge

    2015-11-02

    People's decision to enroll in a health insurance scheme is determined by socio-cultural and socio-economic factors. On request of the National health Insurance Authority (NHIA) in Ghana, our study explores the influence of social relationships on people's perceptions, behavior and decision making to enroll in the National Health Insurance Scheme. This social scheme, initiated in 2003, aims to realize accessible quality healthcare services for the entire population of Ghana. We look at relationships of trust and reciprocity between individuals in the communities (so called horizontal social capital) and between individuals and formal health institutions (called vertical social capital) in order to determine whether these two forms of social capital inhibit or facilitate enrolment of clients in the scheme. Results can support the NHIA in exploiting social capital to reach their objective and strengthen their policy and practice. We conducted 20 individual- and seven key-informant interviews, 22 focus group discussions, two stakeholder meetings and a household survey, using a random sample of 1903 households from the catchment area of 64 primary healthcare facilities. The study took place in Greater Accra Region and Western Regions in Ghana between June 2011 and March 2012. While social developments and increased heterogeneity seem to reduce community solidarity in Ghana, social networks remain common in Ghana and are valued for their multiple benefits (i.e. reciprocal trust and support, information sharing, motivation, risk sharing). Trusting relations with healthcare and insurance providers are, according healthcare clients, based on providers' clear communication, attitude, devotion, encouragement and reliability of services. Active membership of the NHIS is positive associated with community trust, trust in healthcare providers and trust in the NHIS (p-values are .009, .000 and .000 respectively). Social capital can motivate clients to enroll in health insurance

  20. SECURE VISUAL SECRET SHARING BASED ON DISCRETE WAVELET TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Jyothi Lekshmi

    2015-08-01

    Full Text Available Visual Cryptography Scheme (VCS is an encryption method to encode secret written materials. This method converts the secret written material into an image. Then encode this secret image into n shadow images called shares. For the recreation of the original secret, all or some selected subsets of shares are needed; individual shares are of no use on their own. The secret image can be recovered simply by selecting some subset of these n shares, makes transparencies of them and stacking on top of each other. Nowadays, the data security has an important role. The shares can be altered by an attacker. So providing security to the shares is important. This paper proposes a method of adding security to cryptographic shares. This method uses two dimensional discrete wavelet transform to hide visual secret shares. Then the hidden secrets are distributed among participants through the internet. All hidden shares are extracted to reconstruct the secret.

  1. Risk, Benefit, and Moderators of the Affect Heuristic in a Widespread Unlawful Activity: Evidence from a Survey of Unlawful File-Sharing Behavior.

    Science.gov (United States)

    Watson, Steven J; Zizzo, Daniel J; Fleming, Piers

    2017-06-01

    Increasing the perception of legal risk via publicized litigation and lobbying for copyright law enforcement has had limited success in reducing unlawful content sharing by the public. We consider the extent to which engaging in file sharing online is motivated by the perceived benefits of this activity as opposed to perceived legal risks. Moreover, we explore moderators of the relationship between perceived risk and perceived benefits; namely, trust in industry and legal regulators, and perceived online anonymity. We examine these questions via a large two-part survey of consumers of music (n = 658) and eBooks (n = 737). We find that perceptions of benefit, but not of legal risk, predict stated file-sharing behavior. An affect heuristic is employed: as perceived benefit increases, perceived risk falls. This relationship is increased under high regulator and industry trust (which actually increases perceived risk in this study) and low anonymity (which also increases perceived risk). We propose that, given the limited impact of perceived legal risk upon unlawful downloading, it would be better for the media industries to target enhancing the perceived benefit and availability of lawful alternatives. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  2. Car sharing à la carte

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    Do you want to make your commute to CERN easier, while saving money at the same time? Would you prefer not to spend a quarter of an hour crawling round the CERN car parks looking for a space? If so, read on: this article might well be of great interest to you.   We would like to draw your attention to a well established, albeit sadly under-used, method of transport: car sharing. To promote car-sharing, the GS Department has stepped in to call on the services of the Swiss firm Green Monkeys which specialises in this user-friendly and intelligent transport scheme. The company’s slogan is:  “Car-sharing as you want, when you want and as much as you want”. The principle is very straightforward. To use this car-sharing facility, you simply complete your free online registration with Green Monkeys, providing the following details: your journey, departure time, arrival time and days of the week, and indicating whether you are a passenger or driver or both. &a...

  3. Educational differences in cardiovascular mortality: The role of shared family factors and cardiovascular risk factors.

    Science.gov (United States)

    Kjøllesdal, M K R; Ariansen, I; Mortensen, L H; Davey Smith, G; Næss, Ø

    2016-12-01

    To explore the confounding effects of early family factors shared by siblings and cardiovascular risk factors in midlife on the educational differences in mortality from cardiovascular disease (CVD). Data from national and regional health surveys in Norway (1974-2003) were linked with data from the Norwegian Family Based Life Course Study, the National Educational Registry and the Cause of Death Registry. The study population consisted of participants with at least one full sibling among the health survey participants ( n=271,310). Data were available on CVD risk factors, including weight, height, blood pressure, total cholesterol and smoking. The hazards ratio (HR) of CVD mortality was 3.44 (95% confidence interval (CI) 2.98-3.96) in the lowest educational group relative to the highest. The HRs were little altered in the within-sibship analyses. Adjusted for risk factors, the HR for CVD mortality in the cohort analyses was 2.05 (CI 1.77-2.37) in the lowest educational group relative to the highest. The respective HR in the within-sibship analyses was 2.46 (CI 1.48-2.24). Using a sibling design, we did not find that the association between education and CVD mortality was confounded by early life factors shared by siblings, but it was explained to a large extent by CVD risk factors. These results suggest that reducing levels of CVD risk factors could have the greatest effect on mortality in less well-educated people.

  4. Switch and examine transmit diversity for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme

  5. Interleaved Buck Converter with Variable Number of Active Phases and a Predictive Current Sharing Scheme

    DEFF Research Database (Denmark)

    Jakobsen, Lars Tønnes; Garcia, O.; Oliver, J. A.

    2008-01-01

    The efficiency of an interleaved Buck converter is typically low at light load conditions because of the switching losses in each of the switching stages. Improvements in the converter efficiency can be achieved by dynamically changing the number of active phases depending on the load current....... This paper addresses the issues related to the transient response of the converter when the number of active phases is changed by a digital control scheme. The problem arises because the current in the individual phases of the interleaved Buck converter will not be equal immediately after the controller has...... changed the number of active phases. This paper proposes a current equalisation scheme that adjusts the duty cycle of each phase in a manner that ensures equal average inductor current in all active phases in one or two PWM periods. The current equalisation scheme relies on the measurement of the output...

  6. Coordinated single-phase control scheme for voltage unbalance reduction in low voltage network.

    Science.gov (United States)

    Pullaguram, Deepak; Mishra, Sukumar; Senroy, Nilanjan

    2017-08-13

    Low voltage (LV) distribution systems are typically unbalanced in nature due to unbalanced loading and unsymmetrical line configuration. This situation is further aggravated by single-phase power injections. A coordinated control scheme is proposed for single-phase sources, to reduce voltage unbalance. A consensus-based coordination is achieved using a multi-agent system, where each agent estimates the averaged global voltage and current magnitudes of individual phases in the LV network. These estimated values are used to modify the reference power of individual single-phase sources, to ensure system-wide balanced voltages and proper power sharing among sources connected to the same phase. Further, the high X / R ratio of the filter, used in the inverter of the single-phase source, enables control of reactive power, to minimize voltage unbalance locally. The proposed scheme is validated by simulating a LV distribution network with multiple single-phase sources subjected to various perturbations.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  7. The educational gradient in cardiovascular risk factors: impact of shared family factors in 228,346 Norwegian siblings.

    Science.gov (United States)

    Ariansen, Inger; Mortensen, Laust Hvas; Graff-Iversen, Sidsel; Stigum, Hein; Kjøllesdal, Marte Karoline Råberg; Næss, Øyvind

    2017-03-30

    Various indicators of childhood socioeconomic position have been related to cardiovascular disease (CVD) risk in adulthood. We investigated the impact of shared family factors on the educational gradient in midlife CVD risk factors by assessing within sibling similarities in the gradient using a discordant sibling design. Norwegian health survey data (1980-2003) was linked to educational and generational data. Participants with a full sibling in the health surveys (228,346 individuals in 98,046 sibships) were included. Associations between attained educational level (7-9 years, 10-11 years, 12 years, 13-16 years, or >16 years) and CVD risk factor levels in the study population was compared with the corresponding associations within siblings. Educational gradients in risk factors were attenuated when factors shared by siblings was taken into account: A one category lower educational level was associated with 0.7 (95% confidence interval 0.6 to 0.8) mm Hg higher systolic blood pressure (27% attenuation), 0.4 (0.4 to 0.5) mmHg higher diastolic blood pressure (30%), 1.0 (1.0 to 1.1) more beats per minute higher heart rate (21%), 0.07 (0.06 to 0.07) mmol/l higher serum total cholesterol (32%), 0.2 (0.2 to 0.2) higher smoking level (5 categories) (30%), 0.15 (0.13 to 0.17) kg/m 2 higher BMI (43%), and 0.2 (0.2 to 0.2) cm lower height (52%). Attenuation increased with shorter age-difference between siblings. About one third of the educational gradients in modifiable CVD risk factors may be explained by factors that siblings share. This implies that childhood environment is important for the prevention of CVD.

  8. Validation of risk stratification schemes for predicting stroke and thromboembolism in patients with atrial fibrillation: nationwide cohort study

    DEFF Research Database (Denmark)

    Olesen, Jonas Bjerring; Lip, Gregory Y H; Hansen, Morten Lock

    2011-01-01

    To evaluate the individual risk factors composing the CHADS(2) (Congestive heart failure, Hypertension, Age≥75 years, Diabetes, previous Stroke) score and the CHA(2)DS(2)-VASc (CHA(2)DS(2)-Vascular disease, Age 65-74 years, Sex category) score and to calculate the capability of the schemes to pre...

  9. Multiparty Quantum Secret Sharing of Secure Direct Communication Using Teleportation

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojing

    2007-01-01

    We present an (n,n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state and teleportation. After ensuring the security of the quantum channel, the sender encodes the secret message directly on a sequence of particle states and transmits it to the receivers by teleportation. The receivers can recover the secret message by combining their measurement results with the sender's result. If a perfect quantum channel is used, our scheme is completely secure because the transmitting particle sequence does not carry the secret message. We also show our scheme is secure for noise quantum channel.

  10. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  11. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    Science.gov (United States)

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  12. Shared Responsibility for Type 1 Diabetes Care Is Associated With Glycemic Variability and Risk of Glycemic Excursions in Youth.

    Science.gov (United States)

    Marker, Arwen M; Noser, Amy E; Clements, Mark A; Patton, Susana R

    2018-01-01

    We examined how parent and youth responsibility for type 1 diabetes (T1D) care is related to adherence and glycemic outcomes, namely, glycemic variability and risk of glycemic excursions. One hundred thirty-five parent-youth dyads (10-16 years old; diagnosed with T1D for at least 6 months) participated in this study. Percent responsibility of T1D care attributed to the youth, parent, or shared was measured using the Diabetes Family Responsibility Questionnaire. We collected youth's hemoglobin A1c (HbA1c) and glucometer downloads to examine relationships between responsibility and HbA1c, frequency of blood glucose monitoring (self-monitoring blood glucose, SMBG), risk of glycemic excursions, and actual glycemic variability using bivariate correlations and path analysis. Participants reported shared responsibility for almost half of T1D self-care tasks. Bivariate correlations showed shared responsibility was associated with less variability, whereas parent responsibility was associated with greater glycemic variability and risk for glycemic excursions. Youth responsibility was associated with lower frequency of SMBG. The path analyses confirmed our correlational findings (pshypothesis that shared T1D responsibility is associated with better diabetes outcomes in youth. © The Author 2017. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  13. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  14. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  15. Cost-based droop scheme with lower generation costs for microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    -based droop scheme, whose objective is to reduce a generation cost function realised with various DG operating characteristics taken into consideration. Where desired, proportional power sharing based on the DG kVA ratings can also be included, whose disadvantage is a slightly higher generation cost, which...... on the DG kilovolts ampere (kVA) ratings. Other factors like generation costs, efficiencies and emission penalties at different load demands have not been considered. This omission might not be appropriate if different types of DGs are present in the microgrids. As an alternative, this study proposes a cost...... is still lower than that produced by the traditional droop schemes. The proposed droop scheme therefore retains all advantages of the traditional droop schemes, whereas at the same time, keeps its generation cost low. These findings have been validated in experiments....

  16. The Stability of Interbank Market Network: A Perspective on Contagion and Risk Sharing

    Directory of Open Access Journals (Sweden)

    Chi Xie

    2016-01-01

    Full Text Available As an important part of the financial system, interbank market provides banks with liquidity and credit lending and also is the main channel for risk contagion. In this paper, we test the existence of systematic risk contagion within the Chinese interbank market. By building the networks of the Chinese interbank market for each year and using the measure of mutual information, we quantitatively detect the changes of interbank market networks and observe that the correlations between banks become increasingly tighter in recent years. With the bilateral risk exposure among Chinese listed commercial banks, we find that the possibility of systemic risk contagion in Chinese interbank market is fairly small. But of great concern on each individual bank, the matter is different. Our simulation shows that the failures of three special banks (i.e., Agricultural Bank of China and Bank of China and Industrial and Commercial Bank of China most likely lead to systemic risk contagion. Furthermore, we test the antirisk ability of the Chinese interbank market from the perspective of risk sharing and discover that the interbank market is stable when the loss scale is lower than forty percent of banks’ total core capital.

  17. A virtual network computer's optical storage virtualization scheme

    Science.gov (United States)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  18. Joint switched multi-spectrum and transmit antenna diversity for spectrum sharing systems

    KAUST Repository

    Sayed, Mostafa M.

    2013-10-01

    In spectrum sharing systems, a secondary user (SU) is allowed to share the spectrum with a primary (licensed) network under the condition that the interference observed at the receivers of the primary users (PU-Rxs) is below a predetermined level. In this paper, we consider a secondary network comprised of a secondary transmitter (SU-Tx) equipped with multiple antennas and a single-antenna secondary receiver (SU-Rx) sharing the same spectrum with multiple primary users (PUs), each with a distinct spectrum. We develop transmit antenna diversity schemes at the SU-Tx that exploit the multi-spectrum diversity provided by the existence of multiple PUs so as to optimize the signal-to-noise ratio (SNR) at the SU-Rx. In particular, assuming bounded transmit power at the SU-Tx, we develop switched selection schemes that select the primary spectrum and the SU-Tx transmit antenna that maintain the SNR at the SU-Rx above a specific threshold. Assuming Rayleigh fading channels and binary phase-shift keying (BPSK) transmission, we derive the average bit-error-rate (BER) and average feedback load expressions for the proposed schemes. For the sake of comparison, we also derive a BER expression for the optimal selection scheme that selects the best antenna/spectrum pair that maximizes the SNR at the SU-Rx, in exchange of high feedback load and switching complexity. Finally, we show that our analytical results are in perfect agreement with the simulation results. © 2013 IEEE.

  19. Measuring the travel behaviour impact of free-floating car-sharing

    OpenAIRE

    Becker, Henrik; Ciari, Francesco; Axhausen, Kay W.

    2016-01-01

    Free-floating car-sharing schemes operate without fixed car-sharing stations, ahead reservations or return-trip requirements. Providing fast and convenient motorization, they attract both public transport users and (former) car-owners. Thus, its impact on individual travel behavior depends on the user type. Estimating the travel behavior impact of these novel systems therefore requires quantitative data. Using a two-wave survey approach including travel diaries, this research shows, that free...

  20. Share capitalism and worker wellbeing⋆, ⋆⋆

    Science.gov (United States)

    Clark, Andrew E.; Freeman, Richard B.; Green, Colin P.

    2017-01-01

    We show that worker wellbeing is determined not only by the amount of compensation workers receive but also by how compensation is determined. While previous theoretical and empirical work has often been preoccupied with individual performance-related pay, we find that the receipt of a range of group-performance schemes (profit shares, group bonuses and share ownership) is associated with higher job satisfaction. This holds conditional on wage levels, so that pay methods are associated with greater job satisfaction in addition to that coming from higher wages. We use a variety of methods to control for unobserved individual and job-specific characteristics. We suggest that half of the share-capitalism effect is accounted for by employees reciprocating for the “gift”; we also show that share capitalism helps dampen the negative wellbeing effects of what we typically think of as “bad” aspects of job quality. PMID:28725118

  1. On Secret Sharing with Nonlinear Product Reconstruction

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Cramer, Ronald; Mirandola, Diego

    2015-01-01

    Multiplicative linear secret sharing is a fundamental notion in the area of secure multiparty computation and, since recently, in the area of two-party cryptography as well. In a nutshell, this notion guarantees that the product of two secrets is obtained as a linear function of the vector......-necessarily-linear “product reconstruction function.” Is the resulting notion equivalent to multiplicative linear secret sharing? We show the (perhaps somewhat counterintuitive) result that this relaxed notion is strictly more general. Concretely, fix a finite field ${\\mathbb F}_q$ as the base field over which linear secret...... sharing is considered. Then we show there exists an (exotic) linear secret sharing scheme with an unbounded number of players $n$ such that it has $t$-privacy with $t = \\Omega(n)$ and such that it does admit a product reconstruction function, yet this function is necessarily nonlinear. In addition, we...

  2. The educational gradient in cardiovascular risk factors: impact of shared family factors in 228,346 Norwegian siblings

    Directory of Open Access Journals (Sweden)

    Inger Ariansen

    2017-03-01

    Full Text Available Abstract Background Various indicators of childhood socioeconomic position have been related to cardiovascular disease (CVD risk in adulthood. We investigated the impact of shared family factors on the educational gradient in midlife CVD risk factors by assessing within sibling similarities in the gradient using a discordant sibling design. Methods Norwegian health survey data (1980–2003 was linked to educational and generational data. Participants with a full sibling in the health surveys (228,346 individuals in 98,046 sibships were included. Associations between attained educational level (7–9 years, 10–11 years, 12 years, 13–16 years, or >16 years and CVD risk factor levels in the study population was compared with the corresponding associations within siblings. Results Educational gradients in risk factors were attenuated when factors shared by siblings was taken into account: A one category lower educational level was associated with 0.7 (95% confidence interval 0.6 to 0.8 mm Hg higher systolic blood pressure (27% attenuation, 0.4 (0.4 to 0.5 mmHg higher diastolic blood pressure (30%, 1.0 (1.0 to 1.1 more beats per minute higher heart rate (21%, 0.07 (0.06 to 0.07 mmol/l higher serum total cholesterol (32%, 0.2 (0.2 to 0.2 higher smoking level (5 categories (30%, 0.15 (0.13 to 0.17 kg/m2 higher BMI (43%, and 0.2 (0.2 to 0.2 cm lower height (52%. Attenuation increased with shorter age-difference between siblings. Conclusion About one third of the educational gradients in modifiable CVD risk factors may be explained by factors that siblings share. This implies that childhood environment is important for the prevention of CVD.

  3. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  4. Scenarios for the risk of hunger in the twenty-first century using Shared Socioeconomic Pathways

    International Nuclear Information System (INIS)

    Hasegawa, Tomoko; Fujimori, Shinichiro; Takahashi, Kiyoshi; Masui, Toshihiko

    2015-01-01

    Shared socioeconomic pathways (SSPs) are being developed internationally for cross-sectoral assessments of climate change impacts, adaptation, and mitigation. These are five scenarios that include both qualitative and quantitative information for mitigation and adaptation challenges to climate change. In this study, we quantified scenarios for the risk of hunger in the 21st century using SSPs, and clarified elements that influence future hunger risk. There were two primary findings: (1) risk of hunger in the 21st-century greatly differed among five SSPs; and (2) population growth, improvement in the equality of food distribution within a country, and increases in food consumption mainly driven by income growth greatly influenced future hunger risk and were important elements in its long-term assessment. (letter)

  5. A Multi-Breed Genome-Wide Association Analysis for Canine Hypothyroidism Identifies a Shared Major Risk Locus on CFA12.

    Directory of Open Access Journals (Sweden)

    Matteo Bianchi

    Full Text Available Hypothyroidism is a complex clinical condition found in both humans and dogs, thought to be caused by a combination of genetic and environmental factors. In this study we present a multi-breed analysis of predisposing genetic risk factors for hypothyroidism in dogs using three high-risk breeds--the Gordon Setter, Hovawart and the Rhodesian Ridgeback. Using a genome-wide association approach and meta-analysis, we identified a major hypothyroidism risk locus shared by these breeds on chromosome 12 (p = 2.1x10(-11. Further characterisation of the candidate region revealed a shared ~167 kb risk haplotype (4,915,018-5,081,823 bp, tagged by two SNPs in almost complete linkage disequilibrium. This breed-shared risk haplotype includes three genes (LHFPL5, SRPK1 and SLC26A8 and does not extend to the dog leukocyte antigen (DLA class II gene cluster located in the vicinity. These three genes have not been identified as candidate genes for hypothyroid disease previously, but have functions that could potentially contribute to the development of the disease. Our results implicate the potential involvement of novel genes and pathways for the development of canine hypothyroidism, raising new possibilities for screening, breeding programmes and treatments in dogs. This study may also contribute to our understanding of the genetic etiology of human hypothyroid disease, which is one of the most common endocrine disorders in humans.

  6. Infotech. Cyber security. Health care learns to share scares and solutions.

    Science.gov (United States)

    Colias, Mike

    2004-05-01

    Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.

  7. Effects of Perceived Risks, Reputation and Electronic Word of Mouth (E-WOM) on Collaborative Consumption of Uber Car Sharing Service

    Science.gov (United States)

    Wati Hawapi, Mega; Sulaiman, Zuraidah; Kohar, Umar Haiyat Abdul; Abu Talib, Noraini

    2017-06-01

    Current transition from traditional economic model of selling and buying to sharing economic business creates a huge impact on consumers’ preferences to participate in collaborative consumption. The market entrance of sharing economic business is relatively new, thus it builds scepticism among consumers. Consumers’ trust becomes the most crucial aspect in determining their willingness to participate in collaborative consumption. This study will reveal the effects of perceived risks (performance and social), reputation and Electronic Word-of Mouth (E-WOM) on Malaysian consumers’ intention of collaborative consumption, especially for Uber car sharing service. This study inspires to enrich the literature for collaborative consumption and perceived risk theory. From the practical perspective, this study may provide insights in assisting the collaborative consumption service providers especially Uber car users on factors influencing the intention to engage in such service.

  8. Instant Social Ride-Sharing

    OpenAIRE

    Gidofalvi, Gyözö; Herenyi, Gergely; Bach Pedersen, Torben

    2008-01-01

    This paper explores the use of ride–sharing as a resource-efficient mode of personal transportation. While the perceived benefits of ride–sharing include reduced travel times, transportation costs, congestion, and carbon emissions, its wide–spread adoption is hindered by a number of barriers. These include the scheduling and coordination of routes, safety risks, social discomfort in sharing private spaces, and an imbalance of costs and benefits among parties. To address these barriers, the au...

  9. On the management of life insurance company risk by strategic choice of product mix, investment strategy and surplus appropriation schemes

    DEFF Research Database (Denmark)

    Bohnert, Alexander; Gatzert, Nadine; Jørgensen, Peter Løchte

    2015-01-01

    The aim of this paper is to analyze the impact of management’s strategic choice of asset and liability composition in life insurance on shortfall risk and the shareholders’ fair risk charge. In contrast to previous work, we focus on the effectiveness of management decisions regarding the product...... mix and the riskiness of the asset side under different surplus appropriation schemes. We propose a model setting that comprises temporary life annuities and endowment insurance contracts. Our numerical results show that the effectiveness of management decisions in regard to risk reduction strongly...

  10. Construct the stable vendor managed inventory partnership through a profit-sharing approach

    Science.gov (United States)

    Li, S.; Yu, Z.; Dong, M.

    2015-01-01

    In real life, the vendor managed inventory (VMI) model is not always a stable supply chain partnership. This paper proposes a cooperative game based profit-sharing method to stabilize the VMI partnership. Specifically, in a B2C setting, we consider a VMI program including a manufacturer and multiple online retailers. The manufacturer provides the finished product at the equal wholesale price to multiple online retailers. The online retailers face the same customer demand information. We offer the model to compute the increased profits generated by information sharing for total possible VMI coalitions. Using the solution concept of Shapley value, the profit-sharing scheme is produced to fairly divide the total increased profits among the VMI members. We find that under a fair allocation scheme, the higher inventory cost of one VMI member increases the surplus of the other members. Furthermore, the manufacturer is glad to increase the size of VMI coalition, whereas, the retailers are delighted to limit the size of the alliance. Finally, the manufacturer can select the appropriate retailer to boost its surplus, which has no effect on the surplus of the other retailers. The numerical examples indicate that the grand coalition is stable under the proposed allocation scheme.

