WorldWideScience

Sample records for shore-up key existing

  1. Shoring up the pipeline: A case study of female navigation throughout the science instructional pathway (SIP)

    Science.gov (United States)

    Aclufi, Allison Jill

    Female minority students are increasing in numbers as science majors, but are still under-represented when compared to White and Asian males in the workplace. Many factors have been proposed and studied, yet there has been little, if any, longitudinal study of possible exacerbating variables that may play a key role in deterring female minority students from pursuing a science degree and career. This study took a retro-longitudinal look at the experiences of ten successful science undergraduate female minority students. Two major domains already widely covered in the literature were identified: academic experiences and social-capital networks. Based on in-depth interviews, the following trends, in order of magnitude, were noted: students were focused and goal-orientated, insufficient amounts and access to science equipment, lack of science education in elementary school, no after-school science programs, indifferent or resistant stakeholders, males favored in the classroom, parent alienation from schools, inequitable access to academic information, parental encouragement, and a lack of ethnic identity in the context of a science student. Not all of these trends began in elementary school, most began in middle school and exacerbated throughout the remainder of student's K-12 education. The major factors that allowed for these students matriculation into a four-year university as undergraduate science majors was their goal-orientated dedication to a science career, and deliberate expansion of their social-capital networks to facilitate knowledge acquisition mandatory for college acceptance. A large-scale, longitudinal study, following students throughout their entire K-12 education would provide details that may be lost due to memory, and allow for the creation of more effective interventions to reduce student attrition.

  2. A Key Challenge in Global HRM: Adding New Insights to Existing Expatriate Spouse Adjustment Models

    Science.gov (United States)

    Gupta, Ritu; Banerjee, Pratyush; Gaur, Jighyasu

    2012-01-01

    This study is an attempt to strengthen the existing knowledge about factors affecting the adjustment process of the trailing expatriate spouse and the subsequent impact of any maladjustment or expatriate failure. We conducted a qualitative enquiry using grounded theory methodology with 26 Indian spouses who had to deal with their partner's…

  3. Wastewater shores up food security | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-13

    Oct 13, 2010 ... Water enters the food system at various points along the path “from farm to fork. ... The findings will help to influence future WHO recommendations and government health policies – and to stop a valuable ... Related articles ...

  4. Wastewater shores up food security | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    . Wastewater often makes it possible. Water enters the food system at various points along the path “from farm to fork.” In the past, the World Health Organization (WHO) focused on the water entering the system in farmers' fields, recommending ...

  5. Key issues

    International Nuclear Information System (INIS)

    Cook, N.G.W.

    1980-01-01

    Successful modeling of the thermo-mechanical and hydrochemical behavior of radioactive waste repositories in hard rock is possible in principle. Because such predictions lie outside the realm of experience, their adequacy depends entirely upon a thorough understanding of three fundamental questions: an understanding of the chemical and physical processess that determine the behavior of rock and all its complexities; accurate and realistic numerical models of the geologic media within which a repository may be built; and sufficient in-situ data covering the entire geologic region affected by, or effecting the behavior of a repository. At present sufficient is known to be able to identify most of those areas which require further attention. These areas extend all the way from a complete understanding of the chemical and physical processes determining the behavior of rock through to the exploration mapping and testing that must be done during the development of any potential repository. Many of the techniques, laboratory equipment, field instrumentation, and numerical methods needed to accomplish this do not exist at present. Therefore it is necessary to accept that a major investment in scientific research is required to generate this information over the next few years. The spectrum of scientific and engineering activities is wide extending from laboratory measurements through the development of numerical models to the measurement of data in-situ, but there is every prospect that sufficient can be done to resolve these key issues. However, to do so requires overt recognition of the many gaps which exist in our knowledge and abilities today, and of the need to bridge these gaps and of the significant costs involved in doing so

  6. Requirements for existing buildings

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund; Wittchen, Kim Bjarne

    This report collects energy performance requirements for existing buildings in European member states by June 2012.......This report collects energy performance requirements for existing buildings in European member states by June 2012....

  7. Greening Existing Tribal Buildings

    Science.gov (United States)

    Guidance about improving sustainability in existing tribal casinos and manufactured homes. Many steps can be taken to make existing buildings greener and healthier. They may also reduce utility and medical costs.

  8. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  9. Shoring Up Math and Science in the Elementary Grades: Schools Enlist Specialists to Teach Science Lessons

    Science.gov (United States)

    Jacobson, Linda

    2004-01-01

    As science gets squeezed in the elementary curriculum, at least two Florida districts are trying a new approach to keeping hands-on lessons a part of pupils' experiences. This article reports how Broward and Palm Beach county districts have increased the number of science specialists working in their elementary schools--teachers who, like physical…

  10. Project Helps High-Schoolers Shore up on Shut-Eye

    Science.gov (United States)

    Brydolf, Carol

    2011-01-01

    It's not news to most parents of adolescents that teenagers' sleep cycles operate in an alternate universe. A growing body of research shows that American teenagers are so at odds with conventional work and school schedules that they suffer from sleep deficits serious enough to affect their moods, health, and academic performance. Yet the vast…

  11. Physician Appraisals: Key Challenges

    Directory of Open Access Journals (Sweden)

    Klich Jacek

    2017-06-01

    Full Text Available The main purpose of the article is to identify key criteria being used for physician appraisals and to find how communication skills of physicians are valued in those appraisals. ScienceDirect and EBSCOhost databases were used for this search. The results show that a physician appraisal is underestimated both theoretically and empirically. The particular gap exists with respect to the communication skills of physicians, which are rarely present in medical training syllabi and physician assessments. The article contributes to the theoretical discourse on physician appraisals and points out at the inconsistency between the high status of physicians as a key hospital resource on the one hand and, on the other hand, at inadequate and poorly researched assessment of their performance with a special emphasis on communication skills. The article may inspire health managers to develop and implement up-to-date assessment forms for physicians and good managerial practices in this respect in hospitals and other health care units.

  12. Why preeclampsia still exists?

    Science.gov (United States)

    Chelbi, Sonia T; Veitia, Reiner A; Vaiman, Daniel

    2013-08-01

    Preeclampsia (PE) is a deadly gestational disease affecting up to 10% of women and specific of the human species. Preeclampsia is clearly multifactorial, but the existence of a genetic basis for this disease is now clearly established by the existence of familial cases, epidemiological studies and known predisposing gene polymorphisms. PE is very common despite the fact that Darwinian pressure should have rapidly eliminated or strongly minimized the frequency of predisposing alleles. Consecutive pregnancies with the same partner decrease the risk and severity of PE. Here, we show that, due to this peculiar feature, preeclampsia predisposing-alleles can be differentially maintained according to the familial structure. Thus, we suggest that an optimal frequency of PE-predisposing alleles in human populations can be achieved as a result of a trade-off between benefits of exogamy, importance for maintaining genetic diversity and increase of the fitness owing to a stable paternal investment. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Existence of Projective Planes

    OpenAIRE

    Perrott, Xander

    2016-01-01

    This report gives an overview of the history of finite projective planes and their properties before going on to outline the proof that no projective plane of order 10 exists. The report also investigates the search carried out by MacWilliams, Sloane and Thompson in 1970 [12] and confirms their result by providing independent verification that there is no vector of weight 15 in the code generated by the projective plane of order 10.

  14. Does bioethics exist?

    Science.gov (United States)

    Turner, L

    2009-12-01

    Bioethicists disagree over methods, theories, decision-making guides, case analyses and public policies. Thirty years ago, the thinking of many scholars coalesced around a principlist approach to bioethics. That mid-level mode of moral reasoning is now one of many approaches to moral deliberation. Significant variation in contemporary approaches to the study of ethical issues related to medicine, biotechnology and health care raises the question of whether bioethics exists as widely shared method, theory, normative framework or mode of moral reasoning.

  15. O Ponto G Existe?

    Directory of Open Access Journals (Sweden)

    Carlos Alexandre Molina Noccioli

    2016-07-01

    Full Text Available Este trabalho busca analisar o tratamento linguístico-discursivo das informações acerca de um tópicotemático tradicionalmente visto como tabu, relacionado a questões sexuais, na notícia O ponto G existe?, publicada em 2008, na revista brasileira Superinteressante, destacando-se como o conhecimento em questão é representado socialmente ao se considerar a linha editorial da revista. A notícia caracteriza-se como um campo fértil para a análise das estratégias divulgativas, já que atrai, inclusive pelas escolhas temáticas, a curiosidade dos leitores. Imbuído de um tema excêntrico, o texto consegue angariar um público jovem interessado em discussões polêmicas relacionadas ao seu universo.

