WorldWideScience

Sample records for scheme employing near-front

  1. Employment and Training Schemes for Rural Youth: Learning from Experience.

    Science.gov (United States)

    Phan-Thuy, N.

    1985-01-01

    Over the past two decades a number of African and Asian governments have experimented with various types of youth mobilization or employment and training schemes in trying to cope with rural youth unemployment. A critical appraisal is made of some of these in an attempt to establish criteria that productive employment programs for rural youth…

  2. Effect of national open apprenticeship scheme on youth employment ...

    African Journals Online (AJOL)

    Major problems of respondents in the scheme were, exclusion of some participants from resettlement benefits which accounted for 76.3% of the problem and insufficient resettlement package which accounted for 71.3% of the problem. Increasing the number of participants to benefit from the scheme's resettlement package ...

  3. Processes of Middle-Class Reproduction in a Graduate Employment Scheme

    Science.gov (United States)

    Smart, Sarah; Hutchings, Merryn; Maylor, Uvanney; Mendick, Heather; Menter, Ian

    2009-01-01

    Teach First is an educational charity that places graduates to teach in "challenging" schools for two years. It is marketed as an opportunity to develop employability while "making a difference". In this paper, I examine the process of class reproduction occurring in this graduate employment scheme through examining the…

  4. An Employer of Last Resort Scheme which Resembles a Free Labour Market

    OpenAIRE

    MUSGRAVE, Ralph S.

    2017-01-01

    Abstract. The idea that government should act as employer of last resort (ELR) is an old one. That idea is often referred to nowadays as “job guarantee”. Many ELR schemes to date have been confined to the public sector. There is no good reason for that limitation: i.e. the private sector should use ELR labour as well.  A second common characteristic of ELR schemes has been that (like the WPA in the US in the 1930s) they involve specially set up projects or schemes as distinct from subsidising...

  5. Firm performance and employment in the EU emissions trading scheme: An empirical assessment for Germany

    International Nuclear Information System (INIS)

    Anger, Niels; Oberndorfer, Ulrich

    2008-01-01

    This paper empirically investigates the role of the EU Emissions Trading Scheme (EU ETS) for firm performance and employment in Germany. We provide an overview of relative allowance allocation within the EU ETS as well as an econometric analysis for a large sample of German firms covered by the scheme in order to assess the impacts of EU emissions regulation on both firm revenues and employment. The dataset indicates that the EU ETS was in an overall long position in 2005, although allowance allocation was very heterogeneous across member states. Our econometric analysis suggests that, within the first phase of the EU ETS, relative allowance allocation did not have a significant impact on firm performance and employment of regulated German firms

  6. Entanglement distribution schemes employing coherent photon-to-spin conversion in semiconductor quantum dot circuits

    Science.gov (United States)

    Gaudreau, Louis; Bogan, Alex; Korkusinski, Marek; Studenikin, Sergei; Austing, D. Guy; Sachrajda, Andrew S.

    2017-09-01

    Long distance entanglement distribution is an important problem for quantum information technologies to solve. Current optical schemes are known to have fundamental limitations. A coherent photon-to-spin interface built with quantum dots (QDs) in a direct bandgap semiconductor can provide a solution for efficient entanglement distribution. QD circuits offer integrated spin processing for full Bell state measurement (BSM) analysis and spin quantum memory. Crucially the photo-generated spins can be heralded by non-destructive charge detection techniques. We review current schemes to transfer a polarization-encoded state or a time-bin-encoded state of a photon to the state of a spin in a QD. The spin may be that of an electron or that of a hole. We describe adaptations of the original schemes to employ heavy holes which have a number of attractive properties including a g-factor that is tunable to zero for QDs in an appropriately oriented external magnetic field. We also introduce simple throughput scaling models to demonstrate the potential performance advantage of full BSM capability in a QD scheme, even when the quantum memory is imperfect, over optical schemes relying on linear optical elements and ensemble quantum memories.

  7. China in transition: the new health insurance scheme for the urban employed.

    Science.gov (United States)

    Hindle, D

    2000-01-01

    China has been very successful in achieving good health at a low cost, mostly through national programs for health promotion and illness prevention. However, increased prosperity in recent years has led to higher expectations for therapeutic care, and the change to a socialist market economy has created new risks and opportunities for both financing and care provision. After several years of experimentation, China committed itself in 1996 to a major reform program which includes implementation of a new method of financing of care for the urban employed population. It comprises a mix of government-operated compulsory basic insurance, individual health savings accounts, and optional private health insurance. This paper outlines the new Scheme, and notes some tactical and strategic issues. I conclude that the Chinese government is correctly choosing to balance new and old ideas, but that there are many challenges to be faced including integration of the new Scheme with the rest of the health care system.

  8. National Rural Employment Guarantee Scheme, poverty and prices in rural India.

    Science.gov (United States)

    Gaiha, Raghav; Kulkarni, Vani S; Pandey, Manoj K; Imai, Katsushi S

    2010-01-01

    The objective of this analysis is mainly to construct an intuitive measure of the performance of the National Rural Employment Guarantee Scheme (NREGS) in India. The focus is on divergence between demand and supply at the district level. Some related issues addressed are: (i) whether the gap between demand and supply responds to poverty; and (ii) whether recent hikes in NREGS wages are inflationary. Our analysis confirms responsiveness of the positive gap between demand and supply to poverty. Also, apprehensions expressed about the inflationary potential of recent hikes in NREGS wages have been confirmed. More importantly, higher NREGS wages are likely to undermine self-selection of the poor in it.

  9. Multi-band microwave photonic satellite repeater scheme employing intensity Mach-Zehnder modulators

    Institute of Scientific and Technical Information of China (English)

    Yin Jie; Dong Tao; Zhang Bin; Hao Yan; Cao Guixing; Cheng Zijing; Xu Kun; Zhou Yue; Dai Jian

    2017-01-01

    To solve the satellite repeater's flexible and wideband frequency conversion problem,we propose a novel microwave photonic repeater system,which can convert the upload signal's carrier to six different frequencies.The scheme employs one 20 GHz bandwidth dual-drive Mach-Zehnder modulator (MZM) and two 10 GHz bandwidth MZMs.The basic principle of this scheme is filtering out two optical sidebands after the optical carrier suppression (OCS) modulation and combining two sidebands modulated by the input radio frequency (RF) signal.This structure can realize simultaneous multi-band frequency conversion with only one frequency-fixed microwave source and prevent generating harmful interference sidebands by using two corresponding optical filters after optical modulation.In the simulation,one C-band signal of 6 GHz carrier can be successfully converted to 12 GHz (Ku-band),28 GHz,34 GHz,40 GHz,46 GHz (Ka-band) and 52 GHz (V-band),which can be an attractive method to realize multi-band microwave photonic satellite repeater.Alternatively,the scheme can be configured to generate multi-band local oscillators (LOs) for widely satellite onboard clock distribution when the input RF signal is replaced by the internal clock source.

  10. 2-kW single-mode fiber laser employing bidirectional-pump scheme

    Science.gov (United States)

    Zhang, Fan; Zheng, Wenyou; Shi, Pengyang; Zhang, Xinhai

    2018-01-01

    2kW single-mode fiber laser with two cascade home-made cladding light strippers (CLSs) by employing bidirectionalpump scheme has been demonstrated. 2.009 kW signal power is obtained when pump power is 2.63 kW and the slope efficiency is 76.6%. Raman Stokes light is less than -47 dB at 2.009 kW even with a 10-m delivery fiber with core/inner cladding diameter of 20/400um. The beam quality M2<=1.2 and the spectral FWHM bandwidth is 4.34nm. There is no transverse mode instability and the output power stability of +/-0.14% is achieved by special thermal management for a more uniform temperature distribution on the Yb-doped gain fiber.

  11. Long will they live, work and learn : A scheme for understanding and influencing employability during the life span

    NARCIS (Netherlands)

    Nauta, Aukje; de Lange, Annet H.; Gortz, Saskia

    2010-01-01

    Long will they live, work and learn. A scheme for understanding and influencing employability during the life span A. Nauta, A. H. de Lange en S. Gortz, Gedrag & Organisatie, volume 23, June 2010, nr. 2, pp. 136-157 To stimulate employees' employability until high age, knowledge is needed about what

  12. Employment impacts of energy conservation schemes in the residential sector. Calculation of direct and indirect employment effects using a dedicated input/output simulation approach

    International Nuclear Information System (INIS)

    Jeeninga, H.; Weber, C.; Maeenpaeae, I.; Rivero Garcia, F.; Wiltshire, V.; Wade, J.

    1999-10-01

    The relationship between investments in energy efficiency and employment is investigated. The employment effects of several energy conservation schemes implemented in the residential sector are determined by means of a dedicated input/output simulation approach. The employment effects of energy conservation schemes were determined for France, Germany, the Netherlands, Spain and the United Kingdom. Within the time frame of the project, it was not feasible to perform a comparable analysis for Greece, Ireland and Austria. For Finland, the employment effects of energy auditing schemes were investigated by means of a macro economic simulation model. The main driving force behind the positive employment effect of investment in energy efficiency in the residential sector is the fact that the energy sector has a rather low labour intensity. The resulting shift of expenditures from the energy sector to other sectors with higher labour intensity leads to increased employment. The main mechanisms that determine the net shift in employment resulting from investments in energy conservation are: 1. The employment effect related to the initial investment in energy efficiency; 2. The energy saving effect. Due to lower energy bill, a shift in expenditure pattern will occur from the labour extensive energy sector towards sectors with higher labour intensity, thus inducing a net positive effect on employment; 3. The effects of money transfers between sectors. For example, when the investment is subsidised by the government, money is transferred from the governmental sector to the residential sector; 4. Changes in the total government budget as a result of changes in total tax revenue and expenditures on unemployment benefits. Different financing methods for the investment in energy efficiency are analysed. The initial investment can be financed from the general household consumption budget, by means of a loan, using a subsidy or using private savings. The following input parameters

  13. Novel scheme for simple label-swapping employing XOR logic in an integrated interferometric wavelength converter

    DEFF Research Database (Denmark)

    Fjelde, Tina; Kloch, Allan; Wolfson, David

    2001-01-01

    We present a novel scheme for all-optical label swapping that relies on logic exclusive-OR (XOR) in an integrated SOA-based Michelson interferometer. The scheme allows simple, efficient and mechanically stable operation, while relaxing the requirements on packet format and simplifying switch...

  14. Experimental research of UWB over fiber system employing 128-QAM and ISFA-optimized scheme

    Science.gov (United States)

    He, Jing; Xiang, Changqing; Long, Fengting; Chen, Zuo

    2018-05-01

    In this paper, an optimized intra-symbol frequency-domain averaging (ISFA) scheme is proposed and experimentally demonstrated in intensity-modulation and direct-detection (IMDD) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband over fiber (UWBoF) system. According to the channel responses of three MB-OFDM UWB sub-bands, the optimal ISFA window size for each sub-band is investigated. After 60-km standard single mode fiber (SSMF) transmission, the experimental results show that, at the bit error rate (BER) of 3.8 × 10-3, the receiver sensitivity of 128-quadrature amplitude modulation (QAM) can be improved by 1.9 dB using the proposed enhanced ISFA combined with training sequence (TS)-based channel estimation scheme, compared with the conventional TS-based channel estimation. Moreover, the spectral efficiency (SE) is up to 5.39 bit/s/Hz.

  15. Gradual retirement schemes and older workers : social inclusion and employability in the Netherlands

    NARCIS (Netherlands)

    Gellert, Franz Jozef; Velthuijsen, Hugo

    The number of employees above 50 is increasing in organizations because of demographic changes. People above 50 feel less involved in work and societal activities as they should be and as they are expected to be. Older workers‟ employment is accompanied by stereotyping that workers are less

  16. Stationary flow near fronts

    Directory of Open Access Journals (Sweden)

    Reinhold Steinacker

    2016-12-01

    Full Text Available In 1906, the Austrian scientist Max Margules published a paper on temperature stratification in resting and non-accelerated moving air. The paper derives conditions for stationary slopes of air mass boundaries and was an important forerunner of frontal theories. Its formulation of relations between changes in density and geostrophic wind across the front is basically a discrete version of the thermal wind balance equation. The paper was highly influential and is still being cited to the present day. This paper accompanies an English translation of Margules’ seminal paper. We conclude here our “Classic Papers” series of the Meteorologische Zeitschrift.

  17. 'Students-as-partners' scheme enhances postgraduate students' employability skills while addressing gaps in bioinformatics education.

    Science.gov (United States)

    Mello, Luciane V; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student-staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators' teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability.

  18. "Students-as-Partners" Scheme Enhances Postgraduate Students' Employability Skills While Addressing Gaps in Bioinformatics Education

    Science.gov (United States)

    Mello, Luciane V.; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student-staff partnership and peer-learning. It was centred on the experiences of peer-facilitators,…

  19. ‘Students-as-partners’ scheme enhances postgraduate students’ employability skills while addressing gaps in bioinformatics education

    Science.gov (United States)

    Mello, Luciane V.; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Abstract Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student–staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators’ teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability. PMID:29098185

  20. A low knee voltage and high breakdown voltage of 4H-SiC TSBS employing poly-Si/Ni Schottky scheme

    Science.gov (United States)

    Kim, Dong Young; Seok, Ogyun; Park, Himchan; Bahng, Wook; Kim, Hyoung Woo; Park, Ki Cheol

    2018-02-01

    We report a low knee voltage and high breakdown voltage 4H-SiC TSBS employing poly-Si/Ni dual Schottky contacts. A knee voltage was significantly improved from 0.75 to 0.48 V by utilizing an alternative low work-function material of poly-Si as an anode electrode. Also, reverse breakdown voltage was successfully improved from 901 to 1154 V due to a shrunk low-work-function Schottky region by a proposed self-align etching process between poly-Si and SiC. SiC TSBS with poly-Si/Ni dual Schottky scheme is a suitable structure for high-efficiency rectification and high-voltage blocking operation.

  1. Future perspectives toward the early definition of a multivariate decision-support scheme employed in clinical decision making for senior citizens.

    Science.gov (United States)

    Frantzidis, Christos A; Gilou, Sotiria; Billis, Antonis; Karagianni, Maria; Bratsas, Charalampos D; Bamidis, Panagiotis

    2016-03-01

    Recent neuroscientific studies focused on the identification of pathological neurophysiological patterns (emotions, geriatric depression, memory impairment and sleep disturbances) through computerised clinical decision-support systems. Almost all these research attempts employed either resting-state condition (e.g. eyes-closed) or event-related potentials extracted during a cognitive task known to be affected by the disease under consideration. This Letter reviews existing data mining techniques and aims to enhance their robustness by proposing a holistic decision framework dealing with comorbidities and early symptoms' identification, while it could be applied in realistic occasions. Multivariate features are elicited and fused in order to be compared with average activities characteristic of each neuropathology group. A proposed model of the specific cognitive function which may be based on previous findings (a priori information) and/or validated by current experimental data should be then formed. So, the proposed scheme facilitates the early identification and prevention of neurodegenerative phenomena. Neurophysiological semantic annotation is hypothesised to enhance the importance of the proposed framework in facilitating the personalised healthcare of the information society and medical informatics research community.

  2. An Efficient, Semi-implicit Pressure-based Scheme Employing a High-resolution Finitie Element Method for Simulating Transient and Steady, Inviscid and Viscous, Compressible Flows on Unstructured Grids

    Energy Technology Data Exchange (ETDEWEB)

    Richard C. Martineau; Ray A. Berry

    2003-04-01

    A new semi-implicit pressure-based Computational Fluid Dynamics (CFD) scheme for simulating a wide range of transient and steady, inviscid and viscous compressible flow on unstructured finite elements is presented here. This new CFD scheme, termed the PCICEFEM (Pressure-Corrected ICE-Finite Element Method) scheme, is composed of three computational phases, an explicit predictor, an elliptic pressure Poisson solution, and a semiimplicit pressure-correction of the flow variables. The PCICE-FEM scheme is capable of second-order temporal accuracy by incorporating a combination of a time-weighted form of the two-step Taylor-Galerkin Finite Element Method scheme as an explicit predictor for the balance of momentum equations and the finite element form of a time-weighted trapezoid rule method for the semi-implicit form of the governing hydrodynamic equations. Second-order spatial accuracy is accomplished by linear unstructured finite element discretization. The PCICE-FEM scheme employs Flux-Corrected Transport as a high-resolution filter for shock capturing. The scheme is capable of simulating flows from the nearly incompressible to the high supersonic flow regimes. The PCICE-FEM scheme represents an advancement in mass-momentum coupled, pressurebased schemes. The governing hydrodynamic equations for this scheme are the conservative form of the balance of momentum equations (Navier-Stokes), mass conservation equation, and total energy equation. An operator splitting process is performed along explicit and implicit operators of the semi-implicit governing equations to render the PCICE-FEM scheme in the class of predictor-corrector schemes. The complete set of semi-implicit governing equations in the PCICE-FEM scheme are cast in this form, an explicit predictor phase and a semi-implicit pressure-correction phase with the elliptic pressure Poisson solution coupling the predictor-corrector phases. The result of this predictor-corrector formulation is that the pressure Poisson

  3. Accurate adiabatic singlet-triplet gaps in atoms and molecules employing the third-order spin-flip algebraic diagrammatic construction scheme for the polarization propagator

    Energy Technology Data Exchange (ETDEWEB)

    Lefrancois, Daniel; Dreuw, Andreas, E-mail: dreuw@uni-heidelberg.de [Interdisciplinary Center for Scientific Computing, Ruprecht-Karls University, Im Neuenheimer Feld 205, 69120 Heidelberg (Germany); Rehn, Dirk R. [Departments of Physics, Chemistry and Biology, Linköping University, SE-581 83 Linköping (Sweden)

    2016-08-28

    For the calculation of adiabatic singlet-triplet gaps (STG) in diradicaloid systems the spin-flip (SF) variant of the algebraic diagrammatic construction (ADC) scheme for the polarization propagator in third order perturbation theory (SF-ADC(3)) has been applied. Due to the methodology of the SF approach the singlet and triplet states are treated on an equal footing since they are part of the same determinant subspace. This leads to a systematically more accurate description of, e.g., diradicaloid systems than with the corresponding non-SF single-reference methods. Furthermore, using analytical excited state gradients at ADC(3) level, geometry optimizations of the singlet and triplet states were performed leading to a fully consistent description of the systems, leading to only small errors in the calculated STGs ranging between 0.6 and 2.4 kcal/mol with respect to experimental references.

  4. [Individual prevention of occupational contact dermatitis: protective gloves and skin protection recommendations as part of the patient management scheme by the public statutory employers' liability insurance].

    Science.gov (United States)

    Wilke, A; Skudlik, C; Sonsmann, F K

    2018-05-02

    The dermatologist's procedure is a pivotal tool for early recognition of occupational contact dermatitis (OCD), for reporting OCD cases to the statutory accident insurance and for treating the diseases. The employer is in charge of implementing skin protection measures at the workplace. However, in terms of an individual prevention approach it may be necessary to propose targeted skin protection recommendations in specific patient cases. The patient's own skin protection behavior significantly contributes to regenerating and maintaining healthy skin. This behavior includes the use of occupational skin products, and in particular the correct use of appropriately selected protective gloves. Protective gloves are the most important personal protective measure in the prevention of OCD. Prevention services, occupational health and safety specialists, occupational physicians and centers specialized in occupational dermatology can support the identification of suitable protective measures. Nowadays, suitable protective gloves exist for (almost) every occupational activity and exposure. However, improper use in practice can become a risk factor by itself for the skin (e. g., incorrectly used gloves). Therefore, it is of utmost importance to identify application errors, to educate patients in terms of skin protection and to motivate them to perform an appropriate skin protection behavior. With particular focus on protective gloves, this article gives an overview of various types, materials and potentially glove-related allergens, presents strategies for reducing occlusion effects and discusses some typical application errors and solutions.

  5. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  6. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  7. A 600-µW ultra-low-power associative processor for image pattern recognition employing magnetic tunnel junction-based nonvolatile memories with autonomic intelligent power-gating scheme

    Science.gov (United States)

    Ma, Yitao; Miura, Sadahiko; Honjo, Hiroaki; Ikeda, Shoji; Hanyu, Takahiro; Ohno, Hideo; Endoh, Tetsuo

    2016-04-01

    A novel associative processor using magnetic tunnel junction (MTJ)-based nonvolatile memories has been proposed and fabricated under a 90 nm CMOS/70 nm perpendicular-MTJ (p-MTJ) hybrid process for achieving the exceptionally low-power performance of image pattern recognition. A four-transistor 2-MTJ (4T-2MTJ) spin transfer torque magnetoresistive random access memory was adopted to completely eliminate the standby power. A self-directed intelligent power-gating (IPG) scheme specialized for this associative processor is employed to optimize the operation power by only autonomously activating currently accessed memory cells. The operations of a prototype chip at 20 MHz are demonstrated by measurement. The proposed processor can successfully carry out single texture pattern matching within 6.5 µs using 128-dimension bag-of-feature patterns, and the measured average operation power of the entire processor core is only 600 µW. Compared with the twin chip designed with 6T static random access memory, 91.2% power reductions are achieved. More than 88.0% power reductions are obtained compared with the latest associative memories. The further power performance analysis is discussed in detail, which verifies the special superiority of the proposed processor in power consumption for large-capacity memory-based VLSI systems.

  8. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  9. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  10. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  11. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  12. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  13. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  14. Calculating the binding free energies of charged species based on explicit-solvent simulations employing lattice-sum methods: an accurate correction scheme for electrostatic finite-size effects.