  11. Cost shared wildfire risk mitigation in Log Hill Mesa, Colorado: Survey evidence on participation and willingness to pay

    Science.gov (United States)

    James R. Meldrum; Patricia A. Champ; Travis Warziniack; Hannah Brenkert-Smith; Christopher M. Barth; Lilia C. Falk

    2014-01-01

    Wildland-urban interface (WUI) homeowners who do not mitigate the wildfire risk on their properties impose a negative externality on society. To reduce the social costs of wildfire and incentivise homeowners to take action, cost sharing programs seek to reduce the barriers that impede wildfire risk mitigation. Using survey data from a WUI community in western Colorado...

  12. Risk mitigation of shared electronic records system in campus institutions: medical social work practice in singapore.

    Science.gov (United States)

    Ow Yong, Lai Meng; Tan, Amanda Wei Li; Loo, Cecilia Lay Keng; Lim, Esther Li Ping

    2014-10-01

    In 2013, the Singapore General Hospital (SGH) Campus initiated a shared electronic system where patient records and documentations were standardized and shared across institutions within the Campus. The project was initiated to enhance quality of health care, improve accessibility, and ensure integrated (as opposed to fragmented) care for best outcomes in our patients. In mitigating the risks of ICT, it was found that familiarity with guiding ethical principles, and ensuring adherence to regulatory and technical competencies in medical social work were important. The need to negotiate and maneuver in a large environment within the Campus to ensure proactive integrative process helped.

  13. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....

  14. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-01

    This paper proposes adequate methods to improve the interference mitigation capability of a recently investigated switched-based interference reduction scheme in short-range open-access and over-loaded femtocells. It is assumed that the available orthogonal channels for the femtocell network are distributed among operating access points in close vicinity, where each of which knows its allocated channels a priori. For the case when the feedback links are capacity-limited and the available channels can be universally shared and simultaneously used, the paper presents enhanced schemes to identify a channel to serve the desired scheduled user by maintaining the interference power level within a tolerable range. They attempt to either complement the switched-based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those of the single-threshold switched-based scheme via numerical and simulation results. © 2012 IEEE.

  15. Do adolescent delinquency and problem drinking share psychosocial risk factors? A literature review.

    Science.gov (United States)

    Curcio, Angela L; Mak, Anita S; George, Amanda M

    2013-04-01

    Despite the prevalence and damaging effects of adolescent problem drinking, relative to delinquency, far less research has focused on drinking using an integrated theoretical approach. The aim of the current research was to review existing literature on psychosocial risk factors for delinquency and problem drinking, and explore whether integrating elements of social learning theory with an established psychosocial control theory of delinquency could explain adolescent problem drinking. We reviewed 71 studies published post-1990 with particular focus on articles that empirically researched risk factors for adolescent problem drinking and delinquency in separate and concurrent studies and meta-analytic reviews. We found shared risk factors for adolescent delinquency and problem drinking that are encompassed by an extension of psychosocial control theory. The potential of an extended psychosocial control theory providing a parsimonious theoretical approach to explaining delinquency, problem drinking and other adolescent problem behaviours, along with suggestions for future investigations, is discussed. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Egalitarian Risk Sharing under Liquidity Constraints

    NARCIS (Netherlands)

    Koster, M.; Boonen, T.

    2014-01-01

    Undertaking joint projects in practice involves a lot of uncertainty, especially when it comes to the final costs. This paper addresses the problem of sharing realized costs by the participants, subject to their indvidual liquidity constraints. If all cost levels can be accounted for, and it the

  17. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  18. Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud

    Directory of Open Access Journals (Sweden)

    Qingqing Gan

    2017-01-01

    Full Text Available With the rapid development of network and storage technology, cloud storage has become a new service mode, while data sharing and user revocation are important functions in the cloud storage. Therefore, according to the characteristics of cloud storage, a revocable key-aggregate encryption scheme is put forward based on subset-cover framework. The proposed scheme not only has the key-aggregate characteristics, which greatly simplifies the user’s key management, but also can revoke user access permissions, realizing the flexible and effective access control. When user revocation occurs, it allows cloud server to update the ciphertext so that revoked users can not have access to the new ciphertext, while nonrevoked users do not need to update their private keys. In addition, a verification mechanism is provided in the proposed scheme, which can verify the updated ciphertext and ensure that the user revocation is performed correctly. Compared with the existing schemes, this scheme can not only reduce the cost of key management and storage, but also realize user revocation and achieve user’s access control efficiently. Finally, the proposed scheme can be proved to be selective chosen-plaintext security in the standard model.

  19. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  20. Applying a new computer-aided detection scheme generated imaging marker to predict short-term breast cancer risk

    Science.gov (United States)

    Mirniaharikandehei, Seyedehnafiseh; Hollingsworth, Alan B.; Patel, Bhavika; Heidari, Morteza; Liu, Hong; Zheng, Bin

    2018-05-01

    This study aims to investigate the feasibility of identifying a new quantitative imaging marker based on false-positives generated by a computer-aided detection (CAD) scheme to help predict short-term breast cancer risk. An image dataset including four view mammograms acquired from 1044 women was retrospectively assembled. All mammograms were originally interpreted as negative by radiologists. In the next subsequent mammography screening, 402 women were diagnosed with breast cancer and 642 remained negative. An existing CAD scheme was applied ‘as is’ to process each image. From CAD-generated results, four detection features including the total number of (1) initial detection seeds and (2) the final detected false-positive regions, (3) average and (4) sum of detection scores, were computed from each image. Then, by combining the features computed from two bilateral images of left and right breasts from either craniocaudal or mediolateral oblique view, two logistic regression models were trained and tested using a leave-one-case-out cross-validation method to predict the likelihood of each testing case being positive in the next subsequent screening. The new prediction model yielded the maximum prediction accuracy with an area under a ROC curve of AUC  =  0.65  ±  0.017 and the maximum adjusted odds ratio of 4.49 with a 95% confidence interval of (2.95, 6.83). The results also showed an increasing trend in the adjusted odds ratio and risk prediction scores (p  breast cancer risk.

  1. Building shared understandings in introductory physics tutorials through risk, repair, conflict & comedy

    Science.gov (United States)

    Conlin, Luke D.

    Collaborative inquiry learning environments, such as The Tutorials in Physics Sensemaking, are designed to provide students with opportunities to partake in the authentic disciplinary practices of argumentation and sensemaking. Through these practices, groups of students in tutorial can build shared conceptual understandings of the mechanisms behind physical phenomena. In order to do so, they must also build a shared epistemological understanding of what they are doing together, such that their activity includes collaboratively making sense of mechanisms. Previous work (Conlin, Gupta, Scherr, & Hammer, 2007; Scherr & Hammer, 2009) has demonstrated that tutorial students do not settle upon only one way of understanding their activity together, but instead build multiple shared ways of understanding, or framing (Scherr & Hammer, 2009; Tannen, 1993a), their activity. I build upon this work by substantiating a preliminary finding that one of these shared ways of framing corresponds with increased evidence of the students' collaboratively making sense of physical mechanisms. What previous research has not yet addressed is how the students come to understand their activity as including collaborative sensemaking discussions in the first place, and how that understanding develops over the course of the semester. In this dissertation, I address both of these questions through an in-depth video analysis of three groups' discussions throughout the semester. To build shared understandings through scientific argumentation and collaborative sensemaking, the students need to continually make repairs of each other's understanding, but this comes with the risk of affective damage that can shut down further sensemaking discussions. By analyzing the discourse of the three groups' discussions throughout the semester, I show how each group is able to manage this essential tension as they each build and maintain a safe space to sensemake together. I find that the three groups differ in

  2. Identification of novel genetic risk loci in Maltese dogs with necrotizing meningoencephalitis and evidence of a shared genetic risk across toy dog breeds.

    Directory of Open Access Journals (Sweden)

    Isabelle Schrauwen

    Full Text Available Necrotizing meningoencephalitis (NME affects toy and small breed dogs causing progressive, often fatal, inflammation and necrosis in the brain. Genetic risk loci for NME previously were identified in pug dogs, particularly associated with the dog leukocyte antigen (DLA class II complex on chromosome 12, but have not been investigated in other susceptible breeds. We sought to evaluate Maltese and Chihuahua dogs, in addition to pug dogs, to identify novel or shared genetic risk factors for NME development. Genome-wide association testing of single nucleotide polymorphisms (SNPs in Maltese dogs with NME identified 2 regions of genome-wide significance on chromosomes 4 (chr4:74522353T>A, p = 8.1×10-7 and 15 (chr15:53338796A>G, p = 1.5×10-7. Haplotype analysis and fine-mapping suggests that ILR7 and FBXW7, respectively, both important for regulation of immune system function, could be the underlying associated genes. Further evaluation of these regions and the previously identified DLA II locus across all three breeds, revealed an enrichment of nominal significant SNPs associated with chromosome 15 in pug dogs and DLA II in Maltese and Chihuahua dogs. Meta-analysis confirmed effect sizes the same direction in all three breeds for both the chromosome 15 and DLA II loci (p = 8.6×10-11 and p = 2.5×10-7, respectively. This suggests a shared genetic background exists between all breeds and confers susceptibility to NME, but effect sizes might be different among breeds. In conclusion, we identified the first genetic risk factors for NME development in the Maltese, chromosome 4 and chromosome 15, and provide evidence for a shared genetic risk between breeds associated with chromosome 15 and DLA II. Last, DLA II and IL7R both have been implicated in human inflammatory diseases of the central nervous system such as multiple sclerosis, suggesting that similar pharmacotherapeutic targets across species should be investigated.

  3. Identification of novel genetic risk loci in Maltese dogs with necrotizing meningoencephalitis and evidence of a shared genetic risk across toy dog breeds.

    Science.gov (United States)

    Schrauwen, Isabelle; Barber, Renee M; Schatzberg, Scott J; Siniard, Ashley L; Corneveaux, Jason J; Porter, Brian F; Vernau, Karen M; Keesler, Rebekah I; Matiasek, Kaspar; Flegel, Thomas; Miller, Andrew D; Southard, Teresa; Mariani, Christopher L; Johnson, Gayle C; Huentelman, Matthew J

    2014-01-01

    Necrotizing meningoencephalitis (NME) affects toy and small breed dogs causing progressive, often fatal, inflammation and necrosis in the brain. Genetic risk loci for NME previously were identified in pug dogs, particularly associated with the dog leukocyte antigen (DLA) class II complex on chromosome 12, but have not been investigated in other susceptible breeds. We sought to evaluate Maltese and Chihuahua dogs, in addition to pug dogs, to identify novel or shared genetic risk factors for NME development. Genome-wide association testing of single nucleotide polymorphisms (SNPs) in Maltese dogs with NME identified 2 regions of genome-wide significance on chromosomes 4 (chr4:74522353T>A, p = 8.1×10-7) and 15 (chr15:53338796A>G, p = 1.5×10-7). Haplotype analysis and fine-mapping suggests that ILR7 and FBXW7, respectively, both important for regulation of immune system function, could be the underlying associated genes. Further evaluation of these regions and the previously identified DLA II locus across all three breeds, revealed an enrichment of nominal significant SNPs associated with chromosome 15 in pug dogs and DLA II in Maltese and Chihuahua dogs. Meta-analysis confirmed effect sizes the same direction in all three breeds for both the chromosome 15 and DLA II loci (p = 8.6×10-11 and p = 2.5×10-7, respectively). This suggests a shared genetic background exists between all breeds and confers susceptibility to NME, but effect sizes might be different among breeds. In conclusion, we identified the first genetic risk factors for NME development in the Maltese, chromosome 4 and chromosome 15, and provide evidence for a shared genetic risk between breeds associated with chromosome 15 and DLA II. Last, DLA II and IL7R both have been implicated in human inflammatory diseases of the central nervous system such as multiple sclerosis, suggesting that similar pharmacotherapeutic targets across species should be investigated.

  4. Proof of concept for a banding scheme to support risk assessments related to multi-product biologics manufacturing.

    Science.gov (United States)

    Card, Jeffrey W; Fikree, Hana; Haighton, Lois A; Blackwell, James; Felice, Brian; Wright, Teresa L

    2015-11-01

    A banding scheme theory has been proposed to assess the potency/toxicity of biologics and assist with decisions regarding the introduction of new biologic products into existing manufacturing facilities. The current work was conducted to provide a practical example of how this scheme could be applied. Information was identified for representatives from the following four proposed bands: Band A (lethal toxins); Band B (toxins and apoptosis signals); Band C (cytokines and growth factors); and Band D (antibodies, antibody fragments, scaffold molecules, and insulins). The potency/toxicity of the representative substances was confirmed as follows: Band A, low nanogram quantities exert lethal effects; Band B, repeated administration of microgram quantities is tolerated in humans; Band C, endogenous substances and recombinant versions administered to patients in low (interferons), intermediate (growth factors), and high (interleukins) microgram doses, often on a chronic basis; and Band D, endogenous substances present or produced in the body in milligram quantities per day (insulin, collagen) or protein therapeutics administered in milligram quantities per dose (mAbs). This work confirms that substances in Bands A, B, C, and D represent very high, high, medium, and low concern with regard to risk of cross-contamination in manufacturing facilities, thus supporting the proposed banding scheme. Copyright © 2015 Elsevier Inc. All rights reserved.

  5. Shared risk aversion in spontaneous and induced abortion.

    Science.gov (United States)

    Catalano, Ralph; Bruckner, Tim A; Karasek, Deborah; Adler, Nancy E; Mortensen, Laust H

    2016-05-01

    Does the incidence of spontaneous abortion correlate positively over conception cohorts with the incidence of non-clinically indicated induced abortion as predicted by shared risk aversion? We find that the number of spontaneous and non-clinically indicated induced abortions correlates in conception cohorts, suggesting that risk aversion affects both the conscious and non-conscious mechanisms that control parturition. Much literature speculates that natural selection conserved risk aversion because the trait enhanced Darwinian fitness. Risk aversion, moreover, supposedly influences all decisions including those that individuals can and cannot report making. We argue that these circumstances, if real, would manifest in conscious and non-conscious decisions to invest in prospective offspring, and therefore affect incidence of induced and spontaneous abortion over time. Using data from Denmark, we test the hypothesis that monthly conception cohorts yielding unexpectedly many non-clinically indicated induced abortions also yield unexpectedly many spontaneous abortions. The 180 month test period (January 1995 through December 2009), yielded 1 351 800 gestations including 156 780 spontaneous as well as 233 280 induced abortions 9100 of which were clinically indicated. We use Box-Jenkins transfer functions to adjust the incidence of spontaneous and non-clinically indicated induced abortions for autocorrelation (including seasonality), cohort size, and fetal as well as gestational anomalies over the 180-month test period. We use cross-correlation to test our hypothesized association. We find a positive association between spontaneous and non-clinically indicated induced abortions. This suggests, consistent with our theory, that mothers of conception cohorts that yielded more spontaneous abortions than expected opted more frequently than expected for non-clinically indicated induced abortion. Limitations of our work include that even the world's best registration system

  6. Is periodontitis a comorbidity of COPD or can associations be explained by shared risk factors/behaviors?

    Science.gov (United States)

    Hobbins, Stephanie; Chapple, Iain Lc; Sapey, Elizabeth; Stockley, Robert A

    2017-01-01

    COPD is recognized as having a series of comorbidities potentially related to common inflammatory processes. Periodontitis is one of the most common human inflammatory diseases and has previously been associated with COPD in numerous observational studies. As periodontitis and COPD are both chronic, progressive conditions characterized by neutrophilic inflammation with subsequent proteolytic destruction of connective tissue, it has been proposed that they share common pathophysiological processes. The mechanisms proposed to link COPD and periodontitis include mechanical aspiration of oral contents into the respiratory tree, overspill of locally produced inflammatory mediators into the systemic circulation or oral or lung-derived bacteremia activating an acute-phase response and also reactive oxygen species (ROS) and cytokine release by systemic neutrophils at distant sites. Studies of systemic neutrophils in COPD and chronic periodontitis describe altered cellular functions that would predispose to inflammation and tissue destruction both in the lung and in the mouth, again potentially connecting these conditions. However, COPD and periodontitis also share risk factors such as age, chronic tobacco smoke exposure, and social deprivation that are not always considered in observational and interventional studies. Furthermore, studies reporting associations have often utilized differing definitions of both COPD and periodontitis. This article reviews the current available evidence supporting the hypothesis that COPD and inflammatory periodontal disease (periodontitis) could be pathologically associated, including a review of shared inflammatory mechanisms. It highlights the potential limitations of previous studies, in particular, the lack of uniformly applied case definitions for both COPD and periodontitis and poor recognition of shared risk factors. Understanding associations between these conditions may inform why patients with COPD suffer such a burden of comorbid

  7. Milk sharing: from private practice to public pursuit.

    Science.gov (United States)

    Akre, James E; Gribble, Karleen D; Minchin, Maureen

    2011-06-25

    After only six months, a commerce-free internet-based milk-sharing model is operating in nearly 50 countries, connecting mothers who are able to donate breast milk with the caregivers of babies who need breast milk. Some public health authorities have condemned this initiative out of hand. Although women have always shared their milk, in many settings infant formula has become the "obvious" alternative to a mother's own milk. Yet an internationally endorsed recommendation supports mother-to-mother milk sharing as the best option in place of a birth mother's milk. Why then this rejection? Several possibilities come to mind: 1) ignorance and prejudice surrounding shared breast milk; 2) a perceived challenge to the medical establishment of a system where mothers exercise independent control; and 3) concern that mother-to-mother milk sharing threatens donor milk banks. We are not saying that milk sharing is risk-free or that the internet is an ideal platform for promoting it. Rather, we are encouraging health authorities to examine this initiative closely, determine what is happening, and provide resources to make mother-to-mother milk sharing as safe as possible. Health authorities readily concede that life is fraught with risk; accordingly, they promote risk-reduction and harm-minimisation strategies. Why should it be any different for babies lacking their own mothers' milk? The more that is known about the risks of substituting for breast milk, the more reasonable parental choice to use donor milk becomes. We believe that the level of intrinsic risk is manageable through informed sharing. If undertaken, managed and evaluated appropriately, this made-by-mothers model shows considerable potential for expanding the world's supply of human milk and improving the health of children.

  8. Milk sharing: from private practice to public pursuit

    Directory of Open Access Journals (Sweden)

    Gribble Karleen D

    2011-06-01

    Full Text Available Abstract After only six months, a commerce-free internet-based milk-sharing model is operating in nearly 50 countries, connecting mothers who are able to donate breast milk with the caregivers of babies who need breast milk. Some public health authorities have condemned this initiative out of hand. Although women have always shared their milk, in many settings infant formula has become the "obvious" alternative to a mother's own milk. Yet an internationally endorsed recommendation supports mother-to-mother milk sharing as the best option in place of a birth mother's milk. Why then this rejection? Several possibilities come to mind: 1 ignorance and prejudice surrounding shared breast milk; 2 a perceived challenge to the medical establishment of a system where mothers exercise independent control; and 3 concern that mother-to-mother milk sharing threatens donor milk banks. We are not saying that milk sharing is risk-free or that the internet is an ideal platform for promoting it. Rather, we are encouraging health authorities to examine this initiative closely, determine what is happening, and provide resources to make mother-to-mother milk sharing as safe as possible. Health authorities readily concede that life is fraught with risk; accordingly, they promote risk-reduction and harm-minimisation strategies. Why should it be any different for babies lacking their own mothers' milk? The more that is known about the risks of substituting for breast milk, the more reasonable parental choice to use donor milk becomes. We believe that the level of intrinsic risk is manageable through informed sharing. If undertaken, managed and evaluated appropriately, this made-by-mothers model shows considerable potential for expanding the world's supply of human milk and improving the health of children.

  9. An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    Directory of Open Access Journals (Sweden)

    Changji Wang

    2013-01-01

    Full Text Available There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most existing KP-ABE scheme, the ciphertext size grows linearly with the number of attributes embedded in ciphertext. In this paper, we propose a new KP-ABE construction with constant ciphertext size. In our construction, the access policy can be expressed as any monotone access structure. Meanwhile, the ciphertext size is independent of the number of ciphertext attributes, and the number of bilinear pairing evaluations is reduced to a constant. We prove that our scheme is semantically secure in the selective-set model based on the general Diffie-Hellman exponent assumption.

  10. Accelerated territorial arterial spin labeling based on shared rotating control acquisition: an observer study for validation

    International Nuclear Information System (INIS)

    Kamano, Hironori; Yoshiura, Takashi; Hiwatashi, Akio; Yamashita, Koji; Takayama, Yukihisa; Nagao, Eiki; Sagiyama, Koji; Honda, Hiroshi; Zimine, Ivan

    2012-01-01

    Shared rotating control acquisition can shorten the imaging time of territorial arterial spin labeling (tASL) by 33% compared with the normal control acquisition scheme but potentially results in an inaccurate estimate of vascular territories due to imperfect magnetization transfer compensation. Our purpose was to validate the accuracy of the shared rotating control acquisition method in evaluation of vascular territories. Twenty-four patients underwent tASL at a 3.0-T MRI with the conventional normal control acquisition method. Composite vascular territory maps, in which the blood flows from the right and left internal carotid arteries and the posterior circulation were encoded in red-green-blue, were generated as a normal averaged control-label scheme and as a simulated shared rotating control scheme. Two observers independently reported the most dominant territorial flow in 26 brain regions corresponding to the arterial segments at three post-labeling time points. Inter-reader and inter-method agreements were analyzed using κ statistics. Overall inter-reader agreements were excellent for both the normal control and the shared rotating control methods (κ = 0.98, respectively). Overall inter-method agreement was also excellent (κ = 0.98), although relatively low agreement was noted in the bilateral posterior cerebral artery territories (κ = 0.79 to 0.93). Our results suggested that tASL using shared rotating control acquisition can provide information on the vascular territories comparable to that obtained using the normal control acquisition while substantially shortening the imaging time. (orig.)

  11. Improvement of multiprocessing performance by using optical centralized shared bus

    Science.gov (United States)

    Han, Xuliang; Chen, Ray T.

    2004-06-01

    With the ever-increasing need to solve larger and more complex problems, multiprocessing is attracting more and more research efforts. One of the challenges facing the multiprocessor designers is to fulfill in an effective manner the communications among the processes running in parallel on multiple multiprocessors. The conventional electrical backplane bus provides narrow bandwidth as restricted by the physical limitations of electrical interconnects. In the electrical domain, in order to operate at high frequency, the backplane topology has been changed from the simple shared bus to the complicated switched medium. However, the switched medium is an indirect network. It cannot support multicast/broadcast as effectively as the shared bus. Besides the additional latency of going through the intermediate switching nodes, signal routing introduces substantial delay and considerable system complexity. Alternatively, optics has been well known for its interconnect capability. Therefore, it has become imperative to investigate how to improve multiprocessing performance by utilizing optical interconnects. From the implementation standpoint, the existing optical technologies still cannot fulfill the intelligent functions that a switch fabric should provide as effectively as their electronic counterparts. Thus, an innovative optical technology that can provide sufficient bandwidth capacity, while at the same time, retaining the essential merits of the shared bus topology, is highly desirable for the multiprocessing performance improvement. In this paper, the optical centralized shared bus is proposed for use in the multiprocessing systems. This novel optical interconnect architecture not only utilizes the beneficial characteristics of optics, but also retains the desirable properties of the shared bus topology. Meanwhile, from the architecture standpoint, it fits well in the centralized shared-memory multiprocessing scheme. Therefore, a smooth migration with substantial

  12. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    KAUST Repository

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  13. A GPS-Based Control Method for Load Sharing and Power Quality Improvement in Microgrids

    DEFF Research Database (Denmark)

    Golsorkhi, Mohammad; Lu, Dylan; Savaghebi, Mehdi

    2016-01-01

    This paper proposes a novel control method for accurate sharing of load current among the Distributed Energy Resources (DER) and high power quality operating in islanded ac microgrids. This control scheme is based on hierarchical structure comprising of decentralized primary controllers and a cen....... The secondary controller produces compensation signals at fundamental and dominant harmonics to improve the voltage quality at a sensitive load bus. Experimental results are presented to validate the efficacy of the proposed method.......This paper proposes a novel control method for accurate sharing of load current among the Distributed Energy Resources (DER) and high power quality operating in islanded ac microgrids. This control scheme is based on hierarchical structure comprising of decentralized primary controllers...