  16. Lebesgue Sets Immeasurable Existence

    Directory of Open Access Journals (Sweden)

    Diana Marginean Petrovai

    2012-12-01

    Full Text Available It is well known that the notion of measure and integral were released early enough in close connection with practical problems of measuring of geometric figures. Notion of measure was outlined in the early 20th century through H. Lebesgue’s research, founder of the modern theory of measure and integral. It was developed concurrently a technique of integration of functions. Gradually it was formed a specific area todaycalled the measure and integral theory. Essential contributions to building this theory was made by a large number of mathematicians: C. Carathodory, J. Radon, O. Nikodym, S. Bochner, J. Pettis, P. Halmos and many others. In the following we present several abstract sets, classes of sets. There exists the sets which are not Lebesgue measurable and the sets which are Lebesgue measurable but are not Borel measurable. Hence B ⊂ L ⊂ P(X.

  17. EXIST Perspective for SFXTs

    Science.gov (United States)

    Ubertini, Pietro; Sidoli, L.; Sguera, V.; Bazzano, A.

    2009-12-01

    Supergiant Fast X-ray Transients (SFXTs) are one of the most interesting (and unexpected) results of the INTEGRAL mission. They are a new class of HMXBs displaying short hard X-ray outbursts (duration less tha a day) characterized by fast flares (few hours timescale) and large dinamic range (10E3-10E4). The physical mechanism driving their peculiar behaviour is still unclear and highly debated: some models involve the structure of the supergiant companion donor wind (likely clumpy, in a spherical or non spherical geometry) and the orbital properties (wide separation with eccentric or circular orbit), while others involve the properties of the neutron star compact object and invoke very low magnetic field values (B 1E14 G, magnetars). The picture is still highly unclear from the observational point of view as well: no cyclotron lines have been detected in the spectra, thus the strength of the neutron star magnetic field is unknown. Orbital periods have been measured in only 4 systems, spanning from 3.3 days to 165 days. Even the duty cycle seems to be quite different from source to source. The Energetic X-ray Imaging Survey Telescope (EXIST), with its hard X-ray all-sky survey and large improved limiting sensitivity, will allow us to get a clearer picture of SFXTs. A complete census of their number is essential to enlarge the sample. A long term and continuous as possible X-ray monitoring is crucial to -(1) obtain the duty cycle, -(2 )investigate their unknown orbital properties (separation, orbital period, eccentricity),- (3) to completely cover the whole outburst activity, (4)-to search for cyclotron lines in the high energy spectra. EXIST observations will provide crucial informations to test the different models and shed light on the peculiar behaviour of SFXTs.

  18. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  19. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  20. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  1. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  2. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  3. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  4. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  5. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  6. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  7. Ontological Proofs of Existence and Non-Existence

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2008-01-01

    Roč. 90, č. 2 (2008), s. 257-262 ISSN 0039-3215 R&D Projects: GA AV ČR IAA100300503 Institutional research plan: CEZ:AV0Z10300504 Keywords : ontological proofs * existence * non-existence * Gödel * Caramuel Subject RIV: BA - General Mathematics

  8. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  9. Existence theory in optimal control

    International Nuclear Information System (INIS)

    Olech, C.

    1976-01-01

    This paper treats the existence problem in two main cases. One case is that of linear systems when existence is based on closedness or compactness of the reachable set and the other, non-linear case refers to a situation where for the existence of optimal solutions closedness of the set of admissible solutions is needed. Some results from convex analysis are included in the paper. (author)

  10. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  11. Key findings from HSC's 2010 site visits: health care markets weather economic downturn, brace for health reform.

    Science.gov (United States)

    Felland, Laurie E; Grossman, Joy M; Tu, Ha T

    2011-05-01

    Lingering fallout--loss of jobs and employer coverage--from the great recession slowed demand for health care services but did little to slow aggressive competition by dominant hospital systems for well-insured patients, according to key findings from the Center for Studying Health System Change's (HSC) 2010 site visits to 12 nationally representative metropolitan communities. Hospitals with significant market clout continued to command high payment rate increases from private insurers, and tighter hospital-physician alignment heightened concerns about growing provider market power. High and rising premiums led to increasing employer adoption of consumer-driven health plans and continued increases in patient cost sharing, but the broader movement to educate and engage consumers in care decisions did not keep pace. State and local budget deficits led to some funding cuts for safety net providers, but an influx of federal stimulus funds increased support to community health centers and shored up Medicaid programs, allowing many people who lost private insurance because of job losses to remain covered. Hospitals, physicians and insurers generally viewed health reform coverage expansions favorably, but all worried about protecting revenues as reform requirements phase in.

  12. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  13. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  14. Co-existence in multispecies biofilm communities

    DEFF Research Database (Denmark)

    Røder, Henriette Lyng

    of these emergent properties which are relevant to as diverse areas as clinical settings and natural systems. In this thesis, I have attempted to contribute to our knowledge on the multispecies interactions with a special focus on biofilm communities. I was especially interested in how co-existing species affect...... each other and in understanding the key mechanisms and interactions involved. In the introduction of this thesis the most important concepts of multi-species interactions and biofilm development are explained. After this the topic changes to the various ways of examining community interactions...... and production. The analysis was further extended in manuscript 3, in which the effect of social interac-tions on biofilm formation in multispecies co-cultures isolated from a diverse range of environments was examined. The question raised was whether the interspecific interactions of co-existing bacteria...

  15. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  16. Symmetric autocompensating quantum key distribution

    Science.gov (United States)

    Walton, Zachary D.; Sergienko, Alexander V.; Levitin, Lev B.; Saleh, Bahaa E. A.; Teich, Malvin C.

    2004-08-01

    We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and time-bin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We show that both the polarization and the time-bin schemes may be implemented with existing technology. The new schemes are related to previously described schemes by the concept of advanced waves.

  17. Existing Steel Railway Bridges Evaluation

    Science.gov (United States)

    Vičan, Josef; Gocál, Jozef; Odrobiňák, Jaroslav; Koteš, Peter

    2016-12-01

    The article describes general principles and basis of evaluation of existing railway bridges based on the concept of load-carrying capacity determination. Compared to the design of a new bridge, the modified reliability level for existing bridges evaluation should be considered due to implementation of the additional data related to bridge condition and behaviour obtained from regular inspections. Based on those data respecting the bridge remaining lifetime, a modification of partial safety factors for actions and materials could be respected in the bridge evaluation process. A great attention is also paid to the specific problems of determination of load-caring capacity of steel railway bridges in service. Recommendation for global analysis and methodology for existing steel bridge superstructure load-carrying capacity determination are described too.

  18. Existing Steel Railway Bridges Evaluation

    Directory of Open Access Journals (Sweden)

    Vičan Josef

    2016-12-01

    Full Text Available The article describes general principles and basis of evaluation of existing railway bridges based on the concept of load-carrying capacity determination. Compared to the design of a new bridge, the modified reliability level for existing bridges evaluation should be considered due to implementation of the additional data related to bridge condition and behaviour obtained from regular inspections. Based on those data respecting the bridge remaining lifetime, a modification of partial safety factors for actions and materials could be respected in the bridge evaluation process. A great attention is also paid to the specific problems of determination of load-caring capacity of steel railway bridges in service. Recommendation for global analysis and methodology for existing steel bridge superstructure load-carrying capacity determination are described too.

  19. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  20. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  1. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  2. Limitations of existing web services

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Limitations of existing web services. Uploading or downloading large data. Serving too many user from single source. Difficult to provide computer intensive job. Depend on internet and its bandwidth. Security of data in transition. Maintain confidentiality of data ...

  3. Performance of Existing Hydrogen Stations

    Energy Technology Data Exchange (ETDEWEB)

    Sprik, Samuel [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Kurtz, Jennifer M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Ainscough, Christopher D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Saur, Genevieve [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Peters, Michael C [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-12-01

    In this presentation, the National Renewable Energy Laboratory presented aggregated analysis results on the performance of existing hydrogen stations, including performance, operation, utilization, maintenance, safety, hydrogen quality, and cost. The U.S. Department of Energy funds technology validation work at NREL through its National Fuel Cell Technology Evaluation Center (NFCTEC).

  4. The EXIST Mission Concept Study

    Science.gov (United States)

    Fishman, Gerald J.; Grindlay, J.; Hong, J.