    Science.gov (United States)

    Rocklin, Gabriel J; Mobley, David L; Dill, Ken A; Hünenberger, Philippe H

    2013-11-14

    The calculation of a protein-ligand binding free energy based on molecular dynamics (MD) simulations generally relies on a thermodynamic cycle in which the ligand is alchemically inserted into the system, both in the solvated protein and free in solution. The corresponding ligand-insertion free energies are typically calculated in nanoscale computational boxes simulated under periodic boundary conditions and considering electrostatic interactions defined by a periodic lattice-sum. This is distinct from the ideal bulk situation of a system of macroscopic size simulated under non-periodic boundary conditions with Coulombic electrostatic interactions. This discrepancy results in finite-size effects, which affect primarily the charging component of the insertion free energy, are dependent on the box size, and can be large when the ligand bears a net charge, especially if the protein is charged as well. This article investigates finite-size effects on calculated charging free energies using as a test case the binding of the ligand 2-amino-5-methylthiazole (net charge +1 e) to a mutant form of yeast cytochrome c peroxidase in water. Considering different charge isoforms of the protein (net charges -5, 0, +3, or +9 e), either in the absence or the presence of neutralizing counter-ions, and sizes of the cubic computational box (edges ranging from 7.42 to 11.02 nm), the potentially large magnitude of finite-size effects on the raw charging free energies (up to 17.1 kJ mol(-1)) is demonstrated. Two correction schemes are then proposed to eliminate these effects, a numerical and an analytical one. Both schemes are based on a continuum-electrostatics analysis and require performing Poisson-Boltzmann (PB) calculations on the protein-ligand system. While the numerical scheme requires PB calculations under both non-periodic and periodic boundary conditions, the latter at the box size considered in the MD simulations, the analytical scheme only requires three non-periodic PB

  15. Calculating the binding free energies of charged species based on explicit-solvent simulations employing lattice-sum methods: An accurate correction scheme for electrostatic finite-size effects

    Energy Technology Data Exchange (ETDEWEB)

    Rocklin, Gabriel J. [Department of Pharmaceutical Chemistry, University of California San Francisco, 1700 4th St., San Francisco, California 94143-2550, USA and Biophysics Graduate Program, University of California San Francisco, 1700 4th St., San Francisco, California 94143-2550 (United States); Mobley, David L. [Departments of Pharmaceutical Sciences and Chemistry, University of California Irvine, 147 Bison Modular, Building 515, Irvine, California 92697-0001, USA and Department of Chemistry, University of New Orleans, 2000 Lakeshore Drive, New Orleans, Louisiana 70148 (United States); Dill, Ken A. [Laufer Center for Physical and Quantitative Biology, 5252 Stony Brook University, Stony Brook, New York 11794-0001 (United States); Hünenberger, Philippe H., E-mail: phil@igc.phys.chem.ethz.ch [Laboratory of Physical Chemistry, Swiss Federal Institute of Technology, ETH, 8093 Zürich (Switzerland)

    2013-11-14

    The calculation of a protein-ligand binding free energy based on molecular dynamics (MD) simulations generally relies on a thermodynamic cycle in which the ligand is alchemically inserted into the system, both in the solvated protein and free in solution. The corresponding ligand-insertion free energies are typically calculated in nanoscale computational boxes simulated under periodic boundary conditions and considering electrostatic interactions defined by a periodic lattice-sum. This is distinct from the ideal bulk situation of a system of macroscopic size simulated under non-periodic boundary conditions with Coulombic electrostatic interactions. This discrepancy results in finite-size effects, which affect primarily the charging component of the insertion free energy, are dependent on the box size, and can be large when the ligand bears a net charge, especially if the protein is charged as well. This article investigates finite-size effects on calculated charging free energies using as a test case the binding of the ligand 2-amino-5-methylthiazole (net charge +1 e) to a mutant form of yeast cytochrome c peroxidase in water. Considering different charge isoforms of the protein (net charges −5, 0, +3, or +9 e), either in the absence or the presence of neutralizing counter-ions, and sizes of the cubic computational box (edges ranging from 7.42 to 11.02 nm), the potentially large magnitude of finite-size effects on the raw charging free energies (up to 17.1 kJ mol{sup −1}) is demonstrated. Two correction schemes are then proposed to eliminate these effects, a numerical and an analytical one. Both schemes are based on a continuum-electrostatics analysis and require performing Poisson-Boltzmann (PB) calculations on the protein-ligand system. While the numerical scheme requires PB calculations under both non-periodic and periodic boundary conditions, the latter at the box size considered in the MD simulations, the analytical scheme only requires three non

  16. Calculating the binding free energies of charged species based on explicit-solvent simulations employing lattice-sum methods: An accurate correction scheme for electrostatic finite-size effects

    Science.gov (United States)

    Rocklin, Gabriel J.; Mobley, David L.; Dill, Ken A.; Hünenberger, Philippe H.

    2013-11-01

    The calculation of a protein-ligand binding free energy based on molecular dynamics (MD) simulations generally relies on a thermodynamic cycle in which the ligand is alchemically inserted into the system, both in the solvated protein and free in solution. The corresponding ligand-insertion free energies are typically calculated in nanoscale computational boxes simulated under periodic boundary conditions and considering electrostatic interactions defined by a periodic lattice-sum. This is distinct from the ideal bulk situation of a system of macroscopic size simulated under non-periodic boundary conditions with Coulombic electrostatic interactions. This discrepancy results in finite-size effects, which affect primarily the charging component of the insertion free energy, are dependent on the box size, and can be large when the ligand bears a net charge, especially if the protein is charged as well. This article investigates finite-size effects on calculated charging free energies using as a test case the binding of the ligand 2-amino-5-methylthiazole (net charge +1 e) to a mutant form of yeast cytochrome c peroxidase in water. Considering different charge isoforms of the protein (net charges -5, 0, +3, or +9 e), either in the absence or the presence of neutralizing counter-ions, and sizes of the cubic computational box (edges ranging from 7.42 to 11.02 nm), the potentially large magnitude of finite-size effects on the raw charging free energies (up to 17.1 kJ mol-1) is demonstrated. Two correction schemes are then proposed to eliminate these effects, a numerical and an analytical one. Both schemes are based on a continuum-electrostatics analysis and require performing Poisson-Boltzmann (PB) calculations on the protein-ligand system. While the numerical scheme requires PB calculations under both non-periodic and periodic boundary conditions, the latter at the box size considered in the MD simulations, the analytical scheme only requires three non-periodic PB

  17. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  18. Employer Branding

    OpenAIRE

    Stroblová, Zuzana

    2017-01-01

    The aim of the Master Thesis is to describe how to build Employer Brand a company. It is based on the description of Employer Branding project of a particular company and the evaluation its process. The thesis is a case study and consists of theoretical and practical part. The theoretical part focuses on trends and changes in leadership approach, definition of Employer Branding and HR Marketing. The practical part deals with the brand building process itself, describes the outputs of the proj...

  19. Employer branding

    OpenAIRE

    Mičková, Kateřina

    2008-01-01

    The demand for qualified employees is higher then the offering, both in Czech republic and internationally. Demand for specific skills, in addition to a greater demand for workforce generally, is making employee recruitment and retention much more difficult and expensive. Employer Branding claims to be an answer to this new challenge. This international concept focuses on developing an "employer brand" - mental image of a company as an employer. To achieve this, it is necessary to demonstrate...

  20. Employer Toolkit.

    Science.gov (United States)

    Thuli, Kelli J.; Hong, Esther

    This document consists of two guides intended for either employers or service providers involved in school to work partnerships for students with disabilities. "Tools for Service Providers" is intended to be used for training local-level providers who are developing school to work linkages with employers. Following an introduction, this…

  1. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  2. VIA Employability

    DEFF Research Database (Denmark)

    Andersen, Henrik Mariendal

    2017-01-01

    ’s realized at the entrance to the labor market and in the future career. The purpose is to find opportunities to improve employability-developing activities and to adapt it to specific needs from the students. Based on a number of qualitative interviews and personality tests of the graduates, an increased......The fact that students develop employability during their education is a key point for educational institutions and the focus on this issue has never been greater. This project looks into personal experience from VIA-graduates of "developing their employability" during the education and how it...

  3. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  4. Employment protection

    OpenAIRE

    Stefano Scarpetta

    2014-01-01

    Laws on hiring and firing are intended to protect workers from unfair behavior by employers, to counter imperfections in financial markets that limit workers’ ability to insure themselves against job loss, and to preserve firm-specific human capital. But by imposing costs on firms’ adaptation to changes in demand and technology, employment protection legislation may reduce not only job destruction but also job creation, hindering the efficient allocation of labor and productivity growth....

  5. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  6. Employer Branding

    DEFF Research Database (Denmark)

    Frimann, Søren; Mønsted, Bolette Rye

    2012-01-01

    Employer branding er både for den private og den offentlige sektor blevet en måde, de kan imødekomme ændrede arbejdsmarkedsvilkår og organisatoriske udfordringer i en postmoderne og globaliseret verden. Den aktuelle finanskrise har skabt nye udfordringer for organisationer i deres bestræbelser på...... at tiltrække- og fastholde attraktive medarbejdere. Men hvilken betydning har det, når Grundfos siger ”Mennesket er i fokus”, og hvad siger ”mangfoldighed” om Københavns Kommune som arbejdsplads i relation til employer branding? Er der egentlig sammenhæng mellem tankerne bag employer branding og de eksternt...... kommunikerede employer brandprodukter. Eller bliver det unikke ved arbejdspladserne ersattet af buzzwords uden substans og inddragelse af ansatte og interessenter? Artiklen har til formål at vurdere disse spørgsmål på baggrund af analyser af to cases med employer branding....

  7. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  8. Student employment

    DEFF Research Database (Denmark)

    Jacob, Marita; Gerth, Maria; Weiss, Felix

    2018-01-01

    , according to social origins, in student employment from first-year students through graduating students. We show that inequality in job quality exists and is partly attributable to the need for students from lower social origins to work to finance their studies. We hypothesise that initial inequalities......In this article, we examine social origin differences in employment patterns across different stages of higher education and compare these differences between vocational and academic fields of study. Using data from a large-scale German student survey, we study the development of inequality...

  9. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  10. The effect of performance related pay in employment services

    DEFF Research Database (Denmark)

    Sofie Johansen, Ann; Holm, Anders; Rosdahl, Anders

    This paper investigates the effects of performance-related pay (PRP) in Danish local employment administration on unemployed social clients’ employment outcomes. PRP implies here that employees in the employment administration are rewarded each time a social client gets a job. There are different...... schemes involved in the programme – schemes with collective payoffs and schemes with private payoffs and schemes with monetary payoffs and non-monetary payoffs, such as training activities. The main conclusion is that PRP seems to promote employment chances of social clients. Especially it seems that PRP...

  11. Northern employment

    International Nuclear Information System (INIS)

    Zavitz, J.

    1997-01-01

    Hiring practices and policies and employment opportunities that were available in the Beaufort Sea and MacKenzie Delta project for local residents and for people from southern Canada were dealt with in this chapter. Depending on the source, Northern hiring was a mere token, or a genuine and successful effort on the part of the companies to involve the native population and to share with them the benefits of the project. The fact remains that opening up job opportunities for Northerners was not easily attained, and would never have been realized without the involvement of government and community organizations. Government also played a major role in developing policies and training regimes. By the end of exploration operations, the hiring of Northern residents in the oil and gas industry had become a requirement of drilling applications. Training programs were also created to ensure that Northern residents received the means necessary to take advantage of Northern employment opportunities

  12. An argument and an outline for a new employment scheme

    DEFF Research Database (Denmark)

    Hansen, Henning; Lind, Jens; Møller, Iver Hornemann

    2017-01-01

    Liberalism is celebrating triumphs in these years. As faith in the welfare state and Keynesianism began to crack in the 1970s, capitalist principles were revitalised and the old virtues and dogmas were found and dusted. Now all that restrained the free competition in the market were considered a ...

  13. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  14. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  15. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  16. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  17. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  18. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  19. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  20. Hybrid Modulation Scheme for Cascaded H-Bridge Inverter Cells ...

    African Journals Online (AJOL)

    This work proposes a switching technique for cascaded H-Bridge (CHB) cells. Single carrier Sinusoidal PWM (SCSPWM) scheme is employed in the generation of the gating signals. A sequential switching and base PWM circulation schemes are presented for this fundamental cascaded multilevel inverter topology.

  1. Evaluation of the Danish Leave Schemes. Summary of a Report.

    Science.gov (United States)

    Andersen, Dines; Appeldorn, Alice; Weise, Hanne

    An evaluation examined how the Danish leave schemes, an offer to employed and unemployed persons who qualify for unemployment benefits, were functioning and to what extent the objectives have been achieved. It was found that 60 percent of those taking leave had previously been unemployed; women accounted for two-thirds of those joining the scheme;…

  2. Employer-sponsored pension plans

    Directory of Open Access Journals (Sweden)

    Rakonjac-Antić Tatjana N.

    2004-01-01

    Full Text Available Apart from pension plans within social insurance, in developed pension systems there are also available to individuals schemes which may to a large extent ensure a significant part of their total pension. Among them are the following: employer-sponsored pension plans or individual pension plans. The most widely used employer-sponsored pension plan in the USA is 401(k, in which both the employer and the employee contribute to the financing of the pension. These contributions as well as the return to their investment have a preferential tax treatment, i.e. do not enter a tax base. The funds are taxed only when drawn from the account in the form of a pension. This paper aims to present the functioning of 401(k pension plan as the most widely used employer sponsored pension plan in the USA, which is likely, in a modified form, to have an important place within our future reformed pension insurance system.

  3. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  4. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  5. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  6. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  7. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  8. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  9. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  10. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  11. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  12. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  13. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  14. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  15. Evaluating Employability Skills: Employer and Student Perceptions

    Science.gov (United States)

    Saunders, Venetia; Zuzel, Katherine

    2010-01-01

    Graduate employability is a key issue for Higher Education. In this two-part study student employability skills have been evaluated from the perspective of sandwich students and graduates in biomolecular science, and their employers. A strong correlation was found between employer and sandwich student/graduate perceptions of the relative…

  16. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  17. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  18. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  19. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  20. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  1. A novel modulation scheme for noise reduction in analog fiber optic links

    NARCIS (Netherlands)

    Marpaung, D.A.I.; Roeloffzen, C.G.H.; van Etten, Wim

    2006-01-01

    A novel noise reduction scheme called Balanced Modulation and Detection (BMD) is proposed. In this scheme, the modulating RF signal is half-wave rectified in the optical domain, eliminating the DC optical power resulting from pre-biasing of the optical source. A link model employing this scheme has

  2. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  3. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  4. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  5. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  6. Employment specialist competencies for supported employment programs

    NARCIS (Netherlands)

    Corbière, M.; Brouwers, E.P.M.; Lanctôt, N.; van Weeghel, J.

    2014-01-01

    Purpose Supported employment (SE) programs are evidence-based programs offered to people with severe mental illness to facilitate obtaining and keeping competitive work. However, significant variations in individuals’ vocational success may be partly explained by differences in their employment

  7. Forcing scheme in pseudopotential lattice Boltzmann model for multiphase flows.

    Science.gov (United States)

    Li, Q; Luo, K H; Li, X J

    2012-07-01

    The pseudopotential lattice Boltzmann (LB) model is a widely used multiphase model in the LB community. In this model, an interaction force, which is usually implemented via a forcing scheme, is employed to mimic the molecular interactions that cause phase segregation. The forcing scheme is therefore expected to play an important role in the pseudoepotential LB model. In this paper, we aim to address some key issues about forcing schemes in the pseudopotential LB model. First, theoretical and numerical analyses will be made for Shan-Chen's forcing scheme [Shan and Chen, Phys. Rev. E 47, 1815 (1993)] and the exact-difference-method forcing scheme [Kupershtokh et al., Comput. Math. Appl. 58, 965 (2009)]. The nature of these two schemes and their recovered macroscopic equations will be shown. Second, through a theoretical analysis, we will reveal the physics behind the phenomenon that different forcing schemes exhibit different performances in the pseudopotential LB model. Moreover, based on the analysis, we will present an improved forcing scheme and numerically demonstrate that the improved scheme can be treated as an alternative approach to achieving thermodynamic consistency in the pseudopotential LB model.

  8. Linear source approximation scheme for method of characteristics

    International Nuclear Information System (INIS)

    Tang Chuntao

    2011-01-01

    Method of characteristics (MOC) for solving neutron transport equation based on unstructured mesh has already become one of the fundamental methods for lattice calculation of nuclear design code system. However, most of MOC codes are developed with flat source approximation called step characteristics (SC) scheme, which is another basic assumption for MOC. A linear source (LS) characteristics scheme and its corresponding modification for negative source distribution were proposed. The OECD/NEA C5G7-MOX 2D benchmark and a self-defined BWR mini-core problem were employed to validate the new LS module of PEACH code. Numerical results indicate that the proposed LS scheme employs less memory and computational time compared with SC scheme at the same accuracy. (authors)

  9. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  10. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  11. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  12. A beacon interval shifting scheme for interference mitigation in body area networks.

    Science.gov (United States)

    Kim, Seungku; Kim, Seokhwan; Kim, Jin-Woo; Eom, Doo-Seop

    2012-01-01

    This paper investigates the issue of interference avoidance in body area networks (BANs). IEEE 802.15 Task Group 6 presented several schemes to reduce such interference, but these schemes are still not proper solutions for BANs. We present a novel distributed TDMA-based beacon interval shifting scheme that reduces interference in the BANs. A design goal of the scheme is to avoid the wakeup period of each BAN coinciding with other networks by employing carrier sensing before a beacon transmission. We analyze the beacon interval shifting scheme and investigate the proper back-off length when the channel is busy. We compare the performance of the proposed scheme with the schemes presented in IEEE 802.15 Task Group 6 using an OMNeT++ simulation. The simulation results show that the proposed scheme has a lower packet loss, energy consumption, and delivery-latency than the schemes of IEEE 802.15 Task Group 6.

  13. Employer Contribution and Premium Growth in Health Insurance

    OpenAIRE

    Yiyan Liu; Ginger Zhe Jin

    2013-01-01

    We study whether employer premium contribution schemes could impact the pricing behavior of health plans and contribute to rising premiums. Using 1991-2011 data before and after a 1999 premium subsidy policy change in the Federal Employees Health Benefits Program (FEHBP), we find that the employer premium contribution scheme has a differential impact on health plan pricing based on two market incentives: 1) consumers are less price sensitive when they only need to pay part of the premium incr...

  14. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  15. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  16. Employer's Manual on Affirmative Action in Employment.

    Science.gov (United States)

    Kentucky State Commission on Human Rights, Frankfort.

    The express purpose of this manual is for its use by business and industry in Kentucky as an aid to eliminate discrimination. Affirmative action is defined here as a comprehensive effort by an employer designed to: employ women and minority persons where they are under-utilized; include minority persons and women in all facets of the company's…

  17. Employing Discourse: Universities and Graduate "Employability"

    Science.gov (United States)

    Boden, Rebecca; Nedeva, Maria

    2010-01-01

    What constitutes graduate employability is discursively framed. In this paper we argue that whilst universities in the UK have long had an involvement in producing useful and productive citizens, the ongoing neoliberalisation of higher education has engendered a discursive shift in definitions of employability. Traditionally, universities regarded…

  18. Becoming Self-Employed.

    Science.gov (United States)

    Lee, Grant; Cochran, Larry

    1997-01-01

    Explored how persons become self-employed. In critical incident interviews with five self-employed persons the critical events that assisted or hindered progress toward self-employment were listed in chronological order. In general, becoming self-employed involved establishing conditions of action that enhanced a sense of agency, thus enabling…

  19. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  20. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  1. Schemes for Probabilistic Teleportation of an Unknown Three-Particle Three-Level Entangled State

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, two schemes for teleporting an unknown three-particle three-level entangled state are proposed. In the first scheme, two partial three-particle three-level entangled states are used as the quantum channels, while in the second scheme, three two-particle three-level non-maximally entangled states are employed as quantum channels.It is shown that the teleportation can be successfully realized with certain probability, for both two schemes, if a receiver adopts some appropriate unitary transformations. It is shown also that the successful probabilities of these two schemes are different.

  2. Progress with multigrid schemes for hypersonic flow problems

    International Nuclear Information System (INIS)

    Radespiel, R.; Swanson, R.C.

    1995-01-01

    Several multigrid schemes are considered for the numerical computation of viscous hypersonic flows. For each scheme, the basic solution algorithm employs upwind spatial discretization with explicit multistage time stepping. Two-level versions of the various multigrid algorithms are applied to the two-dimensional advection equation, and Fourier analysis is used to determine their damping properties. The capabilities of the multigrid methods are assessed by solving three different hypersonic flow problems. Some new multigrid schemes based on semicoarsening strategies are shown to be quite effective in relieving the stiffness caused by the high-aspect-ratio cells required to resolve high Reynolds number flows. These schemes exhibit good convergence rates for Reynolds numbers up to 200 X 10 6 and Mach numbers up to 25. 32 refs., 31 figs., 1 tab

  3. A New Graph Drawing Scheme for Social Network

    Directory of Open Access Journals (Sweden)

    Eric Ke Wang

    2014-01-01

    visualization is employed to extract the potential information from the large scale of social network data and present the information briefly as visualized graphs. In the process of information visualization, graph drawing is a crucial part. In this paper, we study the graph layout algorithms and propose a new graph drawing scheme combining multilevel and single-level drawing approaches, including the graph division method based on communities and refining approach based on partitioning strategy. Besides, we compare the effectiveness of our scheme and FM3 in experiments. The experiment results show that our scheme can achieve a clearer diagram and effectively extract the community structure of the social network to be applied to drawing schemes.

  4. Investigation on the MOC with a linear source approximation scheme in three-dimensional assembly

    International Nuclear Information System (INIS)

    Zhu, Chenglin; Cao, Xinrong

    2014-01-01

    Method of characteristics (MOC) for solving neutron transport equation has already become one of the fundamental methods for lattice calculation of nuclear design code system. At present, MOC has three schemes to deal with the neutron source of the transport equation: the flat source approximation of the step characteristics (SC) scheme, the diamond difference (DD) scheme and the linear source (LS) characteristics scheme. The MOC for SC scheme and DD scheme need large storage space and long computing time when they are used to calculate large-scale three-dimensional neutron transport problems. In this paper, a LS scheme and its correction for negative source distribution were developed and added to DRAGON code. This new scheme was compared with the SC scheme and DD scheme which had been applied in this code. As an open source code, DRAGON could solve three-dimensional assembly with MOC method. Detailed calculation is conducted on two-dimensional VVER-1000 assembly under three schemes of MOC. The numerical results indicate that coarse mesh could be used in the LS scheme with the same accuracy. And the LS scheme applied in DRAGON is effective and expected results are achieved. Then three-dimensional cell problem and VVER-1000 assembly are calculated with LS scheme and SC scheme. The results show that less memory and shorter computational time are employed in LS scheme compared with SC scheme. It is concluded that by using LS scheme, DRAGON is able to calculate large-scale three-dimensional problems with less storage space and shorter computing time

  5. Student and Staff Perceptions of a Vacation Research Assistantship Scheme

    Science.gov (United States)

    Penn, Felicity; Stephens, Danielle; Morgan, Jessica; Upton, Penney; Upton, Dominic

    2013-01-01

    There is a push for universities to equip graduates with desirable employability skills and "hands-on" experience. This article explores the perceptions of students and staff experiences of a research assistantship scheme. Nine students from the University of Worcester were given the opportunity to work as a student vacation researcher…

  6. Exploring fraud and abuse in National Health Insurance Scheme ...

    African Journals Online (AJOL)

    This study explored patterns of fraud and abuse that exist in the National Health Insurance Scheme (NHIS) claims in the Awutu-Effutu-Senya District using data mining techniques, with a specific focus on malaria-related claims. The study employed quantitative research approach with survey design as a strategy of enquiry.

  7. Employing helicity amplitudes for resummation

    International Nuclear Information System (INIS)

    Moult, Ian; Stewart, Iain W.; Tackmann, Frank J.; Waalewijn, Wouter J.; Amsterdam Univ.

    2015-08-01

    Many state-of-the-art QCD calculations for multileg processes use helicity amplitudes as their fundamental ingredients. We construct a simple and easy-to-use helicity operator basis in soft-collinear effective theory (SCET), for which the hard Wilson coefficients from matching QCD onto SCET are directly given in terms of color-ordered helicity amplitudes. Using this basis allows one to seamlessly combine fixed-order helicity amplitudes at any order they are known with a resummation of higher-order logarithmic corrections. In particular, the virtual loop amplitudes can be employed in factorization theorems to make predictions for exclusive jet cross sections without the use of numerical subtraction schemes to handle real-virtual infrared cancellations. We also discuss matching onto SCET in renormalization schemes with helicities in 4- and d-dimensions. To demonstrate that our helicity operator basis is easy to use, we provide an explicit construction of the operator basis, as well as results for the hard matching coefficients, for pp → H+0,1,2 jets, pp → W/Z/γ+0,1,2 jets, and pp → 2,3 jets. These operator bases are completely crossing symmetric, so the results can easily be applied to processes with e + e - and e - p collisions.

  8. Structural and parameteric uncertainty quantification in cloud microphysics parameterization schemes

    Science.gov (United States)

    van Lier-Walqui, M.; Morrison, H.; Kumjian, M. R.; Prat, O. P.; Martinkus, C.