  14. A Shared Compliance Control for Application in High Radiation Fields

    International Nuclear Information System (INIS)

    Ahn, Sung Ho; Jung, Hoan Sung; Lee, Kye Hong; Kim, Young Ki; Kim, Hark Rho

    2005-01-01

    Bilateral control systems present a technical alternative for intelligent robotic systems performing dexterous tasks in unstructured environments such as a nuclear facility, outer space and underwater. A shared compliance control scheme is proposed for application in high radiation fields in which the force sensor can not be installed because of a radiation effect. A position difference between the master system and the slave system is treated as an equivalent contact force and used for an input to the compliance controller. The compliance controller is implemented by a first order low pass filter and it modifies the position of the master to the reference position. Thus the compliance control task is shared by both the human operator's direct manual control and the autonomous compliance control of the slave system. Consequently, the position of a slave system tracks well the reference position and the compliance of the slave system is autonomously controlled in a contact condition. The simulation results show the excellence of the proposed scheme

  15. Societal Risk Evaluation Scheme (SRES: Scenario-Based Multi-Criteria Evaluation of Synthetic Biology Applications.

    Directory of Open Access Journals (Sweden)

    Christopher L Cummings

    Full Text Available Synthetic biology (SB applies engineering principles to biology for the construction of novel biological systems designed for useful purposes. From an oversight perspective, SB products come with significant uncertainty. Yet there is a need to anticipate and prepare for SB applications before deployment. This study develops a Societal Risk Evaluation Scheme (SRES in order to advance methods for anticipatory governance of emerging technologies such as SB. The SRES is based upon societal risk factors that were identified as important through a policy Delphi study. These factors range from those associated with traditional risk assessment, such as health and environmental consequences, to broader features of risk such as those associated with reversibility, manageability, anticipated levels of public concern, and uncertainty. A multi-disciplinary panel with diverse perspectives and affiliations assessed four case studies of SB using the SRES. Rankings of the SRES components are compared within and across the case studies. From these comparisons, we found levels of controllability and familiarity associated with the cases to be important for overall SRES rankings. From a theoretical standpoint, this study illustrates the applicability of the psychometric paradigm to evaluating SB cases. In addition, our paper describes how the SRES can be incorporated into anticipatory governance models as a screening tool to prioritize research, information collection, and dialogue in the face of the limited capacity of governance systems. To our knowledge, this is the first study to elicit data on specific cases of SB with the goal of developing theory and tools for risk governance.

  16. Decoherence-full subsystems and the cryptographic power of a private shared reference frame

    International Nuclear Information System (INIS)

    Bartlett, Stephen D.; Rudolph, Terry; Spekkens, Robert W.

    2004-01-01

    We show that private shared reference frames can be used to perform private quantum and private classical communication over a public quantum channel. Such frames constitute a type of private shared correlation, distinct from private classical keys or shared entanglement, useful for cryptography. We present optimally efficient schemes for private quantum and classical communication given a finite number of qubits transmitted over an insecure channel and given a private shared Cartesian frame and/or a private shared reference ordering of the qubits. We show that in this context, it is useful to introduce the concept of a decoherence-full subsystem, wherein every state is mapped to the completely mixed state under the action of the decoherence

  17. Partnerships for disaster risk insurance in the EU

    Science.gov (United States)

    Mysiak, Jaroslav; Dionisio Pérez-Blanco, C.

    2016-11-01

    With increasing costs inflicted by natural hazard perils, and amidst state budget cuts, concerns are mounting about the capacity of governments to design sustainable, equitable and affordable risk management schemes. The participation of the private sector along with the public one through public-private partnerships (PPPs) has gained importance as a means of providing catastrophic natural hazard insurance to address these seemingly conflicting objectives. In 2013 the European Commission launched a wide-ranging consultation about what EU action could be appropriate to improve the performance of insurance markets. Simultaneously, the EU legislator instigated major reforms in the legislation and regulations that pertain to how PPPs are designed or operate. This paper has a dual objective: first, we review and summarize the manifold legal background that influences the provision of insurance against natural catastrophes. Second, we examine how PPPs designed for sharing and transferring risk operate within the European regulatory constraints, illustrated using the example of the UK Flood Reinsurance Scheme (Flood RE) between the state and the Association of British Insurers.

  18. An Enhanced Islanding Microgrid Reactive Power, Imbalance Power, and Harmonic Power Sharing Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Lin, Yun Wei; Blaabjerg, Frede

    2015-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through online virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power, or harmonic power is added to the conventional real power...

  19. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  20. Financial "risk-sharing" or refund programs in assisted reproduction: an Ethics Committee opinion.

    Science.gov (United States)

    2016-10-01

    Financial "risk-sharing" fee structures in assisted reproduction programs charge patients a higher initial fee but provide reduced fees for subsequent cycles and often a partial or complete refund if treatment fails. This opinion of the ASRM Ethics Committee analyzes the ethical issues raised by these fee structures, including patient selection criteria, conflicts of interest, success rate transparency, and patient informed consent. This document replaces the document of the same name, last published in 2013 (Fertil Steril 2013;100:334-6). Copyright © 2016 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  1. Stakeholders' views on data sharing in multicenter studies.

    Science.gov (United States)

    Mazor, Kathleen M; Richards, Allison; Gallagher, Mia; Arterburn, David E; Raebel, Marsha A; Nowell, W Benjamin; Curtis, Jeffrey R; Paolino, Andrea R; Toh, Sengwee

    2017-09-01

    To understand stakeholders' views on data sharing in multicenter comparative effectiveness research studies and the value of privacy-protecting methods. Semistructured interviews with five US stakeholder groups. We completed 11 interviews, involving patients (n = 15), researchers (n = 10), Institutional Review Board and regulatory staff (n = 3), multicenter research governance experts (n = 2) and healthcare system leaders (n = 4). Perceptions of the benefits and value of research were the strongest influences toward data sharing; cost and security risks were primary influences against sharing. Privacy-protecting methods that share summary-level data were acknowledged as being appealing, but there were concerns about increased cost and potential loss of research validity. Stakeholders were open to data sharing in multicenter studies that offer value and minimize security risks.

  2. Learning-based traffic signal control algorithms with neighborhood information sharing: An application for sustainable mobility

    Energy Technology Data Exchange (ETDEWEB)

    Aziz, H. M. Abdul [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Zhu, Feng [Purdue University, West Lafayette, IN (United States). Lyles School of Civil Engineering; Ukkusuri, Satish V. [Purdue University, West Lafayette, IN (United States). Lyles School of Civil Engineering

    2017-10-04

    Here, this research applies R-Markov Average Reward Technique based reinforcement learning (RL) algorithm, namely RMART, for vehicular signal control problem leveraging information sharing among signal controllers in connected vehicle environment. We implemented the algorithm in a network of 18 signalized intersections and compare the performance of RMART with fixed, adaptive, and variants of the RL schemes. Results show significant improvement in system performance for RMART algorithm with information sharing over both traditional fixed signal timing plans and real time adaptive control schemes. Additionally, the comparison with reinforcement learning algorithms including Q learning and SARSA indicate that RMART performs better at higher congestion levels. Further, a multi-reward structure is proposed that dynamically adjusts the reward function with varying congestion states at the intersection. Finally, the results from test networks show significant reduction in emissions (CO, CO2, NOx, VOC, PM10) when RL algorithms are implemented compared to fixed signal timings and adaptive schemes.

  3. ORRION: A specific information sharing tool to (rebuild a “flood risk culture” in the Rhine Graben (France - Germany

    Directory of Open Access Journals (Sweden)

    Martin Brice

    2016-01-01

    Full Text Available When is led a prevention initiative concerning flood risk, the recall of old events allows just as much to act as pedagogy to legitimize the initiative. So as it is written in the information leaflet on the “Plan de Prévention des Risques d’Inondation” (PPRI:«Alsace did not know any more exceptional floods since 1910. In almost a century, the flood risk thus naturally faded of our memory”. A paradoxical assertion because the floods of 1910 are not taken into account for risk mapping. Only the recent floods (1983, 1990 are used as benchmarks. We were able to show [1] that, although legitimate as reference events, the floods of 1910 and many others had become manifestly underestimated for multiple reasons connected to the history of Alsace, or due to disorganization of the archives. Worse, these riks unawareness is shared by all the actors, causing problems of acceptance of the risk and their management, and an additional vulnerability in terms of population behavior before, during and after the crises. This is the reason why an online participative database (ORRION has been created. the objective of this database is to inform and to share the information about floods history, in the particular context of a cross-border territory (France, Germany, Switzerland. This tool has been immediately involved into risks prevention actions (PAPI, PPRI.

  4. Multi-spectrum and transmit-antenna switched diversity schemes for spectrum sharing systems: A performance analysis

    KAUST Repository

    Sayed, Mostafa; Abdallah, Mohamed; Alouini, Mohamed Slim; Qaraqe, Khalid A.

    2012-01-01

    of comparison, we also derive a closed-form BER expression for the optimal selection scheme that selects the best pair in terms of the SU-Rx signal-to-noise ratio (SNR) which has the disadvantage of high feedback requirements. Finally, our results are verified

  5. Virtual partitioning for robust resource sharing: computational techniques for heterogeneous traffic

    NARCIS (Netherlands)

    Borst, S.C.; Mitra, D.

    1998-01-01

    We consider virtual partitioning (VP), which is a scheme for sharing a resource among several traffic classes in an efficient, fair, and robust manner. In the preliminary design stage, each traffic class is allocated a nominal capacity, which is based on expected offered traffic and required quality

  6. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  7. Partnerships for disaster risk insurance in the EU

    Directory of Open Access Journals (Sweden)

    J. Mysiak

    2016-11-01

    Full Text Available With increasing costs inflicted by natural hazard perils, and amidst state budget cuts, concerns are mounting about the capacity of governments to design sustainable, equitable and affordable risk management schemes. The participation of the private sector along with the public one through public–private partnerships (PPPs has gained importance as a means of providing catastrophic natural hazard insurance to address these seemingly conflicting objectives. In 2013 the European Commission launched a wide-ranging consultation about what EU action could be appropriate to improve the performance of insurance markets. Simultaneously, the EU legislator instigated major reforms in the legislation and regulations that pertain to how PPPs are designed or operate. This paper has a dual objective: first, we review and summarize the manifold legal background that influences the provision of insurance against natural catastrophes. Second, we examine how PPPs designed for sharing and transferring risk operate within the European regulatory constraints, illustrated using the example of the UK Flood Reinsurance Scheme (Flood RE between the state and the Association of British Insurers.

  8. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  9. Pervasive sharing of genetic effects in autoimmune disease.

    Directory of Open Access Journals (Sweden)

    Chris Cotsapas

    2011-08-01

    Full Text Available Genome-wide association (GWA studies have identified numerous, replicable, genetic associations between common single nucleotide polymorphisms (SNPs and risk of common autoimmune and inflammatory (immune-mediated diseases, some of which are shared between two diseases. Along with epidemiological and clinical evidence, this suggests that some genetic risk factors may be shared across diseases-as is the case with alleles in the Major Histocompatibility Locus. In this work we evaluate the extent of this sharing for 107 immune disease-risk SNPs in seven diseases: celiac disease, Crohn's disease, multiple sclerosis, psoriasis, rheumatoid arthritis, systemic lupus erythematosus, and type 1 diabetes. We have developed a novel statistic for Cross Phenotype Meta-Analysis (CPMA which detects association of a SNP to multiple, but not necessarily all, phenotypes. With it, we find evidence that 47/107 (44% immune-mediated disease risk SNPs are associated to multiple-but not all-immune-mediated diseases (SNP-wise P(CPMA<0.01. We also show that distinct groups of interacting proteins are encoded near SNPs which predispose to the same subsets of diseases; we propose these as the mechanistic basis of shared disease risk. We are thus able to leverage genetic data across diseases to construct biological hypotheses about the underlying mechanism of pathogenesis.

  10. Reliability demonstration test for load-sharing systems with exponential and Weibull components.

    Directory of Open Access Journals (Sweden)

    Jianyu Xu

    Full Text Available Conducting a Reliability Demonstration Test (RDT is a crucial step in production. Products are tested under certain schemes to demonstrate whether their reliability indices reach pre-specified thresholds. Test schemes for RDT have been studied in different situations, e.g., lifetime testing, degradation testing and accelerated testing. Systems designed with several structures are also investigated in many RDT plans. Despite the availability of a range of test plans for different systems, RDT planning for load-sharing systems hasn't yet received the attention it deserves. In this paper, we propose a demonstration method for two specific types of load-sharing systems with components subject to two distributions: exponential and Weibull. Based on the assumptions and interpretations made in several previous works on such load-sharing systems, we set the mean time to failure (MTTF of the total system as the demonstration target. We represent the MTTF as a summation of mean time between successive component failures. Next, we introduce generalized test statistics for both the underlying distributions. Finally, RDT plans for the two types of systems are established on the basis of these test statistics.

  11. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  12. Petroleum tax systems and risk sharing

    International Nuclear Information System (INIS)

    Sunnevaag, K.

    1992-12-01

    We have focused on four different measures of risk, well known from the finance literature, namely sensitivity, standard deviation, coefficient of variation and finally probability of a negative expected net present value (NPV). While the two first measures show that the state carries most of the risk, the latter measures show the opposite result. Whether or not the project is developed on a stand-alone or on-going basis, has a crucial impact on much risk the company carries. We have also looked at the risk development as a consequence of changes in tax regime. While the two first measures of risk (sensitivity and standard deviation) show an increase in risk for the company from the pre 1987 tax regime to the 1987-1991 tax regime, and a decrease in risk as a consequence of the last change, the opposite is the case when we look at the two last measures of risk, namely coefficient of variation and probability of a negative expected NPV. The same is the conclusion for the state, except that the sign of change is the opposite that of the company. This analysis could have been extended to include a risk concept based on the well known Capital Asset Pricing Model, which is relevant risk, or covariance risk. This model concludes that the return on any risky asset is a function of the correlation between the return on this asset and the market portfolio. In this case only the projects contribution to the portfolio risk should be accounted for. For the Norwegian state it is not unreasonable to assume that the risk contribution of a medium sized oil field to a big portfolio of fields and onshore activities only is marginal. For the national or international oil company it is somewhat less marginal, and for a company developing the field on a stand-alone basis it is substantial. 12 refs., 15 figs

  13. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  14. Economic Droop Scheme for Decentralized Power Management in DC Microgrids

    Directory of Open Access Journals (Sweden)

    E. Alizadeh

    2016-12-01

    Full Text Available This paper proposes an autonomous and economic droop control scheme for DC microgrid application. In this method, a cost-effective power sharing technique among various types of DG units is properly adopted. The droop settings are determined based on an algorithm to individually manage the power management without any complicated optimization methods commonly applied in the centralized control method. In the proposed scheme, the system retains all the advantages of the traditional droop method while minimizes the generation costs of the DC microgrid. In the proposed method, all DGs are classified in a sorting rule based on their total generation cost and the reference voltage of their droop equations is then determined. The proposed scheme is applied to a typical DC microgrid consisting of four different types of DGs and a controllable load. The simulation results are presented to verify the effectiveness of the proposed method using MATLAB/SIMULINK software.

  15. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El

    2017-06-12

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  16. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  17. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  18. Secret-Key-Aided Scheme for Securing Untrusted DF Relaying Networks

    KAUST Repository

    Shafie, Ahmed El; Salem, Ahmed Sultan; Mabrouk, Asma; Tourki, Kamel; Al-Dhahir, Naofal

    2017-01-01

    This paper proposes a new scheme to secure the transmissions in an untrusted decode-and-forward (DF) relaying network. A legitimate source node, Alice, sends her data to a legitimate destination node, Bob, with the aid of an untrusted DF relay node, Charlie. To secure the transmissions from Charlie during relaying time slots, each data codeword is secured using a secret-key codeword that has been previously shared between Alice and Bob during the perfectly secured time slots (i.e., when the channel secrecy rate is positive). The secret-key bits exchanged between Alice and Bob are stored in a finite-length buffer and are used to secure data transmission whenever needed. We model the secret-key buffer as a queueing system and analyze its Markov chain. Our numerical results show the gains of our proposed scheme relative to benchmarks. Moreover, the proposed scheme achieves an upper bound on the secure throughput.

  19. Risk Stratification and Shared Decision Making for Colorectal Cancer Screening: A Randomized Controlled Trial.

    Science.gov (United States)

    Schroy, Paul C; Duhovic, Emir; Chen, Clara A; Heeren, Timothy C; Lopez, William; Apodaca, Danielle L; Wong, John B

    2016-05-01

    Eliciting patient preferences within the context of shared decision making has been advocated for colorectal cancer (CRC) screening, yet providers often fail to comply with patient preferences that differ from their own. To determine whether risk stratification for advanced colorectal neoplasia (ACN) influences provider willingness to comply with patient preferences when selecting a desired CRC screening option. Randomized controlled trial. Asymptomatic, average-risk patients due for CRC screening in an urban safety net health care setting. Patients were randomized 1:1 to a decision aid alone (n= 168) or decision aid plus risk assessment (n= 173) arm between September 2012 and September 2014. The primary outcome was concordance between patient preference and test ordered; secondary outcomes included patient satisfaction with the decision-making process, screening intentions, test completion rates, and provider satisfaction. Although providers perceived risk stratification to be useful in selecting an appropriate screening test for their average-risk patients, no significant differences in concordance were observed between the decision aid alone and decision aid plus risk assessment groups (88.1% v. 85.0%,P= 0.40) or high- and low-risk groups (84.5% v. 87.1%,P= 0.51). Concordance was highest for colonoscopy and relatively low for tests other than colonoscopy, regardless of study arm or risk group. Failure to comply with patient preferences was negatively associated with satisfaction with the decision-making process, screening intentions, and test completion rates. Single-institution setting; lack of provider education about the utility of risk stratification into their decision making. Providers perceived risk stratification to be useful in their decision making but often failed to comply with patient preferences for tests other than colonoscopy, even among those deemed to be at low risk of ACN. © The Author(s) 2016.

  20. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  1. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  2. Risk management frameworks: supporting the next generation of Murray-Darling Basin water sharing plans

    Directory of Open Access Journals (Sweden)

    G. M. Podger

    2014-09-01

    Full Text Available Water jurisdictions in Australia are required to prepare and implement water resource plans. In developing these plans the common goal is realising the best possible use of the water resources – maximising outcomes while minimising negative impacts. This requires managing the risks associated with assessing and balancing cultural, industrial, agricultural, social and environmental demands for water within a competitive and resource-limited environment. Recognising this, conformance to international risk management principles (ISO 31000:2009 have been embedded within the Murray-Darling Basin Plan. Yet, to date, there has been little strategic investment by water jurisdictions in bridging the gap between principle and practice. The ISO 31000 principles and the risk management framework that embodies them align well with an adaptive management paradigm within which to conduct water resource planning. They also provide an integrative framework for the development of workflows that link risk analysis with risk evaluation and mitigation (adaptation scenarios, providing a transparent, repeatable and robust platform. This study, through a demonstration use case and a series of workflows, demonstrates to policy makers how these principles can be used to support the development of the next generation of water sharing plans in 2019. The workflows consider the uncertainty associated with climate and flow inputs, and model parameters on irrigation and hydropower production, meeting environmental flow objectives and recreational use of the water resource. The results provide insights to the risks associated with meeting a range of different objectives.

  3. Jones index, secret sharing and total quantum dimension

    Science.gov (United States)

    Fiedler, Leander; Naaijkens, Pieter; Osborne, Tobias J.

    2017-02-01

    We study the total quantum dimension in the thermodynamic limit of topologically ordered systems. In particular, using the anyons (or superselection sectors) of such models, we define a secret sharing scheme, storing information invisible to a malicious party, and argue that the total quantum dimension quantifies how well we can perform this task. We then argue that this can be made mathematically rigorous using the index theory of subfactors, originally due to Jones and later extended by Kosaki and Longo. This theory provides us with a ‘relative entropy’ of two von Neumann algebras and a quantum channel, and we argue how these can be used to quantify how much classical information two parties can hide form an adversary. We also review the total quantum dimension in finite systems, in particular how it relates to topological entanglement entropy. It is known that the latter also has an interpretation in terms of secret sharing schemes, although this is shown by completely different methods from ours. Our work provides a different and independent take on this, which at the same time is completely mathematically rigorous. This complementary point of view might be beneficial, for example, when studying the stability of the total quantum dimension when the system is perturbed.

  4. An Effective Grouping Method for Privacy-Preserving Bike Sharing Data Publishing

    Directory of Open Access Journals (Sweden)

    A S M Touhidul Hasan

    2017-10-01

    Full Text Available Bike sharing programs are eco-friendly transportation systems that are widespread in smart city environments. In this paper, we study the problem of privacy-preserving bike sharing microdata publishing. Bike sharing systems collect visiting information along with user identity and make it public by removing the user identity. Even after excluding user identification, the published bike sharing dataset will not be protected against privacy disclosure risks. An adversary may arrange published datasets based on bike’s visiting information to breach a user’s privacy. In this paper, we propose a grouping based anonymization method to protect published bike sharing dataset from linking attacks. The proposed Grouping method ensures that the published bike sharing microdata will be protected from disclosure risks. Experimental results show that our approach can protect user privacy in the released datasets from disclosure risks and can keep more data utility compared with existing methods.

  5. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  6. Swedish-Norwegian tradable green certificates: Scheme design flaws and perceived investment barriers

    International Nuclear Information System (INIS)

    Linnerud, Kristin; Simonsen, Morten

    2017-01-01

    The EU Commission recommends using market-based support schemes for renewable-electricity projects. One example is the Swedish-Norwegian tradable green certificate scheme. We examine whether design features in the Norwegian part of this scheme, specifically, the scheme's short duration and the way it is to be abruptly terminated, contribute to investors' perceptions of barriers. We apply econometric techniques on primary data collected in two surveys of Norwegian investors in hydropower, and we use real options theory to predict and interpret investors' responses. We show that: (1) immediately after the scheme was introduced, investors are eager to lock in future subsidies by investing immediately and concerned with factors that may delay the completion of their projects; (2) as the certificate deadline neared, investors have become increasingly pessimistic and concerned with economic and risk barriers. Investors in big hydropower plants with regulation reservoirs are particularly concerned with the risk of not completing their projects in time to gain the right to sell certificates. These findings are consistent with the predicted responses to the scheme design derived from real options theory. In contrast to earlier studies, we find no difference in responses to the scheme design across investor types. - Highlights: • The Swedish-Norwegian tradable green certificate scheme is intended to promote cost-efficiency. • We examine the optimism about and barriers against investing in new hydropower projects in Norway. • We find that scheme design may have contributed to barriers against Norwegian hydropower projects. • Thus, scheme design flaws may have prevented the scheme from working as intended. • These findings are consistent with real options theory predictions.

  7. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  8. Performance-Based Risk-Sharing Arrangements: U.S. Payer Experience.

    Science.gov (United States)

    Goble, Joseph A; Ung, Brian; van Boemmel-Wegmann, Sascha; Navarro, Robert P; Parece, Andrew

    2017-10-01

    As a result of global concern about rising drug costs, many U.S. payers and European agencies such as the National Health Service have partnered with pharmaceutical companies in performance-based risk-sharing arrangements (PBRSAs) by which manufacturers share financial risk with health care purchasing entities and authorities. However, PBRSAs present many administrative and legal challenges that have minimized successful contract experiences in the United States. To (a) identify drug and disease characteristics and contract components that contribute to successful PBRSA experiences and the primary barriers to PBRSA execution and (b) explore solutions to facilitate contract negotiation and execution. A 37-item, web-based survey instrument (Qualtrics), approximately 20 minutes in duration, was open during July and August 2016. The survey was emailed to 90 pharmacy and medical directors of various health care organizations. Statistical analysis included the Kruskal-Wallis test and chi-square tests to examine differences among payer responses. Survey responses were anonymized and data were aggregated. Twenty-seven individuals completed the survey (30% completion rate). The majority of respondents worked for regional health plans (52%, n = 14), covering at least 1 million lives (63%, n = 17), with at least 7 years of managed care experience (81%, n = 22). A total of 51 PBRSAs were active among respondents at the time of the survey. Easily obtainable and evaluable drug data and medical data were the most important drug and disease attributes for successful PBRSAs, respectively. Pharmacy claims and patient demographic data were assessed as "very easy and inexpensive" to collect. Type and amount of manufacturer payment for drug outcome performance failure, endpoint measurement, and necessary clinical data for drug performance measurement were all critical factors for successful PBRSAs. Standardized contract templates and transparent contract financial risk evaluation and

  9. Lack of Knowledge Sharing Amongst Institutions in Denmark Responsible for Vulnerable Groups

    DEFF Research Database (Denmark)

    Bojsen, Ann Kristina Mikkelsen

    they share their knowledge about risk and policy management. In order to protect vulnerable groups such as children, disabled, sick and elderly people, we need to learn more about the general risk understanding and sharing of such according to region, responsibility, common events and hazards....... This information is needed to protect against future unintentional and intentional hazards and compare those with the institutional responsibilities. Risk understanding and knowledge sharing among professionals with responsibility for vulnerable groups can be a crucial tool for handling everyday threats as well......Lack of Knowledge Sharing Amongst Institutions in Denmark Responsible for Vulnerable Groups Ann Bojsen, Senior Lecturer Emergency and Risk Management Department, Metropolitan University College, Copenhagen, Denmark Even though understanding risk and how it is enacted is regarded as a crucial step...