    2008-01-01

    EXIST is a mission designed to find and study black holes (BHs) over a wide range of environments and masses, including: 1) BHs accreting from binary companions or dense molecular clouds throughout our Galaxy and the Local Group, 2) supermassive black holes (SMBHs) lying dormant in galaxies that reveal their existence by disrupting passing stars, and 3) SMBHs that are hidden from our view at lower energies due to obscuration by the gas that they accrete. 4) the birth of stellar mass BHs which is accompanied by long cosmic gamma-ray bursts (GRBs) which are seen several times a day and may be associated with the earliest stars to form in the Universe. EXIST will provide an order of magnitude increase in sensitivity and angular resolution as well as greater spectral resolution and bandwidth compared with earlier hard X-ray survey telescopes. With an onboard optical-infra red (IR) telescope, EXIST will measure the spectra and redshifts of GRBs and their utility as cosmological probes of the highest z universe and epoch of reionization. The mission would retain its primary goal of being the Black Hole Finder Probe in the Beyond Einstein Program. However, the new design for EXIST proposed to be studied here represents a significant advance from its previous incarnation as presented to BEPAC. The mission is now less than half the total mass, would be launched on the smallest EELV available (Atlas V-401) for a Medium Class mission, and most importantly includes a two-telescope complement that is ideally suited for the study of both obscured and very distant BHs. EXIST retains its very wide field hard X-ray imaging High Energy Telescope (HET) as the primary instrument, now with improved angular and spectral resolution, and in a more compact payload that allows occasional rapid slews for immediate optical/IR imaging and spectra of GRBs and AGN as well as enhanced hard X-ray spectra and timing with pointed observations. The mission would conduct a 2 year full sky survey in

  5. The Greenhouse Effect Does Exist!

    OpenAIRE

    Ebel, Jochen

    2009-01-01

    In particular, without the greenhouse effect, essential features of the atmospheric temperature profile as a function of height cannot be described, i.e., the existence of the tropopause above which we see an almost isothermal temperature curve, whereas beneath it the temperature curve is nearly adiabatic. The relationship between the greenhouse effect and observed temperature curve is explained and the paper by Gerlich and Tscheuschner [arXiv:0707.1161] critically analyzed. Gerlich and Tsche...

  6. Europe - space for transcultural existence?

    OpenAIRE

    Tamcke, Martin; Janny, de Jong; Klein, Lars; Waal, Margriet

    2013-01-01

    Europe - Space for Transcultural Existence? is the first volume of the new series, Studies in Euroculture, published by Göttingen University Press. The series derives its name from the Erasmus Mundus Master of Excellence Euroculture: Europe in the Wider World, a two year programme offered by a consortium of eight European universities in collaboration with four partner universities outside Europe. This master highlights regional, national and supranational dimensions of the European democrati...

  7. Existence of undiscovered Uranian satellites

    International Nuclear Information System (INIS)

    Boice, D.C.

    1986-04-01

    Structure in the Uranian ring system as observed in recent occultations may contain indirect evidence for the existence of undiscovered satellites. Using the Alfven and Arrhenius (1975, 1976) scenario for the formation of planetary systems, the orbital radii of up to nine hypothetical satellites interior to Miranda are computed. These calculations should provide interesting comparisons when the results from the Voyager 2 encounter with Uranus are made public. 15 refs., 1 fig., 1 tab

  8. UNCITRAL: Changes to existing law

    OpenAIRE

    Andersson, Joakim

    2008-01-01

    The UNCITRAL Convention on Contracts for the International Carriage of Goods [wholly or partly] by Sea has an ambition of replacing current maritime regimes and expands the application of the Convention to include also multimodal transport. This thesis questions what changes to existing law, in certain areas, the new Convention will bring compared to the current regimes. In the initial part, the thesis provides for a brief background and history of international maritime regulations and focus...

  9. Existence Results for Incompressible Magnetoelasticity

    Czech Academy of Sciences Publication Activity Database

    Kružík, Martin; Stefanelli, U.; Zeman, J.

    2015-01-01

    Roč. 35, č. 6 (2015), s. 2615-2623 ISSN 1078-0947 R&D Projects: GA ČR GA13-18652S Institutional support: RVO:67985556 Keywords : magnetoelasticity * magnetostrictive solids * incompressibility * existence of minimizers * quasistatic evolution * energetic solution Subject RIV: BA - General Mathematics Impact factor: 1.127, year: 2015 http://library.utia.cas.cz/separaty/2015/MTR/kruzik-0443017.pdf

  10. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  11. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  12. Soil fauna: key to new carbon models

    OpenAIRE

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; Jiménez, Juan José

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined ...

  13. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  14. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  15. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  16. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  17. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  18. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  19. Locks and Keys Service

    CERN Multimedia

    Claude Ducastel

    The GS-LS-SEM section is pleased to inform you that as from Monday 30 November 2009, the opening hours of the Locks and Keys service will be the following: 08h30 - 12h30 / 13h30 - 16:30, Mondays to Fridays. GS-SEM-LS 73333

  20. Quantum logics with existence property

    International Nuclear Information System (INIS)

    Schindler, C.

    1991-01-01

    A quantum logic (σ-orthocomplete orthomodular poset L with a convex, unital, and separating set Δ of states) is said to have the existence property if the expectation functionals on lin(Δ) associated with the bounded observables of L form a vector space. Classical quantum logics as well as the Hilbert space logics of traditional quantum mechanics have this property. The author shows that, if a quantum logic satisfies certain conditions in addition to having property E, then the number of its blocks (maximal classical subsystems) must either be one (classical logics) or uncountable (as in Hilbert space logics)

  1. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  2. Does cold nuclear fusion exist?

    International Nuclear Information System (INIS)

    Brudanin, V.B.; Bystritskij, V.M.; Egorov, V.G.; Shamsutdinov, S.G.; Shyshkin, A.L.; Stolupin, V.A.; Yutlandov, I.A.

    1989-01-01

    The results of investigation of cold nuclear fusion on palladium are given both for electrolysis of heavy water D 2 O and mixture D 2 O + H 2 O) (1:1) and for palladium saturation with gaseous deuterium. The possibility of existance of this phenomenon was examined by detection of neutrons and gamma quanta from reactions: d + d → 3 He + n + 3.27 MeV, p + d → 3 He + γ + 5.5 MeV. Besides these reactions were identified by measuring the characteristic X radiation of palladium due to effect of charged products 3 He, p, t. The upper limits of the intensities of hypothetical sources of neutrons and gamma quanta at the 95% confidence level were obtained to be Q n ≤ 2x10 -2 n/sxcm 3 Pd, Q γ ≤ 2x10 -3 γ/sxcm 3 Pd. 2 refs.; 4 figs.; 2 tabs

  3. Straightening: existence, uniqueness and stability

    Science.gov (United States)

    Destrade, M.; Ogden, R. W.; Sgura, I.; Vergori, L.

    2014-01-01

    One of the least studied universal deformations of incompressible nonlinear elasticity, namely the straightening of a sector of a circular cylinder into a rectangular block, is revisited here and, in particular, issues of existence and stability are addressed. Particular attention is paid to the system of forces required to sustain the large static deformation, including by the application of end couples. The influence of geometric parameters and constitutive models on the appearance of wrinkles on the compressed face of the block is also studied. Different numerical methods for solving the incremental stability problem are compared and it is found that the impedance matrix method, based on the resolution of a matrix Riccati differential equation, is the more precise. PMID:24711723

  4. Why do interstellar grains exist

    International Nuclear Information System (INIS)

    Seab, C.G.; Hollenbach, D.J.; Mckee, C.F.; Tielens, A.G.G.M.

    1986-01-01

    There exists a discrepancy between calculated destruction rates of grains in the interstellar medium and postulated sources of new grains. This problem was examined by modelling the global life cycle of grains in the galaxy. The model includes: grain destruction due to supernovae shock waves; grain injection from cool stars, planetary nebulae, star formation, novae, and supernovae; grain growth by accretion in dark clouds; and a mixing scheme between phases of the interstellar medium. Grain growth in molecular clouds is considered as a mechanism or increasing the formation rate. To decrease the shock destruction rate, several new physical processes, such as partial vaporization effects in grain-grain collisions, breakdown of the small Larmor radius approximation for betatron acceleration, and relaxation of the steady-state shock assumption are included

  5. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  6. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  7. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  8. Quantum cryptography beyond quantum key distribution

    NARCIS (Netherlands)

    Broadbent, A.; Schaffner, C.

    2016-01-01

    Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation,

  9. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  10. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  11. Existe sujeito em Michel Maffesoli?

    Directory of Open Access Journals (Sweden)

    Marli Appel da Silva

    2010-06-01

    Full Text Available Este ensaio discute a concepção de sujeito na abordagem teórica de Michel Maffesoli. As ideias desse autor estão em voga em alguns meios acadêmicos no Brasil e são difundidas por algumas mídias de grande circulação nacional. Entretanto, ao longo de suas obras, os pressupostos que definem quem é o sujeito maffesoliano se encontram pouco clarificados. Portanto, para alcançar o objetivo a que se propõe, este ensaio desenvolve uma análise da epistemologia e da ontologia maffesoliana com a finalidade de compreender as origens dos pressupostos desse autor, ou seja, as teorias e os autores em que Maffesoli se baseou para desenvolver uma visão de sujeito. Com essa compreensão, pretende-se responder à questão: existe sujeito na abordagem teórica de Maffesoli.