    2017-12-01

    Atmospheric model parameterization schemes employ approximations to represent the effects of unresolved processes. These approximations are a source of error in forecasts, caused in part by considerable uncertainty about the optimal value of parameters within each scheme -- parameteric uncertainty. Furthermore, there is uncertainty regarding the best choice of the overarching structure of the parameterization scheme -- structrual uncertainty. Parameter estimation can constrain the first, but may struggle with the second because structural choices are typically discrete. We address this problem in the context of cloud microphysics parameterization schemes by creating a flexible framework wherein structural and parametric uncertainties can be simultaneously constrained. Our scheme makes no assuptions about drop size distribution shape or the functional form of parametrized process rate terms. Instead, these uncertainties are constrained by observations using a Markov Chain Monte Carlo sampler within a Bayesian inference framework. Our scheme, the Bayesian Observationally-constrained Statistical-physical Scheme (BOSS), has flexibility to predict various sets of prognostic drop size distribution moments as well as varying complexity of process rate formulations. We compare idealized probabilistic forecasts from versions of BOSS with varying levels of structural complexity. This work has applications in ensemble forecasts with model physics uncertainty, data assimilation, and cloud microphysics process studies.

  9. The Employer Perspective on Sustainable Employability in the Construction Industry

    NARCIS (Netherlands)

    Tonnon, Susanne C; van der Veen, Rozan; Westerman, Marjan J; Robroek, Suzan J W; van der Ploeg, Hidde P; Van Der Beek, Allard J.; Proper, Karin I.

    OBJECTIVE: To determine the measures employers in the construction industry take to promote sustainable employability, the barriers and facilitators that influence implementation and employer needs. METHODS: Questionnaire among 499 employers and interviews with 17 employers. RESULTS: Employers

  10. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  11. Perspectives of employability skills

    OpenAIRE

    ANNE LOUISE NEWTON

    2017-01-01

    The study investigated the different perspectives held by young people, employers and policy makers around Employability Skills and it examined how young people learnt these skills. This study draws young peoples’ perspectives into the research around Employability Skills and highlights the way in which social and cultural capital mediate their development. The research points to a model to re-vision employability skills which recognises the many ways in which they are learnt, over time a...

  12. Youth employment in Egypt

    OpenAIRE

    Eekelen, Willem van; De Luca, Loretta; Ismail, Magwa

    2001-01-01

    Examines economic and social factors affecting youth employment in Egypt and describes three national programmes for the promotion of youth employment based on human resources development, direct job creation and support in self-employment and enterprise creation. Describes one public-private project in each case.

  13. Employment in Agribusiness.

    Science.gov (United States)

    Hilgenberg, Gene; Huston, Jane

    This curriculum guide is intended to assist persons teaching a course in employment in agribusiness. Addressed in the individual units of instruction are the following topics: employment information (training plans/agreements and wages, taxes, and fringe benefits); human relations (employer/employee/customer relations and communication skills);…

  14. Social innovation in employment

    NARCIS (Netherlands)

    Oeij, P.R.A.; Torre, W. van der; Santoclides, M.E

    2017-01-01

    This policy brief on Social Innovation of Employment informs on an inventory of challenges and policy recommendations based on the Case Study Report of Employment and on the Second Policy Foresight Workshop of Employment. A ‘paradigm shift’ is needed in the mind-set of policymakers. ‘Traditional’

  15. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  16. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  17. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  18. Employers Roundtable: Employer Supported Child Care.

    Science.gov (United States)

    Delaware Valley Child Care Council, Philadelphia, PA.

    This booklet outlines a number of options available to employers to enable them to better cope with child care issues that they and their employees face. Major options include: (1) flexible work policies, such as flexible scheduling, alternate work places, shorter work weeks, and the consolidating of sick leave, holidays, and vacation time into…

  19. Simulating deep convection with a shallow convection scheme

    Directory of Open Access Journals (Sweden)

    C. Hohenegger

    2011-10-01

    Full Text Available Convective processes profoundly affect the global water and energy balance of our planet but remain a challenge for global climate modeling. Here we develop and investigate the suitability of a unified convection scheme, capable of handling both shallow and deep convection, to simulate cases of tropical oceanic convection, mid-latitude continental convection, and maritime shallow convection. To that aim, we employ large-eddy simulations (LES as a benchmark to test and refine a unified convection scheme implemented in the Single-column Community Atmosphere Model (SCAM. Our approach is motivated by previous cloud-resolving modeling studies, which have documented the gradual transition between shallow and deep convection and its possible importance for the simulated precipitation diurnal cycle.

    Analysis of the LES reveals that differences between shallow and deep convection, regarding cloud-base properties as well as entrainment/detrainment rates, can be related to the evaporation of precipitation. Parameterizing such effects and accordingly modifying the University of Washington shallow convection scheme, it is found that the new unified scheme can represent both shallow and deep convection as well as tropical and mid-latitude continental convection. Compared to the default SCAM version, the new scheme especially improves relative humidity, cloud cover and mass flux profiles. The new unified scheme also removes the well-known too early onset and peak of convective precipitation over mid-latitude continental areas.

  20. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  1. PMD compensation in multilevel coded-modulation schemes with coherent detection using BLAST algorithm and iterative polarization cancellation.

    Science.gov (United States)

    Djordjevic, Ivan B; Xu, Lei; Wang, Ting

    2008-09-15

    We present two PMD compensation schemes suitable for use in multilevel (M>or=2) block-coded modulation schemes with coherent detection. The first scheme is based on a BLAST-type polarization-interference cancellation scheme, and the second scheme is based on iterative polarization cancellation. Both schemes use the LDPC codes as channel codes. The proposed PMD compensations schemes are evaluated by employing coded-OFDM and coherent detection. When used in combination with girth-10 LDPC codes those schemes outperform polarization-time coding based OFDM by 1 dB at BER of 10(-9), and provide two times higher spectral efficiency. The proposed schemes perform comparable and are able to compensate even 1200 ps of differential group delay with negligible penalty.

  2. Information Literacy and Employability

    OpenAIRE

    O'Keeffe, Colin

    2016-01-01

    Information Literacy (IL) and its relationship to third level graduates’ employability has gained more attention in recent years. This article examines how IL has evolved from skills initially associated with academic libraries into a key workplace skill set of the knowledge economy. It outlines the challenges interviewees encounter when selling IL to employers, how IL can be utilised when preparing for upcoming interviews and suggests a distinction between workplace IL and employability IL. ...

  3. General Outside Employment

    Data.gov (United States)

    Montgomery County of Maryland — This dataset contains all outside employment requests held by employees of Montgomery County (excluding uniformed police officer) approved by the Ethics Commission...

  4. Secretary Marshall's Employment Strategies

    Science.gov (United States)

    Stevenson, Gloria

    1977-01-01

    A review of proposed employment strategies and priorities of Ray Marshall, Secretary of Labor, with regard to training programs, governmental subsidy programs, apprenticeships, private sector jobs, etc. (WL)

  5. Institutionalized Employer Collective Action

    DEFF Research Database (Denmark)

    Ibsen, Christian Lyhne; Navrbjerg, Steen Erik

    2016-01-01

    Recent studies show that employer associations continue to exist in new ways despite internationalisation of the economy, liberalisation of markets and the decline of trade unions. This paradox raises two questions regarding EOs in today’s labour markets: Which employers join employer associations...... and what kind of services do EOs offer employers? This article explores these questions using two comprehensive surveys on EOs in Denmark – a prominent case of coordinated market economies. The main finding of the analyses is that collective activities vis-à-vis trade unions and government are still...

  6. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  7. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  8. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  9. The decay scheme of 229Ra

    International Nuclear Information System (INIS)

    Yang, W.F.; Yuan, S.G.; Fang, K.M.; Shen, S.F.; Mou, W.T.; Zhang, X.Q.; Li, Z.Q.

    1997-01-01

    By bombarding the natural thorium targets with 14 MeV neutrons, 229 Ra was produced through the reaction 232 Th(n,α) 229 Ra. The radium activities were separated from the irradiated targets by coprecipitation with the BaCl 2 . A total of 18 new weak γ rays with energies of 14.5, 15.6, 18.8, 21.8, 22.5, 44.0, 47.5, 55.0, 63.0, 69.6, 93.6, 94.1, 98.5, 102.2, 104.5, 106.1, 161.1, and 171.5 keV which could be assigned to the decay of 229 Ra were observed in the isolated radium fractions employing high resolution HPGe detectors and γ(X)-γ coincidence methods. A decay scheme of 229 Ra based on these observations is proposed. (orig.). With 2 figs

  10. Maine's Employability Skills Program

    Science.gov (United States)

    McMahon, John M.; Wolffe, Karen E.; Wolfe, Judy; Brooker, Carrie

    2013-01-01

    This Practice Report describes the development and implementation of the "Maine Employability Skills Program," a model employment program developed by the Maine Division for the Blind and Visually Impaired (DBVI). The program was designed to support the efforts of the chronically unemployed or underemployed. These consumers were either…

  11. Maternal Employment: 1979.

    Science.gov (United States)

    Hoffman, Lois Wladis

    1979-01-01

    Maternal employment is a part of modern family life, a response to changes such as smaller families and more efficient household management. Not only does maternal employment meet parents' needs, but it is a pattern better suited for socializing the child for the adult role s/he will occupy. (Author/GC)

  12. Dimensions of Adolescent Employment.

    Science.gov (United States)

    Mael, Fred A.; Morath, Ray A.; McLellan, Jeffrey A.

    1997-01-01

    Examines positive and negative correlates of adolescent work as a function of work dimensions. Results indicate that concurrent costs and benefits of adolescent employment may depend on dimensions of work as well as adolescent characteristics. Adolescent employment was generally related to subsequent work motivation and nonacademic performance.…

  13. Does Supported Employment Work?

    Science.gov (United States)

    Morgan McInnes, Melayne; Ozturk, Orgul Demet; McDermott, Suzanne; Mann, Joshua R.

    2010-01-01

    Providing employment-related services, including supported employment through job coaches, has been a priority in federal policy since the enactment of the Developmental Disabilities Assistance and Bill of Rights Act in 1984. We take advantage of a unique panel data set of all clients served by the South Carolina Department of Disabilities and…

  14. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  15. Impact of mothers' employment on infant feeding and care: a qualitative study of the experiences of mothers employed through the Mahatma Gandhi National Rural Employment Guarantee Act.

    Science.gov (United States)

    Nair, Manisha; Ariana, Proochista; Webster, Premila

    2014-04-02

    To explore the experiences of mothers employed through the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) using focus group discussions (FGDs) to understand the impact of mothers' employment on infant feeding and care. The effects of mothers' employment on nutritional status of children could be variable. It could lead to increased household income, but could also compromise child care and feeding. The study was undertaken in the Dungarpur district of Rajasthan, India. Mothers of infants employment compromises infant feeding and care', 'caregivers' inability to substitute mothers' care', 'compromises related to childcare and feeding outweigh benefits from MGNREGA' and 'employment as disempowering'. Mothers felt that the comprises to infant care and feeding due to long hours of work, lack of alternative adequate care arrangements, low wages and delayed payments outweighed the benefits from the scheme. This study provides an account of the trade-off between mothers' employment and child care. It provides an understanding of the household power relationships, societal and cultural factors that modulate the effects of mothers' employment. From the perspective of mothers, it helps to understand the benefits and problems related to providing employment to women with infants in the MGNREGA scheme and make a case to pursue policy changes to improve their working conditions.

  16. Impact of mothers’ employment on infant feeding and care: a qualitative study of the experiences of mothers employed through the Mahatma Gandhi National Rural Employment Guarantee Act

    Science.gov (United States)

    Nair, Manisha; Ariana, Proochista; Webster, Premila

    2014-01-01

    Objective To explore the experiences of mothers employed through the Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA) using focus group discussions (FGDs) to understand the impact of mothers’ employment on infant feeding and care. The effects of mothers’ employment on nutritional status of children could be variable. It could lead to increased household income, but could also compromise child care and feeding. Setting The study was undertaken in the Dungarpur district of Rajasthan, India. Participants Mothers of infants employment compromises infant feeding and care’, ‘caregivers’ inability to substitute mothers’ care’, ‘compromises related to childcare and feeding outweigh benefits from MGNREGA’ and ‘employment as disempowering’. Mothers felt that the comprises to infant care and feeding due to long hours of work, lack of alternative adequate care arrangements, low wages and delayed payments outweighed the benefits from the scheme. Conclusions This study provides an account of the trade-off between mothers’ employment and child care. It provides an understanding of the household power relationships, societal and cultural factors that modulate the effects of mothers’ employment. From the perspective of mothers, it helps to understand the benefits and problems related to providing employment to women with infants in the MGNREGA scheme and make a case to pursue policy changes to improve their working conditions. PMID:24694624

  17. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  18. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  19. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  20. Development of Fault Detection and Diagnosis Schemes for Industrial Refrigeration Systems

    DEFF Research Database (Denmark)

    Thybo, C.; Izadi-Zamanabadi, Roozbeh

    2004-01-01

    The success of a fault detection and diagnosis (FDD) scheme depends not alone on developing an advanced detection scheme. To enable successful deployment in industrial applications, an economically optimal development of FDD schemes are required. This paper reviews and discusses the gained...... experiences achieved by employing a combination of various techniques, methods, and algorithms, which are proposed by academia, on an industrial application. The main focus is on sharing the "lessons learned" from developing and employing Faulttolerant functionalities to a controlled process in order to meet...... the industrial needs while satisfying economically motivated constraints....

  1. Self-adjusting entropy-stable scheme for compressible Euler equations

    Institute of Scientific and Technical Information of China (English)

    程晓晗; 聂玉峰; 封建湖; LuoXiao-Yu; 蔡力

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, based on entropy variables, is employed to make the numerical diffusion term added around discontinuities automatically. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy.

  2. Explicit solution of the time domain volume integral equation using a stable predictor-corrector scheme

    KAUST Repository

    Al Jarro, Ahmed; Salem, Mohamed; Bagci, Hakan; Benson, Trevor; Sewell, Phillip D.; Vuković, Ana

    2012-01-01

    An explicit marching-on-in-time (MOT) scheme for solving the time domain volume integral equation is presented. The proposed method achieves its stability by employing, at each time step, a corrector scheme, which updates/corrects fields computed by the explicit predictor scheme. The proposedmethod is computationally more efficient when compared to the existing filtering techniques used for the stabilization of explicit MOT schemes. Numerical results presented in this paper demonstrate that the proposed method maintains its stability even when applied to the analysis of electromagnetic wave interactions with electrically large structures meshed using approximately half a million discretization elements.

  3. Explicit solution of the time domain volume integral equation using a stable predictor-corrector scheme

    KAUST Repository

    Al Jarro, Ahmed

    2012-11-01

    An explicit marching-on-in-time (MOT) scheme for solving the time domain volume integral equation is presented. The proposed method achieves its stability by employing, at each time step, a corrector scheme, which updates/corrects fields computed by the explicit predictor scheme. The proposedmethod is computationally more efficient when compared to the existing filtering techniques used for the stabilization of explicit MOT schemes. Numerical results presented in this paper demonstrate that the proposed method maintains its stability even when applied to the analysis of electromagnetic wave interactions with electrically large structures meshed using approximately half a million discretization elements.

  4. Self-adjusting entropy-stable scheme for compressible Euler equations

    International Nuclear Information System (INIS)

    Cheng Xiao-Han; Nie Yu-Feng; Cai Li; Feng Jian-Hu; Luo Xiao-Yu

    2015-01-01

    In this work, a self-adjusting entropy-stable scheme is proposed for solving compressible Euler equations. The entropy-stable scheme is constructed by combining the entropy conservative flux with a suitable diffusion operator. The entropy has to be preserved in smooth solutions and be dissipated at shocks. To achieve this, a switch function, which is based on entropy variables, is employed to make the numerical diffusion term be automatically added around discontinuities. The resulting scheme is still entropy-stable. A number of numerical experiments illustrating the robustness and accuracy of the scheme are presented. From these numerical results, we observe a remarkable gain in accuracy. (paper)

  5. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  6. Remote automatic control scheme for plasma arc cutting of contaminated waste

    International Nuclear Information System (INIS)

    Dudar, A.M.; Ward, C.R.; Kriikku, E.M.

    1993-01-01

    The Robotics Development Group at the Savannah River Technology Center has developed and implemented a scheme to perform automatic cutting of metallic contaminated waste. The scheme employs a plasma arc cutter in conjunction with a laser ranging sensor attached to a robotic manipulator called the Telerobot. A software algorithm using proportional control is then used to perturb the robot's trajectory in such a way as to regulate the plasma arc standoff and the robot's speed in order to achieve automatic plasma arc cuts. The scheme has been successfully tested on simulated waste materials and the results have been very favorable. This report details the development and testing of the scheme

  7. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  8. Evaluating Labour Market Effects of Wage Subsidies for the Disabled – the Danish Flexjob Scheme

    DEFF Research Database (Denmark)

    Datta Gupta, Nabanita; Larsen, Mona

    We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving the employm......We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving...... the employment prospects of the long-term disabled with partial working capacity. We find a substantial, positive employment effect of the scheme in the 1994-2001 period within the target group compared to a control group of closely matched ineligibles, but no discernable effects on the probability of disability...... exit. For the target group employment probability is raised by 33 pct. points after the scheme is introduced relative to a mean employment rate at baseline of 44%. One explanation for a strong employment entry effect concomitant with a non-existent disability exit effect could be that subsidized jobs...

  9. Evaluating Labour Market Effects of Wage Subsidies for the Disabled -The Danish Flexjobs Scheme

    DEFF Research Database (Denmark)

    Datta Gupta, Nabanita; Larsen, Mona

    2010-01-01

    We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving the employm......We evaluate the employment and disability exit effects of a wage subsidy program for the disabled in a setting characterized by universal health insurance and little employment protection. We focus on the Danish Flexjob scheme that was introduced in 1998 and targeted towards improving...... the employment prospects of the long-term disabled with partial working capacity. We find a substantial, positive employment effect of the scheme in the 1994-2001 period within the target group compared to a control group of closely matched ineligibles, but no discernable effects on the probability of disability...... exit. For the target group employment probability is raised by 33 pct. points after the scheme is introduced relative to a mean employment rate at baseline of 44%. One explanation for a strong employment entry effect concomitant with a non-existent disability exit effect could be that subsidized jobs...

  10. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  11. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  12. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  13. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  14. Entrepreneurship and Employment Stability

    DEFF Research Database (Denmark)

    Failla, Virgilio; Melillo, Francesca; Reichstein, Toke

    2017-01-01

    This paper challenges the conventional belief that entrepreneurship is an unstable career path. Using longitudinal matched employer–employee data from Denmark, the analysis reveals that a transition to entrepreneurship decreases individual's employment turnover tendency. Three explanations...

  15. Veteran Services - Welcome Employers

    Science.gov (United States)

    Assistance Crosswalk websites Transition GPS National Career Readiness Certificate Post Traumatic Stress Credits (PDF) Fidelity Bonding Program National Career Readiness (PDF) Veteran Recruitment State/Federal veteran recruitment process Military Veteran Employment Guide Veterans Hiring Toolkit Other Information

  16. Employers meet employees

    OpenAIRE

    Scheuer, Christian

    2009-01-01

    "Leaping into the future of labor economics: the research potential of linking employer and employee data" is the title of a paper by Daniel S Hammermesh published in Labour Economics in 1999. I quote it here, since it captures much of my motivation for the work included in this thesis. Considering applied micro econometrics and labor economics my main elds of interest, the development of linked employer-employee data that took place in Denmark around the time of the new mille...

  17. Deficiency of employability capacity

    Directory of Open Access Journals (Sweden)

    Pelse I.

    2012-10-01

    Full Text Available Young unemployed people have comprised one of the significantly largest groups of the unemployed people in Latvia in recent years. One of the reasons why young people have difficulty integrating into the labour market is the “expectation gap” that exists in the relations between employers and the new generation of workers. Employers focus on capacity-building for employability such individual factors as strength, patience, self-discipline, self-reliance, self-motivation, etc., which having a nature of habit and are developed in a long-term work socialization process, which begins even before the formal education and will continue throughout the life cycle. However, when the socialization is lost, these habits are depreciated faster than they can be restored. Currently a new generation is entering the labour market, which is missing the succession of work socialization. Factors, such as rising unemployment and poverty in the background over the past twenty years in Latvia have created a very unfavourable employability background of “personal circumstances” and “external factors”, which seriously have impaired formation of the skills and attitudes in a real work environment. The study reveals another paradox – the paradox of poverty. Common sense would want to argue that poverty can be overcome by the job. However, the real state of affairs shows that unfavourable coincidence of the individual, personal circumstances and external factors leads to deficit of employability capacity and possibility of marked social and employment deprivation.

  18. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  19. Reducing Employment Insecurity

    Directory of Open Access Journals (Sweden)

    Florence Lebert

    2016-10-01

    Full Text Available The perception of job insecurity is known to be a stressful condition for employees. Less is known about employment insecurity and the ways employees and their families deal with it. This study investigates whether participation in further training is a strategy that employees adopt to reduce perceived employment insecurity. As participation in further training is often costly and time-consuming, we assume that the family context is of importance for the decision to take part in further training. To take account of possible self-selection, we apply a propensity score matching procedure on longitudinal data from the Swiss Household Panel (2004-2013. Three main findings can be emphasized: first, participation in further training is not a strategy adopted particularly by employees who perceive high employment insecurity as they are less likely to train than their secure counterparts. Second, even though further training is not a strategy that is actively adopted, employees who train subsequently report lower levels of perceived employment insecurity. Third, the family context indeed influences the likelihood to train: partnered employees are more likely to train and preschool-aged children act as a constraint on women’s but enhance men’s participation in further training. Yet, in the context of high perceived employment insecurity, children generally reduce their parents’ likelihood to train as the parents may turn to other strategies that reduce perceived employment insecurity.

  20. Employment protection and the consequences for displaced workers

    DEFF Research Database (Denmark)

    Albæk, Karsten; van Audenrode, Marc; Browning, Martin

    We compare the wage and employment consequences of a job displacement in Belgium and Denmark. These two countries both have generous unemployment insurance schemes but job protection laws vary dramatically between the two. Using comparable data we find that the incidence of displacement and the c...... and the consequences for wages are similar in the two countries. The consequences for employment are very different with Danish workers experiencing much less unemployment after a displacement...

  1. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  2. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  3. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  4. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  5. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  6. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  7. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  8. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  9. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  10. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  11. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  12. Implementing public employment policy

    DEFF Research Database (Denmark)

    Larsen, Flemming; Bredgaard, Thomas

    disciplining of the unemployed (work first) (cf.Bredgaard & Larsen, 2005; Sol & Westerweld, 2005). It is, however, remarkable that in the research field there seems to be a division of labour so that changes in public administration and changes in the substance of employment policies are dealt with separately......Like most other areas within welfare policy, the employment and social policy areas are undergoing far-reaching changes in many countries. Partly in the shape of new forms of governance inspired by New Public Management (NPM), partly through new policies oriented towards activation and stronger....... But there is an interesting question to investigate here: whether and if so how, NPM-inspired reforms are related to changes in employment policy towards a work-first approach? Are changes in public management systems created as deliberate policy changes, or do they bring about more indirect and unintended policy changes...

  13. Employment certificates on HRT

    CERN Multimedia

    HR Department

    2008-01-01

    As part of the ongoing drive to simplify and streamline administrative procedures and processes, the IT and HR Departments have made employment certificates available on a self-service basis on the HRT application, in the main menu under "My self services". All members of the personnel can thus obtain a certificate of employment or association, in French or in English, for the present or past contractual period. The HR Department’s Records Office remains responsible for issuing any special certificates that might be required. IT-AIS (Administrative Information Services) HR-SPS (Services, Procedures & Social) Records Office – Tel. 73700

  14. Radiation protection - the employer

    International Nuclear Information System (INIS)

    Goldfinch, E.