  10. An Enhanced Dual Droop Control Scheme for Resilient Active Power Sharing among Paralleled Two-Stage Converters

    DEFF Research Database (Denmark)

    Liu, Hongpeng; Yang, Yongheng; Wang, Xiongfei

    2017-01-01

    Traditional droop-controlled system has assumed that generators can always generate the powers demanded from them. This is true with conventional sources, where fuel supplies are usually planned in advance. For renewable sources, it may also be possible if energy storage is available. Energy...... storage, usually as batteries, may however be expensive, depending on its planned capacity. Renewable sources are therefore sometimes installed as non-dispatch-able sources without storage. This may not be viable for remote grids, where renewable sources may be the only or major type of sources. In those...... cases, traditional droop scheme may not work well when its demanded power cannot be met by some renewable sources due to intermittency. When that happens, the system may become unstable with some sources progressively brought out of generation. To avoid such occurrence, an enhanced dual droop scheme...

  11. SCHEME FOR COMBINED USE OF STATINS AND URSODEOXYCHOLIC ACID IN PATIENTS WITH A HIGH RISK OF CARDIOVASCULAR EVENTS AND CONCOMITANT NON-ALCOHOLIC FATTY LIVER DISEASE: PROBLEMS OF PRACTICAL APPLICATION

    Directory of Open Access Journals (Sweden)

    S. N. Bel'diev

    2017-01-01

    Full Text Available Russian physicians often afraid to use statins in patients with high cardiovascular risk and nonalcoholic fatty liver disease (NAFLD or other hepatobiliary diseases, especially in cases when elevated levels of serum transaminases are detected. To expand the use of statins in these patients, a scheme of statins and ursodeoxycholic acid (UDCA co-administration was developed in 2014 and subsequently in 2016 it was included into the Russian clinical guidelines for the diagnosis and treatment of NAFLD. In addition to the scheme, the guidelines contain the results of clinical trials that demonstrated hepatoprotective, lipid-lowering and anti-atherogenic effects of UDCA in patients with NAFLD. This paper  presents a critical review of these trials, as well as it discusses the points of the scheme, which may contribute to unduly delayed prescribing and insufficiently intensive use of statins in patients with high risk of cardiovascular complications and associated NAFLD.

  12. An accurate autonomous islanding microgrid reactive power, imbalance power and harmonic power sharing scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Blaabjerg, Frede

    2013-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through adaptive virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power or harmonic power is added to the conventional real power...

  13. Data sharing and dual-use issues.

    Science.gov (United States)

    Bezuidenhout, Louise

    2013-03-01

    The concept of dual-use encapsulates the potential for well-intentioned, beneficial scientific research to also be misused by a third party for malicious ends. The concept of dual-use challenges scientists to look beyond the immediate outcomes of their research and to develop an awareness of possible future (mis)uses of scientific research. Since 2001 much attention has been paid to the possible need to regulate the dual-use potential of the life sciences. Regulation initiatives fall under two broad categories-those that develop the ethical education of scientists and foster an awareness and responsibility of dual-use issues, and those which assess the regulation of information being generated by current research. Both types of initiatives are premised on a cautious, risk-adverse philosophy which advocates careful examination of all future endpoints of research endeavors. This caution advocated within initiatives such as pre-publication review of journal articles contrasts to the obligation to share underpinning data sharing discussions. As the dual-use debate has yet to make a significant impact on data sharing discussions (and vice versa) it is possible that these two areas of knowledge control may present areas of ethical conflict for scientists, and thus need to be more closely examined. This paper examines the tension between the obligation to share exemplified by data sharing principles and the concerns raised by the risk-cautious culture of the dual-use debates. The paper concludes by reflecting on the issues of responsibility as raised by dual-use as relating to data sharing, such as the chain of custody for shared data.

  14. Optimization and Control for Sharing of the ITER Vacuum Vessel Support Force

    International Nuclear Information System (INIS)

    Rozov, V.

    2006-01-01

    The ITER Vacuum Vessel (VV) is a complex body supported in 9 points below lower ports by restraints in the radial, toroidal and vertical directions. The applied load produces a combination of reaction forces, which must be consistent with the design of the supported object. A reasonable sharing of the load among the supports is important for overall performance of the structure and helps to avoid excessive stress at the joints between the VV and lower ports. Optimization has been performed of the sharing of the total horizontal load applied to the ITER VV between radial and toroidal restraints. An effective method of finding simple parametric relationships between the design parameters of supports and the balance of the reaction forces has been developed. This allows purely analytical prediction of the sharing of the reaction forces for any desired stiffness of the applied restraints with no need for finite element structural analysis, and also allows control of the sharing by a proper selection of parameters of the supports. The method is based on the use of elementary mono-directional schemes - equivalent oscillators built for the main global modes, in static problems. The types of schemes and parameters of their members, related to the a-priori unknown stiffness of the VV structure under the supports, are found from consideration of the free vibration problem for the object using a 3D model of the VV with mass simulators - a series of simple eigenvalue analyses with variation of stiffness of the external restraints, that demands quite moderate computational resources. The equivalent schemes for the main modes not only enable simple one-line analytical calculation of the natural frequencies at any desired stiffness of the supports, but also indicate the contributions and balance of stiffness, to be considered in the static problem. The results of assessments of the reaction forces by direct static structural analyses for several cases are in agreement with values

  15. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  16. Achieving involvement: process outcomes from a cluster randomized trial of shared decision making skill development and use of risk communication aids in general practice.

    NARCIS (Netherlands)

    Elwyn, G.; Edwards, A.; Hood, K.; Robling, M.; Atwell, C.; Russell, I.; Wensing, M.J.P.; Grol, R.P.T.M.

    2004-01-01

    BACKGROUND: A consulting method known as 'shared decision making' (SDM) has been described and operationalized in terms of several 'competences'. One of these competences concerns the discussion of the risks and benefits of treatment or care options-'risk communication'. Few data exist on

  17. Cost sharing and hereditary cancer risk: predictors of willingness-to-pay for genetic testing.

    Science.gov (United States)

    Matro, Jennifer M; Ruth, Karen J; Wong, Yu-Ning; McCully, Katen C; Rybak, Christina M; Meropol, Neal J; Hall, Michael J

    2014-12-01

    Increasing use of predictive genetic testing to gauge hereditary cancer risk has been paralleled by rising cost-sharing practices. Little is known about how demographic and psychosocial factors may influence individuals' willingness-to-pay for genetic testing. The Gastrointestinal Tumor Risk Assessment Program Registry includes individuals presenting for genetic risk assessment based on personal/family cancer history. Participants complete a baseline survey assessing cancer history and psychosocial items. Willingness-to-pay items include intention for: genetic testing only if paid by insurance; testing with self-pay; and amount willing-to-pay ($25-$2,000). Multivariable models examined predictors of willingness-to-pay out-of-pocket (versus only if paid by insurance) and willingness-to-pay a smaller versus larger sum (≤$200 vs. ≥$500). All statistical tests are two-sided (α = 0.05). Of 385 evaluable participants, a minority (42%) had a personal cancer history, while 56% had ≥1 first-degree relative with colorectal cancer. Overall, 21.3% were willing to have testing only if paid by insurance, and 78.7% were willing-to-pay. Predictors of willingness-to-pay were: 1) concern for positive result; 2) confidence to control cancer risk; 3) fewer perceived barriers to colorectal cancer screening; 4) benefit of testing to guide screening (all p testing (all p testing, and anticipate benefits to reducing cancer risk. Identifying factors associated with willingness-to-pay for genetic services is increasingly important as testing is integrated into routine cancer care.

  18. Supporting evidence-based analysis for modified risk tobacco products through a toxicology data-sharing infrastructure [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Stéphanie Boué

    2017-09-01

    Full Text Available The US FDA defines modified risk tobacco products (MRTPs as products that aim to reduce harm or the risk of tobacco-related disease associated with commercially marketed tobacco products.  Establishing a product’s potential as an MRTP requires scientific substantiation including toxicity studies and measures of disease risk relative to those of cigarette smoking.  Best practices encourage verification of the data from such studies through sharing and open standards. Building on the experience gained from the OpenTox project, a proof-of-concept database and website (INTERVALS has been developed to share results from both in vivo inhalation studies and in vitro studies conducted by Philip Morris International R&D to assess candidate MRTPs. As datasets are often generated by diverse methods and standards, they need to be traceable, curated, and the methods used well described so that knowledge can be gained using data science principles and tools. The data-management framework described here accounts for the latest standards of data sharing and research reproducibility. Curated data and methods descriptions have been prepared in ISA-Tab format and stored in a database accessible via a search portal on the INTERVALS website. The portal allows users to browse the data by study or mechanism (e.g., inflammation, oxidative stress and obtain information relevant to study design, methods, and the most important results. Given the successful development of the initial infrastructure, the goal is to grow this initiative and establish a public repository for 21st-century preclinical systems toxicology MRTP assessment data and results that supports open data principles.

  19. The use of copula functions for modeling the risk of investment in shares traded on the Warsaw Stock Exchange

    Science.gov (United States)

    Domino, Krzysztof; Błachowicz, Tomasz

    2014-11-01

    In our work copula functions and the Hurst exponent calculated using the local Detrended Fluctuation Analysis (DFA) were used to investigate the risk of investment made in shares traded on the Warsaw Stock Exchange. The combination of copula functions and the Hurst exponent calculated using local DFA is a new approach. For copula function analysis bivariate variables composed of shares prices of the PEKAO bank (a big bank with high capitalization) and other banks (PKOBP, BZ WBK, MBANK and HANDLOWY in decreasing capitalization order) and companies from other branches (KGHM-mining industry, PKNORLEN-petrol industry as well as ASSECO-software industry) were used. Hurst exponents were calculated for daily shares prices and used to predict high drops of those prices. It appeared to be a valuable indicator in the copula selection procedure, since Hurst exponent’s low values were pointing on heavily tailed copulas e.g. the Clayton one.

  20. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  1. Resource allocation for two source-destination pairs sharing a single relay with a buffer

    KAUST Repository

    Zafar, Ammar; Shaqfeh, Mohammad; Alouini, Mohamed-Slim; Alnuweiri, Hussein M.

    2014-01-01

    In this paper, we obtain the optimal resource allocation scheme in order to maximize the achievable rate region in a dual-hop system that consists of two independent source-destination pairs sharing a single half-duplex relay. The relay decodes

  2. Neural Computation Scheme of Compound Control: Tacit Learning for Bipedal Locomotion

    Science.gov (United States)

    Shimoda, Shingo; Kimura, Hidenori

    The growing need for controlling complex behaviors of versatile robots working in unpredictable environment has revealed the fundamental limitation of model-based control strategy that requires precise models of robots and environments before their operations. This difficulty is fundamental and has the same root with the well-known frame problem in artificial intelligence. It has been a central long standing issue in advanced robotics, as well as machine intelligence, to find a prospective clue to attack this fundamental difficulty. The general consensus shared by many leading researchers in the related field is that the body plays an important role in acquiring intelligence that can conquer unknowns. In particular, purposeful behaviors emerge during body-environment interactions with the help of an appropriately organized neural computational scheme that can exploit what the environment can afford. Along this line, we propose a new scheme of neural computation based on compound control which represents a typical feature of biological controls. This scheme is based on classical neuron models with local rules that can create macroscopic purposeful behaviors. This scheme is applied to a bipedal robot and generates the rhythm of walking without any model of robot dynamics and environments.

  3. False promise or false premise? Using tourism revenue sharing to promote conservation and poverty reduction in Uganda

    Directory of Open Access Journals (Sweden)

    David Mwesigye Tumusiime

    2012-01-01

    Full Text Available Tourism and the sharing of the associated revenues with local people have been increasingly fronted as key instruments for maintaining protected areas (PAs globally. This paper focuses on a tourism revenue sharing scheme employed in Uganda′s Bwindi Impenetrable National Park, involving rural farmers. We find that the scheme faces difficulties in integrating with the existing local historical, socio-economic, and institutional landscapes. Similar experiences from other cases suggest that these challenges are generic, and relate to lack of real local participation; an insignificant scale of economic returns to local people relative to costs; inept institutions in charge of planning, managing and evaluation efforts; and an institutional complexity that constrains most activities. We conclude that although tourism revenue sharing is an appealing concept, and its oft-quoted logic of promoting conservation and rural development is difficult to ignore, it is challenging to plan and implement in competent ways. We do not suggest abandoning tourism revenue sharing, but rather believe that a more concerted effort to overcome the mechanism′s economic and institutional shortcomings, as identified in this paper, may be more appropriate. The overall findings indicate that problems are not with tourism revenue sharing as an ambition, but with the difficulties encountered in putting it into practice.

  4. Federalism, Fiscal Autonomy and Democratic Legitimacy in Europe: Towards Tax Sharing Arrangements

    NARCIS (Netherlands)

    Groenendijk, Nico

    2011-01-01

    In this article data on fi scal autonomy of different levels of government in the European Union are presented. Within Europe central governments still hold the lion’s share of the power to tax and spend. Other levels of government largely have to make do with upward and downward funding schemes

  5. Maintenance service contract model for heavy equipment in mining industry using principal agent theory

    Science.gov (United States)

    Pakpahan, Eka K. A.; Iskandar, Bermawi P.

    2015-12-01

    Mining industry is characterized by a high operational revenue, and hence high availability of heavy equipment used in mining industry is a critical factor to ensure the revenue target. To maintain high avaliability of the heavy equipment, the equipment's owner hires an agent to perform maintenance action. Contract is then used to control the relationship between the two parties involved. The traditional contracts such as fixed price, cost plus or penalty based contract studied is unable to push agent's performance to exceed target, and this in turn would lead to a sub-optimal result (revenue). This research deals with designing maintenance contract compensation schemes. The scheme should induce agent to select the highest possible maintenance effort level, thereby pushing agent's performance and achieve maximum utility for both parties involved. Principal agent theory is used as a modeling approach due to its ability to simultaneously modeled owner and agent decision making process. Compensation schemes considered in this research includes fixed price, cost sharing and revenue sharing. The optimal decision is obtained using a numerical method. The results show that if both parties are risk neutral, then there are infinite combination of fixed price, cost sharing and revenue sharing produced the same optimal solution. The combination of fixed price and cost sharing contract results in the optimal solution when the agent is risk averse, while the optimal combination of fixed price and revenue sharing contract is obtained when agent is risk averse. When both parties are risk averse, the optimal compensation scheme is a combination of fixed price, cost sharing and revenue sharing.

  6. FOUR-YEAR-OLD NAMSAN TUNNEL CONGESTION PRICING SCHEME IN SEOUL

    Directory of Open Access Journals (Sweden)

    Bongsoo SON, Ph. D.

    2002-01-01

    Full Text Available The purpose of this paper is to evaluate the effectiveness of the congestion pricing scheme at Namsan #1 and #3 tunnels in downtown Seoul four years after its implementation. The effectiveness of the scheme was measured by the changes of various traffic impacts. The traffic volume of the two tunnels was reduced by up to 25% for the first month. After that time, the traffic volume started to increase again and then exceeded the previous volume level. However, average travel speed of the two tunnel corridors improved by up to 74%. The overall traffic volume of the four alternative routes was increased; nevertheless, their average travel speed increased as well. The number of carpool vehicles occupied by 3 or more persons including the driver during the peak periods was remarkably increased. Before the congestion fee charging, toll-charged vehicles amounted to 68.5% of the total traffic volume of the two tunnels, and then the share dropped to 29% afterwards. The empirical analysis results for the effectiveness of the congestion pricing scheme are very promising.

  7. Secure biometric image sensor and authentication scheme based on compressed sensing.

    Science.gov (United States)

    Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2013-11-20

    It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.

  8. Self-Harm and Suicide Attempts among High-Risk, Urban Youth in the U.S.: Shared and Unique Risk and Protective Factors

    Directory of Open Access Journals (Sweden)

    Angela C. Jones

    2012-01-01

    Full Text Available The extent to which self-harm and suicidal behavior overlap in community samples of vulnerable youth is not well known. Secondary analyses were conducted of the “linkages study” (N = 4,131, a cross-sectional survey of students enrolled in grades 7, 9, 11/12 in a high-risk community in the U.S. in 2004. Analyses were conducted to determine the risk and protective factors (i.e., academic grades, binge drinking, illicit drug use, weapon carrying, child maltreatment, social support, depression, impulsivity, self-efficacy, parental support, and parental monitoring associated with both self-harm and suicide attempt. Findings show that 7.5% of participants reported both self-harm and suicide attempt, 2.2% of participants reported suicide attempt only, and 12.4% of participants reported self-harm only. Shared risk factors for co-occurring self-harm and suicide attempt include depression, binge drinking, weapon carrying, child maltreatment, and impulsivity. There were also important differences by sex, grade level, and race/ethnicity that should be considered for future research. The findings show that there is significant overlap in the modifiable risk factors associated with self-harm and suicide attempt that can be targeted for future research and prevention strategies.

  9. Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States

    International Nuclear Information System (INIS)

    Wang Zhangyin; Yuan Hao; Gao Gan; Shi Shouhua

    2006-01-01

    We present a robust (n,n)-threshold scheme for multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states. In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique.

  10. To share or not to share? Expected pros and cons of data sharing in radiological research.

    Science.gov (United States)

    Sardanelli, Francesco; Alì, Marco; Hunink, Myriam G; Houssami, Nehmat; Sconfienza, Luca M; Di Leo, Giovanni

    2018-06-01

    The aims of this paper are to illustrate the trend towards data sharing, i.e. the regulated availability of the original patient-level data obtained during a study, and to discuss the expected advantages (pros) and disadvantages (cons) of data sharing in radiological research. Expected pros include the potential for verification of original results with alternative or supplementary analyses (including estimation of reproducibility), advancement of knowledge by providing new results by testing new hypotheses (not explored by the original authors) on pre-existing databases, larger scale analyses based on individual-patient data, enhanced multidisciplinary cooperation, reduced publication of false studies, improved clinical practice, and reduced cost and time for clinical research. Expected cons are outlined as the risk that the original authors could not exploit the entire potential of the data they obtained, possible failures in patients' privacy protection, technical barriers such as the lack of standard formats, and possible data misinterpretation. Finally, open issues regarding data ownership, the role of individual patients, advocacy groups and funding institutions in decision making about sharing of data and images are discussed. • Regulated availability of patient-level data of published clinical studies (data-sharing) is expected. • Expected benefits include verification/advancement of knowledge, reduced cost/time of research, clinical improvement. • Potential drawbacks include faults in patients' identity protection and data misinterpretation.

  11. Quantum secret sharing based on modulated high-dimensional time-bin entanglement

    International Nuclear Information System (INIS)

    Takesue, Hiroki; Inoue, Kyo

    2006-01-01

    We propose a scheme for quantum secret sharing (QSS) that uses a modulated high-dimensional time-bin entanglement. By modulating the relative phase randomly by {0,π}, a sender with the entanglement source can randomly change the sign of the correlation of the measurement outcomes obtained by two distant recipients. The two recipients must cooperate if they are to obtain the sign of the correlation, which is used as a secret key. We show that our scheme is secure against intercept-and-resend (IR) and beam splitting attacks by an outside eavesdropper thanks to the nonorthogonality of high-dimensional time-bin entangled states. We also show that a cheating attempt based on an IR attack by one of the recipients can be detected by changing the dimension of the time-bin entanglement randomly and inserting two 'vacant' slots between the packets. Then, cheating attempts can be detected by monitoring the count rate in the vacant slots. The proposed scheme has better experimental feasibility than previously proposed entanglement-based QSS schemes

  12. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  13. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  14. Improvement of the mining technology with the ring movement scheme of the haul trucks

    Directory of Open Access Journals (Sweden)

    Slobodyanyuk R.V.

    2016-04-01

    Full Text Available The article describes the designed technology that allows to expand the use of the haul truck ring movement scheme and to reduce the share of an empty run time in the transportation cycle. A preliminary calculation of the efficiency of its usage has allowed to confirm the main advantages of this scheme over the existing one as follows: reducing the required number of transport for the needs of open-pit mine operation by increasing the productivity of mining trucks; decreasing the transport operating costs (some part of an empty truck movement occurs when the engine is switched off; dropping the probability of accidents (reduced a number of the counter transport maneuvers. The calculation showed the regularity of changes in the efficiency using the alternative scheme in relation to the basic one, which reflecting significantly higher effectiveness in situations with a smaller distance between the empty run sites of the ring scheme.

  15. Connecting the Dots: State Health Department Approaches to Addressing Shared Risk and Protective Factors Across Multiple Forms of Violence.

    Science.gov (United States)

    Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci

    Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, "siloed" approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states.

  16. Distributed Cooperative Current-Sharing Control of Parallel Chargers Using Feedback Linearization

    Directory of Open Access Journals (Sweden)

    Jiangang Liu

    2014-01-01

    Full Text Available We propose a distributed current-sharing scheme to address the output current imbalance problem for the parallel chargers in the energy storage type light rail vehicle system. By treating the parallel chargers as a group of agents with output information sharing through communication network, the current-sharing control problem is recast as the consensus tracking problem of multiagents. To facilitate the design, input-output feedback linearization is first applied to transform the nonidentical nonlinear charging system model into the first-order integrator. Then, a general saturation function is introduced to design the cooperative current-sharing control law which can guarantee the boundedness of the proposed control. The cooperative stability of the closed-loop system under fixed and dynamic communication topologies is rigorously proved with the aid of Lyapunov function and LaSalle invariant principle. Simulation using a multicharging test system further illustrates that the output currents of parallel chargers are balanced using the proposed control.

  17. Juggling on a rollercoaster? Gains, loss and uncertainties in IVF patients' accounts of volunteering for a U.K. ‘egg sharing for research’ scheme

    Science.gov (United States)

    Haimes, Erica

    2013-01-01

    The past decade has seen a growth in demand for human eggs for stem cell related research and, more recently, for mitochondrial research. That demand has been accompanied by global debates over whether women should be encouraged, by offers of payments, in cash or kind, to provide eggs. Few of these debates have been informed by empirical evidence, let alone by the views of women themselves. This article addresses that gap in knowledge by presenting findings from a UK investigation, conducted 2008–2011, which is the first systematic study of women volunteering to provide eggs under such circumstances. This article focuses on the views and experiences of 25 IVF patients who volunteered for the Newcastle ‘egg sharing for research’ scheme (NESR), in exchange for reduced IVF fees. This was an interview based study, designed to gain understandings of volunteers' perspectives and reasoning. The interviews show that volunteers approached the scheme as a way of accessing more treatment in pursuit of their goal of having a baby, against a landscape of inadequate state provision of treatment and expensive private treatment. The process of deciding to volunteer raised a wide range of uncertainties about the consequent gains and losses, for women already in the uncertain world of the ‘IVF rollercoaster’. However, interviewees preferred to have the option of the NESR, than not, and they juggled the numerous uncertainties with skill and resilience. The article is as revealing of the ongoing challenges of the UK IVF bio-economy as it is of egg provision. This article adds to the growing body of knowledge of the contributions of tissue providers to the global bio-economy. It also contributes to several areas of wider sociological interest, including debates on the social management of ‘uncertainty’ and discussions at the interface of sociology and ethics. PMID:23608093

  18. Network-based Arbitrated Quantum Signature Scheme with Graph State

    Science.gov (United States)

    Ma, Hongling; Li, Fei; Mao, Ningyi; Wang, Yijun; Guo, Ying

    2017-08-01

    Implementing an arbitrated quantum signature(QAS) through complex networks is an interesting cryptography technology in the literature. In this paper, we propose an arbitrated quantum signature for the multi-user-involved networks, whose topological structures are established by the encoded graph state. The determinative transmission of the shared keys, is enabled by the appropriate stabilizers performed on the graph state. The implementation of this scheme depends on the deterministic distribution of the multi-user-shared graph state on which the encoded message can be processed in signing and verifying phases. There are four parties involved, the signatory Alice, the verifier Bob, the arbitrator Trent and Dealer who assists the legal participants in the signature generation and verification. The security is guaranteed by the entanglement of the encoded graph state which is cooperatively prepared by legal participants in complex quantum networks.