  12. Summary of existing uncertainty methods

    International Nuclear Information System (INIS)

    Glaeser, Horst

    2013-01-01

    A summary of existing and most used uncertainty methods is presented, and the main features are compared. One of these methods is the order statistics method based on Wilks' formula. It is applied in safety research as well as in licensing. This method has been first proposed by GRS for use in deterministic safety analysis, and is now used by many organisations world-wide. Its advantage is that the number of potential uncertain input and output parameters is not limited to a small number. Such a limitation was necessary for the first demonstration of the Code Scaling Applicability Uncertainty Method (CSAU) by the United States Regulatory Commission (USNRC). They did not apply Wilks' formula in their statistical method propagating input uncertainties to obtain the uncertainty of a single output variable, like peak cladding temperature. A Phenomena Identification and Ranking Table (PIRT) was set up in order to limit the number of uncertain input parameters, and consequently, the number of calculations to be performed. Another purpose of such a PIRT process is to identify the most important physical phenomena which a computer code should be suitable to calculate. The validation of the code should be focused on the identified phenomena. Response surfaces are used in some applications replacing the computer code for performing a high number of calculations. The second well known uncertainty method is the Uncertainty Methodology Based on Accuracy Extrapolation (UMAE) and the follow-up method 'Code with the Capability of Internal Assessment of Uncertainty (CIAU)' developed by the University Pisa. Unlike the statistical approaches, the CIAU does compare experimental data with calculation results. It does not consider uncertain input parameters. Therefore, the CIAU is highly dependent on the experimental database. The accuracy gained from the comparison between experimental data and calculated results are extrapolated to obtain the uncertainty of the system code predictions

  13. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  14. Key aspects congenital infection

    Directory of Open Access Journals (Sweden)

    Yu. V. Lobzin

    2014-01-01

    Full Text Available The key questions to solve the problem of congenital infection in the Russian Federation are: using in national practice over world accepted terminology adapted to the recommendations of the World Health Organization; representation of the modern concepts of an infectious process in the classification of congenital infections; scientific development and introducing in clinical practice the «standard case definitions», applied to different congenital infections; optimization of protocols and clinical guidelines for diagnosis, treatment and prevention of congenital infections; improvement a knowledge in the infectious disease for all  pecialists involved in the risk assessment of congenital infections, manage pregnancy and children. Based on our experience and analysis of publications, the authors suggest possible solutions.

  15. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  16. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  17. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  18. Existing ingestion guidance: Problems and recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Mooney, Robert R; Ziegler, Gordon L; Peterson, Donald S [Environmental Radiation Section, Division of Radiation Protection, WA (United States)

    1989-09-01

    Washington State has been developing plans and procedures for responding to nuclear accidents since the early 1970s. A key part of this process has been formulating a method for calculating ingestion pathway concentration guides (CGs). Such a method must be both technically sound and easy to use. This process has been slow and frustrating. However, much technical headway has been made in recent years, and hopefully the experience of the State of Washington will provide useful insight to problems with the existing guidance. Several recommendations are offered on ways to deal with these problems. In January 1986, the state held an ingestion pathway exercise which required the determination of allowed concentrations of isotopes for various foods, based upon reactor source term and field data. Objectives of the exercise were not met because of the complexity of the necessary calculations. A major problem was that the allowed concentrations had to be computed for each isotope and each food group, given assumptions on the average diet. To solve problems identified during that exercise, Washington developed, by March 1986, partitioned CGs. These CGs apportioned doses from each food group for an assumed mix of radionuclides expected to result from a reactor accident. This effort was therefore in place just in time for actual use during the Chernobyl fallout episode in May 1986. This technique was refined and described in a later report and presented at the 1987 annual meeting of the Health Physics Society. Realizing the technical weaknesses which still existed and a need to simplify the numbers for decision makers, Washington State has been developing computer methods to quickly calculate, from an accident specific relative mix of isotopes, CGs which allow a single radionuclide concentration for all food groups. This latest approach allows constant CGs for different periods of time following the accident, instead of peak CGs, which are good only for a short time after the

  19. Existing ingestion guidance: Problems and recommendations

    International Nuclear Information System (INIS)

    Mooney, Robert R.; Ziegler, Gordon L.; Peterson, Donald S.

    1989-01-01

    Washington State has been developing plans and procedures for responding to nuclear accidents since the early 1970s. A key part of this process has been formulating a method for calculating ingestion pathway concentration guides (CGs). Such a method must be both technically sound and easy to use. This process has been slow and frustrating. However, much technical headway has been made in recent years, and hopefully the experience of the State of Washington will provide useful insight to problems with the existing guidance. Several recommendations are offered on ways to deal with these problems. In January 1986, the state held an ingestion pathway exercise which required the determination of allowed concentrations of isotopes for various foods, based upon reactor source term and field data. Objectives of the exercise were not met because of the complexity of the necessary calculations. A major problem was that the allowed concentrations had to be computed for each isotope and each food group, given assumptions on the average diet. To solve problems identified during that exercise, Washington developed, by March 1986, partitioned CGs. These CGs apportioned doses from each food group for an assumed mix of radionuclides expected to result from a reactor accident. This effort was therefore in place just in time for actual use during the Chernobyl fallout episode in May 1986. This technique was refined and described in a later report and presented at the 1987 annual meeting of the Health Physics Society. Realizing the technical weaknesses which still existed and a need to simplify the numbers for decision makers, Washington State has been developing computer methods to quickly calculate, from an accident specific relative mix of isotopes, CGs which allow a single radionuclide concentration for all food groups. This latest approach allows constant CGs for different periods of time following the accident, instead of peak CGs, which are good only for a short time after the

  20. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  1. Bibliography - Existing Guidance for External Hazard Modelling

    International Nuclear Information System (INIS)

    Decker, Kurt

    2015-01-01

    The bibliography of deliverable D21.1 includes existing international and national guidance documents and standards on external hazard assessment together with a selection of recent scientific papers, which are regarded to provide useful information on the state of the art of external event modelling. The literature database is subdivided into International Standards, National Standards, and Science Papers. The deliverable is treated as a 'living document' which is regularly updated as necessary during the lifetime of ASAMPSA-E. The current content of the database is about 140 papers. Most of the articles are available as full-text versions in PDF format. The deliverable is available as an EndNote X4 database and as text files. The database includes the following information: Reference, Key words, Abstract (if available), PDF file of the original paper (if available), Notes (comments by the ASAMPSA-E consortium if available) The database is stored at the ASAMPSA-E FTP server hosted by IRSN. PDF files of original papers are accessible through the EndNote software

  2. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  3. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  4. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  5. 10 CFR 4.127 - Existing facilities.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Existing facilities. 4.127 Section 4.127 Energy NUCLEAR... 1973, as Amended Discriminatory Practices § 4.127 Existing facilities. (a) Accessibility. A recipient... make each of its existing facilities or every part of an existing facility accessible to and usable by...

  6. Public key infrastructure for DOE security research

    Energy Technology Data Exchange (ETDEWEB)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  7. Measuring Input Thresholds on an Existing Board

    Science.gov (United States)

    Kuperman, Igor; Gutrich, Daniel G.; Berkun, Andrew C.

    2011-01-01

    temperatures to show that the interface had voltage margin under all worst case conditions. Gate input thresholds are normally measured at the manufacturer when the device is on a chip tester. A key function of this machine was duplicated on an existing flight board with no modifications to the nets to be tested, with the exception of changes in the FPGA program.

  8. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  9. Introduction strategies raise key questions.

    Science.gov (United States)

    Finger, W R; Keller, S

    1995-09-01

    Key issues that must be considered before a new contraceptive is introduced center on the need for a trained provider to begin or terminate the method, its side effects, duration of use, method's ability to meet users' needs and preferences, and extra training or staff requirements. Logistics and economic issues to consider are identifying a dependable way of effectively supplying commodities, planning extra services needed for the method, and cost of providing the method. Each contraceptive method presents a different side effect pattern and burdens the service delivery setting differently. The strategy developed to introduce or expand the 3-month injectable Depo-Provera (DMPA) can be used for any method. It includes a needs assessment and addresses regulatory issues, service delivery policies and procedures, information and training, evaluation, and other concerns. Viet Nam's needs assessment showed that Norplant should not be introduced until the service delivery system becomes stronger. Any needs assessment for expansion of contraceptive services should cover sexually transmitted disease/HIV issues. A World Health Organization strategy helps officials identify the best method mix for local situations. Introductory strategies must aim to improve the quality of family planning programs and expand choices. Many begin by examining existing data and conducting interviews with policymakers, users, providers, and women's health advocates. Introductory programs for Norplant focus on provider training, adequate counseling and informed consent for users, and ready access to removal. They need a well-prepared service delivery infrastructure. The first phase of the DMPA introductory strategy for the Philippines comprised a social marketing campaign and DMPA introduction at public clinics in 10 pilot areas with strong service delivery. Successful AIDS prevention programs show that people tend to use barrier methods when they are available. USAID is currently studying

  10. Do Elementary Particles Have an Objective Existence?

    OpenAIRE

    Nissenson, Bilha

    2007-01-01

    The formulation of quantum theory does not comply with the notion of objective existence of elementary particles. Objective existence independent of observation implies the distinguishability of elementary particles. In other words: If elementary particles have an objective existence independent of observations, then they are distinguishable. Or if elementary particles are indistinguishable then matter cannot have existence independent of our observation. This paper presents a simple deductio...