    1983-01-01

    A brief report is given of a paper presented at the symposium on 'Radiation and the Worker - where do we go from here' in London 1983. The paper concerned the employers' viewpoint on the draft of the proposed Ionising Radiations Regulations in the Health and Safety Commission Consultative Document. It was concluded that there was already a very good standard of radiological protection in the UK and that any improvements could therefore only be fringe improvements, although the cost to the employer of introducing and implementing the new proposed Regulations was bound to be high. (U.K.)

  15. Disability Employment 101

    Science.gov (United States)

    US Department of Education, 2007

    2007-01-01

    Business is about productivity and maintaining a competitive advantage. To do this, business needs qualified workers. Hiring people with disabilities adds value to a business and will attract new customers. Disability is not inability. Employers can make sound business decisions and gain a competitive advantage by using this guide to increase the…

  16. Discrimination in Employment

    Science.gov (United States)

    Abzug, Bella

    1975-01-01

    This testimony, before a public hearing of the New York City Commission on Human Rights in May 1974, expressly focuses on discrimination in employment, asserting that this has had the most direct effect on minorities and women in the country; while legal protections have grown stronger, they have not been used effectively. (Author/JM)

  17. Governing EU employment policy

    DEFF Research Database (Denmark)

    Sørensen, Eva; Triantafillou, Peter; Damgaard, Bodil

    2015-01-01

    In the European Union (EU), employment policy is a prerogative of the member states. Therefore the EU's ability to govern in this area depends on its capability to involve national governments and relevant stakeholders in a collaborative effort to formulate and implement shared policy objectives....... of collaboration, the implementation phase mainly consists in the less demanding forms of cooperation and coordination....

  18. Employment Relations in Denmark

    DEFF Research Database (Denmark)

    Madsen, Jørgen Steen; Due, Jesper Jørgen; Andersen, Søren Kaj

    2011-01-01

    Jørgen Steen Madsen, Jesper Due og Søren Kaj Andersen har skrevet et kapitel om udviklingen i dansk arbejdsmarkedsregulering til bogen International and Comparative Employment Relations, redigeret af Greg Bamber, Russell Lansbury og Nick Wailes. Bogen indeholder bidrag, der præsenterer og...

  19. Employment Challenges in Kenya

    African Journals Online (AJOL)

    Dr Kazungu

    of foreigners in rural trade, use of work permits to limit employment of expatriates, .... as social and trade union protection, job security, and wage negotiations to the worker. .... are Republic of Korea (1960–2001); Malaysia (1967–1997); Malta ...

  20. Transitional Employment Programs.

    Science.gov (United States)

    Dulle, Paul J.; And Others

    The paper examines the need and implementation of transitional employment programs for handicapped youth. Effects on the handicapped of future automation are considered along with the need for school-business cooperation to prepare for the future. The importance of initial success in any innovation is noted. A Chicago transitional employment…

  1. Policies for full employment

    DEFF Research Database (Denmark)

    de Koning, Jaap; Layard, Richard; Nickel, Stephen

    European unemployment is too high, and employment is too low. Over 7½ per cent of Europe's workforce is unemployed, and only two thirds of people aged 15-64 are in work. At the Lisbon summit two years ago the heads of government set the target that by 2010 the employment rate should rise from 64...... per cent to at least 70 per cent. And for older workers between 55 and 64 the employment rate should rise from 38 per cent to at least one half. These are ambitious targets. They will require two big changes: more people must seek work, and among those seeking work a higher proportion must get a job....... So we need higher participation, and (for full employment) we need a much lower unemployment rate. Can it be done? A mere glance at the experience of different European countries shows that it can. As Table 1 shows, four E.U. countries already exceed the overall target for 2010 (Britain, Denmark...

  2. Implementing the employability agenda

    DEFF Research Database (Denmark)

    Lee, Donna; Snaith, Holly Grace; Foster, Emma

    2014-01-01

    whether, and how, colleagues in politics and international relations (IR) had taken ownership of student employability at the level of the curriculum. In the article, the key findings of the research are summarised. There is also discussion of the (sometimes troubling) professional implications...

  3. Industrialisation, Exports and Employment.

    Science.gov (United States)

    Sabolo, Yves

    1980-01-01

    After reviewing trends in industrial production, exports, and employment in the Third World since 1960, the author discusses industrialization strategies based on the local processing of raw materials for export. Such processing has proved to be a major factor in job creation. (Author/SK)

  4. The Employment Mismatch

    Science.gov (United States)

    Fischer, Karin

    2013-01-01

    Employers value a four-year college degree, many of them more than ever. Yet half of those surveyed recently by "The Chronicle" and American Public Media's "Marketplace" said they had trouble finding recent graduates qualified to fill positions at their company or organization. Nearly a third gave colleges just fair to poor marks for producing…

  5. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  6. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  7. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  8. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  9. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  10. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  11. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  12. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  13. Multiple Employer Welfare Arrangements

    Science.gov (United States)

    1992-01-01

    Sponsors in the Private Nonfarm Sector in the United States, 1978-79," Volume IV, Description and Analysis of Plans and Plan Sponsors, NTIS # PB81-180366...Labor finds to be collectively bargained plans, and those organized by rural electrical cooperatives and rural telephone cooperatives. Thus, except for...their existence and generally higher cost than uninsured plans no doubt contributed to the development of other types of multiple employer

  14. Authenticity in Employment Relations

    OpenAIRE

    Tackney, Charles T.

    2014-01-01

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop ...

  15. Soldiers’ employment attitude and employability: An exploratory study

    Directory of Open Access Journals (Sweden)

    Peng Gao

    2015-04-01

    Full Text Available Purpose: Nowadays it is very difficult for Chinese retired soldiers to find proper jobs, and the primary reason is the significant gap between job requirements and soldiers owned job skills. Therefore, it is very important to improve the soldiers’ job skills and enhance their understanding of employment.Design/methodology/approach: This paper expands the study scope from the soldiers’ job skills to the employability, initiatively introduces the employment attitude which has obvious impact on the employment of soldiers, and analyses the influence that employment attitude can play on employability. At last, this paper develops statistical method to find the relationship between soldiers’ employment attitude and employability.Findings: The empirical analysis shows that soldiers’ employment attitude has the positive linkage with employability, which makes the employment attitude a measurable variable for the employability rather than an absolute standard.Research limitations/implications: According to the research purpose, more variables should be considered in the model, consequently, there are only three indicators to describe solders’ employment attitude and four indicators to describe solders’ employability.Originality/value: This paper takes research on soldiers’ employability in a new perspective. The soldiers’ employment attitude is served as the entry point, showing the influence that soldiers’ employment attitude has on employability.

  16. Energy investments and employment

    International Nuclear Information System (INIS)

    1993-08-01

    A study was conducted to assess the effect that different energy options would have on provincial and regional employment prospects in British Columbia. Current and future economic and employment patterns were examined to develop a more detailed understanding of the skills, age, gender, location, and other characteristics of British Columbia workers. Over 40 previous studies examining the energy/employment relationship were also reviewed. Based on this review and an analysis of the province's economic and labor conditions, the following conclusions are drawn. Investment in non-energy sectors offers better prospects for reducing unemployment than investment in the energy sector, whether for new supply or improving efficiency. Investments in the energy sector provide fewer jobs than investments in most other sectors of the economy. Among the available electricity supply options, large hydroelectric projects tend to produce the fewest jobs per investment dollar. Smaller thermal projects such as wood residue plants produce the most jobs. If and when more energy is needed in British Columbia, the most cost-effective combination of energy supply and efficiency options will also create the most jobs. Compared to traditional energy supply options, investments in energy efficiency would create about twice as many total jobs, create jobs that better match the skills of the province's unemployed and its population distribution, and create jobs that last longer on the average. Construction-related measures such as improved insulation tend to produce more jobs per investment dollar than the substitution of more energy-efficient equipment. 69 refs., 9 tabs

  17. Environment, employment and development

    International Nuclear Information System (INIS)

    Bhalla, A.S.

    1992-01-01

    It is generally recognised that the question of sustainable development is a global problem, emphasizing the increasingly interdependent nature of relationships among nations. Solutions to the problem are as much political as they are economic and technological. Notwithstanding the deepening and widening of the debate on sustainable development, its implications for employment - a major concern of the ILO under its World Employment Programme - have remained largely unexplored. This volume, therefore, has a very modest objective, namely to place the employment question on the policy agenda in the context of the current debate on environment and development. The design of environmental policies should allow for the differences that exist between countries with a high level of development and technological dynamism and those with a low level of development and low technological capability. One must also recognize the costs imposed by adjustment and the consequent distributional impact. In the long term, technology choice plays a crucial role in promoting sustainable development in both industrialized and developing countries. It is not only environment-friendly technologies that need to be developed and diffused; in the case of the least developed countries, technological transformation needs to be accelerated in order to minimise their dependence on natural resources for economic growth. Refs, figs and tabs

  18. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  19. Screening for Proteolytic Activities in Snake Venom by Means of a Multiplexing ESI-MS Assay Scheme

    NARCIS (Netherlands)

    Liesener, A.; Perchuc, Anna-Maria; Schöni, Reto; Wilmer, Marianne; Karst, U.

    2005-01-01

    A multiplexed mass spectrometry based assay scheme for the simultaneous determination of five different substrate/product pairs was developed as a tool for screening of proteolytic activities in snake venom fractions from Bothrops moojeni. The assay scheme was employed in the functional

  20. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  1. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  2. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  3. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  4. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  5. Full Employment in Industrialized Countries.

    Science.gov (United States)

    Britton, Andrew

    1997-01-01

    Argues that full employment must be acceptable on both social and economic grounds. Examines profound changes in industrialized economies since the 1970s and the diversity of employment contracts. Suggests that difficult policy decisions surround full employment. (SK)

  6. India : Note on Public Financial Management and Accountability in Centrally Sponsored Schemes

    OpenAIRE

    World Bank

    2006-01-01

    The budget outlay for Centrally Sponsored Schemes (CSS) for India in 2005-06 is significantly higher as compared to the previous year's level of Rs.395,000 million. This includes increased allocations for rural roads, rural employment, and education and nutritional support for pre-school children. At present there are over 200 such schemes in operation, of which a dozen accounts for more t...

  7. A new scheme for maximizing the lifetime of heterogeneous wireless sensor networks

    OpenAIRE

    Aldaihani, Reem; AboElFotoh, Hosam

    2016-01-01

    Heterogeneous wireless sensor network consists of wireless sensor nodes with different abilities, such as different computing power and different initial energy. We present in this paper a new scheme for maximizing heterogeneous WSN lifetime. The proposed scheme employs two types of sensor nodes that are named (consistent with IEEE 802.15.4 standard) Full Function Device (FFD) and Reduced Function Device (RFD). The FFDs are the expensive sensor nodes with high power and computational capabili...

  8. Emulation-based comparative study of centralized and distributed control schemes for optical networks

    Science.gov (United States)

    Xin, Chunsheng; Ye, Yinghua; Dixit, Sudhir; Qiao, Chunming

    2001-07-01

    Recently there are considerable amount of research about the automatic control and provisioning in all optical networks. One of the critical issues is how to provide effective lightpath provisioning to improve network performance, such as blocking probability and decision time. Depending on the network topology, configuration, and administration policy, a distributed or centralized control scheme can be employed to manage the routing and signaling. In a distributed control scheme, each node exchanges information with other nodes, but performs routing and signaling independently from other nodes. On the other hand, in a centralized scheme, each node communicates with a central controller and the controller performs routing and signaling on behalf of all other nodes. Intuitively, the centralized scheme can obtain a lower blocking probability since the controller has the complete resource availability information. We have studied the two schemes through emulations, determined the signaling and processing overheads and quantified the conditions that favor one approach over the other.

  9. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    Science.gov (United States)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  10. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  11. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  12. 2007 Veterans Employability Research Survey

    Data.gov (United States)

    Department of Veterans Affairs — The 2007 Veterans Employability Research Survey (VERS) was conducted to determine the factors that impact veterans' employability resulting from participation in the...

  13. Leaving Employment to Entrepreneurship

    DEFF Research Database (Denmark)

    Rocha, Vera; Carneiro, Anabela; Varum, Celeste

    : the relative inattention paid to other human resources beyond the founder, and the hetero-geneous context where employee startups may be established. We use a rich matched employer-employee dataset for Portugal, and estimate a multi-stage model addressing the issues of self-selection in entrepreneurship...... outcomes of arrival fi rms, and also for developing theories on labor markets for entrepreneurship. It also constitutes an important step towards unpacking the mechanisms through which mobile human capital affects the performance of receiving firms....

  14. Challenging Scandinavian employment relations

    DEFF Research Database (Denmark)

    Ibsen, Christian Lyhne; Larsen, Trine Pernille; Madsen, Jørgen Steen

    2011-01-01

    and employment relations in the Danish, Norwegian and Swedish public sector. In this paper, we argue that although differences exist across the Scandinavian countries, it is evident that they have managed to adopt and implement NPM-inspired reforms without dismantling their universal welfare services and strong......Building on the convergence/divergence approach, this paper examines whether recent new public management (NPM) inspired reforms entailing inter alia cutbacks in the public sector, marketisation and management by performance measures have had significant implications for service provision...... traditions of collective bargaining in the public sector. However, this restructuring is taking its toll on the work environment....

  15. Graduate Employability: A Conceptual Framework for Understanding Employers' Perceptions

    Science.gov (United States)

    Cai, Yuzhuo

    2013-01-01

    This study provides a conceptual framework for understanding what employers think about the value of graduates with similar educational credentials in the workplace (their employability), using insights from the new institutionalism. In this framework, the development of employers' beliefs about graduates' employability is broken into a number of…

  16. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  17. Novel store–carry–forward scheme for message dissemination in vehicular ad-hoc networks

    Directory of Open Access Journals (Sweden)

    Truc D.T. Nguyen

    2017-12-01

    Full Text Available To improve traffic safety in intelligent transportation systems, vehicles formed by vehicular ad-hoc networks (VANETs conventionally disseminate warning messages to their nearby vehicles as soon as a dangerous situation occurs. In this paper, we propose a novel scheme employing a novel story–carry–forward (SCF mechanism to tackle the network partition and broadcast storm problems, which are two major challenges in VANETs. The experimental result in the Veins simulation framework shows that the proposed SCF scheme significantly mitigates broadcast storms relative to other schemes, and maintains good coverage across various traffic densities.

  18. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  19. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  20. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  1. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  2. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  3. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  4. Development of knowledgebase system for assisting signal validation scheme design

    International Nuclear Information System (INIS)

    Kitamura, M.; Baba, T.; Washio, T.; Sugiyama, K.

    1987-01-01

    The purpose of this study is to develop a knowledgebase system to be used as a tool for designing signal validation schemes. The outputs from the signal validation scheme can be used as; (1) auxiliary signals for detecting sensor failures, (2) inputs to advanced instrumentation such as disturbance analysis and diagnosis system or safety parameter display system, and (3) inputs to digital control systems. Conventional signal validation techniques such as comparison of redundant sensors, limit checking, and calibration tests have been employed in nuclear power plants. However, these techniques have serious drawbacks, e.g. needs for extra sensors, vulnerability to common mode failures, limited applicability to continuous monitoring, etc. To alleviate these difficulties, a new signal validation technique has been developed by using the methods called analytic redundancy and parity space. Although the new technique has been proved feasible as far as preliminary tests are concerned, further developments should be made in order to enhance its practical applicability

  5. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review of the con......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...... analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...

  6. Life Sciences and employability

    Directory of Open Access Journals (Sweden)

    Wynand J. Boshoff

    2012-03-01

    Full Text Available This article addresses unemployment in rural areas. South Africa is also characterised by skills shortage and high unemployment figures, especially in rural areas as compared to urban areas. The institutional reality of education is that every rural village hosts a high school which is primarily engaged in preparing learners for further studies, whilst the Further Training Colleges (previously known as technical colleges are mainly located in the larger centres. It is with this scenario as a backdrop that the possible role of high schools to alleviate the problem is being argued. It is clear that rural employers do not expect from school leavers to be in possession of applicable knowledge, but rather to be in possession of the ability as well as certain personal characteristics that would make them employable. Unfortunately, however, this is not always found in young persons who have completed their schooling successfully. Life Sciences educators can render a valuable service should certain nontraditional approaches be incorporated into the teaching practice. This will enable them to contribute to solving one of South Africa’s serious problems.

  7. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  8. Employability Skills Assessment Tool Development

    Science.gov (United States)

    Rasul, Mohamad Sattar; Rauf, Rose Amnah Abd; Mansor, Azlin Norhaini; Puvanasvaran, A. P.

    2012-01-01

    Research nationally and internationally found that technical graduates are lacking in employability skills. As employability skills are crucial in outcome-based education, the main goal of this research is to develop an Employability Skill Assessment Tool to help students and lecturers produce competent graduates in employability skills needed by…

  9. Welfare Effects of Employment Protection

    NARCIS (Netherlands)

    Belot, M.V.K.; Boone, J.; van Ours, J.C.

    2002-01-01

    Employment protection is often related to costs incurred by the firms when they hire a worker.The stability of the employment relationship, enhanced by employment protection, is also favorable to the productivity of the job.We analyze employment protection focusing on this trade-off between

  10. A Transcription Scheme for Languages Employing the Arabic Script Motivated by Speech Processing Application

    National Research Council Canada - National Science Library

    Ganjavi, Shadi; Georgiou, Panayiotis G; Narayanan, Shrikanth

    2004-01-01

    ... (The DARPA Babylon Program; Narayanan, 2003). In this paper, we discuss transcription systems needed for automated spoken language processing applications in Persian that uses the Arabic script for writing...

  11. If you pay peanuts: a laboratory experiment on reward schemes in employment service contracting

    NARCIS (Netherlands)

    van de Meerendonk, A.; Onderstal, S.

    2010-01-01

    The design of tenders and contracts is a crucial factor in the success or failure of the contracting-out of reintegration services. In a laboratory experiment with professionals from private reintegration service providers, we tested two tender designs. In the first design, the government announces

  12. NATIONAL RURAL EMPLOYMENT GENERATION GUARANTEE SCHEME IN INDIA ON RURAL POVERTY

    OpenAIRE

    Dr. B. Sasikumar

    2017-01-01

    India has become the second most popular the most poverty-stricken countries. Seventy percent of people live in rural area. Poverty is widespread in India, with the Nation; developing economies including India have been plagued by skewed distribution of nation’s resources leading to poverty, illiteracy, low consumption and investment, lagged growth and the like. Economic reforms were introduced in India in 1991, after which there is a great deal of discussion on its impact on growth, employm...

  13. Doses and fractionation schemes to be employed in clinical trials of high-LET radiations

    International Nuclear Information System (INIS)

    Fowler, J.F.

    1979-01-01

    An improvement in local tumour control of 20% would require 2 x 130 cases in order that nine trials out of ten should show the difference at a significant level. If the improvement is 30% only 2 x 55 patients are required. However, the detection of increased normal tissue complications requires larger number of patients than this, e.g. 2 x 150 if the increase is from 5% to 15%. The use of two dose levels on the neutron side in a clinical trial would enable definitive data to be obtained in, say, 6 years with 300 patients, instead of 10 years with 400 patients if only one dose level were used. (author)

  14. Fixed term employment

    International Nuclear Information System (INIS)

    Durant, B.W.; Schonberner, M.J.

    1999-01-01

    A series of brief notes were included with this presentation which highlighted certain aspects of contract management. Several petroleum companies have realized the benefits of taking advantage of contract personnel to control fixed G and A, manage the impacts on their organization, contain costs, to manage termination costs, and to fill gaps in lean personnel rosters. An independent contractor was described as being someone who is self employed, often with a variety of work experiences. The tax benefits and flexibility of contractor personnel were also described. Some liability aspects of hiring an independent contractor were also reviewed. The courts have developed the following 4 tests to help determine whether an individual is an employee or an independent contractor: (1) the control test, (2) the business integration test, (3) specific result test, and (4) the economic reality test

  15. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    2018-01-01

    Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...

  16. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  17. Second order finite volume scheme for Maxwell's equations with discontinuous electromagnetic properties on unstructured meshes

    Energy Technology Data Exchange (ETDEWEB)

    Ismagilov, Timur Z., E-mail: ismagilov@academ.org

    2015-02-01

    This paper presents a second order finite volume scheme for numerical solution of Maxwell's equations with discontinuous dielectric permittivity and magnetic permeability on unstructured meshes. The scheme is based on Godunov scheme and employs approaches of Van Leer and Lax–Wendroff to increase the order of approximation. To keep the second order of approximation near dielectric permittivity and magnetic permeability discontinuities a novel technique for gradient calculation and limitation is applied near discontinuities. Results of test computations for problems with linear and curvilinear discontinuities confirm second order of approximation. The scheme was applied to modelling propagation of electromagnetic waves inside photonic crystal waveguides with a bend.

  18. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  19. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  20. Asymptotic analysis of discrete schemes for non-equilibrium radiation diffusion

    International Nuclear Information System (INIS)

    Cui, Xia; Yuan, Guang-wei; Shen, Zhi-jun

    2016-01-01

    Motivated by providing well-behaved fully discrete schemes in practice, this paper extends the asymptotic analysis on time integration methods for non-equilibrium radiation diffusion in [2] to space discretizations. Therein studies were carried out on a two-temperature model with Larsen's flux-limited diffusion operator, both the implicitly balanced (IB) and linearly implicit (LI) methods were shown asymptotic-preserving. In this paper, we focus on asymptotic analysis for space discrete schemes in dimensions one and two. First, in construction of the schemes, in contrast to traditional first-order approximations, asymmetric second-order accurate spatial approximations are devised for flux-limiters on boundary, and discrete schemes with second-order accuracy on global spatial domain are acquired consequently. Then by employing formal asymptotic analysis, the first-order asymptotic-preserving property for these schemes and furthermore for the fully discrete schemes is shown. Finally, with the help of manufactured solutions, numerical tests are performed, which demonstrate quantitatively the fully discrete schemes with IB time evolution indeed have the accuracy and asymptotic convergence as theory predicts, hence are well qualified for both non-equilibrium and equilibrium radiation diffusion. - Highlights: • Provide AP fully discrete schemes for non-equilibrium radiation diffusion. • Propose second order accurate schemes by asymmetric approach for boundary flux-limiter. • Show first order AP property of spatially and fully discrete schemes with IB evolution. • Devise subtle artificial solutions; verify accuracy and AP property quantitatively. • Ideas can be generalized to 3-dimensional problems and higher order implicit schemes.

  1. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  2. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  3. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  4. Study of Hybrid Localization Noncooperative Scheme in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Irfan Dwiguna Sumitra

    2017-01-01

    Full Text Available In this paper, we evaluated the experiment and analysis measurement accuracy to determine object location based on wireless sensor network (WSN. The algorithm estimates the position of sensor nodes employing received signal strength (RSS from scattered nodes in the environment, in particular for the indoor building. Besides that, we considered another algorithm based on weight centroid localization (WCL. In particular testbed, we combined both RSS and WCL as hybrid localization in case of noncooperative scheme with considering that source nodes directly communicate only with anchor nodes. Our experimental result shows localization accuracy of more than 90% and obtained the estimation error reduction to 4% compared to existing algorithms.