  19. Stroke Health and Risk Education (SHARE): design, methods, and theoretical basis.

    Science.gov (United States)

    Brown, Devin L; Conley, Kathleen M; Resnicow, Kenneth; Murphy, Jillian; Sánchez, Brisa N; Cowdery, Joan E; Sais, Emma; Lisabeth, Lynda D; Skolarus, Lesli E; Zahuranec, Darin B; Williams, Geoffrey C; Morgenstern, Lewis B

    2012-07-01

    Stroke is a disease with tremendous individual, family, and societal impact across all race/ethnic groups. Mexican Americans, the largest subgroup of Hispanic Americans, are at even higher risk of stroke than European Americans. To test the effectiveness of a culturally sensitive, church-based, multi-component, motivational enhancement intervention for Mexican Americans and European Americans in reducing stroke risk factors. Participants enroll in family or friendship pairs, from the same Catholic church in the Corpus Christi Texas area, and are encouraged to change diet and physical activity behaviors and provide support for behavior change to their partners. Churches are randomized to either the intervention or control group. Goal enrollment for each of the 10 participating churches is 40 participant pairs. The intervention consists of self-help materials (including a motivational short film, cookbook/healthy eating guide, physical activity guide with pedometer, and photonovella), five motivational interviewing calls, two tailored newsletters, parish health promotion activities and environmental changes, and a peer support workshop where participants learn to provide autonomy supportive counseling to their partner. SHARE's three primary outcomes are self-reported sodium intake, fruit and vegetable intake, and level of physical activity. Participants complete questionnaires and have measurements at baseline, six months, and twelve months. Persistence testing is performed at 18 months in the intervention group. The trial is registered with clinicaltrials.gov (NCT01378780). Copyright © 2012 Elsevier Inc. All rights reserved.

  20. The Treatment of Uncertainty in Compensation Schemes for Cancer Based on the Probability of Causation Methodology

    International Nuclear Information System (INIS)

    Koch, J.

    2014-01-01

    Since it is commonly accepted that exposure to ionizing radiation, even at the low levels encountered in the workplace, can cause malignant diseases, radiation workers are at some risk, although much is done to optimize radiation protection and reduce occupational exposure to levels a s low as reasonably achievable . However, the causal relationship between exposure to radiation and malignant diseases is difficult to establish, since cancer is such a frequent disease and many other factors may contribute to its development. Ideally, those workers who developed cancer as a result of occupational exposure to radiation should be compensated. Guidance on procedures and methodology to assess attributability of cancer to occupational exposure to radiation and to assist decision-making in compensating workers is provided in a recent joint IAEA/ILO/WHO publication.This guide also reviews compensation schemes in place in several countries, with an emphasis on those based on the probability of causation (POC), also known as assigned share (AS) methodology. The POC method provides a scientifically based framework to assess cancer attributability to occupational exposure and was extensively reviewed by Wakeford et al. This paper presents a comparison of two well-known compensation schemes based on the POC approach with regard to their treatment of uncertainty

  1. Incentives in statutory health insurance bonus schemes - Communication as an underrated precondition of success

    OpenAIRE

    Viviane Scherenberg; Gerd Glaeske

    2009-01-01

    Aim - Bonus schemes within German statutory health insurance (GKV) use monetary incentives to promote health-conscious behaviour, particularly amongst risk groups. The idea is to exploit a latent potential for participation in money-saving preventive measures. First studies suggest that incidental effects (good risks) are more common than prevention effects. The purpose of the article is to present factors contributing to the successfulness of incentive schemes. Methods - To outline the findi...

  2. When do they care to share? : How manufacturers make contracted service partners share knowledge

    NARCIS (Netherlands)

    de Vries, J.; Schepers, J.; van Weele, A.; van der Valk, W.

    2014-01-01

    Manufacturing firms that outsource customer-facing services, risk losing touch with their customers and thereby forfeit valuable market and customer-related knowledge. To maintain informed and competitive, the manufacturer's customer-facing service partners should engage in knowledge sharing and

  3. When do they care to share? : how manufacturers make contracted service partners share knowledge

    NARCIS (Netherlands)

    Vries, de J.J.A.P.; Schepers, J.J.L.; Weele, van A.J.; Valk, van der W.

    2014-01-01

    Manufacturing firms that outsource customer-facing services, risk losing touch with their customers and thereby forfeit valuable market and customer-related knowledge. To maintain informed and competitive, the manufacturer's customer-facing service partners should engage in knowledge sharing and

  4. A quantitative study on factors influencing enrolment of dairy farmers in a community health insurance scheme.

    Science.gov (United States)

    Greef, Tineke de Groot-de; Monareng, Lydia V; Roos, Janetta H

    2016-12-09

    Access to affordable and effective health care is a challenge in low- and middle- income countries. Out-of-pocket expenditure for health care is a major cause of impoverishment. One way to facilitate access and overcome catastrophic expenditure is through a health insurance mechanism, whereby risks are shared and financial inputs pooled by way of contributions. This study examined factors that influenced the enrolment status of dairy farmers in Western Kenya to a community health insurance (CHI) scheme. Quantitative, cross-sectional research was used to describe factors influencing the enrolment in the CHI scheme. Quota and convenience sampling was used, recruiting a sample of 135 farmers who supply milk to a dairy cooperation. Data were collected using a structured interview schedule and analysed using Stata SE, Data Analysis and Statistical Software, Version 12. Factors influencing non-enrolment were identified as affordability (40%; n = 47), unfamiliarity with the management of the scheme (37%; n = 44) and a lack of understanding about the scheme (41%; n = 48). An exploratory factor analysis was used to reduce the variables to two factors: information provision and understanding community health insurance (CHI). Logistic regression identified factors associated with enrolment in the Tanykina Community Healthcare Plan (TCHP). Supplies of less than six litres of milk per day (OR: 0.22; 95% CI: 0.06-0.84) and information provision (OR: 8.77; 95% CI: 2.25-34.16) were significantly associated with enrolment in the TCHP. Nearly 30% (29.6%; n = 40) of the respondents remarked that TCHP is expensive and 17% (n = 23) asked for more education on CHI and TCHP in an open-ended question. Recommendations related to marketing strategies, financial approach, information provision and further research were outlined to be made to the management of the TCHP as well as to those involved in public health.

  5. The RISAP-study: a complex intervention in risk communication and shared decision-making in general practice

    DEFF Research Database (Denmark)

    Kirkegaard, Pia; Edwards, Adrian G K; Hansen, Bo

    2010-01-01

    decision satisfaction (Provider Decision Process Assessment Instrument). The patients will receive a questionnaire at baseline and after 3 and 6 months. It includes questions about adherence to chosen treatment (Morisky Compliance Scale), self-rated health (SF-12), enablement (Patient Enablement Instrument...... training are needed. Aim:1) to systematically develop, describe and evaluate a complex intervention comprising a training programme for GPs in risk communication and shared decision-making, 2) to evaluate the effect of the training programme on real-life consultations between GPs and patients with high......), and risk communication and decision-making effectiveness (COMRADE Scale). Prescriptions, contacts to the health services, and cholesterol level will be drawn from the registers.In each group, 12 consultations will be observed and tape-recorded. The patients from these 24 consultations will be interviewed...

  6. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  7. A meta-analysis of genome-wide association scans identifies IL18RAP, PTPN2, TAGAP, and PUS10 as shared risk loci for Crohn's disease and celiac disease.

    Directory of Open Access Journals (Sweden)

    Eleonora A M Festen

    2011-01-01

    Full Text Available Crohn's disease (CD and celiac disease (CelD are chronic intestinal inflammatory diseases, involving genetic and environmental factors in their pathogenesis. The two diseases can co-occur within families, and studies suggest that CelD patients have a higher risk to develop CD than the general population. These observations suggest that CD and CelD may share common genetic risk loci. Two such shared loci, IL18RAP and PTPN2, have already been identified independently in these two diseases. The aim of our study was to explicitly identify shared risk loci for these diseases by combining results from genome-wide association study (GWAS datasets of CD and CelD. Specifically, GWAS results from CelD (768 cases, 1,422 controls and CD (3,230 cases, 4,829 controls were combined in a meta-analysis. Nine independent regions had nominal association p-value <1.0 x 10⁻⁵ in this meta-analysis and showed evidence of association to the individual diseases in the original scans (p-value < 1 x 10⁻² in CelD and < 1 x 10⁻³ in CD. These include the two previously reported shared loci, IL18RAP and PTPN2, with p-values of 3.37 x 10⁻⁸ and 6.39 x 10⁻⁹, respectively, in the meta-analysis. The other seven had not been reported as shared loci and thus were tested in additional CelD (3,149 cases and 4,714 controls and CD (1,835 cases and 1,669 controls cohorts. Two of these loci, TAGAP and PUS10, showed significant evidence of replication (Bonferroni corrected p-values <0.0071 in the combined CelD and CD replication cohorts and were firmly established as shared risk loci of genome-wide significance, with overall combined p-values of 1.55 x 10⁻¹⁰ and 1.38 x 10⁻¹¹ respectively. Through a meta-analysis of GWAS data from CD and CelD, we have identified four shared risk loci: PTPN2, IL18RAP, TAGAP, and PUS10. The combined analysis of the two datasets provided the power, lacking in the individual GWAS for single diseases, to detect shared loci with a

  8. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  9. Renewable energy burden sharing. REBUS. Effects of burden sharing and certificate trade on the renewable electricity market in Europe

    International Nuclear Information System (INIS)

    Voogt, M.H.; Uyterlinde, M.A.; De Noord, M.; Skytte, K.; Nielsen, L.H.; Leonardi, M.; Whiteley, M.H.; Chapman, M.

    2001-05-01

    Creation of an internal market for renewable electricity will involve a political negotiation process, similar to previous European Union (EU) greenhouse gas negotiations. The Energy Ministers in the EU have agreed upon an overall target of 22% of electricity supply from Renewable Energy Sources (RES-E) and a distribution of targets over the individual Member States. The REBUS project provides insights in the effects of implementing targets for renewable electricity generation at EU Member State level and the impact of introducing burden sharing systems within the EU, such as a Tradable Green Certificate (TGC) system. Member States can participate in such burden sharing systems to reduce the costs of achieving RES-E targets. The project concentrated on the development of the REBUS model, which quantifies the impact of trade (in green certificates, quotas or targets), the specification of cost potential curves for renewable electricity options in each of the 15 EU Member States and the implementation of different rules to setting targets at individual Member State level. In addition, utilities and consumer organisations were interviewed on their requirements and expectations for an international burden sharing scheme. 49 refs

  10. AN AGENT BASED TRANSACTION PROCESSING SCHEME FOR DISCONNECTED MOBILE NODES

    Directory of Open Access Journals (Sweden)

    J.L. Walter Jeyakumar

    2010-12-01

    Full Text Available We present a mobile transaction framework in which mobile users can share data which is stored in the cache of a mobile agent. This mobile agent is a special mobile node which coordinates the sharing process. The proposed framework allows mobile affiliation work groups to be formed dynamically with a mobile agent and mobile hosts. Using short range wireless communication technology, mobile users can simultaneously access the data from the cache of the mobile agent. The data Access Manager module at the mobile agent enforces concurrency control using cache invalidation technique. This model supports disconnected mobile computing allowing mobile agent to move along with the Mobile Hosts. The proposed Transaction frame work has been simulated in Java 2 and performance of this scheme is compared with existing frame works.

  11. Analysis of sensitivity to different parameterization schemes for a subtropical cyclone

    Science.gov (United States)

    Quitián-Hernández, L.; Fernández-González, S.; González-Alemán, J. J.; Valero, F.; Martín, M. L.

    2018-05-01

    A sensitivity analysis to diverse WRF model physical parameterization schemes is carried out during the lifecycle of a Subtropical cyclone (STC). STCs are low-pressure systems that share tropical and extratropical characteristics, with hybrid thermal structures. In October 2014, a STC made landfall in the Canary Islands, causing widespread damage from strong winds and precipitation there. The system began to develop on October 18 and its effects lasted until October 21. Accurate simulation of this type of cyclone continues to be a major challenge because of its rapid intensification and unique characteristics. In the present study, several numerical simulations were performed using the WRF model to do a sensitivity analysis of its various parameterization schemes for the development and intensification of the STC. The combination of parameterization schemes that best simulated this type of phenomenon was thereby determined. In particular, the parameterization combinations that included the Tiedtke cumulus schemes had the most positive effects on model results. Moreover, concerning STC track validation, optimal results were attained when the STC was fully formed and all convective processes stabilized. Furthermore, to obtain the parameterization schemes that optimally categorize STC structure, a verification using Cyclone Phase Space is assessed. Consequently, the combination of parameterizations including the Tiedtke cumulus schemes were again the best in categorizing the cyclone's subtropical structure. For strength validation, related atmospheric variables such as wind speed and precipitable water were analyzed. Finally, the effects of using a deterministic or probabilistic approach in simulating intense convective phenomena were evaluated.

  12. Risks associated with borrowing and sharing of prescription analgesics among patients observed by pain management physicians in Croatia: a qualitative study

    Directory of Open Access Journals (Sweden)

    Markotic F

    2016-11-01

    Full Text Available Filipa Markotic,1 Livia Puljak2 1Centre for Clinical Pharmacology, University Clinical Hospital Mostar, Mostar, Bosnia and Herzegovina; 2Laboratory for Pain Research, University of Split School of Medicine, Split, Croatia Background: Understanding and improving patient safety is a key issue in medicine. One of the potential threats to patient safety is the sharing of medication among patients, which is a form of self-medication. This study analyzed experiences and attitudes of pain management physicians (PMPs about sharing prescription analgesics among patients.Methods: This qualitative study was conducted by semi-structured interviews among PMPs employed in Croatian pain clinics. The study involved two researchers and 15 PMPs.Results: Among PMPs, 80% have seen patients who share their prescription analgesics with other patients for whom prescription is not intended. Most PMPs consider prescription analgesics sharing a risky and negative behavior. Some of them, however, found certain positive aspects associated to it, such as being a benevolent behavior, helping patients to get medications when they need them, and helping them cope with pain.Conclusion: The majority of physicians specialized in pain management encountered patients sharing prescription analgesics. Most of them considered this as risky behavior with a number of potential consequences. It has been noted that this problem is neglected and that physicians should inquire about medication sharing. Direct-to-consumers advertising was perceived as a factor contributing to such behavior. Patient education and more involvement of physicians in identifying this behavior were cited as potential remedies for preventing sharing of prescription analgesics. Keywords: analgesics, sharing, lending, borrowing, risks

  13. Risk evaluation on leading companies in property and real estate subsector at IDX: A Value-at-Risk with ARMAX-GARCHX approach and duration test

    Science.gov (United States)

    Dwi Prastyo, Dedy; Handayani, Dwi; Fam, Soo-Fen; Puteri Rahayu, Santi; Suhartono; Luh Putu Satyaning Pradnya Paramita, Ni

    2018-03-01

    Risk assessment and evaluation becomes essential for financial institution to measure the potential risk of their counterparties. In middle of 2016 until first quarter of 2017, there is national program from Indonesian government so-called Tax Amnesty. One subsector that has potential to receive positive impact from the Tax Amnesty program is property and real estate. This work evaluates the risk of top five companies in term of capital share listed in Indonesia stock exchange (IDX). To do this, the Value-at-Risk (VaR) with ARMAX-GARCHX approach is employed. The ARMAX-GARCHX simultaneously models the adaptive mean and variance of stock return of each company considering exogenous variables, i.e. IDR/USD exchange rate and Jakarta Composite Index (JCI). The risk is evaluated in scheme of time moving window. The risk evaluation using 5% quantile with window size 500 transaction days perform better result compare to other scenarios. In addition, duration test is used to test the dependency between shortfalls. It informs that series of shortfall are independent.

  14. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  15. How May Bike-sharing Choice Be Affected By Air Pollution? A Seasonal Analysis In Taiyuan, China

    OpenAIRE

    Li, W.; Kamargianni, M.

    2016-01-01

    Bike-sharing has become a popular green transportation choice in many cities around the world. There has been a rapid expansion of bike-sharing schemes in developing countries at recent time. However, many of those were launched without the support of adequate scientific research and hence failed to create the expected demand. Given the increasingly significant urban transportation challenges in developing countries, such as congestion and air pollution caused by the continuously growing priv...

  16. Option pricing: a flexible tool to disseminate shared savings contracts.

    Science.gov (United States)

    Friedberg, Mark W; Buendia, Anthony M; Lauderdale, Katherine E; Hussey, Peter S

    2013-08-01

    Due to volatility in healthcare costs, shared savings contracts can create systematic financial losses for payers, especially when contracting with smaller providers. To improve the business case for shared savings, we calculated the prices of financial options that payers can "sell" to providers to offset these losses. Using 2009 to 2010 member-level total cost of care data from a large commercial health plan, we calculated option prices by applying a bootstrap simulation procedure. We repeated these simulations for providers of sizes ranging from 500 to 60,000 patients and for shared savings contracts with and without key design features (minimum savings thresholds,bonus caps, cost outlier truncation, and downside risk) and under assumptions of zero, 1%, and 2% real cost reductions due to the shared savings contracts. Assuming no real cost reduction and a 50% shared savings rate, per patient option prices ranged from $225 (3.1% of overall costs) for 500-patient providers to $23 (0.3%) for 60,000-patient providers. Introducing minimum savings thresholds, bonus caps, cost outlier truncation, and downside risk reduced these option prices. Option prices were highly sensitive to the magnitude of real cost reductions. If shared savings contracts cause 2% reductions in total costs, option prices fall to zero for all but the smallest providers. Calculating the prices of financial options that protect payers and providers from downside risk can inject flexibility into shared savings contracts, extend such contracts to smaller providers, and clarify the tradeoffs between different contract designs, potentially speeding the dissemination of shared savings.

  17. Optimization study on multiple train formation scheme of urban rail transit

    Science.gov (United States)

    Xia, Xiaomei; Ding, Yong; Wen, Xin

    2018-05-01

    The new organization method, represented by the mixed operation of multi-marshalling trains, can adapt to the characteristics of the uneven distribution of passenger flow, but the research on this aspect is still not perfect enough. This paper introduced the passenger sharing rate and congestion penalty coefficient with different train formations. On this basis, this paper established an optimization model with the minimum passenger cost and operation cost as objective, and operation frequency and passenger demand as constraint. The ideal point method is used to solve this model. Compared with the fixed marshalling operation model, the overall cost of this scheme saves 9.24% and 4.43% respectively. This result not only validates the validity of the model, but also illustrate the advantages of the multiple train formations scheme.

  18. The production sharing contract in Indonesia

    International Nuclear Information System (INIS)

    Machmud, T.N.

    1994-01-01

    The basic concept of production sharing is that the petroleum resource is owned and controlled by the host country while all cost and risk of exploration are borne by the contractor who is freely allowed to lift his share of petroleum. The first Production Sharing Contract (PSC) was established by the government of Indonesia in 1967 and has since become an accepted pattern for petroleum exploration and exploitation agreements between host governments and private oil companies in many developing countries in addition to Indonesia. The history of the PSC in Indonesia is briefly reviewed and a new incentive package and new contractual arrangements for gas developments are discussed. (UK)

  19. Financial protection effects of modification of China's New Cooperative Medical Scheme on rural households with chronic diseases.

    Science.gov (United States)

    Wang, Jing; Chen, Lina; Ye, Ting; Zhang, Zhiguo; Ma, Jingdong

    2014-07-15

    Several years have passed since the rural New Cooperative Medical Scheme (NCMS) in China was established and policies kept continuous improvement. Its policies on chronic diseases vary by county but have certain shared characteristics. Following this modification of medical insurance policy, this study reassesses the provision of insurance against expenditure on chronic diseases in rural areas, and analyzes its effect on impoverishment. We conducted an empirical study using multi-stage stratified random sampling. We surveyed 1,661 rural households in three provinces and analyzed the responses from 1,525 households that participated in NCMS, using descriptive and logistic regression analysis. The NCMS has reduced the prevalence of poverty and catastrophic health expenditure (CHE), as measured by out-of-pocket (OOP) payments exceeding 40% of total household expenditure, by decreasing medical expenditure. It provides obvious protection to households which include someone with chronic diseases. However, these households continue to face a higher financial risk than those without anyone suffering from chronic diseases. Variables about health service utilization and OOP payment differed significantly between households with or without people suffering from chronic disease. And CHE risk is commonly associated with household income, the number of family members with chronic diseases, OOP payment of outpatient and inpatient service in all three provinces. To reduce CHE risk for these households, it is critical to decrease OOP payments for health services by enhancing the effective reimbursement level of NCMS and strictly regulating the providers' behaviors. We recommend that a combinatory changes should be made to the rural health insurance scheme in China to improve its effect. These include improving the NCMS benefit package by broadening the catalogue of drugs and treatments covered, decreasing or abolishing deductible and increasing the reimbursement ratio of outpatient

  20. An Islanding Microgrid Power Sharing Approach Using Enhanced Virtual Impedance Control Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2013-01-01

    In order to address the load sharing problem in islanding microgrids, this paper proposes an enhanced distributed generation (DG) unit virtual impedance control approach. The proposed method can realize accurate regulation of DG unit equivalent impedance at both fundamental and selected harmonic...... and PCC harmonic voltage compensation are achieved without using any fundamental and harmonic components extractions. Experimental results from a scaled single-phase microgrid prototype are provided to validate the feasibility of the proposed virtual impedance control approach....... frequencies. In contrast to conventional virtual impedance control methods, where only a line current feed-forward term is added to the DG voltage reference, the proposed virtual impedance at fundamental and harmonic frequencies is regulated using DG line current and point of common coupling (PCC) voltage...

  1. An Enhanced Instantaneous Circulating Current Control for Reactive power and Harmonic Load Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Askarian Abyaneh, Hossein; Savaghebi, Mehdi

    2017-01-01

    To address inaccurate load demand sharing problems among parallel inverter-interfaced voltage-controlled distributed generation (DG) units in islanded microgrids with different DG power ratings and mismatched feeder impedances, an enhanced voltage control scheme based on actively compensation of ...

  2. A Review on Successive Interference Cancellation Scheme Based on Optical CDMA Network

    Science.gov (United States)

    Alsowaidi, N.; Eltaif, T.; Mokhtar, M. R.

    2014-12-01

    Due to various desirable features of optical code division multiple access (OCDMA), it is believed this technique once developed and commercially available will be an integral part of optical access networks. Optical CDMA system suffers from a problem called multiple access interference (MAI) which limits the number of active users, it occurs when number of active users share the same carriers. The aim of this paper is to review successive interference cancellation (SIC) scheme based on optical CDMA system. The paper also reviews the system performance in presence of shot noise, thermal noise, and phase-induced intensity noise (PIIN). A comprehensive review on the mathematical model of SIC scheme using direct detection (DS) and spectral amplitude coding (SAC) were presented in this article.

  3. A Hierarchical Transactive Energy Management System for Energy Sharing in Residential Microgrids

    Directory of Open Access Journals (Sweden)

    Most Nahida Akter

    2017-12-01

    Full Text Available This paper presents an analytical framework to develop a hierarchical energy management system (EMS for energy sharing among neighbouring households in residential microgrids. The houses in residential microgrids are categorized into three different types, traditional, proactive and enthusiastic, based on the inclusion of solar photovoltaic (PV systems and battery energy storage systems (BESSs. Each of these three houses has an individual EMS, which is defined as the primary EMS. Two other EMSs (secondary and tertiary are also considered in the proposed hierarchical energy management framework for the purpose of effective energy sharing. The intelligences of each EMS are presented in this paper for the purpose of energy sharing in a residential microgrid along with the priorities. The effectiveness of the proposed hierarchical framework is evaluated on a residential microgrid in Australia. The analytical results clearly reflect that the proposed scheme effectively and efficiently shares the energy among neighbouring houses in a residential microgrid.

  4. Digital Distributed Control System Design: Control Policy for Shared Objects in HTR-PM

    International Nuclear Information System (INIS)

    Zhou Shuqiao; Huang Xiaojin

    2014-01-01

    HTR-PM is an HTR demonstration plant with a structure of two modules feeding one steam turbine. Compared with the structure of one single reactor feeding one turbine, there are more devices shared between these two modules. When they are operated, the shared components are prone to introduce collisions or even logical deadlocks for different technical processes. The future commercial HTR-PM plants are supposed to comprise more modules for a larger turbine, thus the collision problem introduced by the shared components may become severer. Therefore, how to design suitable policies in the distributed control system (DCS) to relieve the collisions during using these shared devices is a new and also a very important problem. In this paper, the classifications of the shared devices are first addressed, and then how to identify the shared objects of an NPP is proposed. Furthermore, a general model for the control logic design is proposed, taking into consideration the collision avoidance, time delay and fairness. The example of how to apply the schemes to relieve the conflicts and deadlocks in the processes of using the shared devices in fuel element cycling system is illustrated. (author)

  5. A risk-based classification scheme for genetically modified foods. II: Graded testing.

    Science.gov (United States)

    Chao, Eunice; Krewski, Daniel

    2008-12-01

    This paper presents a graded approach to the testing of crop-derived genetically modified (GM) foods based on concern levels in a proposed risk-based classification scheme (RBCS) and currently available testing methods. A graded approach offers the potential for more efficient use of testing resources by focusing less on lower concern GM foods, and more on higher concern foods. In this proposed approach to graded testing, products that are classified as Level I would have met baseline testing requirements that are comparable to what is widely applied to premarket assessment of GM foods at present. In most cases, Level I products would require no further testing, or very limited confirmatory analyses. For products classified as Level II or higher, additional testing would be required, depending on the type of the substance, prior dietary history, estimated exposure level, prior knowledge of toxicity of the substance, and the nature of the concern related to unintended changes in the modified food. Level III testing applies only to the assessment of toxic and antinutritional effects from intended changes and is tailored to the nature of the substance in question. Since appropriate test methods are not currently available for all effects of concern, future research to strengthen the testing of GM foods is discussed.