  11. 34 CFR 104.22 - Existing facilities.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Existing facilities. 104.22 Section 104.22 Education... Accessibility § 104.22 Existing facilities. (a) Accessibility. A recipient shall operate its program or activity.... This paragraph does not require a recipient to make each of its existing facilities or every part of a...

  12. 45 CFR 1170.32 - Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Existing facilities. 1170.32 Section 1170.32... ASSISTED PROGRAMS OR ACTIVITIES Accessibility § 1170.32 Existing facilities. (a) Accessibility. A recipient... require a recipient to make each of its existing facilities or every part of a facility accessible to and...

  13. 45 CFR 605.22 - Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Existing facilities. 605.22 Section 605.22 Public... Accessibility § 605.22 Existing facilities. (a) Accessibility. A recipient shall operate each program or... existing facilities or every part of a facility accessible to and usable by qualified handicapped persons...

  14. 14 CFR 1251.301 - Existing facilities.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Existing facilities. 1251.301 Section 1251... HANDICAP Accessibility § 1251.301 Existing facilities. (a) Accessibility. A recipient shall operate each... existing facilities or every part of a facility accessible to and usable by handicapped persons. (b...

  15. 45 CFR 1151.22 - Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Existing facilities. 1151.22 Section 1151.22... Prohibited Accessibility § 1151.22 Existing facilities. (a) A recipient shall operate each program or... make each of its existing facilities or every part of a facility accessible to and usable by...

  16. 10 CFR 611.206 - Existing facilities.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Existing facilities. 611.206 Section 611.206 Energy... PROGRAM Facility/Funding Awards § 611.206 Existing facilities. The Secretary shall, in making awards to those manufacturers that have existing facilities, give priority to those facilities that are oldest or...

  17. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  18. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  19. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  20. Existence of equilibria in articulated bearings

    Science.gov (United States)

    Buscaglia, G.; Ciuperca, I.; Hafidi, I.; Jai, M.

    2007-04-01

    The existence of equilibrium solutions for a lubricated system consisting of an articulated body sliding over a flat plate is considered. Though this configuration is very common (it corresponds to the popular tilting-pad thrust bearings), the existence problem has only been addressed in extremely simplified cases, such as planar sliders of infinite width. Our results show the existence of at least one equilibrium for a quite general class of (nonplanar) slider shapes. We also extend previous results concerning planar sliders.

  1. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  2. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  3. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  4. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  5. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  6. 47 CFR 17.17 - Existing structures.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Existing structures. 17.17 Section 17.17... STRUCTURES Federal Aviation Administration Notification Criteria § 17.17 Existing structures. (a) The requirements found in § 17.23 relating to painting and lighting of antenna structures shall not apply to those...

  7. 10 CFR 1040.72 - Existing facilities.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Existing facilities. 1040.72 Section 1040.72 Energy... § 1040.72 Existing facilities. (a) Accessibility. A recipient shall operate any program or activity to... facilities or every part of a facility accessible to and useable by handicapped persons. (b) Methods. A...

  8. 45 CFR 84.22 - Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... HANDICAP IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 84.22 Existing facilities. (a) Accessibility. A recipient shall operate its program or activity so that when each part is..., welfare, or other social services at alternate accessible sites, alteration of existing facilities and...

  9. Financial gap calculations for existing cogeneration 2008

    International Nuclear Information System (INIS)

    Hers, S.J.; Wetzels, W.; Seebregts, A.J.; Van der Welle, A.J.

    2008-05-01

    The Dutch SDE (abbreviation for the renewable energy incentive) subsidy scheme promotes the reduction of CO2 emissions which results from the use of Combined Heat and Power (CHP) plants. This report calculates the profitability of operation of existing CHP plants. This information can be used for decision making on the SDE subsidy for existing CHP plants in 2008 [nl

  10. On the existence of consistent price systems

    DEFF Research Database (Denmark)

    Bayraktar, Erhan; Pakkanen, Mikko S.; Sayit, Hasanjan

    2014-01-01

    We formulate a sufficient condition for the existence of a consistent price system (CPS), which is weaker than the conditional full support condition (CFS). We use the new condition to show the existence of CPSs for certain processes that fail to have the CFS property. In particular this condition...

  11. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  12. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  13. Key economic sectors and services

    NARCIS (Netherlands)

    Arent, Douglas J.; Tol, Richard S.J.; Faust, Eberhard; Hella, Joseph P.; Kumar, Surender; Strzepek, Kenneth M.; Tóth, Ferenc L.; Yan, Denghua; Abdulla, Amjad; Kheshgi, Haroon; Xu, He; Ngeh, Julius

    2015-01-01

    Introduction and Context This chapter discusses the implications of climate change on key economic sectors and services, for example, economic activity. Other chapters discuss impacts from a physical, chemical, biological, or social perspective. Economic impacts cannot be isolated; therefore, there

  14. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  15. Key Injury and Violence Data

    Science.gov (United States)

    ... Traumatic Brain Injury Violence Prevention Key Injury and Violence Data Recommend on Facebook Tweet Share Compartir Injuries ... of death among persons 1-44. Injury- and violence-related deaths are only part of the problem ...

  16. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  17. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  18. The existence of trajectories joining critical points

    International Nuclear Information System (INIS)

    Yu Shuxiang.

    1985-01-01

    In this paper, using the notion of an isolating block and the concept of canonical regions, three existence criteria of trajectories connecting a pair of critical points of planar differential equations are given. (author)

  19. Pre-Existing Condition Insurance Plan Data

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Affordable Care Act created the new Pre-Existing Condition Insurance Plan (PCIP) program to make health insurance available to Americans denied coverage by...

  20. How Can Blockchain Technology Disrupt the Existing Business Models?

    OpenAIRE

    Witold Nowiński; Miklós Kozma

    2017-01-01

    Objective: The main purpose of the paper is to show that blockchain technology may disrupt the existing business models and to explore how this may occur. Research Design & Methods: This is a theory development paper which relies on a literature review and desk re-search. The discussion of the reviewed sources leads to the formulation of three re-search propositions. Findings: The paper provides a short overview of key literature on business models and business model innovation, indic...

  1. Seismic assessment of existing nuclear chemical plants

    International Nuclear Information System (INIS)

    Merriman, P.A.

    1997-01-01

    This paper outlines the generic approach to the seismic assessment of existing structures. It describes the role of the safety case in determining the studies carried out by the functional departments on individual projects. There is an emphasis on the role of existing information and material tests to provide realistic properties for analysis to account for possible degradation effects. Finally, a case study of a concrete containment cell is shown to illustrate the approach. (author)

  2. Solar Panel Installations on Existing Structures

    OpenAIRE

    Tim D. Sass; Pe; Leed

    2013-01-01

    The rising price of fossil fuels, government incentives and growing public aware-ness for the need to implement sustainable energy supplies has resulted in a large in-crease in solar panel installations across the country. For many sites the most eco-nomical solar panel installation uses existing, southerly facing rooftops. Adding solar panels to an existing roof typically means increased loads that must be borne by the building-s structural elements. The structural desig...

  3. The global existence problem in general relativity

    CERN Document Server

    Andersson, L

    2000-01-01

    We survey some known facts and open questions concerning the global properties of 3+1 dimensional space--times containing a compact Cauchy surface. We consider space--times with an $\\ell$--dimensional Lie algebra of space--like Killing fields. For each $\\ell \\leq 3$, we give some basic results and conjectures on global existence and cosmic censorship. For the case of the 3+1 dimensional Einstein equations without symmetries, a new small data global existence result is announced.