  5. Image Interpolation Scheme based on SVM and Improved PSO

    Science.gov (United States)

    Jia, X. F.; Zhao, B. T.; Liu, X. X.; Song, H. P.

    2018-01-01

    In order to obtain visually pleasing images, a support vector machines (SVM) based interpolation scheme is proposed, in which the improved particle swarm optimization is applied to support vector machine parameters optimization. Training samples are constructed by the pixels around the pixel to be interpolated. Then the support vector machine with optimal parameters is trained using training samples. After the training, we can get the interpolation model, which can be employed to estimate the unknown pixel. Experimental result show that the interpolated images get improvement PNSR compared with traditional interpolation methods, which is agrees with the subjective quality.

  6. Womens employment discrimination

    OpenAIRE

    Chernyaeva, V. N.; Черняева, В. Н.

    2014-01-01

    The paper deals with the difficulties faced by women in employment, about stereotypes, that prevent them from getting a decent job and advance their own careers, and the ways to solve this problem. В статье говорится о трудностях, с которыми женщины сталкиваются при трудоустройстве, о стереотипах, которые мешают им получать достойную работу и продвигаться по службе, и о путях решения этой проблемы....

  7. Temporary Employment and Perceived Employability: Mediation by Impression Management

    Science.gov (United States)

    De Cuyper, Nele; De Witte, Hans

    2010-01-01

    Perceived employability (PE) has been advanced as the upcoming resource for career development, particularly for temporary workers. The question is how temporary workers become employable. Our hypothesis is that temporary workers more than permanent workers use impression management to become employable, both on the internal and the external labor…

  8. A Conceptual Understanding of Employability: The Employers' View in Rwanda

    Science.gov (United States)

    Bamwesiga, Penelope Mbabazi

    2013-01-01

    Many governments believe that investing in human capital should increase citizens' employability, which is why it is often presented as a solution to the problems of knowledge-based economies and societies, rising unemployment rates and economic competiveness. The aim of this study is to understand employers' views regarding the employability of…

  9. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  10. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  11. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  12. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  13. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  14. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  15. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  16. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  17. Hierarchical Markov Model in Life Insurance and Social Benefit Schemes

    Directory of Open Access Journals (Sweden)

    Jiwook Jang

    2018-06-01

    Full Text Available We explored the effect of the jump-diffusion process on a social benefit scheme consisting of life insurance, unemployment/disability benefits, and retirement benefits. To do so, we used a four-state Markov chain with multiple decrements. Assuming independent state-wise intensities taking the form of a jump-diffusion process and deterministic interest rates, we evaluated the prospective reserves for this scheme in which the individual is employed at inception. We then numerically demonstrated the state of the reserves for the scheme under jump-diffusion and non-jump-diffusion settings. By decomposing the reserve equation into five components, our numerical illustration indicated that an extension of the retirement age has a spillover effect that would increase government expenses for other social insurance programs. We also conducted sensitivity analyses and examined the total-reserves components by changing the relevant parameters of the transition intensities, which are the average jump-size parameter, average jump frequency, and diffusion parameters of the chosen states, with figures provided. Our computation revealed that the total reserve is most sensitive to changes in average jump frequency.

  18. Single-employer Pension Plans

    Data.gov (United States)

    Pension Benefit Guaranty Corporation — This spreadsheet lists the active single-employer pensions plans insured by PBGC. Plans are identified by name, employer identification number (EIN) and plan number...

  19. Employment relations, flexibility and risk

    DEFF Research Database (Denmark)

    Jensen, Carsten Strøby

    Employment relations literature often distinguishes between social democratic/corporatist models of employment relations and liberal models of employment relations as they are seen as opposite or at least different ways of organizing labor markets. They are often characterized as having very...... different risk profiles in terms of relationships between employees, employers, and the state. Low levels of labor market regulation very often characterize the liberal models of employment relations as we know them from, for instance, the USA and the UK. This means that employment conditions are very often...... insecure and that the burden of unemployment risk mostly lies with the employees rather than the employer. Corporatist – or social democratic – employment relations models are, in contrast to the liberal models, often characterized by stricter regulation of the labor market and by high standards...

  20. Employment challenges in the future

    DEFF Research Database (Denmark)

    2011-01-01

    Discussion of challenges in employment challenges in Europe and a brief discription of the Danish flexicurity system......Discussion of challenges in employment challenges in Europe and a brief discription of the Danish flexicurity system...

  1. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  2. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  3. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  4. Atypical work and employment continuity

    OpenAIRE

    Addison, John T.; Surfield, Christopher J.

    2009-01-01

    Atypical employment arrangements such as agency temporary work and contracting have long been criticized as offering more precarious and unstable work than regular employment. Using data from two datasets – the CAEAS and the NLSY79 – we determine whether workers who take such jobs rather than regular employment, or the alternative of continued job search, subsequently experience greater or lesser employment continuity. Observed differences between the various working arrangements are starkest...

  5. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  6. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  7. The Netherlands: self-employed

    NARCIS (Netherlands)

    Houtman, I.L.D.

    2009-01-01

    This is the national contribution to the CAR on self-employed workers in the Netherlands. In this national contribution information is provided on self-employed workers in relation to (1) legal provisions and social security, (2) recent trends in self-employment with no employees, (3) collective

  8. Business/Employers Influenza Toolkit

    Centers for Disease Control (CDC) Podcasts

    This podcast promotes the "Make It Your Business To Fight The Flu" toolkit for Businesses and Employers. The toolkit provides information and recommended strategies to help businesses and employers promote the seasonal flu vaccine. Additionally, employers will find flyers, posters, and other materials to post and distribute in the workplace.

  9. Tourism Employment Module (TEM: Case of the Czech Republic

    Directory of Open Access Journals (Sweden)

    Zdeněk Lejsek

    2011-09-01

    Full Text Available Tourism Employment Module (TEM provides information on the significance and contribution of tourism for the national economy in terms of employment. It refers to a system of tables describing the main economic characteristics of tourism (i.e. number of jobs and people employed in tourism by industry, seasonality, working scheme,permanency of job, sex, age groups, level of education or nationality and classifying thereby tourism as one of branches in the system of national accounts. The article describes basic methodological concept and structure of this tool (and approaches to measuring employment in the tourist industry in general, exploited data sources and provides a brief information on the type and form of publishing of the results as well as the data on principalmacroeconomic indicators of tourism-related industries in the Czech Republic in 2003–2009.

  10. On the Incidence of Employment Subsidies to Vocational Training

    DEFF Research Database (Denmark)

    Albæk, Karsten

    The present paper analyses employment subsidies to vocational training under union wage bargaining. The analysis includes an investigation of the consequences of financing the subsidy by a levy on employment, which is the typical way of financing these types of subsidies in many countries. The pa....... The paper demonstrates high incidence rates of subsidies to vocational training under standard assumptions about the preference structure of the union. The financing scheme appears to counteract the purpose of the subsidy.......The present paper analyses employment subsidies to vocational training under union wage bargaining. The analysis includes an investigation of the consequences of financing the subsidy by a levy on employment, which is the typical way of financing these types of subsidies in many countries...

  11. The Incidence of Employment Subsidies for Vocational Training

    DEFF Research Database (Denmark)

    Albæk, Karsten

    2013-01-01

    This paper analyses employment subsidies for vocational training under union wage bargaining. The analysis includes an investigation of the consequences of financing the subsidy by a levy on employment, which is the typical way of financing these types of subsidies in many countries. The paper de...... demonstrates high incidence rates of subsidies for vocational training under standard assumptions about the preference structure of the union. The financing scheme appears to counteract the purpose of the subsidy.......This paper analyses employment subsidies for vocational training under union wage bargaining. The analysis includes an investigation of the consequences of financing the subsidy by a levy on employment, which is the typical way of financing these types of subsidies in many countries. The paper...

  12. The expansion of renewable energies and employment effects in Germany

    International Nuclear Information System (INIS)

    Hillebrand, Bernhard; Buttermann, Hans Georg; Behringer, Jean Marc; Bleuel, Michaela

    2006-01-01

    The promotion of electricity produced from renewable energy is a high priority of the European Union, as well of its member states. The German government wants to increase the share of renewable energies from about 5% to 12% by 2010. To attain this goal, the German government has introduced compulsory compensation schemes for electricity produced from renewable energy fed into the public grid. This paper examines the economic impact of this policy employing an econometric model. Particular emphasis was given to employment effects. In general, we distinguish two effects: (1) an expansive effect resulting from additional investments and (2) a contractive effect resulting from an increase in the production cost of power. The first effect will dominate during the first years and lead to an increase in employment of approximately 33,000 new jobs. However, the contractive effect will offset these gains and lead to a slightly negative employment balance by 2010

  13. Employment status, employment functioning, and barriers to employment among VA primary care patients.

    Science.gov (United States)

    Zivin, Kara; Yosef, Matheos; Levine, Debra S; Abraham, Kristen M; Miller, Erin M; Henry, Jennifer; Nelson, C Beau; Pfeiffer, Paul N; Sripada, Rebecca K; Harrod, Molly; Valenstein, Marcia

    2016-03-15

    Prior research found lower employment rates among working-aged patients who use the VA than among non-Veterans or Veterans who do not use the VA, with the lowest reported employment rates among VA patients with mental disorders. This study assessed employment status, employment functioning, and barriers to employment among VA patients treated in primary care settings, and examined how depression and anxiety were associated with these outcomes. The sample included 287 VA patients treated in primary care in a large Midwestern VA Medical Center. Bivariate and multivariable analyses were conducted examining associations between socio-demographic and clinical predictors of six employment domains, including: employment status, job search self-efficacy, work performance, concerns about job loss among employed Veterans, and employment barriers and likelihood of job seeking among not employed Veterans. 54% of respondents were employed, 36% were not employed, and 10% were economically inactive. In adjusted analyses, participants with depression or anxiety (43%) were less likely to be employed, had lower job search self-efficacy, had lower levels of work performance, and reported more employment barriers. Depression and anxiety were not associated with perceived likelihood of job loss among employed or likelihood of job seeking among not employed. Single VA primary care clinic; cross-sectional study. Employment rates are low among working-aged VA primary care patients, particularly those with mental health conditions. Offering primary care interventions to patients that address mental health issues, job search self-efficacy, and work performance may be important in improving health, work, and economic outcomes. Published by Elsevier B.V.

  14. A stable computational scheme for stiff time-dependent constitutive equations

    International Nuclear Information System (INIS)

    Shih, C.F.; Delorenzi, H.G.; Miller, A.K.

    1977-01-01

    Viscoplasticity and creep type constitutive equations are increasingly being employed in finite element codes for evaluating the deformation of high temperature structural members. These constitutive equations frequently exhibit stiff regimes which makes an analytical assessment of the structure very costly. A computational scheme for handling deformation in stiff regimes is proposed in this paper. By the finite element discretization, the governing partial differential equations in the spatial (x) and time (t) variables are reduced to a system of nonlinear ordinary differential equations in the independent variable t. The constitutive equations are expanded in a Taylor's series about selected values of t. The resulting system of differential equations are then integrated by an implicit scheme which employs a predictor technique to initiate the Newton-Raphson procedure. To examine the stability and accuracy of the computational scheme, a series of calculations were carried out for uniaxial specimens and thick wall tubes subjected to mechanical and thermal loading. (Auth.)

  15. A comparative study of upwind and MacCormack schemes for CAA benchmark problems

    Science.gov (United States)

    Viswanathan, K.; Sankar, L. N.

    1995-01-01

    In this study, upwind schemes and MacCormack schemes are evaluated as to their suitability for aeroacoustic applications. The governing equations are cast in a curvilinear coordinate system and discretized using finite volume concepts. A flux splitting procedure is used for the upwind schemes, where the signals crossing the cell faces are grouped into two categories: signals that bring information from outside into the cell, and signals that leave the cell. These signals may be computed in several ways, with the desired spatial and temporal accuracy achieved by choosing appropriate interpolating polynomials. The classical MacCormack schemes employed here are fourth order accurate in time and space. Results for categories 1, 4, and 6 of the workshop's benchmark problems are presented. Comparisons are also made with the exact solutions, where available. The main conclusions of this study are finally presented.

  16. Renewable energy investments under different support schemes: A real options approach

    DEFF Research Database (Denmark)

    Boomsma, Trine Krogh; Meade, Nigel; Fleten, Stein-Erik

    2012-01-01

    -in tariff encourages earlier investment. Nevertheless, as investment has been undertaken, renewable energy certificate trading creates incentives for larger projects. In our baseline scenario and taking the fixed feed-in tariff as a base, the revenue required to trigger investments is 61% higher......This paper adopts a real options approach to analyze investment timing and capacity choice for renewable energy projects under different support schemes. The main purpose is to examine investment behavior under the most extensively employed support schemes, namely, feed-in tariffs and renewable...... energy certificate trading. We consider both multiple sources of uncertainty under each support scheme and uncertainty with respect to any change of support scheme, and we obtain both analytical (when possible) and numerical solutions. In a Nordic case study based on wind power, we find that the feed...

  17. An information-guided channel-hopping scheme for block-fading channels with estimation errors

    KAUST Repository

    Yang, Yuli

    2010-12-01

    Information-guided channel-hopping technique employing multiple transmit antennas was previously proposed for supporting high data rate transmission over fading channels. This scheme achieves higher data rates than some mature schemes, such as the well-known cyclic transmit antenna selection and space-time block coding, by exploiting the independence character of multiple channels, which effectively results in having an additional information transmitting channel. Moreover, maximum likelihood decoding may be performed by simply decoupling the signals conveyed by the different mapping methods. In this paper, we investigate the achievable spectral efficiency of this scheme in the case of having channel estimation errors, with optimum pilot overhead for minimum meansquare error channel estimation, when transmitting over blockfading channels. Our numerical results further substantiate the robustness of the presented scheme, even with imperfect channel state information. ©2010 IEEE.

  18. Collision Resolution Scheme with Offset for Improved Performance of Heterogeneous WLAN

    Science.gov (United States)

    Upadhyay, Raksha; Vyavahare, Prakash D.; Tokekar, Sanjiv

    2016-03-01

    CSMA/CA based DCF of 802.11 MAC layer employs best effort delivery model, in which all stations compete for channel access with same priority. Heterogeneous conditions result in unfairness among stations and degradation in throughput, therefore, providing different priorities to different applications for required quality of service in heterogeneous networks is challenging task. This paper proposes a collision resolution scheme with a novel concept of introducing offset, which is suitable for heterogeneous networks. Selection of random value by a station for its contention with offset results in reduced probability of collision. Expression for the optimum value of the offset is also derived. Results show that proposed scheme, when applied to heterogeneous networks, has improved throughput and fairness than conventional scheme. Results show that proposed scheme also exhibits higher throughput and fairness with reduced delay in homogeneous networks.

  19. Do Employment Subsidies Work? Evidence from Regionally Targeted Subsidies in Turkey

    DEFF Research Database (Denmark)

    Daysal, N. Meltem; Betcherman, Gordon; Pages, Carmen

    2010-01-01

    This paper studies the effects on registered employment and number of registered establishments of two employment subsidy schemes in Turkey. We implement a difference-in-differences methodology to construct appropriate counterfactuals for the covered provinces. Our findings suggest that both subs...... than boosting total employment and economic activity. This supports the theory that in countries with weak enforcement institutions, high labor taxes on low-wage workers may lead to substantial incentives for firms and workers to operate informally....

  20. Do wage subsidies for disabled workers reduce their non-employment?

    DEFF Research Database (Denmark)

    Gupta, Nabanita Datta; Larsen, Mona; Thomsen, Lars Stage

    2015-01-01

    We evaluate the potential of wage subsidy programs for reducing non-employment of the disabled by exploiting a reform of the Danish Flexjob scheme targeted towards employing the long-term (partially) disabled. Firms received a salary reimbursement for all employees granted a Flexjob. We examine....... A reduction in subsidies thus leads to a decrease in the hiring of the non-employed disabled....

  1. Concept of self-employment

    OpenAIRE

    Startienė, Gražina; Remeikienė, Rita; Dumčiuvienė, Daiva

    2010-01-01

    The article deals with the theories that explain the growth of self-employment and help to determine the presumptions of the self-employment growth. Self-employment theories are classified to several groups, i.e. the economic and sociological-psychological as well as the “push” and “pull” theories. Economic theories of self-employment interpret financial motives of the person to pursue own business, while sociologicalpsychological theories of self-employment determine non-financial objectives...

  2. Growth, Employment and Structural Change

    DEFF Research Database (Denmark)

    Aggarwal, Aradhna

    2016-01-01

    This paper studies the decomposition of GSDP growth per capita in Punjab via-a-vis 15 other states in India during 1993–94 and 2011–12 in terms of employment and productivity growth. Specifically, it focuses on the role of employment growth and structural change in employment on economic growth...... but structural shifts have paid off well in terms of diversification of the economy and their contribution to labour productivity especially for manufacturing. Overall employment effect had been negative but this was essentially due to contraction in the labour force; the employment rate effect turned out...

  3. Developing benefit schemes and financial compensation measures for fishermen impacted by marine renewable energy projects

    International Nuclear Information System (INIS)

    Reilly, Kieran; O’Hagan, Anne Marie; Dalton, Gordon

    2016-01-01

    Commercial fishermen are arguably the stakeholder group most likely to be directly impacted by the expansion of the marine renewable energy (MRE) sector. The potential opposition of fishermen may hinder the development of MRE projects and the provision of benefit schemes could to enhance acceptance. Benefit schemes refer to additional voluntary measures that are provided by a developer to local stakeholders. The aim of this study is to explore the issue of the provision of benefit packages to local fishing communities and financial compensation measures for fishermen who may be impacted by MRE projects. Semi-structured interviews were conducted with fourteen fishermen from three separate case study sites around the island of Ireland where MRE projects were being developed. In addition, ten company fisheries liaison officers (CFLOs) who have worked on MRE projects in the UK and Ireland were also interviewed. The interviews were analysed under the headings of local employment, benefits in kind, compensation and community funds and ownership of projects. Analysis shows that there is uncertainty among fishermen over whether they would benefit or gain employment from MRE. Provision of re-training schemes and preferential hiring practices could be used by MRE developers to reduce this uncertainty. There was also agreement between fishermen and CFLOs on the need for the provision of an evidence-base and a standard approach for the calculation of disruption payments. A formal structure for the provision of benefit schemes for fishermen would be useful. Furthermore, schemes that provide a range of benefits to fishermen and other stakeholders over the lifetime of a MRE project are more likely to be successful at enhancing acceptance. - Highlights: • There is uncertainty among fishermen over benefits from MRE projects. • Re-training is required for fishermen to avail of employment opportunities. • Evidence-base is required for calculation of disruption payments.

  4. Hierarchical predictive control scheme for distributed energy storage integrated with residential demand and photovoltaic generation

    NARCIS (Netherlands)

    Lampropoulos, I.; Garoufalis, P.; van den Bosch, P.P.J.; Kling, W.L.

    2015-01-01

    A hierarchical control scheme is defined for the energy management of a battery energy storage system which is integrated in a low-voltage distribution grid with residential customers and photovoltaic installations. The scope is the economic optimisation of the integrated system by employing

  5. Australia’s seasonal worker pilot scheme for Pacific Islanders—Ideas for the Next Phase

    DEFF Research Database (Denmark)

    Pacheco Cueva, Vladimir; Stephan, Carly; Lee, Karen

    2008-01-01

    In August 2008, the Australian Government initiated a seasonal worker pilot scheme for Pacific Islanders to examine whether a seasonal worker program could contribute to the Pacific region economic development objectives and also assist Australian employers.Even in a contracting Australian econom...

  6. Energy Efficient MAC Scheme for Wireless Sensor Networks with High-Dimensional Data Aggregate

    Directory of Open Access Journals (Sweden)

    Seokhoon Kim

    2015-01-01

    Full Text Available This paper presents a novel and sustainable medium access control (MAC scheme for wireless sensor network (WSN systems that process high-dimensional aggregated data. Based on a preamble signal and buffer threshold analysis, it maximizes the energy efficiency of the wireless sensor devices which have limited energy resources. The proposed group management MAC (GM-MAC approach not only sets the buffer threshold value of a sensor device to be reciprocal to the preamble signal but also sets a transmittable group value to each sensor device by using the preamble signal of the sink node. The primary difference between the previous and the proposed approach is that existing state-of-the-art schemes use duty cycle and sleep mode to save energy consumption of individual sensor devices, whereas the proposed scheme employs the group management MAC scheme for sensor devices to maximize the overall energy efficiency of the whole WSN systems by minimizing the energy consumption of sensor devices located near the sink node. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of active time of sensor devices, transmission delay, control overhead, and energy consumption. Therefore, the proposed scheme is suitable for sensor devices in a variety of wireless sensor networking environments with high-dimensional data aggregate.

  7. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  8. Effect of synthetic jet modulation schemes on the reduction of a laminar separation bubble

    Science.gov (United States)

    Seo, J. H.; Cadieux, F.; Mittal, R.; Deem, E.; Cattafesta, L.

    2018-03-01

    The response of a laminar separation bubble to synthetic jet forcing with various modulation schemes is investigated via direct numerical simulations. A simple sinusoidal waveform is considered as a reference case, and various amplitude modulation schemes, including the square-wave "burst" modulation, are employed in the simulations. The results indicate that burst modulation is less effective at reducing the length of the flow separation than the sinusoidal forcing primarily because burst modulation is associated with a broad spectrum of input frequencies that are higher than the target frequency for the flow control. It is found that such high-frequency forcing delays vortex roll-up and promotes vortex pairing and merging, which have an adverse effect on reducing the separation bubble length. A commonly used amplitude modulation scheme is also found to have reduced effectiveness due to its spectral content. A new amplitude modulation scheme which is tailored to impart more energy at the target frequency is proposed and shown to be more effective than the other modulation schemes. Experimental measurements confirm that modulation schemes can be preserved through the actuator and used to enhance the energy content at the target modulation frequency. The present study therefore suggests that the effectiveness of synthetic jet-based flow control could be improved by carefully designing the spectral content of the modulation scheme.

  9. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  10. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  11. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  12. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  13. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  14. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  15. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  16. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  17. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  18. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  19. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  20. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  1. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  2. Betatron tune correction schemes in nuclotron

    International Nuclear Information System (INIS)

    Shchepunov, V.A.

    1992-01-01

    Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab

  3. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  4. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  5. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  6. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  7. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  8. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  9. Employment strategy of the Russians

    Directory of Open Access Journals (Sweden)

    Vladimir Borisovich Toreev

    2015-05-01

    Full Text Available During the crisis it is especially important to choose a correct employment strategy. Every employee uses an employment strategy, as he/she selects the direction of long-term employment consciously or intuitively. The choice of strategy is determined by a number of factors shaping the person’s attitudes: health, character, upbringing, education, social environment, institutional environment. The employment strategies of the young people newly entering the labor market differ from lab our strategies of workers. Young people do not have such experience and can plan their life “from scratch”. The Soviet specialists, people who started their career in the planned economy, have their own features of employment strategies. The article describes employment strategies of the Russians

  10. Maternal Employment and Childhood Obesity

    DEFF Research Database (Denmark)

    Gwozdz, Wencke; Sousa-Poza, Alfonso; Reisch, Lucia

    2013-01-01

    The substantial increase in female employment rates in Europe over the past two decades has often been linked in political and public rhetoric to negative effects on child development, including obesity. We analyse this association between maternal employment and childhood obesity using rich...... on obesity's main drivers: calorie intake and physical activity. Our analysis provides little evidence for any association between maternal employment and childhood obesity, diet or physical activity....