  6. Connecting the Dots: State Health Department Approaches to Addressing Shared Risk and Protective Factors Across Multiple Forms of Violence

    Science.gov (United States)

    Wilkins, Natalie; Myers, Lindsey; Kuehl, Tomei; Bauman, Alice; Hertz, Marci

    2018-01-01

    Violence takes many forms, including intimate partner violence, sexual violence, child abuse and neglect, bullying, suicidal behavior, and elder abuse and neglect. These forms of violence are interconnected and often share the same root causes. They can also co-occur together in families and communities and can happen at the same time or at different stages of life. Often, due to a variety of factors, separate, “siloed” approaches are used to address each form of violence. However, understanding and implementing approaches that prevent and address the overlapping root causes of violence (risk factors) and promote factors that increase the resilience of people and communities (protective factors) can help practitioners more effectively and efficiently use limited resources to prevent multiple forms of violence and save lives. This article presents approaches used by 2 state health departments, the Maryland Department of Health and Mental Hygiene and the Colorado Department of Public Health and Environment, to integrate a shared risk and protective factor approach into their violence prevention work and identifies key lessons learned that may serve to inform crosscutting violence prevention efforts in other states. PMID:29189502

  7. An ethical framework for sharing patient data without consent

    Directory of Open Access Journals (Sweden)

    Robert Navarro

    2008-12-01

    Discussion The hard problem of non-consented data sharing should be divided into the easier (though non-trivial ones of data and recipient breach risk measurement. Directed research in these two areas will help move the data sharing problem into the 'solved' pile.

  8. Intel Xeon Phi accelerated Weather Research and Forecasting (WRF) Goddard microphysics scheme

    Science.gov (United States)

    Mielikainen, J.; Huang, B.; Huang, A. H.-L.

    2014-12-01

    The Weather Research and Forecasting (WRF) model is a numerical weather prediction system designed to serve both atmospheric research and operational forecasting needs. The WRF development is a done in collaboration around the globe. Furthermore, the WRF is used by academic atmospheric scientists, weather forecasters at the operational centers and so on. The WRF contains several physics components. The most time consuming one is the microphysics. One microphysics scheme is the Goddard cloud microphysics scheme. It is a sophisticated cloud microphysics scheme in the Weather Research and Forecasting (WRF) model. The Goddard microphysics scheme is very suitable for massively parallel computation as there are no interactions among horizontal grid points. Compared to the earlier microphysics schemes, the Goddard scheme incorporates a large number of improvements. Thus, we have optimized the Goddard scheme code. In this paper, we present our results of optimizing the Goddard microphysics scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The Intel MIC is capable of executing a full operating system and entire programs rather than just kernels as the GPU does. The MIC coprocessor supports all important Intel development tools. Thus, the development environment is one familiar to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discussed in this paper. The results show that the optimizations improved performance of Goddard microphysics scheme on Xeon Phi 7120P by a factor of 4.7×. In addition, the optimizations reduced the Goddard microphysics scheme's share of the total WRF processing time from 20.0 to 7.5%. Furthermore, the same optimizations

  9. Exploring shared risks through public-private partnerships in public health programs: a mixed method

    Directory of Open Access Journals (Sweden)

    Wadi B. Alonazi

    2017-06-01

    Full Text Available Abstract Background The natural assimilation of the process through which health partners sustain long-term relationships is a key issue in maintaining social well-being, reducing health risk factors, and sustaining public health programs. One global initiative in building effective healthcare systems is public-private partnerships (PPPs. This study elucidates the proposed key performance indicators initiated by the Ministry of Health of Saudi Arabia based on the projections of the government, known as Vision 2030, from the perspective of health risk factors. Methods Through an inductive content analysis, this study assessed primary and secondary data in relation to the Saudi National Transformation Program (NTP. To identify the institutions that played a role in formulating the new Saudi Healthcare System, health policies, regulations, and reports published between 1996 and 2016 were categorized. After ranking the risk factors, the investigator selected 13 healthcare professionals in four focus group interviews to insightfully explore the challenges that the NTP faces from a health risk perspective. Thus, the study employed qualitative data gathered through focus group interviews with key figures as well as data extracted from written sources to identify distinct but interrelated partnerships practiced within risk management. Results A methodological overview of NTP priority and implementation offered practical guidance in the healthcare context. The five critical factors in maintaining successful and sustainable PPPs were (1 trustworthiness, (2 technological capability, (3 patient-centeredness, (4 competence, and (5 flexibility. Concession on primary and secondary healthcare services might be a good option based on the literature review and considering its popularity in other countries. A high outcome-based risk of PPPs was found as the most commonly shared perspective in risk management. Conclusions Although the impact of the NTP rise has yet

  10. Exploring shared risks through public-private partnerships in public health programs: a mixed method.

    Science.gov (United States)

    Alonazi, Wadi B

    2017-06-12

    The natural assimilation of the process through which health partners sustain long-term relationships is a key issue in maintaining social well-being, reducing health risk factors, and sustaining public health programs. One global initiative in building effective healthcare systems is public-private partnerships (PPPs). This study elucidates the proposed key performance indicators initiated by the Ministry of Health of Saudi Arabia based on the projections of the government, known as Vision 2030, from the perspective of health risk factors. Through an inductive content analysis, this study assessed primary and secondary data in relation to the Saudi National Transformation Program (NTP). To identify the institutions that played a role in formulating the new Saudi Healthcare System, health policies, regulations, and reports published between 1996 and 2016 were categorized. After ranking the risk factors, the investigator selected 13 healthcare professionals in four focus group interviews to insightfully explore the challenges that the NTP faces from a health risk perspective. Thus, the study employed qualitative data gathered through focus group interviews with key figures as well as data extracted from written sources to identify distinct but interrelated partnerships practiced within risk management. A methodological overview of NTP priority and implementation offered practical guidance in the healthcare context. The five critical factors in maintaining successful and sustainable PPPs were (1) trustworthiness, (2) technological capability, (3) patient-centeredness, (4) competence, and (5) flexibility. Concession on primary and secondary healthcare services might be a good option based on the literature review and considering its popularity in other countries. A high outcome-based risk of PPPs was found as the most commonly shared perspective in risk management. Although the impact of the NTP rise has yet to be explored, its potential for challenging health

  11. Availability Cascades & the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    2014-01-01

    attention. This conceptual paper attempts to explain the emergent focus on the sharing economy and associated business and consumption models by applying cascade theory. Risks associated with this behavior will be especially examined with regard to the sustainability claim of collaborative consumption......In search of a new concept that will provide answers to as to how modern societies should not only make sense but also resolve the social and environmental problems linked with our modes of production and consumption, collaborative consumption and the sharing economy are increasingly attracting....... With academics, practitioners, and civil society alike having a shared history in being rather fast in accepting new concepts that will not only provide business opportunities but also a good conscience, this study proposes a critical study of the implications of collaborative consumption, before engaging...

  12. Quantum secret sharing based on Smolin states alone

    International Nuclear Information System (INIS)

    He Guangping; Wang, Z D; Bai, Yankui

    2008-01-01

    It was indicated (Yu 2007 Phys. Rev. A 75 066301) that a previously proposed quantum secret sharing (QSS) protocol based on Smolin states (Augusiak 2006 Phys. Rev. A 73 012318) is insecure against an internal cheater. Here we build a different QSS protocol with Smolin states alone, and prove it to be secure against known cheating strategies. Thus we open a promising venue for building secure QSS using merely Smolin states, which is a typical kind of bound entangled states. We also propose a feasible scheme to implement the protocol experimentally

  13. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  14. Shared breastfeeding in central Africa

    NARCIS (Netherlands)

    Ramharter, Michael; Chai, Sanders K.; Adegnika, Ayola A.; Klöpfer, Anna; Längin, Matthias; Agnandji, Selidji T.; Oyakhirome, Sunny; Schwarz, Norbert G.; Grobusch, Martin P.; Issifou, Saadon; Kremsner, Peter G.

    2004-01-01

    In this study, shared breastfeeding is described asa novel risk factor for vertical HIV transmission. This cross-sectional survey conducted in the central African country Gabon found that 40% of lactating mothers also breastfed other children than their own, and as many children were additionally

  15. Impacts of Smart Configuration in Pedelec-Sharing: Evidence from a Panel Survey in Madrid

    Directory of Open Access Journals (Sweden)

    András Munkácsy

    2017-01-01

    Full Text Available Despite the recently increasing research interest, this is one of the first studies employing a panel sample of users and nonusers to understand the bike-sharing phenomenon (N=205. On the basis of a novel surveying technique, a case study on the clients of the state-of-the-art bike-sharing scheme of Madrid (Spain is presented. BiciMAD is a system of the latest generation, namely, multimodal demand responsive bike-sharing: a fleet of electric pedal-assisted bicycles (pedelecs with an advanced technology and unique smart service configuration to tackle challenges that may hinder the promotion of cycling and bike-sharing in the city. A statistical test has verified that there is a moderate association between previous intention and actual use of bike-sharing (Cramer’s V = 0.25 and both barriers and motivators of further use have been identified. Indicators on mobility patterns show that although drawing primarily from other sustainable modes of transport, bike-sharing has increased mobility (total number and distance of trips and especially active travel but decreased the perceived travel time.

  16. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  17. The role of risk perception in making flood risk management more effective

    Science.gov (United States)

    Buchecker, M.; Salvini, G.; Di Baldassarre, G.; Semenzin, E.; Maidl, E.; Marcomini, A.

    2013-11-01

    Over the last few decades, Europe has suffered from a number of severe flood events and, as a result, there has been a growing interest in probing alternative approaches to managing flood risk via prevention measures. A literature review reveals that, although in the last decades risk evaluation has been recognized as key element of risk management, and risk assessment methodologies (including risk analysis and evaluation) have been improved by including social, economic, cultural, historical and political conditions, the theoretical schemes are not yet applied in practice. One main reason for this shortcoming is that risk perception literature is mainly of universal and theoretical nature and cannot provide the necessary details to implement a comprehensive risk evaluation. This paper therefore aims to explore a procedure that allows the inclusion of stakeholders' perceptions of prevention measures in risk assessment. It proposes to adopt methods of risk communication (both one-way and two-way communication) in risk assessment with the final aim of making flood risk management more effective. The proposed procedure not only focuses on the effect of discursive risk communication on risk perception, and on achieving a shared assessment of the prevention alternatives, but also considers the effects of the communication process on perceived uncertainties, accepted risk levels, and trust in the managing institutions. The effectiveness of this combined procedure has been studied and illustrated using the example of the participatory flood prevention assessment process on the Sihl River in Zurich, Switzerland. The main findings of the case study suggest that the proposed procedure performed well, but that it needs some adaptations for it to be applicable in different contexts and to allow a (semi-) quantitative estimation of risk perception to be used as an indicator of adaptive capacity.

  18. New Power Sharing Control for Inverter-Dominated Microgrid Based on Impedance Match Concept

    Science.gov (United States)

    Gu, Herong; Wang, Deyu; Shen, Hong; Zhao, Wei; Guo, Xiaoqiang

    2013-01-01

    Power flow control is one of the most important issues for operating the inverter-dominated autonomous microgrid. A technical challenge is how to achieve the accurate active/reactive power sharing of inverters. P-F and Q-V droop control schemes have been widely used for power sharing in the past decades. But they suffer from the poor power sharing in the presence of unequal line impedance. In order to solve the problem, a comprehensive analysis of the power droop control is presented, and a new droop control based on the impedance match concept is proposed in this paper. In addition, the design guidelines of control coefficients and virtual impedance are provided. Finally, the performance evaluation is carried out, and the evaluation results verify the effectiveness of the proposed method. PMID:24453910

  19. New power sharing control for inverter-dominated microgrid based on impedance match concept.

    Science.gov (United States)

    Gu, Herong; Wang, Deyu; Shen, Hong; Zhao, Wei; Guo, Xiaoqiang

    2013-01-01

    Power flow control is one of the most important issues for operating the inverter-dominated autonomous microgrid. A technical challenge is how to achieve the accurate active/reactive power sharing of inverters. P-F and Q-V droop control schemes have been widely used for power sharing in the past decades. But they suffer from the poor power sharing in the presence of unequal line impedance. In order to solve the problem, a comprehensive analysis of the power droop control is presented, and a new droop control based on the impedance match concept is proposed in this paper. In addition, the design guidelines of control coefficients and virtual impedance are provided. Finally, the performance evaluation is carried out, and the evaluation results verify the effectiveness of the proposed method.

  20. Evaluation and decision of products conceptual design schemes based on customer requirements

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Hong Zhong; Li, Yan Feng; Liu, Yu; Wang, Zhonglai [University of Electronic Science and Technology of China, Sichuan (China); Liu, Wenhai [2China Science Patent Trademark Agents Ltd., Beijing (China)

    2011-09-15

    Within the competitive market environment, understanding customer requirements is crucial for all corporations to obtain market share and survive competition. Only the products exactly meeting customer requirements can win in the market place. Therefore, customer requirements play a very important role in the evaluation and decision process of conceptual design schemes of products. In this paper, an evaluation and decision method based on customer requirements is presented. It utilizes the importance of customer requirements, the satisfaction degree of each evaluation metric to the specification, and an evaluation metric which models customer requirements to evaluate the satisfaction degree of each design scheme to specific customer requirements via the proposed BP neural networks. In the evaluation and decision process, fuzzy sets are used to describe the importance of customer requirements, the relationship between customer requirements and evaluation metrics, the satisfaction degree of each scheme to customer requirements, and the crisp set is used to describe the satisfaction degree of each metric to specifications. The effectiveness of the proposed method is demonstrated by an example of front suspension fork design of mountain bikes.

  1. Evaluation and decision of products conceptual design schemes based on customer requirements

    International Nuclear Information System (INIS)

    Huang, Hong Zhong; Li, Yan Feng; Liu, Yu; Wang, Zhonglai; Liu, Wenhai

    2011-01-01

    Within the competitive market environment, understanding customer requirements is crucial for all corporations to obtain market share and survive competition. Only the products exactly meeting customer requirements can win in the market place. Therefore, customer requirements play a very important role in the evaluation and decision process of conceptual design schemes of products. In this paper, an evaluation and decision method based on customer requirements is presented. It utilizes the importance of customer requirements, the satisfaction degree of each evaluation metric to the specification, and an evaluation metric which models customer requirements to evaluate the satisfaction degree of each design scheme to specific customer requirements via the proposed BP neural networks. In the evaluation and decision process, fuzzy sets are used to describe the importance of customer requirements, the relationship between customer requirements and evaluation metrics, the satisfaction degree of each scheme to customer requirements, and the crisp set is used to describe the satisfaction degree of each metric to specifications. The effectiveness of the proposed method is demonstrated by an example of front suspension fork design of mountain bikes

  2. Synchronverter-Enabled DC Power Sharing Approach for LVDC Microgrids

    DEFF Research Database (Denmark)

    Peyghami, Saeed; Davari, Pooya; Mokhtari, Hossein

    2017-01-01

    by introducing a small ac voltage superimposed onto the output dc voltage of converters. Therefore, dc sources can be coordinated together with the frequency of the ac voltage, without any communication network like Synchronous Generators (SGs) in conventional power systems. Small signal stability analysis......In a classical ac Micro-Grid (MG), a common frequency exists for coordinating active power sharing among droop-controlled sources. Like the frequency droop method, a voltage based droop approach has been employed to control the converters in dc MGs. However, voltage variation due to the droop gains...... and line resistances causes poor power sharing and voltage regulation in dc MG, which in most cases are solved by a secondary controller using a communication network. To avoid such an infrastructure and its accompanied complications, this paper proposes a new droop scheme to control dc sources...

  3. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  4. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  5. Increasing stress on disaster-risk finance due to large floods

    Science.gov (United States)

    Jongman, Brenden; Hochrainer-Stigler, Stefan; Feyen, Luc; Aerts, Jeroen C. J. H.; Mechler, Reinhard; Botzen, W. J. Wouter; Bouwer, Laurens M.; Pflug, Georg; Rojas, Rodrigo; Ward, Philip J.

    2014-04-01

    Recent major flood disasters have shown that single extreme events can affect multiple countries simultaneously, which puts high pressure on trans-national risk reduction and risk transfer mechanisms. So far, little is known about such flood hazard interdependencies across regions and the corresponding joint risks at regional to continental scales. Reliable information on correlated loss probabilities is crucial for developing robust insurance schemes and public adaptation funds, and for enhancing our understanding of climate change impacts. Here we show that extreme discharges are strongly correlated across European river basins. We present probabilistic trends in continental flood risk, and demonstrate that observed extreme flood losses could more than double in frequency by 2050 under future climate change and socio-economic development. We suggest that risk management for these increasing losses is largely feasible, and we demonstrate that risk can be shared by expanding risk transfer financing, reduced by investing in flood protection, or absorbed by enhanced solidarity between countries. We conclude that these measures have vastly different efficiency, equity and acceptability implications, which need to be taken into account in broader consultation, for which our analysis provides a basis.

  6. The effect of a new lifetime-cardiovascular-risk display on patients' motivation to participate in shared decision-making.

    Science.gov (United States)

    Jegan, Nikita Roman A; Kürwitz, Sarah Anna; Kramer, Lena Kathrin; Heinzel-Gutenbrunner, Monika; Adarkwah, Charles Christian; Popert, Uwe; Donner-Banzhoff, Norbert

    2018-06-09

    This study investigated the effects of three different risk displays used in a cardiovascular risk calculator on patients' motivation for shared decision-making (SDM). We compared a newly developed time-to-event (TTE) display with two established absolute risk displays (i.e. emoticons and bar charts). The accessibility, that is, how understandable, helpful, and trustworthy patients found each display, was also investigated. We analysed a sample of 353 patients recruited in general practices. After giving consent, patients were introduced to one of three fictional vignettes with low, medium or high cardiovascular risk. All three risk displays were shown in a randomized order. Patients were asked to rate each display with regard to motivation for SDM and accessibility. Two-factorial repeated measures analyses of variance were conducted to compare the displays and investigate possible interactions with age. Regarding motivation for SDM, the TTE elicited the highest motivation, followed by the emoticons and bar chart (p motivation for SDM and accessibility when compared to established displays using emoticons and a bar chart. If future research can replicate these results in real-life consultations, the TTE display will be a valuable addition to current risk calculators and decision aids by improving patients' participation.

  7. Buy-back and Revenue-Sharing Contracts in Global Supply Chain

    Directory of Open Access Journals (Sweden)

    Yang Liu

    2015-09-01

    Full Text Available Purpose: The main propose of this study is to investigate how exchange rate risk affects the buy-back and revenue-sharing contracts in the global supply chain, hence to improve the performance of global supply chain. Design/methodology/approach: Based on a two-echelon global supply chain, with the model equilibrium, this paper studies the difference between the buy-back contract and the revenue-sharing contract. By the transmitting of the exchange rate risk, it discusses the node-enterprises’ optimal strategies. Findings: The result shows that: (1 Both these two contracts can diminish the inefficiency caused by demand risk, but none of them can manage the exchange rate risk. (2 No matter which currency is used to settle the payment, both these two contracts will lead to the transmitting of exchange rate risk from one node-enterprise to another. (3 When the currency of the supplier’s country in the relatively appreciating, it is better to use the buy-back contract; when the currency of the supplier’s country in the relatively depreciating, the revenue-sharing contract will lead to a better result. Research limitations/implications: Though this study analyzes how the exchange rate risk affects these two contracts, it based on the assumption that node-enterprises’ goal is maximizing theirs expected profit. In fact, many firms not only focus on maximizing theirs expected profit; the risk-taking is also an important concern. For future researches, how firms’ risk-preferences affects theirs decisions in the global supply chain will be an interesting question. Also, will there be any difference if consider the node-enterprises’ utility functions instead of the expected profit. Originality/value: Existing literature about the global supply chain mainly focus on the exchange rate risk management, few of them considers the double marginalization effect caused by the demand risk. Therefore, with the exchange rate fluctuation, we discuss the

  8. Processes for consensus building and role sharing. Lessons learned from HLW policies in European countries

    International Nuclear Information System (INIS)

    Nagano, Koji

    2003-01-01

    This report attempts to obtain lessons in implementation of HLW management policies for Japan by reviewing past experiences and present status of policy formulation and implementation as well as reflection of public opinions and consensus building of selected European countries, such as Finland, Sweden and others. After examining the situations of those countries, the author derives four key aspects that need to be addressed; separation of nuclear energy policies and HLW policies, fundamental support shared among national public, sense of controllability, and proper scheme of responsibility sharing. (author)

  9. Buy-back and revenue-sharing contracts in global supply shain

    OpenAIRE

    Liu, Yang

    2015-01-01

    Purpose: The main propose of this study is to investigate how exchange rate risk affects the buy-back and revenue-sharing contracts in the global supply chain, hence to improve the performance of global supply chain. Design/methodology/approach: Based on a two-echelon global supply chain, with the model equilibrium, this paper studies the difference between the buy-back contract and the revenue-sharing contract. By the transmitting of the exchange rate risk, it discusses the node-enterpris...

  10. Impact of global investment processes on ukrainian share market

    Directory of Open Access Journals (Sweden)

    O.К. Zotsenko

    2015-03-01

    Full Text Available The paper investigates the effects of financial and investment processes on the Ukrainian share market. The research analyzed and estimated investment climate in Ukraine. The study highlights a comparison of the domestic share market with share markets of other countries. In terms of share capitalization of listed companies in the GDP determined that equity is the most developed in the USA and UK. Largest share markets with highest capitalization rate characterized. The regional distribution of the share market capitalization by continents are shown. The study of the dynamics of Ukrainian and global share indexes revealed that the Ukrainian share market indexes show a constant volatility and unpredictability. Correlation Ukrainian stock indexes with indexes in Europe, Russia and America is very weak, which is a very negative trend of the stock market of Ukraine. The key problems and risks of the domestic investments are defined which are consequences of downturn in the Ukrainian share market.

  11. The effect of discounting, different mortality reduction schemes and predictive cohort life tables on risk acceptability criteria

    International Nuclear Information System (INIS)

    Rackwitz, Ruediger

    2006-01-01

    Technical facilities should be optimal with respect to benefits and cost. Optimization of technical facilities involving risks for human life and limb require an acceptability criterion and suitable discount rates both for the public and the operator depending on for whom the optimization is carried out. The life quality index is presented and embedded into modem socio-economic concepts. A general risk acceptability criterion is derived. The societal life saving cost to be used in optimization as life saving or compensation cost and the societal willingness-to-pay based on the societal value of a statistical life or on the societal life quality index are developed. Different mortality reduction schemes are studied. Also, predictive cohort life tables are derived and applied. Discount rates γ must be long-term averages in view of the time horizon of some 20 to more than 100 years for the facilities of interest and net of inflation and taxes. While the operator may use long-term averages from the financial market for his cost-benefit analysis the assessment of interest rates for investments of the public into risk reduction is more difficult. The classical Ramsey model decomposes the real interest rate (=output growth rate) into the rate of time preference of consumption and the rate of economical growth multiplied by the elasticity of marginal utility of consumption. It is proposed to use a relatively small interest rate of 3% implying a rate of time preference of consumption of about 1%. This appears intergenerationally acceptable from an ethical point of view. Risk-consequence curves are derived for an example

  12. Knowledge Sharing and Collaboration in Volcanic Risk Mitigation at Galeras Volcano, Colombia: A Participative Workshop to Reduce Volcanic Risk

    Science.gov (United States)

    Sheridan, M. F.; Cordoba, G. A.

    2009-12-01

    Galeras has been in nearly constant activity during modern historic times (roughly the past 500 years). Approximately 10,000 people live within an area designated as the highest-hazard and nearly 400,000 people are within areas of potential harmful effects. A wide variety of stakeholders are affected by the hazards, including: farmers, indigenous villagers, and people in urban environments. Hazards assessment and volcano monitoring are the responsibility of the Colombian Geological Survey (INGEOMINAS), whereas decisions regarding mitigation and response procedures are the responsibility of various governmental offices and the national emergency system (SNPAD). According to the current plan, when the risk level rises to a high level the people in the highest risk zone are required to evacuate. The volcano currently is in a very active, but fluctuating, condition and a future large eruption in a medium time frame (years to decades) is possible. There is a growing level of discomfort among many of the affected groups, including indigenous communities, farmers, and urban dwellers, related to the risk assessment. The general opinion prior to July 2009 was quite polarized as the decision makers saw the people of the region as poorly prepared to understand this hazard, whereas the population felt that their views were not being heard. The result was that the people in the hazardous areas decided not to evacuate, even during the current period of explosive activity. To resolve this situation the University of Nariño (Colombia) and the State University of New York at Buffalo organized a workshop named "Knowledge, Sharing and Collaboration in Volcanic Risk Mitigation at Galeras Volcano, Colombia" that was held in Pasto (Colombia), between 6 and 11 July, 2009. The general objective of this workshop was to analyze the existing hazard maps and safety plans for Galeras and form a bridge connecting scientists, decision makers, and other stake holders to promote a better

  13. A Dynamic Approach to Rebalancing Bike-Sharing Systems.

    Science.gov (United States)

    Chiariotti, Federico; Pielli, Chiara; Zanella, Andrea; Zorzi, Michele

    2018-02-08

    Bike-sharing services are flourishing in Smart Cities worldwide. They provide a low-cost and environment-friendly transportation alternative and help reduce traffic congestion. However, these new services are still under development, and several challenges need to be solved. A major problem is the management of rebalancing trucks in order to ensure that bikes and stalls in the docking stations are always available when needed, despite the fluctuations in the service demand. In this work, we propose a dynamic rebalancing strategy that exploits historical data to predict the network conditions and promptly act in case of necessity. We use Birth-Death Processes to model the stations' occupancy and decide when to redistribute bikes, and graph theory to select the rebalancing path and the stations involved. We validate the proposed framework on the data provided by New York City's bike-sharing system. The numerical simulations show that a dynamic strategy able to adapt to the fluctuating nature of the network outperforms rebalancing schemes based on a static schedule.