  4. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  5. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  6. Business-as-Unusual: Existing policies in energy model baselines

    International Nuclear Information System (INIS)

    Strachan, Neil

    2011-01-01

    Baselines are generally accepted as a key input assumption in long-term energy modelling, but energy models have traditionally been poor on identifying baselines assumptions. Notably, transparency on the current policy content of model baselines is now especially critical as long-term climate mitigation policies have been underway for a number of years. This paper argues that the range of existing energy and emissions policies are an integral part of any long-term baseline, and hence already represent a 'with-policy' baseline, termed here a Business-as-Unusual (BAuU). Crucially, existing energy policies are not a sunk effort; as impacts of existing policy initiatives are targeted at future years, they may be revised through iterative policy making, and their quantitative effectiveness requires ex-post verification. To assess the long-term role of existing policies in energy modelling, currently identified UK policies are explicitly stripped out of the UK MARKAL Elastic Demand (MED) optimisation energy system model, to generate a BAuU (with-policy) and a REF (without policy) baseline. In terms of long-term mitigation costs, policy-baseline assumptions are comparable to another key exogenous modelling assumption - that of global fossil fuel prices. Therefore, best practice in energy modelling would be to have both a no-policy reference baseline, and a current policy reference baseline (BAuU). At a minimum, energy modelling studies should have a transparent assessment of the current policy contained within the baseline. Clearly identifying and comparing policy-baseline assumptions are required for cost effective and objective policy making, otherwise energy models will underestimate the true cost of long-term emissions reductions.

  7. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  8. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  9. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  10. A comparative analysis of existing oligonucleotides selection ...

    African Journals Online (AJOL)

    SERVER

    2007-07-04

    Jul 4, 2007 ... Available online at http://www.academicjournals.org/AJB ... Department of Computer and Information Sciences, Covenant University P. M. B 1023, Ota, Nigeria. ... Key words: System biology, microarray technology, oligo, genome, coding sequence, ... ficity) and efficiency (computer speed and memory requi-.

  11. Review Existing and Proposed Emissions Trading Systems

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    This paper reviews key design features of mandatory emissions trading systems that had been established or were under consideration in 2010, with a particular focus on implications for the energy sector. Putting a price on greenhouse gas emissions is a cornerstone policy in climate change mitigation. To this end, many countries have implemented or are developing domestic emissions trading systems.

  12. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  13. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  14. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  15. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  16. Existence test for asynchronous interval iterations

    DEFF Research Database (Denmark)

    Madsen, Kaj; Caprani, O.; Stauning, Ole

    1997-01-01

    In the search for regions that contain fixed points ofa real function of several variables, tests based on interval calculationscan be used to establish existence ornon-existence of fixed points in regions that are examined in the course ofthe search. The search can e.g. be performed...... as a synchronous (sequential) interval iteration:In each iteration step all components of the iterate are calculatedbased on the previous iterate. In this case it is straight forward to base simple interval existence and non-existencetests on the calculations done in each step of the iteration. The search can also...... on thecomponentwise calculations done in the course of the iteration. These componentwisetests are useful for parallel implementation of the search, sincethe tests can then be performed local to each processor and only when a test issuccessful do a processor communicate this result to other processors....

  17. Seismic reevaluation of existing nuclear power plants

    International Nuclear Information System (INIS)

    Hennart, J.C.

    1978-01-01

    The codes and regulations governing Nuclear Power Plant seismic analysis are continuously becoming more stringent. In addition, design ground accelerations of existing plants must sometimes be increased as a result of discovery of faulting zones or recording of recent earthquakes near the plant location after plant design. These new factors can result in augmented seismic design criteria. Seismic reanalysius of the existing Nuclear Power Plant structures and equipments is necessary to prevent the consequences of newly postulated accidents that could cause undue risk to the health or safety of the public. This paper reviews the developments of seismic analysis as applied to Nuclear Power Plants and the methods used by Westinghouse to requalify existing plants to the most recent safety requirements. (author)

  18. The Existence of Public Protection Unit

    Directory of Open Access Journals (Sweden)

    Moh. Ilham A. Hamudy

    2014-12-01

    Full Text Available This article is about the Public Protection Unit (Satlinmas formerly known as civil defence (Hansip. This article is a summary of the results of the desk study and fieldwork conducted in October-November 2013 in the town of Magelang and Surabaya. This study used descriptive qualitative approach to explore the combined role and existence Satlinmas. The results of the study showed, the existence of the problem Satlinmas still leave many, including, first, the legal basis for the establishment of Satlinmas. Until now, there has been no new regulations governing Satlinmas. Existing regulations are too weak and cannot capture the times. Second, the formulation of concepts and basic tasks and functions Satlinmas overlap with other institutions. Third, Satlinmas image in society tend to fade and abused. Fourth, Satlinmas incorporation into the Municipal Police deemed not appropriate, because different philosophy.

  19. Solar potential in existing urban layouts—Critical overview of the existing building stock in Slovenian context

    International Nuclear Information System (INIS)

    Košir, Mitja; Capeluto, Isaac Guedi; Krainer, Aleš; Kristl, Živa

    2014-01-01

    In recent years implementation of sustainable building design in the EU has become one of the key issues in reducing energy dependence. In this context efficient use of solar potential incident on building envelope is essential. The goal of the study is to evaluate the influence of interventions required by the new Slovenian legislation and to propose general site planning guidelines. Special emphasis is devoted to the existing building stock, which is due for refurbishment. The study is carried out on the basis of seven typical urban layouts, which are assessed according to the shape of layout, density, building orientation and design. The calculations are carried out with the program SHADING. The study showed that the existing layouts are not as problematic as had been expected and that form and orientation of buildings present a major challenge. Nevertheless, the quality and the duration of insolation are highly dependent on the specifics of each case. The study showed that by respecting the basic rules of good practice in conjunction with the existing requirements no major changes in the existing design principles are needed. - Highlights: • New Slovenian legislation regarding minimum insolation of building envelope. • Seven typical urban layouts were analysed. • Requirements and rules of good practice result in adequate insolation. • Duration of insolation is highly dependent on the specifics of each case

  20. Radiation protection programme for existing exposure situation

    International Nuclear Information System (INIS)

    Ramadhani, Hilali Hussein

    2016-04-01

    This study was conducted to develop the Radiation protection Programme (RPP) to ensure that measures are in place for protection of individuals from the existing source of exposure. The study established a number of protective and remedial actions to be considered by the responsible regulatory Authority, licensee for existing exposure in workplace and dwellings. Tanzania is endowed with a number NORMs processing industries with an experience of uncontrolled exploration and extraction of minerals and the use of unsafe mining methods leading to severe environmental damage and appalling living conditions in the mining communities. Some of NORMs industries have been abandoned due to lack of an effect management infrastructure. The residual radioactive materials have been found to be the most import source of existing exposure resulted from NORMs industries. The Radon gas and its progeny have also been found to be a source of existing exposure from natural source as well as the major source of risk and health effects associated with existing exposure situation. The following measures have been discovered to play a pivotal role in avoiding or reducing the source of exposure to individuals such as restriction of the use of the construction materials, restriction on the consumption of foodstuffs and restriction on the access to the land and buildings, the removal of the magnitude of the source in terms of activity concentration as well as improvement of ventilation in dwellings. Therefore, the regulatory body (Tanzania Atomic Energy Commission) should examine the major areas outlined in the established RRP for existing exposure situation resulted from the NORMs industries and natural sources so as to develop strategies that will ensure the adequate protection of members of the public and the environment as well as guiding operating organizations to develop radiation protection and safety measures for workers. (au)

  1. Grouted Connections with Shear Keys

    DEFF Research Database (Denmark)

    Pedersen, Ronnie; Jørgensen, M. B.; Damkilde, Lars

    2012-01-01

    This paper presents a finite element model in the software package ABAQUS in which a reliable analysis of grouted pile-to-sleeve connections with shear keys is the particular purpose. The model is calibrated to experimental results and a consistent set of input parameters is estimated so that dif...... that different structural problems can be reproduced successfully....

  2. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  3. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  4. Key World Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  6. Iris recognition based on key image feature extraction.

    Science.gov (United States)

    Ren, X; Tian, Q; Zhang, J; Wu, S; Zeng, Y

    2008-01-01

    In iris recognition, feature extraction can be influenced by factors such as illumination and contrast, and thus the features extracted may be unreliable, which can cause a high rate of false results in iris pattern recognition. In order to obtain stable features, an algorithm was proposed in this paper to extract key features of a pattern from multiple images. The proposed algorithm built an iris feature template by extracting key features and performed iris identity enrolment. Simulation results showed that the selected key features have high recognition accuracy on the CASIA Iris Set, where both contrast and illumination variance exist.

  7. Foucault, Counselling and the Aesthetics of Existence

    Science.gov (United States)

    Peters, Michael A.