  11. Maternal Employment and Childhood Obesity

    DEFF Research Database (Denmark)

    Gwozdz, Wencke; Sousa-Poza, Alfonso; Reisch, Lucia

    The substantial increase in female employment rates in Europe over the past two decades has often been linked in political and public rhetoric to negative effects on child development, including obesity. We analyse this association between maternal employment and childhood obesity using rich...... on obesity's main drivers: calorie intake and physical activity. Our analysis provides little evidence for any association between maternal employment and childhood obesity, diet or physical activity....

  12. Business/Employers Influenza Toolkit

    Centers for Disease Control (CDC) Podcasts

    2011-09-06

    This podcast promotes the "Make It Your Business To Fight The Flu" toolkit for Businesses and Employers. The toolkit provides information and recommended strategies to help businesses and employers promote the seasonal flu vaccine. Additionally, employers will find flyers, posters, and other materials to post and distribute in the workplace.  Created: 9/6/2011 by Office of Infectious Diseases, Office of the Director (OD).   Date Released: 9/7/2011.

  13. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  14. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  15. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  16. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  17. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  18. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  19. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  20. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  1. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  2. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  3. Graduates', University Lecturers' and Employers' Perceptions towards Employability Skills

    Science.gov (United States)

    Wickramasinghe, Vathsala; Perera, Lasantha

    2010-01-01

    Purpose: The purpose of this study is to explore employability skills that employers, university lecturers and graduates value to bring to the workplace, when graduates are applying for entry-level graduate jobs in the field of computer science in Sri Lanka. Design/methodology/approach: A total of three samples were selected for this exploratory…

  4. Employment effects of foreign acquisition

    DEFF Research Database (Denmark)

    Bandick, Roger; Karpaty, Patrik

    2011-01-01

    This paper investigates the employment effects of foreign acquisitions in acquired firms in Swedish manufacturing during the 1990s; a period characterized by a dramatic increase in foreign ownership. We find some evidence of positive employment effects in acquired firms and it seems...... that the employment of skilled labor increasesmore than that of less-skilled labor. Our results indicate that the positive employment effects are more pronounced in acquired non-MNEs than in Swedish MNEs. Furthermore, we observe shifts in skill intensities toward higher shares of skilled labor in non-MNEs taken over...

  5. Unemployment and Subsequent Employment Stability

    DEFF Research Database (Denmark)

    Wulfgramm, Melike; Fervers, Lukas

    2015-01-01

    Recent labour market reforms in Europe have been aimed at activating non-employed people and shortening unemployment duration. While this should indisputably be a central policy aim, the exclusive focus on quick re-employment neglects the importance of its quality and stability. Therefore......, this paper analyses the effect of labour market policy on re-employment stability in Europe. Combining EU-SILC longitudinal survey data with macro-data on labour market policy, we conduct multi-level survival analysis. Empirical evidence suggests that countries with more generous unemployment insurance......, and their positive effect on re-employment stability on the other hand....

  6. "It's about fitting in with the organisation": A qualitative study of employers of nurse practitioners.

    Science.gov (United States)

    Leidel, Stacy; Hauck, Yvonne; McGough, Shirley

    2018-04-01

    To explore the views of employers about the value nurse practitioners (NPs) add to health services, enablers and barriers to employing NPs, and intentions to employ NPs or expand NP services in the future. Research on Australian NPs has focused on NPs' experiences or patient-related factors like waiting times. Few studies have explored NP roles from the perspective of employers. Australian NPs employed by the private sector are eligible for reimbursement by the national health insurance scheme (Medicare Australia), potentially generating revenue for employers and broadening their career opportunities. We aimed to explore private sector employers' views on the barriers and facilitators to employing NPs and to identify factors affecting NP employability. A qualitative descriptive exploratory study. Employers of NPs from 23 private and nonprofit health services in Western Australia were interviewed. Inductive content analysis was used to explore the data. Enablers to employing an NP included enhanced customer service and improved health outcomes. Barriers to employing an NP included lack of financial benefit and inadequate experience or qualifications. Employers also identified future directions for NP employability, such as filling a gap that added value to the health service. Employers wanted NPs to work towards a shared vision of patient care that aligned with organisational needs. Findings can inform NP education and workforce planning to optimally meet employer and patient health needs. © 2018 John Wiley & Sons Ltd.

  7. Vocational Rehabilitation and Employment program--self-employment. Final rule.

    Science.gov (United States)

    2010-01-20

    This document amends the vocational rehabilitation and employment regulations of the Department of Veterans Affairs (VA) concerning self-employment for individuals with qualifying disabilities. We are making changes to conform VA's regulations for self-employment programs for veterans, and for servicemembers awaiting discharge, to statutory provisions, including provisions limiting eligibility for certain supplies, equipment, stock, and license fees to individuals with the most severe service-connected disabilities. We are also making related changes in VA's regulations affecting eligibility for such assistance for certain veterans' children with birth defects in self-employment programs. In addition, we are amending our regulations regarding the approval authority for self-employment plans to make certain requirements less restrictive and less burdensome, to remove a vague and overly broad requirement, to make changes to reflect longstanding VA policy, and to make nonsubstantive clarifying changes.

  8. Breastfeeding and employment: an assessment of employer attitudes.

    Science.gov (United States)

    Libbus, M Kay; Bullock, Linda F C

    2002-08-01

    Both research and anecdotal reports suggest that maternal employment is associated with failure to initiate breastfeeding and early breastfeeding attrition. The objective of this study was to describe the experience with and attitudes toward breastfeeding of a sample of employers in a small Midwestern city in the United States. Based on an analysis of 85 mail-out questionnaires, we found that less than half of the employers had personal experience with breastfeeding. A large percentage of the sample, however, indicated that they would be willing to facilitate women who wished to breastfeed or express milk in the workplace. However, these employers also stated that they saw little value to their business of supporting breastfeeding in the work environment. Thus, enhancement of breastfeeding opportunity in the work environment may come as a result of public and employer education but, more likely, will require some type of directive from official sources.

  9. THE BANGLADESHI EMPLOYMENT SECTOR: EMPLOYER PERSPECTIVES CONCERNING ENGLISH PROFICIENCY

    Directory of Open Access Journals (Sweden)

    Rubina Khan

    2012-07-01

    Full Text Available Abstract: This paper presents a brief summary of a study which was carried out to investigate how employers representing major employment sectors in the Bangladeshi Industry view the skills and English proficiency level of the current employees. Opinions were also solicited on what skills are required for fresh recruits. Semi-structured interviews were conducted with 30 employers representing the major employment sectors in Bangladeshi Industry. Results revealed the importance of English as an indispensible means of communication in the Bangladeshi corporate sector and showed that the business enterprises use extensive amounts of English. It also highlighted that the existent English proficiency of the employees was far below the required proficiency level. Recommendations were made to address the gap and prepare the youth to meet the demands of the global market. Keywords: English proficiency, competency, employability skills, global literacy skills

  10. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  11. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  12. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  13. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  14. 20 CFR 404.1003 - Employment.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Employment. 404.1003 Section 404.1003...- ) Employment, Wages, Self-Employment, and Self-Employment Income Employment § 404.1003 Employment. Employment....1010. Section 404.1004 states the general rule on the kinds of work covered as employment. Exceptions...

  15. Variable-flavor-number scheme in analysis of heavy-quark electro-production data

    International Nuclear Information System (INIS)

    Alekhin, S.; Bluemlein, J.; Klein, S.; Moch, S.

    2009-08-01

    We check the impact of the factorization scheme employed in the calculation of the heavy-quark deep-inelastic scattering (DIS) electro-production on the PDFs determined in the NNLO QCD analysis of the world inclusive neutral-current DIS data combined with the ones on the neutrino-nucleon DIS di-muon production and the fixed-target Drell-Yan process. The charm-quark DIS contribution is calculated in the general-mass variable-flavor-number (GMVFN) scheme: At asymptotically large values of the momentum transfer Q it is given by the zero-mass 4-flavor scheme and at the value of Q equal to the charm-quark mass it is smoothly matched with the 3-flavor scheme using the Buza-Matiounine-Smith-van Neerven prescription. The PDFs obtained in this variant of the fit are very similar to the ones obtained in the fit with a 3-flavor scheme employed. Our 5-flavor PDFs derived from the 3-flavor ones using the NNLO matching conditions are used to calculate the rates of W ± /Z and t anti t production at the Tevatron collider and the LHC at NNLO. (orig.)

  16. Employability Skills. At a Glance

    Science.gov (United States)

    Wibrow, Bridget

    2011-01-01

    In a competitive workforce it is not just having the right qualification or technical skills that will land an individual a job; it could very well be their interpersonal skills. How someone communicates is often the first impression an employer has of a possible worker. Yet, it is precisely communication skills that employers feel applicants are…

  17. Global Prospects for Full Employment

    Directory of Open Access Journals (Sweden)

    Ivo Šlaus

    2011-04-01

    Full Text Available The recent international financial crisis highlights the crucial role of employment in human welfare and social stability. Access to remunerative employment opportunities is essential for economic security in a market-based economic system. As the rise of democracy compelled nations to extend the voting right to all citizens, employment must be recognized as a fundamental human right. In total defiance of conventional wisdom, since 1950 job growth has outpaced the explosive growth of population, the rapid adoption of labor-saving technologies, the manifold expansion of world trade, and the dramatic shift from manual labor to white collar work. In an increasingly globalized labor market, current nation-centric theories and models of employment need to be replaced with a human-centered global perspective complemented by new indicators that recognize the central and essential contribution of employment to human economic welfare. Employment and economy are subsets of society and their growth is driven by the more fundamental process of social development. A vast array of unmet social needs combined with an enormous reservoir of underutilized social resources – technological, scientific, educational, organizational, cultural and psychological – can be harnessed to dramatically expand employment opportunities and achieve full employment on a global basis. This paper examines the theoretical basis, policy issues and strategies required to eradicate unemployment nationally and globally.

  18. Innovation, Industry Evoluation and Employment

    NARCIS (Netherlands)

    D.B. Audretsch (David); A.R. Thurik (Roy)

    1999-01-01

    textabstractThe purpose of this paper is to introduce a series of articles on the links between innovation, the evolution of industry and employment. These relations provide the building blocks of a new industrial policy. The articles are included in Innovation, Industry Evolution and Employment

  19. Maternal Employment and Adolescent Development.

    Science.gov (United States)

    Montemayor, Raymond; Clayton, Mark D.

    1983-01-01

    The relationship between maternal employment and adolescent development is enormously complex, and no simple generalizations are possible. Many intervening variables alter the impact that maternal employment has on adolescent development. There is an urgent need to discover what impact this arrangement has on adolescent development. (CJ)

  20. Employability: Review and Research Prospects

    Science.gov (United States)

    Guilbert, Laure; Bernaud, Jean-Luc; Gouvernet, Brice; Rossier, Jérôme

    2016-01-01

    Professional transition, employment, and reemployment are major concerns for nations facing adverse economic situations. The employability construct represents a scientific challenge in order to better understand the relationship between the job seekers' issues and the expectations of the world of work. This paper presents a review of the concept…

  1. Sensor employing internal reference electrode

    DEFF Research Database (Denmark)

    2013-01-01

    The present invention concerns a novel internal reference electrode as well as a novel sensing electrode for an improved internal reference oxygen sensor and the sensor employing same.......The present invention concerns a novel internal reference electrode as well as a novel sensing electrode for an improved internal reference oxygen sensor and the sensor employing same....

  2. Leading Gainful Employment Metric Reporting

    Science.gov (United States)

    Powers, Kristina; MacPherson, Derek

    2016-01-01

    This chapter will address the importance of intercampus involvement in reporting of gainful employment student-level data that will be used in the calculation of gainful employment metrics by the U.S. Department of Education. The authors will discuss why building relationships within the institution is critical for effective gainful employment…

  3. Longitudinal profile diagnostic scheme with subfemtosecond resolution for high-brightness electron beams

    Directory of Open Access Journals (Sweden)

    G. Andonian

    2011-07-01

    Full Text Available High-resolution measurement of the longitudinal profile of a relativistic electron beam is of utmost importance for linac based free-electron lasers and other advanced accelerator facilities that employ ultrashort bunches. In this paper, we investigate a novel scheme to measure ultrashort bunches (subpicosecond with exceptional temporal resolution (hundreds of attoseconds and dynamic range. The scheme employs two orthogonally oriented deflecting sections. The first imparts a short-wavelength (fast temporal resolution horizontal angular modulation on the beam, while the second imparts a long-wavelength (slow angular kick in the vertical dimension. Both modulations are observable on a standard downstream screen in the form of a streaked sinusoidal beam structure. We demonstrate, using scaled variables in a quasi-1D approximation, an expression for the temporal resolution of the scheme and apply it to a proof-of-concept experiment at the UCLA Neptune high-brightness injector facility. The scheme is also investigated for application at the SLAC NLCTA facility, where we show that the subfemtosecond resolution is sufficient to resolve the temporal structure of the beam used in the echo-enabled free-electron laser. We employ beam simulations to verify the effect for typical Neptune and NLCTA parameter sets and demonstrate the feasibility of the concept.

  4. Comparison of model Hartree-Fock type calculation schemes involving various non-degenerate and quasi-degenerate intrinsic Hamiltonians

    International Nuclear Information System (INIS)

    Amusa, A.

    1983-03-01

    Different Hamiltonians and their corresponding rotationally degenerate intrinsic counterparts are employed in the study of 18 O nucleus under the normal Hartree-Fock, as well as under six other Hartree-Fock type variational calculation schemes. The results are compared and then assessed in the light of their closeness or otherwise to the full 1s-0d basis shell model calculations for this nucleus. The use of these schemes for other shells is also considered. (author)

  5. Numerical schemes for dynamically orthogonal equations of stochastic fluid and ocean flows

    International Nuclear Information System (INIS)

    Ueckermann, M.P.; Lermusiaux, P.F.J.; Sapsis, T.P.

    2013-01-01

    The quantification of uncertainties is critical when systems are nonlinear and have uncertain terms in their governing equations or are constrained by limited knowledge of initial and boundary conditions. Such situations are common in multiscale, intermittent and non-homogeneous fluid and ocean flows. The dynamically orthogonal (DO) field equations provide an adaptive methodology to predict the probability density functions of such flows. The present work derives efficient computational schemes for the DO methodology applied to unsteady stochastic Navier–Stokes and Boussinesq equations, and illustrates and studies the numerical aspects of these schemes. Semi-implicit projection methods are developed for the mean and for the DO modes, and time-marching schemes of first to fourth order are used for the stochastic coefficients. Conservative second-order finite-volumes are employed in physical space with new advection schemes based on total variation diminishing methods. Other results include: (i) the definition of pseudo-stochastic pressures to obtain a number of pressure equations that is linear in the subspace size instead of quadratic; (ii) symmetric advection schemes for the stochastic velocities; (iii) the use of generalized inversion to deal with singular subspace covariances or deterministic modes; and (iv) schemes to maintain orthonormal modes at the numerical level. To verify our implementation and study the properties of our schemes and their variations, a set of stochastic flow benchmarks are defined including asymmetric Dirac and symmetric lock-exchange flows, lid-driven cavity flows, and flows past objects in a confined channel. Different Reynolds number and Grashof number regimes are employed to illustrate robustness. Optimal convergence under both time and space refinements is shown as well as the convergence of the probability density functions with the number of stochastic realizations.

  6. The measurement of employment benefits

    International Nuclear Information System (INIS)

    Burtraw, D.

    1994-01-01

    The consideration of employment effects and so-called 'hidden employment benefits' is one of the most confused and contentious issues in benefit-cost analysis and applied welfare economics generally. New investments create new employment opportunities, and often advocates for specific investments cite these employment opportunities as alleged benefits associated with the project. Indeed, from the local perspective, such employment opportunities may appear to be beneficial because they appear to come for free. If there is unemployment in the local area, then new investments create valuable employment opportunities for those in the local community. Even if there is full employment in the local area then new investments create incentives for immigrant from other locations that may have pecuniary benefits locally through increased property values, business revenues, etc. The focus in this study is on net economic benefits from a broad national perspective. From this perspective, many of the alleged employment benefits at the local level are offset by lost benefits at other locales, and do not count as benefits according to economic theory. This paper outlines a methodology for testing this rebuttable presumption with empirical data pertaining to labor markets that would be affected by a specific new investment. The theoretical question that is relevant is whether the social opportunity cost of new employment is less than the market wage. This would be the case, for example, if one expects unemployment or underemployment to persist in a specific region of the economy or occupational category affected by the new investment. In this case, new employment opportunities produce a net increase in social wealth rather than just a transfer of income

  7. The measurement of employment benefits

    Energy Technology Data Exchange (ETDEWEB)

    Burtraw, D

    1994-07-01

    The consideration of employment effects and so-called 'hidden employment benefits' is one of the most confused and contentious issues in benefit-cost analysis and applied welfare economics generally. New investments create new employment opportunities, and often advocates for specific investments cite these employment opportunities as alleged benefits associated with the project. Indeed, from the local perspective, such employment opportunities may appear to be beneficial because they appear to come for free. If there is unemployment in the local area, then new investments create valuable employment opportunities for those in the local community. Even if there is full employment in the local area then new investments create incentives for immigrant from other locations that may have pecuniary benefits locally through increased property values, business revenues, etc. The focus in this study is on net economic benefits from a broad national perspective. From this perspective, many of the alleged employment benefits at the local level are offset by lost benefits at other locales, and do not count as benefits according to economic theory. This paper outlines a methodology for testing this rebuttable presumption with empirical data pertaining to labor markets that would be affected by a specific new investment. The theoretical question that is relevant is whether the social opportunity cost of new employment is less than the market wage. This would be the case, for example, if one expects unemployment or underemployment to persist in a specific region of the economy or occupational category affected by the new investment. In this case, new employment opportunities produce a net increase in social wealth rather than just a transfer of income.

  8. Benefit Reentitlement Conditions in Unemployment Insurance Schemes

    DEFF Research Database (Denmark)

    Andersen, Torben M.; Christoffersen, Mark Strøm; Svarer, Michael

    and employment requirements are substitute instruments in affecting job search incentives and thus gross unemployment. We analyse the optimal design of the unemployment insurance system (benefit levels, duration and employment requirements) under a utilitarian social welfare function. Simulations show...

  9. Numerical solution of special ultra-relativistic Euler equations using central upwind scheme

    Science.gov (United States)

    Ghaffar, Tayabia; Yousaf, Muhammad; Qamar, Shamsul

    2018-06-01

    This article is concerned with the numerical approximation of one and two-dimensional special ultra-relativistic Euler equations. The governing equations are coupled first-order nonlinear hyperbolic partial differential equations. These equations describe perfect fluid flow in terms of the particle density, the four-velocity and the pressure. A high-resolution shock-capturing central upwind scheme is employed to solve the model equations. To avoid excessive numerical diffusion, the considered scheme avails the specific information of local propagation speeds. By using Runge-Kutta time stepping method and MUSCL-type initial reconstruction, we have obtained 2nd order accuracy of the proposed scheme. After discussing the model equations and the numerical technique, several 1D and 2D test problems are investigated. For all the numerical test cases, our proposed scheme demonstrates very good agreement with the results obtained by well-established algorithms, even in the case of highly relativistic 2D test problems. For validation and comparison, the staggered central scheme and the kinetic flux-vector splitting (KFVS) method are also implemented to the same model. The robustness and efficiency of central upwind scheme is demonstrated by the numerical results.

  10. Application of Intel Many Integrated Core (MIC) accelerators to the Pleim-Xiu land surface scheme

    Science.gov (United States)

    Huang, Melin; Huang, Bormin; Huang, Allen H.

    2015-10-01

    The land-surface model (LSM) is one physics process in the weather research and forecast (WRF) model. The LSM includes atmospheric information from the surface layer scheme, radiative forcing from the radiation scheme, and precipitation forcing from the microphysics and convective schemes, together with internal information on the land's state variables and land-surface properties. The LSM is to provide heat and moisture fluxes over land points and sea-ice points. The Pleim-Xiu (PX) scheme is one LSM. The PX LSM features three pathways for moisture fluxes: evapotranspiration, soil evaporation, and evaporation from wet canopies. To accelerate the computation process of this scheme, we employ Intel Xeon Phi Many Integrated Core (MIC) Architecture as it is a multiprocessor computer structure with merits of efficient parallelization and vectorization essentials. Our results show that the MIC-based optimization of this scheme running on Xeon Phi coprocessor 7120P improves the performance by 2.3x and 11.7x as compared to the original code respectively running on one CPU socket (eight cores) and on one CPU core with Intel Xeon E5-2670.

  11. Quantitative analysis and demonstration of modified triple-branch signal detection scheme for SAC-OCDMA systems

    Science.gov (United States)

    Chen, Fujun; Feng, Gang; Zhang, Siwei

    2016-10-01

    The triple-branch signal detection (TBSD) scheme can eliminate multiple-user interference (MUI) without fixed in-phase cross-correlation (IPCC) stipulation in the spectral-amplitude-coding optical code division multiple access (SACOCDMA) systems. In this paper, we modify the traditional TBSD scheme and theoretically analyze the principle of the MUI elimination. Then, the bit-error-rate (BER) performance of the modified TBSD scheme is investigated under multiple transmission rates. The results show that the modified TBSD employing the codes with unfixed IPCC can achieve simultaneous optical code recognition and MUI elimination in the SAC-OCDMA.

  12. Additional employer and employee obligations of the contract of employment

    OpenAIRE

    Jankauskaitė, Vaida

    2009-01-01

    Economic growth since 2001 till 2008 start leaded to higher incomes for both employers and employees, many new jobs were created. The unemployment rate in Lithuania was particularly low, moreover, according to official statistics, nearly half a million people emigrated from Lithuania. Labor market challenges and economic patterns determined the principles of the labor law and the content of the norms, public social and political conditions. Employers, through businesses, noticed that it has b...

  13. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  14. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  15. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  16. Pressing Issues of Disability Employment

    Directory of Open Access Journals (Sweden)

    Shabunova Aleksandra Anatol’evna

    2017-01-01

    Full Text Available Disability employment is a major tool for creating inclusive society. In Russia, the main obstacles to employment of the disabled are imperfect statutory measures aimed at improving competitiveness of this population group in the labor market; low prestige of jobs for people with disabilities; the employers’ unwillingness to hire disabled people. The purpose of this study is to determine the barriers disabled people face on the labor market and to justify the expedience of investing public funds in activities aimed at promoting disabled employment. Works of Russian and foreign authors, national statistics, results of sociological surveys of the population and people with disabilities conducted on the territory of the Vologda Oblast in 2013–2015 represent the information base of the study. The article reviews the impact of employment quotas for the disabled; in particular, it has been established that the number of the employed under such quotas during the period from 2008 to 2014 has declined. Based on the results of domestic research the authors have determined the reasons underlying lack of effectiveness of this social policy tool. One of the problems of promoting disability employment is training and re-training of the disabled. According to official statistics, only 38% of the employed disabled who live in a city are employed in the area of their specialty. At the same time, the results of research h of Russian authors show that training of an expert (even with consideration of their health capacities pays off within 4 years. Using the example of the Vologda Oblast, the authors show that annual tax revenues in employment of the disabled to jobs with wages close to the regional average may reach 33 million rubles. They also estimate the approximate regional cost of workplace equipment for the disabled. Finally, the authors propose a list of key courses of action on increasing competitiveness of the disabled in the labor market

  17. Employment Discrimination against LGBT Utahns

    OpenAIRE

    Rosky, Clifford; Mallory, Christy; Smith, Jenni; Badgett, M.V. Lee

    2011-01-01

    This study analyzes data from a 2010 survey on the employment experiences of 939 LGBT people living in Utah.  The study found that 44% of LGB people and 66% of transgender people in Utah have experienced employment discrimination.  The data showed that employment discrimination based on sexual orientation and gender identity currently occurs in Utah, with close to 30% of LGB respondents and 45% of transgender respondents reporting that they experienced some form of workplace harassment on a w...