  14. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  15. Macro-level integrated renewable energy production schemes for sustainable development

    International Nuclear Information System (INIS)

    Subhadra, Bobban G.

    2011-01-01

    The production of renewable clean energy is a prime necessity for the sustainable future existence of our planet. However, because of the resource-intensive nature, and other challenges associated with these new generation renewable energy sources, novel industrial frameworks need to be co-developed. Integrated renewable energy production schemes with foundations on resource sharing, carbon neutrality, energy-efficient design, source reduction, green processing plan, anthropogenic use of waste resources for the production green energy along with the production of raw material for allied food and chemical industries is imperative for the sustainable development of this sector especially in an emission-constrained future industrial scenario. To attain these objectives, the scope of hybrid renewable production systems and integrated renewable energy industrial ecology is briefly described. Further, the principles of Integrated Renewable Energy Park (IREP) approach, an example for macro-level energy production, and its benefits and global applications are also explored. - Research highlights: → Discusses the need for macro-level renewable energy production schemes. → Scope of hybrid and integrated industrial ecology for renewable energy production. → Integrated Renewable Energy Parks (IREPs): A macro-level energy production scheme. → Discusses the principle foundations and global applications of IREPs. → Describes the significance of IREPs in the carbon-neutral future business arena.

  16. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  17. On the performance of spectrum sharing systems with two-way relaying and multiuser diversity

    KAUST Repository

    Yang, Liang

    2012-08-01

    In this letter, we consider a spectrum sharing network with two-way relaying and multi-user diversity. More specifically, one secondary transmitter with the best channel quality is selected and splits its partial power to relay its received signals to the primary users by using the amplify-and-forward relaying protocol. We derive a tight approximation for the resulting outage probability. Based on this formula, the performance of the spectral sharing region and the cell coverage are analyzed. Numerical results are given to verify our analysis and are discussed to illustrate the advantages of our newly proposed scheme. © 1997-2012 IEEE.

  18. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  19. A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability.

    Science.gov (United States)

    Lee, Che-Wei; Tsai, Wen-Hsiang

    2012-01-01

    A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the Portable Network Graphics (PNG) image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel values near their maximum value of 255 to yield a transparent stego-image with a disguise effect. In the process of image authentication, an image block is marked as tampered if the authentication signal computed from the current block content does not match that extracted from the shares embedded in the alpha channel plane. Data repairing is then applied to each tampered block by a reverse Shamir scheme after collecting two shares from unmarked blocks. Measures for protecting the security of the data hidden in the alpha channel are also proposed. Good experimental results prove the effectiveness of the proposed method for real applications.

  20. Gender and power contestations over water use in irrigation schemes: Lessons from the lake Chilwa basin

    Science.gov (United States)

    Nkhoma, Bryson; Kayira, Gift

    2016-04-01

    Over the past two decades, Malawi has been adversely hit by climatic variability and changes, and irrigation schemes which rely mostly on water from rivers have been negatively affected. In the face of dwindling quantities of water, distribution and sharing of water for irrigation has been a source of contestations and conflicts. Women who constitute a significant section of irrigation farmers in schemes have been major culprits. The study seeks to analyze gender contestations and conflicts over the use of water in the schemes developed in the Lake Chilwa basin, in southern Malawi. Using oral and written sources as well as drawing evidence from participatory and field observations conducted at Likangala and Domasi irrigation schemes, the largest schemes in the basin, the study observes that women are not passive victims of male domination over the use of dwindling waters for irrigation farming. They have often used existing political and traditional structures developed in the management of water in the schemes to competitively gain monopoly over water. They have sometimes expressed their agency by engaging in irrigation activities that fall beyond the control of formal rules and regulations of irrigation agriculture. Other than being losers, women are winning the battle for water and land resources in the basin.

  1. Toric Varieties and Codes, Error-correcting Codes, Quantum Codes, Secret Sharing and Decoding

    DEFF Research Database (Denmark)

    Hansen, Johan Peder

    We present toric varieties and associated toric codes and their decoding. Toric codes are applied to construct Linear Secret Sharing Schemes (LSSS) with strong multiplication by the Massey construction. Asymmetric Quantum Codes are obtained from toric codes by the A.R. Calderbank P.W. Shor and A.......M. Steane construction of stabilizer codes (CSS) from linear codes containing their dual codes....

  2. When push comes to shove: Compensating and opportunistic strategies in a collective-risk household energy dilemma

    Directory of Open Access Journals (Sweden)

    Anya eSkatova

    2016-03-01

    Full Text Available To solve problems like climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment participants (N = 118 were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, whilst a full round of the game lasted one week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use, all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition or low (fair condition use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behaviour of others. On the contrary, they significantly decreased their consumption towards the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behaviour but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behaviour.

  3. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    Energy Technology Data Exchange (ETDEWEB)

    Skatova, Anya, E-mail: anya.skatova@gmail.com [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Warwick Business School, University of Warwick, Coventry (United Kingdom); Bedwell, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Kuper-Smith, Benjamin [Horizon Digital Economy Research, University of Nottingham, Nottingham (United Kingdom); Institute of Neurology, University College London, London (United Kingdom)

    2016-03-14

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  4. When Push Comes to Shove: Compensating and Opportunistic Strategies in a Collective-Risk Household Energy Dilemma

    International Nuclear Information System (INIS)

    Skatova, Anya; Bedwell, Benjamin; Kuper-Smith, Benjamin

    2016-01-01

    To solve problems such as climate change, every little push counts. Community energy schemes are a popular policy targeted to reduce a country’s carbon emissions but the effect they have on energy use depends on whether people can work together as a community. We often find ourselves caught in a dilemma: if others are not doing their bit, why should I? In our experiment, participants (N = 118) were matched in groups of 10 to play in a collective-risk game framed as a community energy purchase scheme. They made only one decision about energy use for their virtual household a day, while a full round of the game lasted 1 week in real time. All decisions were entered via personal phone or a home computer. If in the end of the week the group exceeded a pre-paid threshold of energy use all group members would share a fine. Each day participants received feedback about decisions of their group partners, and in some groups the feedback was manipulated as high (unfair condition) or low (fair condition) use. High average group use created individual risk for participants to be penalized in the end of the week, even if they did not use much themselves. We found that under the risk of having to pay a fine, participants stayed significantly below the fair-share threshold regardless of unfair behavior of others. On the contrary, they significantly decreased their consumption toward the end of the game. Seeing that others are doing their bit – using a fair-share – encouraged people to take advantage of the situation: those who played against fair confederates did not follow the normative behavior but conversely, increased their consumption over the course of the game. These opportunistic strategies were demonstrated by impulsive participants who were also low in punishment sensitivity. We discuss the findings in the light of policy research as well as literature on cooperation and prosocial behavior.

  5. [Susceptibility to strategy of the drug component of the IPHCC+RxGroups classification system in a risk-adjusted morbidity compensation scheme--a conceptional and data-supported analysis].

    Science.gov (United States)

    Behrend, C; Felder, S; Busse, R

    2007-01-01

    A report commissioned by the German Ministry of Health recommends to the existing scheme for calculating risk-adjusted transfers to sickness funds supplement with the IPHCC+RxGroups method. The method is based on inpatient diagnoses and prescribed drugs as health status measures deduced from prior use. The present study investigates the sickness fund's expected net return from gaming based on the drug component of the risk adjuster. The study explores three possible strategies using the RxGroups method. For the stimulations, insurees are assigned to additional indications or to higher valued RxGroups within the same indication. Then, costs and financial benefits attributable to the altered drug use are estimated and compared with the status quo. The study uses 2000 and 2001 sample data of more than 370,000 insurees of Germany's company-based sickness funds system (BKK). While upgrading increases overall costs, it can be beneficial for the individual sickness funds. Their net return crucially depends on the number of sickness funds gaming the system: the more participating in the game, the smaller is the average net return. Moreover, not participating often is even worse, which in turn points to a prisoner's dilemma. When extending the risk adjustment scheme in social health insurance, the German legislator should take into account the perverse incentives of risk adjusters such as the described prescription drug model.

  6. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    Science.gov (United States)

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  7. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  8. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Science.gov (United States)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  9. The Sharing of Benefits from a Logistics Alliance Based on a Hub-Spoke Network: A Cooperative Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Minyoung Yea

    2018-06-01

    Full Text Available This study investigates a strategic alliance as a horizontal cooperation in the logistics and transportation industries by considering various sharing rules with a cooperative game approach. Through forging a strategic alliance, carriers gain extra benefits from resource sharing and high efficiency resource utilization. In particular, our research focuses on the cost savings from using larger vehicles utilizing collective market demand and regarding them as benefits of cooperation. The model conceptualizes the characteristic function of cost savings by coalitions that take into account the hub-spoke network which is common in transportation services. To share the improved profits fairly between members, we use different allocation schemes: the Shapley value, the core center, the τ -value, and the nucleolus. By analyzing those cooperative game theoretic solutions employing an alliance composed of three carriers, we investigate whether satisfaction in this specific coalition provides an incentive for carriers to join such a coalition. Our results from the analysis, with respect to fair allocation schemes, provide a practical and academic foundation for further research.

  10. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  11. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  12. On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xuran Li

    2016-11-01

    Full Text Available Wireless sensor networks (WSNs play an important role in Cyber Physical Social Sensing (CPSS systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs. In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

  13. HydroShare for iUTAH: Collaborative Publication, Interoperability, and Reuse of Hydrologic Data and Models for a Large, Interdisciplinary Water Research Project

    Science.gov (United States)

    Horsburgh, J. S.; Jones, A. S.

    2016-12-01

    Data and models used within the hydrologic science community are diverse. New research data and model repositories have succeeded in making data and models more accessible, but have been, in most cases, limited to particular types or classes of data or models and also lack the type of collaborative, and iterative functionality needed to enable shared data collection and modeling workflows. File sharing systems currently used within many scientific communities for private sharing of preliminary and intermediate data and modeling products do not support collaborative data capture, description, visualization, and annotation. More recently, hydrologic datasets and models have been cast as "social objects" that can be published, collaborated around, annotated, discovered, and accessed. Yet it can be difficult using existing software tools to achieve the kind of collaborative workflows and data/model reuse that many envision. HydroShare is a new, web-based system for sharing hydrologic data and models with specific functionality aimed at making collaboration easier and achieving new levels of interactive functionality and interoperability. Within HydroShare, we have developed new functionality for creating datasets, describing them with metadata, and sharing them with collaborators. HydroShare is enabled by a generic data model and content packaging scheme that supports describing and sharing diverse hydrologic datasets and models. Interoperability among the diverse types of data and models used by hydrologic scientists is achieved through the use of consistent storage, management, sharing, publication, and annotation within HydroShare. In this presentation, we highlight and demonstrate how the flexibility of HydroShare's data model and packaging scheme, HydroShare's access control and sharing functionality, and versioning and publication capabilities have enabled the sharing and publication of research datasets for a large, interdisciplinary water research project

  14. On distributed key distribution centers and unconditionally secure proactive verifiable secret sharing schemes based on general access structure

    NARCIS (Netherlands)

    Nikov, V.S.; Nikova, S.I.; Preneel, B.; Vandewalle, J.; Menezes, A.; Sarkar, P.

    2002-01-01

    A Key Distribution Center of a network is a server enabling private communications within groups of users. A Distributed Key Distribution Center is a set of servers that jointly realizes a Key Distribution Center. In this paper we build a robust Distributed Key Distribution Center Scheme secure

  15. A survey of bloodborne viruses and associated risk behaviours in Greek prisons.

    Science.gov (United States)

    Malliori, M; Sypsa, V; Psichogiou, M; Touloumi, G; Skoutelis, A; Tassopoulos, N; Hatzakis, A; Stefanis, C

    1998-02-01

    To determine HIV and hepatitis infection prevalence and correlates with risk behaviour. Cross-sectional study: voluntary, anonymous HIV, hepatitis (HCV, HBV and HDV) surveillance and questionnaire on risk factors. Korydallos Prison, Athens and Ag. Stefanos Prison, Patra, Greece. Of 544 drug users imprisoned for drug related offences, all completed the questionnaire and 533 blood samples were collected. HIV (by anti-HIV-1), HCV (by anti-HCV), HBV (by anti-HBc, HBsAg) and HDV (by anti-HDV) prevalence. Data on demography, legal status, drug use, sharing of injecting equipment. Of the 544 drug users, 375 (68.9%) had injected drugs (IDUs) at some time, 35% of whom had injected whilst in that prison. Of the 533 blood samples tested, one was positive for anti-HIV-1 (0.19%), 310 for anti-HCV (58.2%), 306/531 (57.6%) for anti-HBc, 34/527 (6.5%) for HBsAg and 12/527 (2.3%) for anti-HDV. Prevalence rates for IDUs only were 0.27% for HIV-1, 80.6% for hepatitis C, 62.7% for hepatitis B and 3.3% for hepatitis D. Ninety-two per cent of IDUs injecting in prison shared needles, indicating that IDUs inject less but share more during incarceration. Multiple logistic regression revealed needle-sharing as the most important risk factor for HCV infection in IDUs. Prior knowledge of a positive hepatitis result did not appear to inhibit IDUs from practising risky behaviours in prison. The epidemic of hepatitis B and C among imprisoned IDUs identified by this study constitutes a major public health problem. Prevention programmes, such as counselling, HBV vaccination, community-based methadone maintenance treatment and syringe exchange schemes, are necessary in order to prevent a further spread.

  16. Open sharing of genomic data: Who does it and why?

    Directory of Open Access Journals (Sweden)

    Tobias Haeusermann

    Full Text Available We explored the characteristics and motivations of people who, having obtained their genetic or genomic data from Direct-To-Consumer genetic testing (DTC-GT companies, voluntarily decide to share them on the publicly accessible web platform openSNP. The study is the first attempt to describe open data sharing activities undertaken by individuals without institutional oversight. In the paper we provide a detailed overview of the distribution of the demographic characteristics and motivations of people engaged in genetic or genomic open data sharing. The geographical distribution of the respondents showed the USA as dominant. There was no significant gender divide, the age distribution was broad, educational background varied and respondents with and without children were equally represented. Health, even though prominent, was not the respondents' primary or only motivation to be tested. As to their motivations to openly share their data, 86.05% indicated wanting to learn about themselves as relevant, followed by contributing to the advancement of medical research (80.30%, improving the predictability of genetic testing (76.02% and considering it fun to explore genotype and phenotype data (75.51%. Whereas most respondents were well aware of the privacy risks of their involvement in open genetic data sharing and considered the possibility of direct, personal repercussions troubling, they estimated the risk of this happening to be negligible. Our findings highlight the diversity of DTC-GT consumers who decide to openly share their data. Instead of focusing exclusively on health-related aspects of genetic testing and data sharing, our study emphasizes the importance of taking into account benefits and risks that stretch beyond the health spectrum. Our results thus lend further support to the call for a broader and multi-faceted conceptualization of genomic utility.

  17. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  18. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  19. Intelligent Aggregation Based on Content Routing Scheme for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jiachen Xu

    2017-10-01

    Full Text Available Cloud computing has emerged as today’s most exciting computing paradigm for providing services using a shared framework, which opens a new door for solving the problems of the explosive growth of digital resource demands and their corresponding convenience. With the exponential growth of the number of data types and data size in so-called big data work, the backbone network is under great pressure due to its transmission capacity, which is lower than the growth of the data size and would seriously hinder the development of the network without an effective approach to solve this problem. In this paper, an Intelligent Aggregation based on a Content Routing (IACR scheme for cloud computing, which could reduce the amount of data in the network effectively and play a basic supporting role in the development of cloud computing, is first put forward. All in all, the main innovations in this paper are: (1 A framework for intelligent aggregation based on content routing is proposed, which can support aggregation based content routing; (2 The proposed IACR scheme could effectively route the high aggregation ratio data to the data center through the same routing path so as to effectively reduce the amount of data that the network transmits. The theoretical analyses experiments and results show that, compared with the previous original routing scheme, the IACR scheme can balance the load of the whole network, reduce the amount of data transmitted in the network by 41.8%, and reduce the transmission time by 31.6% in the same network with a more balanced network load.

  20. Probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel and its application in quantum state sharing

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper presents a scheme for probabilistic teleportation of an arbitrary GHZ-class state with a pure entangled two-particle quantum channel. The sender Alice first teleports the coefficients of the unknown state to the receiver Bob, and then Bob reconstructs the state with an auxiliary particle and some unitary operations if the teleportation succeeds. This scheme has the advantage of transmitting much less particles for teleporting an arbitrary GHZ-class state than others. Moreover, it discusses the application of this scheme in quantum state sharing.

  1. Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-Controlled Microgrid

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza

    2011-01-01

    In this paper, a microgrid hierarchical control scheme is proposed which includes primary and secondary control levels. The primary level comprises distributed generators (DGs) local controllers. The local controller mainly consists of active and reactive power controllers, voltage and current...... controllers, and virtual impedance loop. A novel virtual impedance structure is proposed to achieve proper sharing of non-fundamental power among the microgrid DGs. The secondary level is designed to manage compensation of voltage harmonics at the microgrid load bus (LB) to which the sensitive loads may...... be connected. Also, restoration of LB voltage amplitude and microgrid frequency to the rated values is directed by the secondary level. These functions are achieved by sending proper control signals to the local controllers. The simulation results show the effectiveness of the proposed control scheme....

  2. Analysis of shared heritability in common disorders of the brain.

    Science.gov (United States)