    2005-01-01

    Michel Foucault was drawn late in life to study the "arts of the self" in Greco-Roman culture as a basis, following Nietzsche, for what he called an "aesthetics of existence." By this, he meant a set of creative and experimental processes and techniques by which an individual turns him- or herself into a work of art. For Nietzsche, it was above…

  8. How to prove the existence of metabolons?

    DEFF Research Database (Denmark)

    Bassard, Jean-Étienne André; Halkier, Barbara Ann

    2017-01-01

    Sequential enzymes in biosynthetic pathways are organized in metabolons. It is challenging to provide experimental evidence for the existence of metabolons as biosynthetic pathways are composed of highly dynamic protein–protein interactions. Many different methods are being applied, each with str...

  9. Conditions for the Existence of Market Equilibrium.

    Science.gov (United States)

    Bryant, William D. A.

    1997-01-01

    Maintains that most graduate-level economics textbooks rarely mention the need for consumers to be above their minimum wealth position as a condition for market equilibrium. Argues that this omission leaves students with a mistaken sense about the range of circumstances under which market equilibria can exist. (MJP)

  10. 22 CFR 142.16 - Existing facilities.

    Science.gov (United States)

    2010-04-01

    ... OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE Accessibility § 142.16 Existing facilities. (a) Accessibility. A recipient shall operate each program or activity to which this part applies so that when each...., telecommunication device for the deaf) redesign of equipment, reassignment of classes or other services to...

  11. Transportation capabilities of the existing cask fleet

    International Nuclear Information System (INIS)

    Johnson, P.E.; Joy, D.S.; Wankerl, M.W.

    1991-01-01

    This paper describes a number of scenarios estimating the amount of spent nuclear fuel that could be transported to a Monitored Retrievable Storage (MRS) Facility by various combinations of existing cask fleets. To develop the scenarios, the data provided by the Transportation System Data Base (TSDB) were modified to reflect the additional time for cask turnaround resulting from various startup and transportation issues. With these more realistic speed and cask-handling assumptions, the annual transportation capability of a fleet consisting of all of the existing casks is approximately 46 metric tons of uranium (MTU). The most likely fleet of existing casks that would be made available to the Department of Energy (DOE) consists of two rail, three overweight truck, and six legal weight truck casks. Under the same transportation assumptions, this cask fleet is capable of approximately transporting 270 MTU/year. These ranges of capability is a result of the assumptions pertaining to the number of casks assumed to be available. It should be noted that this assessment assumes additional casks based on existing certifications are not fabricated. 5 refs., 4 tabs

  12. Conservation and Development Options existing on Uluguru ...

    African Journals Online (AJOL)

    Effective management of projects on Uluguru Mountains requires that both development and conservation options are weighed and that opportunities and challenges are considered. This study identified various conservation and development options existing on Uluguru Mountains and assessed the perceptions of the local ...

  13. Transportation capabilities of the existing cask fleet

    International Nuclear Information System (INIS)

    Johnson, P.E.; Wankerl, M.W.; Joy, D.S.

    1991-01-01

    This paper describes a number of scenarios estimating the amount of spent nuclear fuel that could be transported to a Monitored Retrievable Storage (MRS) Facility by various combinations of existing cask fleets. To develop the scenarios, the data provided by the Transportation System Data Base (TSDB) were modified to reflect the additional time for cask turnaround resulting from various startup and transportation issues. With these more realistic speed and cask-handling assumptions, the annual transportation capability of a fleet consisting of all of the existing casks is approximately 465 metric tons of uranium (MTU). The most likely fleet of existing casks that would be made available to the DOE consists of two rail, three overweight truck, and six legal weight truck casks. Under the same transportation assumptions, this cask fleet is capable of approximately transporting 270 MTU/year. These ranges of capability is a result of the assumptions pertaining to the number of casks assumed to be available. It should be noted that this assessment assumes additional casks based on existing certifications are not fabricated

  14. Does the Kuleshov Effect really Exist?

    DEFF Research Database (Denmark)

    Barratt, Daniel; Cabak Rédei, Anna

    2013-01-01

    with a doll, a dead woman in a coffin, and a bowl of soup; the viewers of the three sequences were reported to have perceived Mozhukin’s face as expressing happiness, sadness, and hunger/thoughtfulness respectively. It is not clear, however, whether or not the socalled “Kuleshov effect” really exists...

  15. COMPARATIVE ANALYSIS OF SOME EXISTING KINETIC MODELS ...

    African Journals Online (AJOL)

    The biosorption of three heavy metal ions namely; Zn2+, Cu2+ and Mn2+ using five microorganisms namely; Bacillus circulans, Pseudomonas aeruginosa, Staphylococcus xylosus, Streptomyces rimosus and Yeast (Saccharomyces sp.) were studied. In this paper, the effectiveness of six existing and two proposed kinetic ...

  16. Do ‘African’ universities exist?

    DEFF Research Database (Denmark)

    Jensen, Stig; Adriansen, Hanne Kirstine; Madsen, Lene Møller

    2015-01-01

    This chapter provides a background for understanding the book. We outline some of the debates in which the individual chapters are situated and thereby show how the book contributes to and fills gaps in existing research. After providing a short history of African universities, the chapter subseq...

  17. Do Biopositive Effects of Ionizing Radiations Exist

    International Nuclear Information System (INIS)

    Broda, E.

    1983-01-01

    The claim that radiations, e.g, in spas, can have biopositive actions on humans is unproven and unplausible. It also conflicts with the contents of the standard handbooks and with national legislation everywhere. Further, stimulation of plants by radiation is badly reproducible. But even if existing it need not be beneficial to the plant itself ("selfpositive"). (author)

  18. Repurposing Existing Material for Performance Support.

    Science.gov (United States)

    Harvey, Francis A.; Nelson, Adam

    1995-01-01

    Presents an overview of performance support systems (PSS), describes their role in promoting productivity in agile organizations, and discusses issues related to developing effective performance support using existing orientation, training, or procedural manuals. Topics include strategic principles of agility, and adding value when incorporating…

  19. Global existence proof for relativistic Boltzmann equation

    International Nuclear Information System (INIS)

    Dudynski, M.; Ekiel-Jezewska, M.L.

    1992-01-01

    The existence and causality of solutions to the relativistic Boltzmann equation in L 1 and in L loc 1 are proved. The solutions are shown to satisfy physically natural a priori bounds, time-independent in L 1 . The results rely upon new techniques developed for the nonrelativistic Boltzmann equation by DiPerna and Lions

  20. 38 CFR 18.422 - Existing facilities.

    Science.gov (United States)

    2010-07-01

    ... THE CIVIL RIGHTS ACT OF 1964 Nondiscrimination on the Basis of Handicap Accessibility § 18.422 Existing facilities. (a) Accessibility. A recipient shall operate each program or activity to which this... visits, delivery of health, or other social services at alternate accessible sites, alteration of...

  1. Developing an Actuarial Track Utilizing Existing Resources

    Science.gov (United States)

    Rodgers, Kathy V.; Sarol, Yalçin

    2014-01-01

    Students earning a degree in mathematics often seek information on how to apply their mathematical knowledge. One option is to follow a curriculum with an actuarial emphasis designed to prepare students as an applied mathematician in the actuarial field. By developing only two new courses and utilizing existing courses for Validation by…

  2. 7 CFR 1718.52 - Existing mortgages.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Existing mortgages. 1718.52 Section 1718.52 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE LOAN SECURITY DOCUMENTS FOR ELECTRIC BORROWERS Mortgage for Distribution Borrowers § 1718.52...

  3. Transforming existing content into reusable Learning Objects

    NARCIS (Netherlands)

    Doorten, Monique; Giesbers, Bas; Janssen, José; Daniels, Jan; Koper, Rob

    2003-01-01

    Please cite as: Doorten, M., Giesbers, B., Janssen, J., Daniëls, J, & Koper, E.J.R., (2004). Transforming existing content into reusable learning objects. In R. McGreal, Online Education using Learning Objects (pp. 116-127). London: RoutledgeFalmer.

  4. Psychology's struggle for existence: Second edition, 1913.

    Science.gov (United States)

    Wundt, Wilhelm; Lamiell, James T

    2013-08-01

    Presents an English translation of Wilhelm Wundt's Psychology's struggle for existence: Second edition, 1913, by James T. Lamiell in August, 2012. In his essay, Wundt advised against the impending divorce of psychology from philosophy. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  5. Altering existing buildings in the UK

    International Nuclear Information System (INIS)

    Roberts, Simon

    2008-01-01

    The profiles of both existing housing and existing public and commercial buildings show that many have very poor thermal efficiency. The UK housing stock is replaced at a low rate of about 1% a year, so to cut energy use it is essential to address the challenges of existing buildings. This will involve reducing energy demand through passive measures such as retrofitted insulation, replacement of windows and proper airtightness, while ensuring adequate ventilation. Active measures include upgrading improved boilers and adding locally produced energy from wind, biomass, solar power and other sources. The introduction of Display Energy Certificates will increase energy awareness but there will also need to be a programme of increased demolition for the worst-performing homes. In addition, buildings will need to be adapted to cope with worse weather, higher temperatures and increased flood risk as climate change takes effect. Overheating, rather than excessive cold, is set to become a growing problem for householders and employees in existing UK buildings

  6. Adding Semantic Support to Existing UDDI Infrastructure

    National Research Council Canada - National Science Library

    Luo, Jim; Montrose, Bruce; Kang, Myong

    2005-01-01

    .... The advantage is that it is completely backward compatible. The add-on modules only need to be installed on the clients of users who wish to take advantage of semantic markups. They can be integrated seamlessly into existing systems and operations without any modification of the infrastructure.