  18. Employability of Nursing Care Graduates

    Directory of Open Access Journals (Sweden)

    Donik Barbara

    2015-12-01

    Full Text Available Starting points: In Slovenia, the higher education institution for nursing started exploring employability opportunities in nursing care in connection with the achievement of competencies from students’ and employers’ point of view. This article highlights the importance of monitoring nursing graduates’ employability. Its aim is to examine the employability of nursing care graduates based on the self-evaluation of competences obtained during the last study year and to establish a link between the self-evaluation of competences and students’ academic performance.

  19. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  20. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  1. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  2. Planning Framework for Mesolevel Optimization of Urban Runoff Control Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Qianqian; Blohm, Andrew; Liu, Bo

    2017-04-01

    A planning framework is developed to optimize runoff control schemes at scales relevant for regional planning at an early stage. The framework employs less sophisticated modeling approaches to allow a practical application in developing regions with limited data sources and computing capability. The methodology contains three interrelated modules: (1)the geographic information system (GIS)-based hydrological module, which aims at assessing local hydrological constraints and potential for runoff control according to regional land-use descriptions; (2)the grading module, which is built upon the method of fuzzy comprehensive evaluation. It is used to establish a priority ranking system to assist the allocation of runoff control targets at the subdivision level; and (3)the genetic algorithm-based optimization module, which is included to derive Pareto-based optimal solutions for mesolevel allocation with multiple competing objectives. The optimization approach describes the trade-off between different allocation plans and simultaneously ensures that all allocation schemes satisfy the minimum requirement on runoff control. Our results highlight the importance of considering the mesolevel allocation strategy in addition to measures at macrolevels and microlevels in urban runoff management. (C) 2016 American Society of Civil Engineers.

  3. Godunov-type schemes for hydrodynamic and magnetohydrodynamic modeling

    International Nuclear Information System (INIS)

    Vides-Higueros, Jeaniffer

    2014-01-01

    The main objective of this thesis concerns the study, design and numerical implementation of finite volume schemes based on the so-Called Godunov-Type solvers for hyperbolic systems of nonlinear conservation laws, with special attention given to the Euler equations and ideal MHD equations. First, we derive a simple and genuinely two-Dimensional Riemann solver for general conservation laws that can be regarded as an actual 2D generalization of the HLL approach, relying heavily on the consistency with the integral formulation and on the proper use of Rankine-Hugoniot relations to yield expressions that are simple enough to be applied in the structured and unstructured contexts. Then, a comparison between two methods aiming to numerically maintain the divergence constraint of the magnetic field for the ideal MHD equations is performed and we show how the 2D Riemann solver can be employed to obtain robust divergence-Free simulations. Next, we derive a relaxation scheme that incorporates gravity source terms derived from a potential into the hydrodynamic equations, an important problem in astrophysics, and finally, we review the design of finite volume approximations in curvilinear coordinates, providing a fresher view on an alternative discretization approach. Throughout this thesis, numerous numerical results are shown. (author) [fr

  4. Regulation control and energy management scheme for wireless power transfer

    Science.gov (United States)

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  5. Scheme-scale ambiguity in analysis of QCD observable

    International Nuclear Information System (INIS)

    Mirjalili, A.; Kniehl, B.A.

    2010-01-01

    The scheme-scale ambiguity that has plagued perturbative analysis in QCD remains on obstacle to making precise tests of the theory. Many attempts have been done to resolve the scale ambiguity. In this regard the BLM, EC, PMS and CORGI approaches are more distinct. We try to employ these methods to fix the scale ambiguity at NLO, NNLO and even in more higher order approximations. By optimizing the renormalization scale, there will be a possibility to predicate higher order terms. We present general results for predicted terms at any order, using different optimization methods. Some observable as specific examples will be used to indicate the validity of scale fixing to predicate the higher order terms. (authors)

  6. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  7. An adaptive Cartesian control scheme for manipulators

    Science.gov (United States)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  8. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  9. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  10. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  11. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  12. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  13. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  14. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  15. Employer Branding: An Islamic Perspective

    Directory of Open Access Journals (Sweden)

    Norasyikin binti Shaikh Ibrahim

    2017-05-01

    Full Text Available This paper discusses employer branding from an Islamic perspective. Islam is away of life and so do the employer and employee relationship, which strengthensemployer branding in an organization. The definition, importance and processrelated to employer branding are discussed in the context of human resource management, such as job satisfaction and work environment. In addition to that, related human resource management practices such as recruitment andselection were discussed in an Islamic context. Related concepts such as employeevalue proposition (EVP, ethics and Islamic values were discussed with referencefrom Al-Quran and Hadith. The paper concludes with a few suggestions andrecommendations on instilling Islamic values for effective employer branding.

  16. Office of Disability Employment Policy

    Science.gov (United States)

    ... STATES DEPARTMENT OF LABOR Facebook Twitter RSS Email Office of Disability Employment Policy (ODEP) Menu About ODEP ... LABOR DEPARTMENT Español A to Z Index Agencies Office of Inspector General Leadership Team Contact Us Subscribe ...

  17. Consultation Services for the Employer

    National Research Council Canada - National Science Library

    1997-01-01

    The Occupational Safety and Health Administration (OSHA) is sensitive to the difficulties faced by employers who are genuinely concerned with their employees' safety and health and who wish to comply with OSHA regulations...

  18. Veterans' Employment and Training Service

    Science.gov (United States)

    ... Find a Job Veterans.Gov Apprenticeship Occupations and Careers Women Who Served Programs & Services Transition GPS Frequently Asked Questions Hire a Veteran Find qualified Veterans Policy & Compliance Employer Toolkit Apprenticeships HIRE Vets Medallion Program Service Providers Grants & ...

  19. Maternal employment and birth outcomes

    DEFF Research Database (Denmark)

    Wüst, Miriam

    selection of mothers between pregnancies drives the results, I focus on mothers whose change in employment status is likely not to be driven by underlying health (unemployed mothers and students). Given generous welfare bene ts and strict workplace regulations in Denmark, my findings support a residual......I use Danish survey and administrative data to examine the impact of maternal employment during pregnancy on birth outcomes. As healthier mothers are more likely to work and health shocks to mothers may impact employment and birth outcomes, I combine two strategies: First, I control extensively...... for time-varying factors that may correlate with employment and birth outcomes, such as pre-pregnancy family income and maternal occupation, pregnancy-related health shocks, maternal sick listing, and health behaviors (smoking and alcohol consumption). Second, to account for remaining time...

  20. Making sense of employer collectivism

    DEFF Research Database (Denmark)

    Ibsen, Christian Lyhne

    2016-01-01

    This conceptual article argues that preferences of employers for collective action cannot be reduced to rational actors making decisions based on market structures or institutional logics. Both markets and institutions are inherently ambiguous and employers therefore have to settle for plausible...... – rather than accurate – rational strategies among many alternatives through so-called sensemaking. Sensemaking refers to the process by which employers continuously make sense of their competitive environment by building causal stories of competitive advantages. The article therefore tries to provide......, unlike countries in similar situations, for example Finland and Sweden, Danish employers retained a coordinated industry-level bargaining system, which makes it an interesting paradox to study from the vantage point of sensemaking....

  1. Caseworker Behavior and Clients' Employability

    DEFF Research Database (Denmark)

    Weatherall, Cecilie Dohlmann; Markwardt, Kristoffer

    experience, economic environment, and rules and restrictions with respect to active labor market policies. A few studies show that organizational structures and managerial organization within the unemployment offices also influence the employability of unemployed clients. But until now, no studies have...... empirically looked at the link between caseworker behavior and clients’ employability. A very rich survey dataset on caseworker behavior combined with informative panel data on the caseworker’s client—the unemployed—makes it possible to study the link between caseworker behavior and clients’ job possibilities....... Results show that there is a relationship between caseworker behavior and employment among the unemployed. Especially the employability among the insured unemployed is related to the concepts of coping, and professional distance....

  2. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  3. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  4. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  5. Group Buying Schemes : A Sustainable Business Model?

    OpenAIRE

    Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus

    2013-01-01

    Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...

  6. New Imaging Operation Scheme at VLTI

    Science.gov (United States)

    Haubois, Xavier

    2018-04-01

    After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.

  7. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  8. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  9. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  10. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  11. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  12. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  13. Globalization and protection of employment

    OpenAIRE

    Fischer, Justina A.V.; Somogyi, Frank

    2012-01-01

    Unionists and politicians frequently claim that globalization lowers employment protection of workers. This paper tests this hypothesis in a panel of 28 OECD countries from 1985 to 2003, differentiating between three dimensions of globalization and two labor market segments. While overall globalization is shown to loosen protection of the regularly employed, it increases regulation in the segment of limited-term contracts. We find economic and political globalization to drive deregulation ...

  14. Employment impacts of alcohol taxes.

    Science.gov (United States)

    Wada, Roy; Chaloupka, Frank J; Powell, Lisa M; Jernigan, David H

    2017-12-01

    There is strong scientific evidence supporting the effectiveness of increasing alcohol taxes for reducing excessive alcohol consumption and related problems. Opponents have argued that alcohol tax increases lead to job losses. However, there has been no comprehensive economic analysis of the impact of alcohol taxes on employment. To fill this gap, a regional macroeconomic simulation model was used to assess the net impact of two hypothetical alcohol tax increases (a 5-cent per drink excise tax increase and a 5% sales tax increase on beer, wine, and distilled spirits, respectively) on employment in Arkansas, Florida, Massachusetts, New Mexico, and Wisconsin. The model accounted for changes in alcohol demand, average state income, and substitution effects. The employment impact of spending the new tax revenue on general expenditures versus health care was also assessed. Simulation results showed that a 5-cent per drink additional excise tax on alcoholic beverages with new tax revenues allocated to general expenditures increased net employment in Arkansas (802 jobs); Florida (4583 jobs); Massachusetts (978 jobs); New Mexico (653 jobs); and Wisconsin (1167 jobs). A 5% additional sales tax also increased employment in Arkansas (789 jobs; Florida (4493 jobs); Massachusetts (898 jobs); New Mexico (621 jobs); and Wisconsin (991 jobs). Using new alcohol tax revenues to fund health care services resulted in slightly lower net increases in state employment. The overall economic impact of alcohol tax increases cannot be fully assessed without accounting for the job gains resulting from additional tax revenues. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Employment protection legislation in Croatia

    Directory of Open Access Journals (Sweden)

    Marina Kunovac

    2014-06-01

    Full Text Available According to business climate and competitiveness indicators published by international organisations, Croatia is a country with a rigid labour market and a high level of the legal protection of employees. Given that an Act on Amendments to the Labour Act (OG 73/13 entered into force in Croatia in June 2013, this paper examines changes in employment protection legislation in Croatia and Central and Eastern European (CEE countries, as well as in Croatia's main trading partners during the period between 2008 and 2013. A cross-country comparison shows a strong downward trend in legal employment protection in most CEE countries during the observed period, primarily as concerns individual dismissal in the cases of regular employment contracts, while in the case of temporary employment the protection strengthened slightly. On the other hand, despite the adoption of amendments to the Labour Act (LA, Croatian labour legislation governing employment protection for regular employment contracts remains relatively inflexible compared to that in other countries.

  16. Employer contribution and premium growth in health insurance.

    Science.gov (United States)

    Liu, Yiyan; Jin, Ginger Zhe

    2015-01-01

    We study whether employer premium contribution schemes could impact the pricing behavior of health plans and contribute to rising premiums. Using 1991-2011 data before and after a 1999 premium subsidy policy change in the Federal Employees Health Benefits Program (FEHBP), we find that the employer premium contribution scheme has a differential impact on health plan pricing based on two market incentives: 1) consumers are less price sensitive when they only need to pay part of the premium increase, and 2) each health plan has an incentive to increase the employer's premium contribution to that plan. Both incentives are found to contribute to premium growth. Counterfactual simulation shows that average premium would have been 10% less than observed and the federal government would have saved 15% per year on its premium contribution had the subsidy policy change not occurred in the FEHBP. We discuss the potential of similar incentives in other government-subsidized insurance systems such as the Medicare Part D and the Health Insurance Marketplace under the Affordable Care Act. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  18. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  19. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  20. A Suboptimal Power-Saving Transmission Scheme in Multiple Component Carrier Networks

    Science.gov (United States)

    Chung, Yao-Liang; Tsai, Zsehong

    Power consumption due to transmissions in base stations (BSs) has been a major contributor to communication-related CO2 emissions. A power optimization model is developed in this study with respect to radio resource allocation and activation in a multiple Component Carrier (CC) environment. We formulate and solve the power-minimization problem of the BS transceivers for multiple-CC networks with carrier aggregation, while maintaining the overall system and respective users' utilities above minimum levels. The optimized power consumption based on this model can be viewed as a lower bound of that of other algorithms employed in practice. A suboptimal scheme with low computation complexity is proposed. Numerical results show that the power consumption of our scheme is much better than that of the conventional one in which all CCs are always active, if both schemes maintain the same required utilities.

  1. A Joint Watermarking and ROI Coding Scheme for Annotating Traffic Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Su Po-Chyi

    2010-01-01

    Full Text Available We propose a new application of information hiding by employing the digital watermarking techniques to facilitate the data annotation in traffic surveillance videos. There are two parts in the proposed scheme. The first part is the object-based watermarking, in which the information of each vehicle collected by the intelligent transportation system will be conveyed/stored along with the visual data via information hiding. The scheme is integrated with H.264/AVC, which is assumed to be adopted by the surveillance system, to achieve an efficient implementation. The second part is a Region of Interest (ROI rate control mechanism for encoding traffic surveillance videos, which helps to improve the overall performance. The quality of vehicles in the video will be better preserved and a good rate-distortion performance can be attained. Experimental results show that this potential scheme works well in traffic surveillance videos.

  2. Application of the implicit MacCormack scheme to the parabolized Navier-Stokes equations

    Science.gov (United States)

    Lawrence, J. L.; Tannehill, J. C.; Chaussee, D. S.

    1984-01-01

    MacCormack's implicit finite-difference scheme was used to solve the two-dimensional parabolized Navier-Stokes (PNS) equations. This method for solving the PNS equations does not require the inversion of block tridiagonal systems of algebraic equations and permits the original explicit MacCormack scheme to be employed in those regions where implicit treatment is not needed. The advantages and disadvantages of the present adaptation are discussed in relation to those of the conventional Beam-Warming scheme for a flat plate boundary layer test case. Comparisons are made for accuracy, stability, computer time, computer storage, and ease of implementation. The present method was also applied to a second test case of hypersonic laminar flow over a 15% compression corner. The computed results compare favorably with experiment and a numerical solution of the complete Navier-Stokes equations.

  3. Convolutional Code Based PAPR Reduction Scheme for Multicarrier Transmission with Higher Number of Subcarriers

    Directory of Open Access Journals (Sweden)

    SAJJAD ALIMEMON

    2017-10-01

    Full Text Available Multicarrier transmission technique has become a prominent transmission technique in high-speed wireless communication systems. It is due to its frequency diversity,small inter-symbol interference in the multipath fading channel, simple equalizer structure, and high bandwidth efficiency. Nevertheless, in thetime domain, multicarrier transmission signal has high PAPR (Peak-to-Average Power Ratio thatinterprets to low power amplifier efficiencies. To decrease the PAPR, a CCSLM (Convolutional Code Selective Mapping scheme for multicarrier transmission with a high number of subcarriers is proposed in this paper. Proposed scheme is based on SLM method and employs interleaver and convolutional coding. Related works on the PAPR reduction have considered either 128 or 256 number of subcarriers. However, PAPR of multicarrier transmission signal will increase as a number of subcarriers increases. The proposed method achieves significant PAPR reduction for ahigher number of subcarriers as well as better power amplifier efficiency. Simulation outcomes validate the usefulness of projected scheme.

  4. Linear and nonlinear schemes applied to pitch control of wind turbines.

    Science.gov (United States)

    Geng, Hua; Yang, Geng

    2014-01-01

    Linear controllers have been employed in industrial applications for many years, but sometimes they are noneffective on the system with nonlinear characteristics. This paper discusses the structure, performance, implementation cost, advantages, and disadvantages of different linear and nonlinear schemes applied to the pitch control of the wind energy conversion systems (WECSs). The linear controller has the simplest structure and is easily understood by the engineers and thus is widely accepted by the industry. In contrast, nonlinear schemes are more complicated, but they can provide better performance. Although nonlinear algorithms can be implemented in a powerful digital processor nowadays, they need time to be accepted by the industry and their reliability needs to be verified in the commercial products. More information about the system nonlinear feature is helpful to simplify the controller design. However, nonlinear schemes independent of the system model are more robust to the uncertainties or deviations of the system parameters.

  5. Gaming across different consoles: exploring the influence of control scheme on game-player enjoyment.

    Science.gov (United States)

    Limperos, Anthony M; Schmierbach, Michael G; Kegerise, Andrew D; Dardis, Frank E

    2011-06-01

    Many studies have investigated how different technological features impact the experience of playing video games, yet few have focused on how control schemes may affect the play experience. This research employed a between-subjects design to explore the relationship between the type of console played (Nintendo Wii, Playstation 2) and feelings of flow and enjoyment during the game-play experience. Results indicated that participants reported greater feelings of control and enjoyment with a traditional control scheme (Playstation 2) than with the more technologically advanced control scheme (Nintendo Wii). Further mediation analysis showed that enjoyment was driven by the sense of control that participants experienced and not simply by whether they won the game. Theoretical and practical implications are discussed.

  6. Employer attractiveness from a generational perspective: Implications for employer branding

    Directory of Open Access Journals (Sweden)

    Germano Glufke Reis

    2016-03-01

    Full Text Available ABSTRACT This study aimed to identify the employer attractiveness factors prioritized by different generations: Baby Boomers, Generation X, and Generation Y. The survey was conducted with a sample of 937 professionals, working in various areas and companies, most of them were managers and had a high education level. The Employer Attractiveness Scale proposed by Berthon et al. (2005 was adopted and the results indicate that, when choosing a company, the generations under study have specific features regarding the attractiveness attributes they prioritize. It was also observed that Generation Y discriminates and ranks such attributes more clearly than the others. Possible implications for employer branding and research limitations are discussed at the end of the article.

  7. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    scheme is a model of a decentralised entity whose importance lies at improving food security and employment creation within the community, it falls short in representing a downwardly accountable decentralised irrigation scheme. The scheme is faced with various challenges which include its operation which is below capacity utilisation, absence of specialised technical human personnel to address infrastructural breakdowns, uneven distribution of water pressure, incapacitated Irrigation Management Committee (IMC), absence of a locally legitimate constitution, compromised beneficiary participation and unclear lines of communication between various institutions involved in water management. Understanding decentralization is important since one of the key tenets of IWRM is stakeholder participation which the decentralization framework interrogates.

  8. Employee to employer communication skills: balancing cancer treatment and employment.

    Science.gov (United States)

    Brown, Richard F; Owens, Myra; Bradley, Cathy

    2013-02-01

    Cancer patients face difficulties in accessing legally mandated benefits and accommodations when they return to the workplace. Poor employer-employee communication inflates these difficulties. Although proven methods to facilitate physician-patient communication exist, these have not been applied to the workplace. Thus, we aimed to assess the feasibility and utility of applying these methods to educate patients about their workplace rights and provide them with communication skills training to aid their conversations with their employers. A DVD was produced to educate patients and facilitate workplace communication. Participants consisted of 28 solid tumor cancer patients (14 women and 14 men) who completed primary cancer treatment in the past 12 months and were employed at the time of diagnosis. Participants watched a communication skills training DVD and completed a telephone interview. The interview elicited information about workplace experiences and evaluation of the DVD training program. The physician-patient communication skills training model utilized was successfully translated to the employer-employee setting. All but one participant found the DVD useful and easy to understand and indicated a high degree of confidence in using the communication skills to help them ask for workplace accommodations. All participants agreed that it would help newly diagnosed patients in discussions with their employers. Our data provides promising preliminary evidence that patient communication skills training can be applied to the workplace setting and is a welcomed aid to newly diagnosed cancer patients in their discussions with employers regarding the impact of treatment on their work performance and needs for accommodations. Copyright © 2011 John Wiley & Sons, Ltd.

  9. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  10. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  11. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  12. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  13. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  14. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.

  15. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  16. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  17. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  18. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  19. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  20. Parallel knock-out schemes in networks

    NARCIS (Netherlands)

    Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.

    2004-01-01

    We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel

  1. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  2. The complete flux scheme in cylindrical coordinates

    NARCIS (Netherlands)

    Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.

    2014-01-01

    We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection

  3. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  4. Harmonic generation with multiple wiggler schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)

    1995-02-01

    In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.

  5. Zero leakage quantization scheme for biometric verification

    NARCIS (Netherlands)

    Groot, de J.A.; Linnartz, J.P.M.G.

    2011-01-01

    Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if

  6. A classification scheme for LWR fuel assemblies

    International Nuclear Information System (INIS)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs

  7. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  8. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  9. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  10. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  11. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  12. Simple Numerical Schemes for the Korteweg-deVries Equation

    Energy Technology Data Exchange (ETDEWEB)

    C. J. McKinstrie; M. V. Kozlov

    2000-12-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.

  13. Electricity storage using a thermal storage scheme

    Energy Technology Data Exchange (ETDEWEB)

    White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)

    2015-01-22

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  14. Employability and Employment Outcomes of No-Fee Preservice Students

    Science.gov (United States)

    Jin, Yule; Li, Ling; Ding, Shujing; Li, Zhichao

    2013-01-01

    This study used interviews and questionnaires to survey 770 no-fee preservice students. Its findings were as follows: (1) Their employability encompasses five dimensions: teaching skills, ability to learn specialized knowledge, ability to grasp elementary and secondary teaching materials and methods, communication skills, and ability to apply for…

  15. Employers' Attitudes toward Employing People with Mental Handicap.

    Science.gov (United States)

    Tse, John W. L.

    1993-01-01

    A survey of 66 Hong Kong companies and factories identified factors affecting employers' decisions to hire workers with mental handicaps. The five most important factors were emotional problems and personalities of workers, workers' ability to perform the job, availability of low-level jobs, productivity of workers, and possible special…

  16. 29 CFR 779.19 - Employer, employee, and employ.

    Science.gov (United States)

    2010-07-01

    ... POLICY OR INTERPRETATION NOT DIRECTLY RELATED TO REGULATIONS THE FAIR LABOR STANDARDS ACT AS APPLIED TO... of oppressive child labor. The Act provides its own definitions of “employer,” “employee”, and... relation to an employee but shall not include the United States or any State or political subdivision of a...

  17. Graduates' Employability: What Do Graduates and Employers Think?

    Science.gov (United States)

    Matsouka, Kyriaki; Mihail, Dimitrios M.