    Anttila, Verneri; Bulik-Sullivan, Brendan; Finucane, Hilary K; Walters, Raymond K; Bras, Jose; Duncan, Laramie; Escott-Price, Valentina; Falcone, Guido J; Gormley, Padhraig; Malik, Rainer; Patsopoulos, Nikolaos A; Ripke, Stephan; Wei, Zhi; Yu, Dongmei; Lee, Phil H; Turley, Patrick; Grenier-Boley, Benjamin; Chouraki, Vincent; Kamatani, Yoichiro; Berr, Claudine; Letenneur, Luc; Hannequin, Didier; Amouyel, Philippe; Boland, Anne; Deleuze, Jean-François; Duron, Emmanuelle; Vardarajan, Badri N; Reitz, Christiane; Goate, Alison M; Huentelman, Matthew J; Kamboh, M Ilyas; Larson, Eric B; Rogaeva, Ekaterina; St George-Hyslop, Peter; Hakonarson, Hakon; Kukull, Walter A; Farrer, Lindsay A; Barnes, Lisa L; Beach, Thomas G; Demirci, F Yesim; Head, Elizabeth; Hulette, Christine M; Jicha, Gregory A; Kauwe, John S K; Kaye, Jeffrey A; Leverenz, James B; Levey, Allan I; Lieberman, Andrew P; Pankratz, Vernon S; Poon, Wayne W; Quinn, Joseph F; Saykin, Andrew J; Schneider, Lon S; Smith, Amanda G; Sonnen, Joshua A; Stern, Robert A; Van Deerlin, Vivianna M; Van Eldik, Linda J; Harold, Denise; Russo, Giancarlo; Rubinsztein, David C; Bayer, Anthony; Tsolaki, Magda; Proitsi, Petra; Fox, Nick C; Hampel, Harald; Owen, Michael J; Mead, Simon; Passmore, Peter; Morgan, Kevin; Nöthen, Markus M; Rossor, Martin; Lupton, Michelle K; Hoffmann, Per; Kornhuber, Johannes; Lawlor, Brian; McQuillin, Andrew; Al-Chalabi, Ammar; Bis, Joshua C; Ruiz, Agustin; Boada, Mercè; Seshadri, Sudha; Beiser, Alexa; Rice, Kenneth; van der Lee, Sven J; De Jager, Philip L; Geschwind, Daniel H; Riemenschneider, Matthias; Riedel-Heller, Steffi; Rotter, Jerome I; Ransmayr, Gerhard; Hyman, Bradley T; Cruchaga, Carlos; Alegret, Montserrat; Winsvold, Bendik; Palta, Priit; Farh, Kai-How; Cuenca-Leon, Ester; Furlotte, Nicholas; Kurth, Tobias; Ligthart, Lannie; Terwindt, Gisela M; Freilinger, Tobias; Ran, Caroline; Gordon, Scott D; Borck, Guntram; Adams, Hieab H H; Lehtimäki, Terho; Wedenoja, Juho; Buring, Julie E; Schürks, Markus; Hrafnsdottir, Maria; Hottenga, Jouke-Jan; Penninx, Brenda; Artto, Ville; Kaunisto, Mari; Vepsäläinen, Salli; Martin, Nicholas G; Montgomery, Grant W; Kurki, Mitja I; Hämäläinen, Eija; Huang, Hailiang; Huang, Jie; Sandor, Cynthia; Webber, Caleb; Muller-Myhsok, Bertram; Schreiber, Stefan; Salomaa, Veikko; Loehrer, Elizabeth; Göbel, Hartmut; Macaya, Alfons; Pozo-Rosich, Patricia; Hansen, Thomas; Werge, Thomas; Kaprio, Jaakko; Metspalu, Andres; Kubisch, Christian; Ferrari, Michel D; Belin, Andrea C; van den Maagdenberg, Arn M J M; Zwart, John-Anker; Boomsma, Dorret; Eriksson, Nicholas; Olesen, Jes; Chasman, Daniel I; Nyholt, Dale R; Avbersek, Andreja; Baum, Larry; Berkovic, Samuel; Bradfield, Jonathan; Buono, Russell; Catarino, Claudia B; Cossette, Patrick; De Jonghe, Peter; Depondt, Chantal; Dlugos, Dennis; Ferraro, Thomas N; French, Jacqueline; Hjalgrim, Helle; Jamnadas-Khoda, Jennifer; Kälviäinen, Reetta; Kunz, Wolfram S; Lerche, Holger; Leu, Costin; Lindhout, Dick; Lo, Warren; Lowenstein, Daniel; McCormack, Mark; Møller, Rikke S; Molloy, Anne; Ng, Ping-Wing; Oliver, Karen; Privitera, Michael; Radtke, Rodney; Ruppert, Ann-Kathrin; Sander, Thomas; Schachter, Steven; Schankin, Christoph; Scheffer, Ingrid; Schoch, Susanne; Sisodiya, Sanjay M; Smith, Philip; Sperling, Michael; Striano, Pasquale; Surges, Rainer; Thomas, G Neil; Visscher, Frank; Whelan, Christopher D; Zara, Federico; Heinzen, Erin L; Marson, Anthony; Becker, Felicitas; Stroink, Hans; Zimprich, Fritz; Gasser, Thomas; Gibbs, Raphael; Heutink, Peter; Martinez, Maria; Morris, Huw R; Sharma, Manu; Ryten, Mina; Mok, Kin Y; Pulit, Sara; Bevan, Steve; Holliday, Elizabeth; Attia, John; Battey, Thomas; Boncoraglio, Giorgio; Thijs, Vincent; Chen, Wei-Min; Mitchell, Braxton; Rothwell, Peter; Sharma, Pankaj; Sudlow, Cathie; Vicente, Astrid; Markus, Hugh; Kourkoulis, Christina; Pera, Joana; Raffeld, Miriam; Silliman, Scott; Boraska Perica, Vesna; Thornton, Laura M; Huckins, Laura M; William Rayner, N; Lewis, Cathryn M; Gratacos, Monica; Rybakowski, Filip; Keski-Rahkonen, Anna; Raevuori, Anu; Hudson, James I; Reichborn-Kjennerud, Ted; Monteleone, Palmiero; Karwautz, Andreas; Mannik, Katrin; Baker, Jessica H; O'Toole, Julie K; Trace, Sara E; Davis, Oliver S P; Helder, Sietske G; Ehrlich, Stefan; Herpertz-Dahlmann, Beate; Danner, Unna N; van Elburg, Annemarie A; Clementi, Maurizio; Forzan, Monica; Docampo, Elisa; Lissowska, Jolanta; Hauser, Joanna; Tortorella, Alfonso; Maj, Mario; Gonidakis, Fragiskos; Tziouvas, Konstantinos; Papezova, Hana; Yilmaz, Zeynep; Wagner, Gudrun; Cohen-Woods, Sarah; Herms, Stefan; Julià, Antonio; Rabionet, Raquel; Dick, Danielle M; Ripatti, Samuli; Andreassen, Ole A; Espeseth, Thomas; Lundervold, Astri J; Steen, Vidar M; Pinto, Dalila; Scherer, Stephen W; Aschauer, Harald; Schosser, Alexandra; Alfredsson, Lars; Padyukov, Leonid; Halmi, Katherine A; Mitchell, James; Strober, Michael; Bergen, Andrew W; Kaye, Walter; Szatkiewicz, Jin Peng; Cormand, Bru; Ramos-Quiroga, Josep Antoni; Sánchez-Mora, Cristina; Ribasés, Marta; Casas, Miguel; Hervas, Amaia; Arranz, Maria Jesús; Haavik, Jan; Zayats, Tetyana; Johansson, Stefan; Williams, Nigel; Dempfle, Astrid; Rothenberger, Aribert; Kuntsi, Jonna; Oades, Robert D; Banaschewski, Tobias; Franke, Barbara; Buitelaar, Jan K; Arias Vasquez, Alejandro; Doyle, Alysa E; Reif, Andreas; Lesch, Klaus-Peter; Freitag, Christine; Rivero, Olga; Palmason, Haukur; Romanos, Marcel; Langley, Kate; Rietschel, Marcella; Witt, Stephanie H; Dalsgaard, Soeren; Børglum, Anders D; Waldman, Irwin; Wilmot, Beth; Molly, Nikolas; Bau, Claiton H D; Crosbie, Jennifer; Schachar, Russell; Loo, Sandra K; McGough, James J; Grevet, Eugenio H; Medland, Sarah E; Robinson, Elise; Weiss, Lauren A; Bacchelli, Elena; Bailey, Anthony; Bal, Vanessa; Battaglia, Agatino; Betancur, Catalina; Bolton, Patrick; Cantor, Rita; Celestino-Soper, Patrícia; Dawson, Geraldine; De Rubeis, Silvia; Duque, Frederico; Green, Andrew; Klauck, Sabine M; Leboyer, Marion; Levitt, Pat; Maestrini, Elena; Mane, Shrikant; De-Luca, Daniel Moreno-; Parr, Jeremy; Regan, Regina; Reichenberg, Abraham; Sandin, Sven; Vorstman, Jacob; Wassink, Thomas; Wijsman, Ellen; Cook, Edwin; Santangelo, Susan; Delorme, Richard; Rogé, Bernadette; Magalhaes, Tiago; Arking, Dan; Schulze, Thomas G; Thompson, Robert C; Strohmaier, Jana; Matthews, Keith; Melle, Ingrid; Morris, Derek; Blackwood, Douglas; McIntosh, Andrew; Bergen, Sarah E; Schalling, Martin; Jamain, Stéphane; Maaser, Anna; Fischer, Sascha B; Reinbold, Céline S; Fullerton, Janice M; Guzman-Parra, José; Mayoral, Fermin; Schofield, Peter R; Cichon, Sven; Mühleisen, Thomas W; Degenhardt, Franziska; Schumacher, Johannes; Bauer, Michael; Mitchell, Philip B; Gershon, Elliot S; Rice, John; Potash, James B; Zandi, Peter P; Craddock, Nick; Ferrier, I Nicol; Alda, Martin; Rouleau, Guy A; Turecki, Gustavo; Ophoff, Roel; Pato, Carlos; Anjorin, Adebayo; Stahl, Eli; Leber, Markus; Czerski, Piotr M; Cruceanu, Cristiana; Jones, Ian R; Posthuma, Danielle; Andlauer, Till F M; Forstner, Andreas J; Streit, Fabian; Baune, Bernhard T; Air, Tracy; Sinnamon, Grant; Wray, Naomi R; MacIntyre, Donald J; Porteous, David; Homuth, Georg; Rivera, Margarita; Grove, Jakob; Middeldorp, Christel M; Hickie, Ian; Pergadia, Michele; Mehta, Divya; Smit, Johannes H; Jansen, Rick; de Geus, Eco; Dunn, Erin; Li, Qingqin S; Nauck, Matthias; Schoevers, Robert A; Beekman, Aartjan Tf; Knowles, James A; Viktorin, Alexander; Arnold, Paul; Barr, Cathy L; Bedoya-Berrio, Gabriel; Bienvenu, O Joseph; Brentani, Helena; Burton, Christie; Camarena, Beatriz; Cappi, Carolina; Cath, Danielle; Cavallini, Maria; Cusi, Daniele; Darrow, Sabrina; Denys, Damiaan; Derks, Eske M; Dietrich, Andrea; Fernandez, Thomas; Figee, Martijn; Freimer, Nelson; Gerber, Gloria; Grados, Marco; Greenberg, Erica; Hanna, Gregory L; Hartmann, Andreas; Hirschtritt, Matthew E; Hoekstra, Pieter J; Huang, Alden; Huyser, Chaim; Illmann, Cornelia; Jenike, Michael; Kuperman, Samuel; Leventhal, Bennett; Lochner, Christine; Lyon, Gholson J; Macciardi, Fabio; Madruga-Garrido, Marcos; Malaty, Irene A; Maras, Athanasios; McGrath, Lauren; Miguel, Eurípedes C; Mir, Pablo; Nestadt, Gerald; Nicolini, Humberto; Okun, Michael S; Pakstis, Andrew; Paschou, Peristera; Piacentini, John; Pittenger, Christopher; Plessen, Kerstin; Ramensky, Vasily; Ramos, Eliana M; Reus, Victor; Richter, Margaret A; Riddle, Mark A; Robertson, Mary M; Roessner, Veit; Rosário, Maria; Samuels, Jack F; Sandor, Paul; Stein, Dan J; Tsetsos, Fotis; Van Nieuwerburgh, Filip; Weatherall, Sarah; Wendland, Jens R; Wolanczyk, Tomasz; Worbe, Yulia; Zai, Gwyneth; Goes, Fernando S; McLaughlin, Nicole; Nestadt, Paul S; Grabe, Hans-Jorgen; Depienne, Christel; Konkashbaev, Anuar; Lanzagorta, Nuria; Valencia-Duarte, Ana; Bramon, Elvira; Buccola, Nancy; Cahn, Wiepke; Cairns, Murray; Chong, Siow A; Cohen, David; Crespo-Facorro, Benedicto; Crowley, James; Davidson, Michael; DeLisi, Lynn; Dinan, Timothy; Donohoe, Gary; Drapeau, Elodie; Duan, Jubao; Haan, Lieuwe; Hougaard, David; Karachanak-Yankova, Sena; Khrunin, Andrey; Klovins, Janis; Kučinskas, Vaidutis; Lee Chee Keong, Jimmy; Limborska, Svetlana; Loughland, Carmel; Lönnqvist, Jouko; Maher, Brion; Mattheisen, Manuel; McDonald, Colm; Murphy, Kieran C; Nenadic, Igor; van Os, Jim; Pantelis, Christos; Pato, Michele; Petryshen, Tracey; Quested, Digby; Roussos, Panos; Sanders, Alan R; Schall, Ulrich; Schwab, Sibylle G; Sim, Kang; So, Hon-Cheong; Stögmann, Elisabeth; Subramaniam, Mythily; Toncheva, Draga; Waddington, John; Walters, James; Weiser, Mark; Cheng, Wei; Cloninger, Robert; Curtis, David; Gejman, Pablo V; Henskens, Frans; Mattingsdal, Morten; Oh, Sang-Yun; Scott, Rodney; Webb, Bradley; Breen, Gerome; Churchhouse, Claire; Bulik, Cynthia M; Daly, Mark; Dichgans, Martin; Faraone, Stephen V; Guerreiro, Rita; Holmans, Peter; Kendler, Kenneth S; Koeleman, Bobby; Mathews, Carol A; Price, Alkes; Scharf, Jeremiah; Sklar, Pamela; Williams, Julie; Wood, Nicholas W; Cotsapas, Chris; Palotie, Aarno; Smoller, Jordan W; Sullivan, Patrick; Rosand, Jonathan; Corvin, Aiden; Neale, Benjamin M

    2018-06-22

    Disorders of the brain can exhibit considerable epidemiological comorbidity and often share symptoms, provoking debate about their etiologic overlap. We quantified the genetic sharing of 25 brain disorders from genome-wide association studies of 265,218 patients and 784,643 control participants and assessed their relationship to 17 phenotypes from 1,191,588 individuals. Psychiatric disorders share common variant risk, whereas neurological disorders appear more distinct from one another and from the psychiatric disorders. We also identified significant sharing between disorders and a number of brain phenotypes, including cognitive measures. Further, we conducted simulations to explore how statistical power, diagnostic misclassification, and phenotypic heterogeneity affect genetic correlations. These results highlight the importance of common genetic variation as a risk factor for brain disorders and the value of heritability-based methods in understanding their etiology. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  3. Adaptive multi-channel downlink assignment for overloaded spectrum-shared multi-antenna overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2012-10-19

    Overlaid cellular technology has been considered as a promising candidate to enhance the capacity and extend the coverage of cellular networks, particularly indoors. The deployment of small cells (e.g. femtocells and/or picocells) in an overlaid setup is expected to reduce the operational power and to function satisfactorily with the existing cellular architecture. Among the possible deployments of small-cell access points is to manage many of them to serve specific spatial locations, while reusing the available spectrum universally. This contribution considers the aforementioned scenario with the objective to serve as many active users as possible when the available downlink spectrum is overloaded. The case study is motivated by the importance of realizing universal resource sharing in overlaid networks, while reducing the load of distributing available resources, satisfying downlink multi-channel assignment, controlling the aggregate level of interference, and maintaining desired design/operation requirements. These objectives need to be achieved in distributed manner in each spatial space with as low processing load as possible when the feedback links are capacity-limited, multiple small-cell access points can be shared, and data exchange between access points can not be coordinated. This contribution is summarized as follows. An adaptive downlink multi-channel assignment scheme when multiple co-channel and shared small-cell access points are allocated to serve active users is proposed. It is assumed that the deployed access points employ isotropic antenna arrays of arbitrary sizes, operate using the open-access strategy, and transmit on shared physical channels simultaneously. Moreover, each active user can be served by a single transmit channel per each access point at a time, and can sense the concurrent interference level associated with each transmit antenna channel non-coherently. The proposed scheme aims to identify a suitable subset of transmit channels

  4. Designing incentive schemes for promoting energy-efficient appliances: A new methodology and a case study for Spain

    International Nuclear Information System (INIS)

    Galarraga, Ibon; Abadie, Luis M.; Kallbekken, Steffen

    2016-01-01

    The energy-efficiency gap has been high on research and policy agendas for several decades. Incentive schemes such as subsidies, taxes and bonus-malus schemes are widely used to promote energy-efficient appliances. Most research, however, considers instruments in isolation, and only rarely in the context of political constraints on instrument use, or for alternative policy goals. This paper presents a methodology for the optimal design of incentive schemes based on the minimisation of Dead Weight Loss for different policy goals and policy restrictions. The use of the methodology is illustrated by designing optimal combinations of taxes and subsidies in Spain for three types of appliance: dishwashers, refrigerators and washing machines. The optimal policies are designed subject to different policy goals such as achieving a fixed reduction in emissions or a certain increased market share for efficient appliances, and for policy constraints such as budget neutrality. The methodology developed here can also be used to evaluate past and current incentive schemes. - Highlights: • A new methodology for the optimal design of incentive schemes is presented. • This is done minimising the Dead Weight Loss for different goals and restrictions. • Efficient bonus malus schemes can be designed with this method.

  5. The Optimal Configuration Scheme of the Virtual Power Plant Considering Benefits and Risks of Investors

    Directory of Open Access Journals (Sweden)

    Jingmin Wang

    2017-07-01

    Full Text Available A virtual power plant (VPP is a special virtual unit that integrates various distributed energy resources (DERs distributed in the generation and consumption sides. The optimal configuration scheme of the VPP needs to break the geographical restrictions to make full use of DERs, considering the uncertainties. First, the components of the DERs and the structure of the VPP are briefly introduced. Next, the cubic exponential smoothing method is adopted to predict the VPP load requirement. Finally, the optimal configuration of the DER capacities inside the VPP is calculated by using portfolio theory and genetic algorithms (GA. The results show that the configuration scheme can optimize the DER capacities considering uncertainties, guaranteeing economic benefits of investors, and fully utilizing the DERs. Therefore, this paper provides a feasible reference for the optimal configuration scheme of the VPP from the perspective of investors.

  6. Scheduling for dual-hop block-fading channels with two source-user pairs sharing one relay

    KAUST Repository

    Zafar, Ammar

    2013-09-01

    In this paper, we maximize the achievable rate region of a dual-hop network with two sources serving two users independently through a single shared relay. We formulate the problem as maximizing the sum of the weighted long term average throughputs of the two users under stability constraints on the long term throughputs of the source-user pairs. In order to solve the problem, we propose a joint user-and-hop scheduling scheme, which schedules the first or second hop opportunistically based on instantaneous channel state information, in order to exploit multiuser diversity and multihop diversity gains. Numerical results show that the proposed joint scheduling scheme enhances the achievable rate region as compared to a scheme that employs multi-user scheduling on the second-hop alone. Copyright © 2013 by the Institute of Electrical and Electronic Engineers, Inc.

  7. Protecting patient privacy when sharing patient-level data from clinical trials.

    Science.gov (United States)

    Tucker, Katherine; Branson, Janice; Dilleen, Maria; Hollis, Sally; Loughlin, Paul; Nixon, Mark J; Williams, Zoë

    2016-07-08

    Greater transparency and, in particular, sharing of patient-level data for further scientific research is an increasingly important topic for the pharmaceutical industry and other organisations who sponsor and conduct clinical trials as well as generally in the interests of patients participating in studies. A concern remains, however, over how to appropriately prepare and share clinical trial data with third party researchers, whilst maintaining patient confidentiality. Clinical trial datasets contain very detailed information on each participant. Risk to patient privacy can be mitigated by data reduction techniques. However, retention of data utility is important in order to allow meaningful scientific research. In addition, for clinical trial data, an excessive application of such techniques may pose a public health risk if misleading results are produced. After considering existing guidance, this article makes recommendations with the aim of promoting an approach that balances data utility and privacy risk and is applicable across clinical trial data holders. Our key recommendations are as follows: 1. Data anonymisation/de-identification: Data holders are responsible for generating de-identified datasets which are intended to offer increased protection for patient privacy through masking or generalisation of direct and some indirect identifiers. 2. Controlled access to data, including use of a data sharing agreement: A legally binding data sharing agreement should be in place, including agreements not to download or further share data and not to attempt to seek to identify patients. Appropriate levels of security should be used for transferring data or providing access; one solution is use of a secure 'locked box' system which provides additional safeguards. This article provides recommendations on best practices to de-identify/anonymise clinical trial data for sharing with third-party researchers, as well as controlled access to data and data sharing

  8. Cost Sharing in the Prevention of Supply Chain Disruption

    Directory of Open Access Journals (Sweden)

    Wen Wang

    2017-01-01

    Full Text Available We examine the influence of cost-sharing mechanism on the disruption prevention investment in a supply chain with unreliable suppliers. When a supply chain faces considerable loss following a disruption, supply chain members are motivated toward investing in manners that reduce their disruption probability. In improving supply chain reliability, the cost-sharing mechanism must be set appropriately to realize the efficiency of the disruption prevention investment. In a supply chain where the focal manufacturing company has its own subsidiary supplier and an outsourcing supplier, we analyze different forms of cost-sharing mechanisms when both suppliers confront disruption risks. Through the cost-sharing mechanisms presented in this study, supply chain members can improve their reliability via disruption prevention investments without considerably increasing the total supply chain cost. We present two concepts, the cost-sharing structure and the cost-sharing ratio, in this study. As the two key components of cost-sharing mechanism, these two elements constitute a practicable cost allocation mechanism to facilitate disruption prevention.

  9. Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud

    Directory of Open Access Journals (Sweden)

    Tengfei Tu

    2017-01-01

    Full Text Available As information technology develops, cloud storage has been widely accepted for keeping volumes of data. Remote data auditing scheme enables cloud user to confirm the integrity of her outsourced file via the auditing against cloud storage, without downloading the file from cloud. In view of the significant computational cost caused by the auditing process, outsourced auditing model is proposed to make user outsource the heavy auditing task to third party auditor (TPA. Although the first outsourced auditing scheme can protect against the malicious TPA, this scheme enables TPA to have read access right over user’s outsourced data, which is a potential risk for user data privacy. In this paper, we introduce the notion of User Focus for outsourced auditing, which emphasizes the idea that lets user dominate her own data. Based on User Focus, our proposed scheme not only can prevent user’s data from leaking to TPA without depending on data encryption but also can avoid the use of additional independent random source that is very difficult to meet in practice. We also describe how to make our scheme support dynamic updates. According to the security analysis and experimental evaluations, our proposed scheme is provably secure and significantly efficient.

  10. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  11. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  12. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  13. The application of the CAPM model on selected shares on the Croatian capital market

    Directory of Open Access Journals (Sweden)

    Zrinka Tolušić

    2014-12-01

    Full Text Available The Capital Asset Pricing Model is a model that describes the relationship between risk, expected return and valuation of securities. The theoretical and practical value of this model has proved unquestionable, but under ideal circumstances. The theory has been utilized by numerous researchers and it confirms the linear relationship between risk and return under the CAPM (Capital Asset Pricing Model model showing that greater exposure to risk provides higher returns. However, empirical research showed there were numerous factors that CAPM model did not take into account since it is based on assumptions which exist in reality, but are invisible. Therefore, it is very interesting to study the application of the CAPM model on selected shares on the Croatian capital market and analyze the possibilities of its application in discovering the misvalued shares. Share price changes on the Croatian capital market suggest there are some unknown factors that also influence share valuation. There is no doubt that the fundamental analysis of shares is not sufficient for evaluating the real share value in light of various invisible elements and all available information available which affect their value as well.

  14. Autonomous Control of Current and Voltage Controlled DG Interface Inverters for Reactive Power Sharing and Harmonics Compensation in Islanded Microgrids

    DEFF Research Database (Denmark)

    Mousazadeh, Seyyed Yousef; Jalilain, Alireza; Savaghebi, Mehdi

    2018-01-01

    In microgrids, Voltage Source Inverters (VSIs) interfacing Distributed Generation (DG) units can be operated in Voltage or Current Controlled Modes (VCM/CCM). In this paper, a coordinated control of CCM and VCM units for reactive power sharing and voltage harmonics compensation is proposed....... This decentralized control scheme is based on the local measurement of signals. In this way, the need for communication links is removed which results in a simpler and more reliable structure compared to the communication based control structures. To be more exact, the VCM units contribute to harmonics compensation....... Experimental and simulation studies show that the harmonics compensation is achieved by using only local measurements in presence of virtual admittance/impedance schemes of CCM/VCM units. Furthermore, it is demonstrated that the reactive power sharing among the CCM and VCM units is obtained based...

  15. A Dynamic Approach to Rebalancing Bike-Sharing Systems

    Directory of Open Access Journals (Sweden)

    Federico Chiariotti

    2018-02-01

    Full Text Available Bike-sharing services are flourishing in Smart Cities worldwide. They provide a low-cost and environment-friendly transportation alternative and help reduce traffic congestion. However, these new services are still under development, and several challenges need to be solved. A major problem is the management of rebalancing trucks in order to ensure that bikes and stalls in the docking stations are always available when needed, despite the fluctuations in the service demand. In this work, we propose a dynamic rebalancing strategy that exploits historical data to predict the network conditions and promptly act in case of necessity. We use Birth-Death Processes to model the stations’ occupancy and decide when to redistribute bikes, and graph theory to select the rebalancing path and the stations involved. We validate the proposed framework on the data provided by New York City’s bike-sharing system. The numerical simulations show that a dynamic strategy able to adapt to the fluctuating nature of the network outperforms rebalancing schemes based on a static schedule.

  16. Cross-Layer Design in Dynamic Spectrum Sharing Systems

    Directory of Open Access Journals (Sweden)

    Shadmand A

    2010-01-01

    Full Text Available We consider a dynamic spectrum sharing system consisting of a primary user, whose licensed spectrum is allowed to be accessed by a secondary user as long as it does not violate the prescribed interference limit inflicted on the primary user. Assuming the Nakagami- block-fading environment, we aim at maximizing the performance of secondary user's link in terms of average spectral efficiency (ASE and error performance under the specified packet error rate (PER and average interference limit constraints. To this end, we employ a cross-layer design policy which combines adaptive power and coded discrete M-QAM modulation scheme at the physical layer with a truncated automatic repeat request (ARQ protocol at the data link layer, and simultaneously satisfies the aforementioned constraints. Numerical results affirm that the secondary link of spectrum sharing system combining ARQ with adaptive modulation and coding (AMC achieves significant gain in ASE depending on the maximum number of retransmissions initiated by the ARQ protocol. The results further indicate that the ARQ protocol essentially improves the packet loss rate performance of the secondary link.

  17. Mean-variance portfolio selection and efficient frontier for defined contribution pension schemes

    OpenAIRE

    Hoejgaard, B.; Vigna, E.

    2007-01-01

    We solve a mean-variance portfolio selection problem in the accumulation phase of a defined contribution pension scheme. The efficient frontier, which is found for the 2 asset case as well as the n + 1 asset case, gives the member the possibility to decide his own risk/reward profile. The mean-variance approach is then compared to other investment strategies adopted in DC pension schemes, namely the target-based approach and the lifestyle strategy. The comparison is done both in a theoretical...

  18. Bed-sharing in the absence of hazardous circumstances: is there a risk of sudden infant death syndrome? An analysis from two case-control studies conducted in the UK.

    Directory of Open Access Journals (Sweden)

    Peter S Blair

    Full Text Available The risk of sudden infant death syndrome (SIDS among infants who co-sleep in the absence of hazardous circumstances is unclear and needs to be quantified.Combined individual-analysis of two population-based case-control studies of SIDS infants and controls comparable for age and time of last sleep.Parents of 400 SIDS infants and 1386 controls provided information from five English health regions between 1993-6 (population: 17.7 million and one of these regions between 2003-6 (population:4.9 million.Over a third of SIDS infants (36% were found co-sleeping with an adult at the time of death compared to 15% of control infants after the reference sleep (multivariate OR = 3.9 [95% CI: 2.7-5.6]. The multivariable risk associated with co-sleeping on a sofa (OR = 18.3 [95% CI: 7.1-47.4] or next to a parent who drank more than two units of alcohol (OR = 18.3 [95% CI: 7.7-43.5] was very high and significant for infants of all ages. The risk associated with co-sleeping next to someone who smoked was significant for infants under 3 months old (OR = 8.9 [95% CI: 5.3-15.1] but not for older infants (OR = 1.4 [95% CI: 0.7-2.8]. The multivariable risk associated with bed-sharing in the absence of these hazards was not significant overall (OR = 1.1 [95% CI: 0.6-2.0], for infants less than 3 months old (OR = 1.6 [95% CI: 0.96-2.7], and was in the direction of protection for older infants (OR = 0.1 [95% CI: 0.01-0.5]. Dummy use was associated with a lower risk of SIDS only among co-sleepers and prone sleeping was a higher risk only among infants sleeping alone.These findings support a public health strategy that underlines specific hazardous co-sleeping environments parents should avoid. Sofa-sharing is not a safe alternative to bed-sharing and bed-sharing should be avoided if parents consume alcohol, smoke or take drugs or if the infant is pre-term.

  19. Development of a sustainability reporting scheme for biofuels: A UK case study

    International Nuclear Information System (INIS)

    Chalmers, Jessica; Archer, Greg

    2011-01-01

    In 2008, the UK launched the first regulatory sustainability reporting scheme for biofuels. The development of the scheme, managed by the Low Carbon Vehicle Partnership for the Department for Transport, involved extensive stakeholder engagement. The scheme has significantly increased understanding by policy-makers, the biofuels industry and its supply chains on how to monitor and manage the sustainability risks of biofuels and increase their greenhouse-gas benefits. It is providing a practical model for similar developments globally. To receive certificates in order to meet volume obligations under the Renewable Transport Fuel Obligation (RTFO), suppliers must provide a monthly carbon and sustainability report on individual batches of renewable fuels they supply into the UK. The Renewable Fuels Agency produces aggregate monthly reports of overall performance and quarterly updates of individual supplier performance. This scheme is an important first step to assist the biofuels industry to demonstrate its environmental credentials and justify the subsidies received. The paper provides a case study of the development of the scheme, its initial outcomes and outstanding challenges.

  20. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.