    2016-01-01

    The purpose of this article is to investigate the views of university graduates and human resource managers (HRMs) on graduates' employability in terms of the soft skills required by the labour market. Soft skills (personal attributes that enhance an individual's interactions, job performance and career prospects) are necessary in the labour…

  18. Weighted divergence correction scheme and its fast implementation

    Science.gov (United States)

    Wang, ChengYue; Gao, Qi; Wei, RunJie; Li, Tian; Wang, JinJun

    2017-05-01

    Forcing the experimental volumetric velocity fields to satisfy mass conversation principles has been proved beneficial for improving the quality of measured data. A number of correction methods including the divergence correction scheme (DCS) have been proposed to remove divergence errors from measurement velocity fields. For tomographic particle image velocimetry (TPIV) data, the measurement uncertainty for the velocity component along the light thickness direction is typically much larger than for the other two components. Such biased measurement errors would weaken the performance of traditional correction methods. The paper proposes a variant for the existing DCS by adding weighting coefficients to the three velocity components, named as the weighting DCS (WDCS). The generalized cross validation (GCV) method is employed to choose the suitable weighting coefficients. A fast algorithm for DCS or WDCS is developed, making the correction process significantly low-cost to implement. WDCS has strong advantages when correcting velocity components with biased noise levels. Numerical tests validate the accuracy and efficiency of the fast algorithm, the effectiveness of GCV method, and the advantages of WDCS. Lastly, DCS and WDCS are employed to process experimental velocity fields from the TPIV measurement of a turbulent boundary layer. This shows that WDCS achieves a better performance than DCS in improving some flow statistics.

  19. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Directory of Open Access Journals (Sweden)

    Muhammad Hameed Siddiqi

    2013-12-01

    Full Text Available Over the last decade, human facial expressions recognition (FER has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER.

  20. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Science.gov (United States)

    Siddiqi, Muhammad Hameed; Lee, Sungyoung; Lee, Young-Koo; Khan, Adil Mehmood; Truc, Phan Tran Ho

    2013-01-01

    Over the last decade, human facial expressions recognition (FER) has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER) system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER. PMID:24316568

  1. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  2. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  3. Labour Supply Effects of a Subsidised Old-Age Part-Time Scheme in Austria

    OpenAIRE

    Nikolaus Graf; Helmut Hofer; Rudolf Winter-Ebmer

    2009-01-01

    In this paper we evaluate the impact of the old-age part-time scheme (OAPT) on the Austrian labour market which was a policy to allow flexible retirement options for the elderly with an aim to increase labour supply. According to our matching estimates employment probability increases slightly, especially in the first two years after entrance into the programme. Furthermore, the programme seems to reduce the measured unemployment risk. However, the total number of hours worked is significantl...

  4. Gender and Self-Employment: The Role of Mini-Companies

    Science.gov (United States)

    Johansen, Vegard

    2016-01-01

    Purpose: The purpose of this paper is to evaluate to what degree participation in mini-companies impact young women and men with regard to the perceived desirability and perceived feasibility of self-employment. The Company Programme (CP) is the largest mini-company scheme in European secondary school. Design/methodology/approach: The data derived…

  5. Women's Declining Employment with Access to Higher Education: Issues and Challenges

    Science.gov (United States)

    Sangar, Sunita

    2014-01-01

    Access to higher education opened up avenues for more women workforce in decent employment contributing to the national economy. Government policies/schemes played a significant role in improving this significant indicator of women empowerment. This access also had an impact on their enrolment and choice of subjects but was accompanied by several…

  6. Efficient multichannel acoustic echo cancellation using constrained tap selection schemes in the subband domain

    Science.gov (United States)

    Desiraju, Naveen Kumar; Doclo, Simon; Wolff, Tobias

    2017-12-01

    Acoustic echo cancellation (AEC) is a key speech enhancement technology in speech communication and voice-enabled devices. AEC systems employ adaptive filters to estimate the acoustic echo paths between the loudspeakers and the microphone(s). In applications involving surround sound, the computational complexity of an AEC system may become demanding due to the multiple loudspeaker channels and the necessity of using long filters in reverberant environments. In order to reduce the computational complexity, the approach of partially updating the AEC filters is considered in this paper. In particular, we investigate tap selection schemes which exploit the sparsity present in the loudspeaker channels for partially updating subband AEC filters. The potential for exploiting signal sparsity across three dimensions, namely time, frequency, and channels, is analyzed. A thorough analysis of different state-of-the-art tap selection schemes is performed and insights about their limitations are gained. A novel tap selection scheme is proposed which overcomes these limitations by exploiting signal sparsity while not ignoring any filters for update in the different subbands and channels. Extensive simulation results using both artificial as well as real-world multichannel signals show that the proposed tap selection scheme outperforms state-of-the-art tap selection schemes in terms of echo cancellation performance. In addition, it yields almost identical echo cancellation performance as compared to updating all filter taps at a significantly reduced computational cost.

  7. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  8. A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher

    Science.gov (United States)

    Kumari, Manju; Gupta, Shailender

    2018-03-01

    As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.

  9. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  10. Development of the KOSHA Proficiency Testing Scheme on Asbestos Analysis in Korea

    Directory of Open Access Journals (Sweden)

    Jiwoon Kwon

    2017-09-01

    Full Text Available This commentary presents the regulatory backgrounds and development of the national proficiency testing (PT scheme on asbestos analysis in the Republic of Korea. Since 2009, under the amended Occupational Safety and Health Act, the survey of asbestos in buildings and clearance test of asbestos removal works have been mandated to be carried out by the laboratories designated by the Ministry of Employment and Labor (MOEL in the Republic of Korea. To assess the performance of asbestos laboratories, a PT scheme on asbestos analysis was launched by the Korea Occupational Safety and Health Agency (KOSHA on behalf of the MOEL in 2007. Participating laboratories are evaluated once a year for fiber counting and bulk asbestos analysis by phase contrast microscopy and polarized light microscopy, respectively. Currently, the number of laboratory enrollments is > 200, and the percentage of passed laboratories is > 90. The current status and several significant changes in operation, sample preparations, and statistics of assigning the reference values of the KOSHA PT scheme on asbestos analysis are presented. Critical retrospect based on the experiences of operating the KOSHA PT scheme suggests considerations for developing a new national PT scheme for asbestos analysis.

  11. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  12. Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding.

    Science.gov (United States)

    Lai, Hong; Zhang, Jun; Luo, Ming-Xing; Pan, Lei; Pieprzyk, Josef; Xiao, Fuyuan; Orgun, Mehmet A

    2016-08-12

    With prevalent attacks in communication, sharing a secret between communicating parties is an ongoing challenge. Moreover, it is important to integrate quantum solutions with classical secret sharing schemes with low computational cost for the real world use. This paper proposes a novel hybrid threshold adaptable quantum secret sharing scheme, using an m-bonacci orbital angular momentum (OAM) pump, Lagrange interpolation polynomials, and reverse Huffman-Fibonacci-tree coding. To be exact, we employ entangled states prepared by m-bonacci sequences to detect eavesdropping. Meanwhile, we encode m-bonacci sequences in Lagrange interpolation polynomials to generate the shares of a secret with reverse Huffman-Fibonacci-tree coding. The advantages of the proposed scheme is that it can detect eavesdropping without joint quantum operations, and permits secret sharing for an arbitrary but no less than threshold-value number of classical participants with much lower bandwidth. Also, in comparison with existing quantum secret sharing schemes, it still works when there are dynamic changes, such as the unavailability of some quantum channel, the arrival of new participants and the departure of participants. Finally, we provide security analysis of the new hybrid quantum secret sharing scheme and discuss its useful features for modern applications.

  13. Industrial wastewater treatment network based on recycling and rerouting strategies for retrofit design schemes

    DEFF Research Database (Denmark)

    Sueviriyapan, Natthapong; Suriyapraphadilok, Uthaiporn; Siemanond, Kitipat

    2015-01-01

    a generic model-based synthesis and design framework for retrofit wastewater treatment networks (WWTN) of an existing industrial process. The developed approach is suitable for grassroots and retrofit systems and adaptable to a wide range of wastewater treatment problems. A sequential solution procedure...... is employed to solve a network superstructure-based optimization problem formulated as Mixed Integer Linear and/or Non-Linear Programming (MILP/MINLP). Data from a petroleum refinery effluent treatment plant together with special design constraints are employed to formulate different design schemes based...... for the future development of the existing wastewater treatment process....

  14. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  15. Childcare Programs Benefit Employers, Too.

    Science.gov (United States)

    Petersen, Donald J.; Massengill, Douglas

    1988-01-01

    The person selecting a childcare program should consider how various plans would benefit employers as well as employees. The needs of the employees and the company must be considered and the options, benefits, and drawbacks of programs must be studied. (JOW)

  16. Employment status and working conditions

    NARCIS (Netherlands)

    Goudswaard, A.; Andries, F.

    2002-01-01

    In the 1990s an increasing number of employees were engaged in non-permanent contract work in the European Union. This can, to a large extent, be explained by an active labour market policy where job creation was the focus, and this type of employment provided a way of meeting the increased demand

  17. Comparative research on women's employment.

    NARCIS (Netherlands)

    Lippe, T. van der; Dijk, L. van

    2002-01-01

    Women's employment has been widely studied in both Western countries and Eastern Europe. In this article, the most frequently used measurements and descriptions of women's paid work are given, namely, participation rate, number of hours worked, gender segregation, and the gender gap in earnings.

  18. Sustainable employability and sensor technology

    NARCIS (Netherlands)

    Oldenhuis, Hilbrand; Polstra, Louis; Velthuijsen, Hugo; de Groot, Martijn

    2015-01-01

    Employees’ level of sustainable employability is influenced by their health. In our study we tested whether self-tracking devices – devices that provide the user with reliable and continuous feedback on one or more health domains – can be useful tools in order to increase employees’ health and, as a

  19. Leisure Education in Supported Employment.

    Science.gov (United States)

    Employment Opportunities, Inc., Raleigh, NC.

    This manual provides a leisure education program for individuals with disabilities, to facilitate leisure functioning in their homes and communities. The program is first introduced to participants and families upon admission into supported employment and is designed to be facilitated by a training specialist or job coach. The program can be…

  20. Intergenerational Attitudes toward Maternal Employment.

    Science.gov (United States)

    Heaven, Catherine P.; McCluskey-Fawcett, Kathleen

    Intergenerational attitudes toward child care were examined among college-age students and their parents through the use of questionnaires, the Beliefs About the Consequences of Maternal Employment Scale (BACMEC), and the Bias in Attitudes toward Women Scale (BIAS). Findings indicated that traditional attitudes were more prevalent in males of both…

  1. Employment Growth and International Trade

    DEFF Research Database (Denmark)

    Ibsen, Rikke; Warzynski, Frederic; Westergård-Nielsen, Niels Chr.

    In this paper, we use a detailed dataset containing information about all international trade transactions of the population of Danish ?rms over more than a decade to analyze the relationship between export and import decisions and employment growth. We further distinguish between imports of ?nal...

  2. Employment and Unemployment in Lagos

    NARCIS (Netherlands)

    O. Fapohunda (Olanrewaju)

    1977-01-01

    textabstractWage-earning employment was non-existent in Nigeria before the advent of the white man and the British administration. The average Nigerian engaged in subsistence agriculture or some cottage industry like weaving, pottery or carving. The first wage earners in Nigeria were probably the

  3. Mental illness and employment discrimination.

    Science.gov (United States)

    Stuart, Heather

    2006-09-01

    Work is a major determinant of mental health and a socially integrating force. To be excluded from the workforce creates material deprivation, erodes self-confidence, creates a sense of isolation and marginalization and is a key risk factor for mental disability. This review summarizes recent evidence pertaining to employment-related stigma and discrimination experienced by people with mental disabilities. A broad understanding of the stigmatization process is adopted, which includes cognitive, attitudinal, behavioural and structural disadvantages. Stigma is both a proximate and a distal cause of employment inequity for people with a mental disability who experience direct discrimination because of prejudicial attitudes from employers and workmates and indirect discrimination owing to historical patterns of disadvantage, structural disincentives against competitive employment and generalized policy neglect. Against this background, modern mental health rehabilitation models and legislative philosophies, which focus on citizenship rights and full social participation, are to be welcomed. Yet, recent findings demonstrate that the legislation remains vulnerable to the very prejudicial attitudes they are intended to abate. Research conducted during the past year continues to highlight multiple attitudinal and structural barriers that prevent people with mental disabilities from becoming active participants in the competitive labour market.

  4. Physical Attractiveness, Employment, and Earnings

    OpenAIRE

    Christian Pfeifer

    2011-01-01

    Survey data is used to estimate the impact of physical attractiveness rated by the interviewer as well as by the respondent on employment probability and labor income of men and women. In addition to mean linear and non-linear effects on earnings, simultaneous quantile regressions are applied to analyze heterogeneity across the wage distribution.

  5. Higher Education, Employability and Competitiveness

    Science.gov (United States)

    Pavlin, Samo; Svetlicic, Marjan

    2012-01-01

    This paper studies the relationship between competitiveness and higher education systems in Europe. It explores whether more competitive countries have developed more labour-market-oriented systems of higher education (HE) that thereby give their graduates greater short term employability potential. Based on and a large-scale survey among 45.000…

  6. Job satisfaction and contingent employment

    NARCIS (Netherlands)

    de Graaf-Zijl, M.

    2012-01-01

    This paper analyses job satisfaction as an aggregate of satisfaction with several job aspects, with special focus on the influence of contingent-employment contracts. Fixed-effect analysis is applied on a longitudinal sample of Dutch employees in four work arrangements: regular, fixed-term, on-call

  7. Sex Discrimination in Employment Practices.

    Science.gov (United States)

    California Univ., Los Angeles. Univ. Extension.

    The conference on sex discrimination in employment practices was held at the University of California at Los Angeles in cooperation with the Women's Bureau of the Department of Labor. Speeches included: (1) "New Legislation--New Action" by Rosalind K. Loring and William Foster, (2) "Compliance Policies and Procedures for Business and Industry" by…

  8. Employment effects of biofuels development

    International Nuclear Information System (INIS)

    Danielsson, B.O.; Hektor, B.

    1992-01-01

    Effects on employment - national and regional - from an expanding market for biofuels in Sweden are estimated in this article. The fuels considered are: Peat, straw, energy crops, silviculture, forestry waste, wood waste, by-products from paper/wood industry and processed fuels from these sources. (22 refs., tabs.)

  9. Patient advocacy versus employer protection.

    Science.gov (United States)

    Deubner, David; Sturm, Richard E

    2002-01-01

    In a departure from the usual Occupational Medicine: State of the Art Reviews article, this piece comprises responses from two occupational physicians to the question of how balance is achieved between employer and patient interests in occupational medicine. The authors discuss the ethical dilemmas that may arise in such relationships, negotiation of confrontations, physician responsibilities, and conflict resolution.

  10. Youth Employability Training: Two Experiments

    Science.gov (United States)

    Brown, Travor; Hillier, Tara-Lynn; Warren, Amy M.

    2010-01-01

    Purpose: This paper aims to assess the effectiveness of verbal self-guidance (VSG) and self-management on youth employability. It seeks to access the joint effectiveness of these interventions, grounded in social cognitive and goal setting theories, for youth job seekers. Design/methodology/approach: The studies used experimental designs involving…

  11. Employers' Perspectives of Online Education

    Science.gov (United States)

    Linardopoulos, Nikolaos

    2012-01-01

    Purpose: The purpose of this paper is to describe the strengths and weaknesses of seven representative studies pertaining to the employers' perceptions of online education. Design/methodology/approach: The paper retrieved and analysed representative studies on the subject from two scholarly databases and Google. Findings: The results indicate that…

  12. Teaching Soft Skills Employers Need

    Science.gov (United States)

    Ellis, Maureen; Kisling, Eric; Hackworth, Robbie G.

    2014-01-01

    This study identifies the soft skills community colleges teach in an office technology course and determines whether the skills taught are congruent with the soft skills employers require in today's entry-level office work. A qualitative content analysis of a community college office technology soft skills course was performed using 23 soft skills…

  13. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  14. Employment, Social Networks and Undocumented Migrants: The Employer Perspective

    Science.gov (United States)

    Bloch, Alice; McKay, Sonia

    2015-01-01

    This article draws on data from qualitative interviews with ethnic enclave and ethnic economy business entrepreneurs from Chinese, Bangladeshi and Turkish-speaking communities in London. Routes into business and worker recruitment practices are explored, demonstrating the centrality of social capital in the form of family and other social networks within these processes. The article investigates what employers consider the desirable characteristics of workers: trust, kinship, gender, social networks, language compatibility and the needs of the business intersect with racialised notions of workers’ strengths and characteristics. Finally, we consider changing practices in relation to the employment of undocumented migrants, in the context of an increasingly punitive legislative regime. The complex and variable impact of policy alongside the ways in which other obligations and positions outweigh the fear and risks of sanctions associated with non-compliance is revealed. PMID:25866421

  15. Social Enterprises and Employment: Mainstreaming SMEs and Employment Creation

    OpenAIRE

    Lanzona, Leonardo Jr. A.

    2015-01-01

    This paper argues that mainstreaming small and medium enterprises (SMEs) and social enterprises (SEs) into various international treaties will require the assumption of positive externalities, which markets cannot fully evaluate. To show this, the possible influence that SEs may have on SME development and, eventually, on employment will be discussed. SEs are small- and medium-sized commercial businesses providing valuable social service to customers and sustainable jobs and training for up t...

  16. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  17. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  18. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  19. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  20. A new chaotic secure communication scheme

    International Nuclear Information System (INIS)

    Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping

    2005-01-01

    A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient

  1. On Some Incompatible Properties of Voting Schemes

    OpenAIRE

    Chevallier-Mames , Benoît; Fouque , Pierre-Alain; Pointcheval , David; Stern , Julien; Traoré , Jacques

    2010-01-01

    In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal veriability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes. Under usual assumptions and efficiency requirements, we show that a voting system that wants to publish the final list of th...

  2. Conservative Semidiscrete Difference Schemes for Timoshenko Systems

    OpenAIRE

    Júnior, D. S. Almeida

    2014-01-01

    We present a parameterized family of finite-difference schemes to analyze the energy properties for linearly elastic constant-coefficient Timoshenko systems considering shear deformation and rotatory inertia. We derive numerical energies showing the positivity, and the energy conservation property and we show how to avoid a numerical anomaly known as locking phenomenon on shear force. Our method of proof relies on discrete multiplier techniques.

  3. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....

  4. A Scheme of Controlled Quantum State Swapping

    International Nuclear Information System (INIS)

    Zha Xinwei; Zou Zhichun; Qi Jianxia; Song Haiyang

    2012-01-01

    A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.

  5. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  6. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  7. Evolutionary Algorithm for Optimal Vaccination Scheme

    International Nuclear Information System (INIS)

    Parousis-Orthodoxou, K J; Vlachos, D S

    2014-01-01

    The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease

  8. Electromagnetically induced transparency and nonlinear pulse propagation in a combined tripod and Λ atom-light coupling scheme

    International Nuclear Information System (INIS)

    Hamedi, H R; Ruseckas, J; Juzeliūnas, G

    2017-01-01

    We consider propagation of a probe pulse in an atomic medium characterized by a combined tripod and Lambda (Λ) atom-light coupling scheme. The scheme involves three atomic ground states coupled to two excited states by five light fields. It is demonstrated that dark states can be formed for such an atom-light coupling. This is essential for formation of the electromagnetically induced transparency (EIT) and slow light. In the limiting cases the scheme reduces to conventional Λ- or N -type atom-light couplings providing the EIT or absorption, respectively. Thus, the atomic system can experience a transition from the EIT to the absorption by changing the amplitudes or phases of control lasers. Subsequently the scheme is employed to analyze the nonlinear pulse propagation using the coupled Maxwell–Bloch equations. It is shown that a generation of stable slow light optical solitons is possible in such a five-level combined tripod and Λ atomic system. (paper)

  9. Cooperative Control of Mobile Sensor Networks for Environmental Monitoring: An Event-Triggered Finite-Time Control Scheme.

    Science.gov (United States)

    Lu, Qiang; Han, Qing-Long; Zhang, Botao; Liu, Dongliang; Liu, Shirong

    2017-12-01

    This paper deals with the problem of environmental monitoring by developing an event-triggered finite-time control scheme for mobile sensor networks. The proposed control scheme can be executed by each sensor node independently and consists of two parts: one part is a finite-time consensus algorithm while the other part is an event-triggered rule. The consensus algorithm is employed to enable the positions and velocities of sensor nodes to quickly track the position and velocity of a virtual leader in finite time. The event-triggered rule is used to reduce the updating frequency of controllers in order to save the computational resources of sensor nodes. Some stability conditions are derived for mobile sensor networks with the proposed control scheme under both a fixed communication topology and a switching communication topology. Finally, simulation results illustrate the effectiveness of the proposed control scheme for the problem of environmental monitoring.

  10. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Document Server

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  11. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  12. Boudot's Range-Bounded Commitment Scheme Revisited

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    Checking whether a committed integer lies in a specific interval has many cryptographic applications. In Eurocrypt'98, Chan et al. proposed an instantiation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt'2000. Both CFT Proof and Boudot Proof are based on the encryption E(x, r)=g^xh^r mod n, where n is an RSA modulus whose factorization is unknown by the prover. They did not use a single base as usual. Thus an increase in cost occurs. In this paper, we show that it suffices to adopt a single base. The cost of the modified Boudot Proof is about half of that of the original scheme. Moreover, the key restriction in the original scheme, i.e., both the discrete logarithm of g in base h and the discrete logarithm of h in base g are unknown by the prover, which is a potential menace to the Boudot Proof, is definitely removed.

  13. An evaluation scheme for nanotechnology policies

    International Nuclear Information System (INIS)

    Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar

    2011-01-01

    Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.

  14. Parallel S/sub n/ iteration schemes

    International Nuclear Information System (INIS)

    Wienke, B.R.; Hiromoto, R.E.

    1986-01-01

    The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial

  15. Optimization of a middle atmosphere diagnostic scheme

    Science.gov (United States)

    Akmaev, Rashid A.

    1997-06-01

    A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.

  16. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  17. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  18. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  19. A rational function based scheme for solving advection equation

    International Nuclear Information System (INIS)

    Xiao, Feng; Yabe, Takashi.

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)

  20. Development of an estuarine assessment scheme for the management of a highly urbanised catchment/estuary system, Sydney estuary, Australia.

    Science.gov (United States)

    Birch, G F; Gunns, T J; Chapman, D; Harrison, D

    2016-05-01

    As coastal populations increase, considerable pressures are exerted on estuarine environments. Recently, there has been a trend towards the development and use of estuarine assessment schemes as a decision support tool in the management of these environments. These schemes offer a method by which complex environmental data is converted into a readily understandable and communicable format for informed decision making and effective distribution of limited management resources. Reliability and effectiveness of these schemes are often limited due to a complex assessment framework, poor data management and use of ineffective environmental indicators. The current scheme aims to improve reliability in the reporting of estuarine condition by including a concise assessment framework, employing high-value indicators and, in a unique approach, employing fuzzy logic in indicator evaluation. Using Sydney estuary as a case study, each of the 15 sub-catchment/sub-estuary systems were assessed using the current scheme. Results identified that poor sediment quality was a significant issue in Blackwattle/Rozelle Bay, Iron Cove and Hen and Chicken Bay while poor water quality was of particular concern in Duck River, Homebush Bay and the Parramatta River. Overall results of the assessment scheme were used to prioritise the management of each sub-catchment/sub-estuary assessed with Blackwattle/Rozelle Bay, Homebush Bay, Iron Cove and Duck River considered to be in need of a high priority management response. A report card format, using letter grades, was employed to convey the results of the assessment in a readily understood manner to estuarine managers and members of the public. Letter grades also provide benchmarking and performance monitoring ability, allowing estuarine managers to set improvement targets and assesses the effectiveness of management strategies. The current assessment scheme provides an effective, integrated and consistent assessment of estuarine health and