  7. Essence and Existence in Avicenna and Averroes

    Directory of Open Access Journals (Sweden)

    Belo, Catarina

    2009-12-01

    Full Text Available This article explores the views on existence of medieval Muslim philosophers Avicenna (d. 1037 and Averroes (d. 1198, whose works followed closely the philosophy of Aristotle. In addition to the Aristotelian influence, which permeated all medieval Islamic philosophy, Avicenna and Averroes were also inspired by Islamic theology, known in Arabic as kalām. The distinction between essence and existence is one of the most central and controversial aspects of Avicenna’s philosophy, together with his claim that existence is an accident. Averroes in turn has a radically different conception of existence, identifying it with existing beings rather than considering it as something in itself. With the Latin translation of Avicenna’s metaphysical works in the 12th century, the Avicennian distinction went on to shape much of the debate on existence in medieval Scholastic philosophy and beyond. This article assesses the meaning of the distinction in Avicenna as well as Averroes’ criticism. In explicating their radically different views on existence, it also touches on later discussions concerning existence, for example the issue whether existence is a predicate, in the Modern Age.

    El presente artículo explora las percepciones sobre la existencia de los filósofos medievales musulmanes Avicena (m. 1037 y Averroes (m. 1198, cuyas obras se encuentran muy próximas a la filosofía de Aristóteles. Además de la influencia aristotélica, que caló en toda la filosofía islámica medieval, Avicena y Averroes estuvieron inspirados por la teología islámica, conocida en árabe como Kalām. La distinción entre esencia y existencia es uno de los más fundamentales y controvertidos aspectos de la filosofía de Avicena junto a su aseveración de que la existencia es un accidente. Averroes, en cambio, concibe de forma radicalmente diferente la existencia, identificándola con los seres existentes más que considerarla como algo en

  8. Key drivers of airline loyalty.

    Science.gov (United States)

    Dolnicar, Sara; Grabler, Klaus; Grün, Bettina; Kulnig, Anna

    2011-10-01

    This study investigates drivers of airline loyalty. It contributes to the body of knowledge in the area by investigating loyalty for a number of a priori market segments identified by airline management and by using a method which accounts for the multi-step nature of the airline choice process. The study is based on responses from 687 passengers. Results indicate that, at aggregate level, frequent flyer membership, price, the status of being a national carrier and the reputation of the airline as perceived by friends are the variables which best discriminate between travellers loyal to the airline and those who are not. Differences in drivers of airline loyalty for a number of segments were identified. For example, loyalty programs play a key role for business travellers whereas airline loyalty of leisure travellers is difficult to trace back to single factors. For none of the calculated models satisfaction emerged as a key driver of airline loyalty.

  9. Key papers in prostate cancer.

    Science.gov (United States)

    Rodney, Simon; Shah, Taimur Tariq; Patel, Hitendra R H; Arya, Manit

    2014-11-01

    Prostate cancer is the most common cancer and second leading cause of death in men. The evidence base for the diagnosis and treatment of prostate cancer is continually changing. We aim to review and discuss past and contemporary papers on these topics to provoke debate and highlight key dilemmas faced by the urological community. We review key papers on prostate-specific antigen screening, radical prostatectomy versus surveillance strategies, targeted therapies, timing of radiotherapy and alternative anti-androgen therapeutics. Previously, the majority of patients, irrespective of risk, underwent radical open surgical procedures associated with considerable morbidity and mortality. Evidence is emerging that not all prostate cancers are alike and that low-grade disease can be safely managed by surveillance strategies and localized treatment to the prostate. The question remains as to how to accurately stage the disease and ultimately choose which treatment pathway to follow.

  10. Key policy choices in groundwater quality management

    International Nuclear Information System (INIS)

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  11. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  12. Low-Power Public Key Cryptography

    Energy Technology Data Exchange (ETDEWEB)

    BEAVER,CHERYL L.; DRAELOS,TIMOTHY J.; HAMILTON,VICTORIA A.; SCHROEPPEL,RICHARD C.; GONZALES,RITA A.; MILLER,RUSSELL D.; THOMAS,EDWARD V.

    2000-11-01

    This report presents research on public key, digital signature algorithms for cryptographic authentication in low-powered, low-computation environments. We assessed algorithms for suitability based on their signature size, and computation and storage requirements. We evaluated a variety of general purpose and special purpose computing platforms to address issues such as memory, voltage requirements, and special functionality for low-powered applications. In addition, we examined custom design platforms. We found that a custom design offers the most flexibility and can be optimized for specific algorithms. Furthermore, the entire platform can exist on a single Application Specific Integrated Circuit (ASIC) or can be integrated with commercially available components to produce the desired computing platform.

  13. Key Topics in Sports Medicine

    OpenAIRE

    2006-01-01

    Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1) Sports injuries, rehabilitation and injury prevention, 2) Exercise physiology, fitness testing and training, 3) Drugs in sport, 4) Exercise and health promotion, 5) Sport and exercise for special and clinical populations, 6) The ps...

  14. Key issues for passive safety

    International Nuclear Information System (INIS)

    Hayns, M.R.

    1996-01-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ''review paper'' as such and only record the highlights. (author)

  15. Human Resources Key Performance Indicators

    Directory of Open Access Journals (Sweden)

    Gabčanová Iveta

    2012-03-01

    Full Text Available The article brings out a proposed strategy map and respective key performance indicators (KPIs in human resources (HR. The article provides an overview of how HR activities are supported in order to reach the partial goals of HR as defined in the strategic map. Overall the aim of the paper is to show the possibilities of using the modern Balanced Scorecard method in human capital.

  16. Key issues for passive safety

    Energy Technology Data Exchange (ETDEWEB)

    Hayns, M R [AEA Technology, Harwell, Didcot (United Kingdom). European Institutions; Hicken, E F [Forschungszentrum Juelich GmbH (Germany)

    1996-12-01

    The paper represents a summary of the introductory presentation made at this Advisory Group Meeting on the Technical Feasibility and Reliability of Passive Safety Systems. It was intended as an overview of our views on what are the key issues and what are the technical problems which might dominate any future developments of passive safety systems. It is, therefore, not a ``review paper`` as such and only record the highlights. (author).

  17. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  18. Detector decoy quantum key distribution

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2009-01-01

    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is especially suited to those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement-based quantum key distribution scheme with an untrusted source without the need for a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single-photon security proof to its physical, full optical implementation. We show that in this scenario, the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.

  19. Overview of Existing Wind Energy Ordinances

    Energy Technology Data Exchange (ETDEWEB)

    Oteri, F.

    2008-12-01

    Due to increased energy demand in the United States, rural communities with limited or no experience with wind energy now have the opportunity to become involved in this industry. Communities with good wind resources may be approached by entities with plans to develop the resource. Although these opportunities can create new revenue in the form of construction jobs and land lease payments, they also create a new responsibility on the part of local governments to ensure that ordinances will be established to aid the development of safe facilities that will be embraced by the community. The purpose of this report is to educate and engage state and local governments, as well as policymakers, about existing large wind energy ordinances. These groups will have a collection of examples to utilize when they attempt to draft a new large wind energy ordinance in a town or county without existing ordinances.

  20. Partial Cooperative Equilibria: Existence and Characterization

    Directory of Open Access Journals (Sweden)

    Amandine Ghintran

    2010-09-01

    Full Text Available We study the solution concepts of partial cooperative Cournot-Nash equilibria and partial cooperative Stackelberg equilibria. The partial cooperative Cournot-Nash equilibrium is axiomatically characterized by using notions of rationality, consistency and converse consistency with regard to reduced games. We also establish sufficient conditions for which partial cooperative Cournot-Nash equilibria and partial cooperative Stackelberg equilibria exist in supermodular games. Finally, we provide an application to strategic network formation where such solution concepts may be useful.

  1. Does evaporation paradox exist in China?

    Directory of Open Access Journals (Sweden)

    Z. T. Cong

    2009-03-01

    Full Text Available One expected consequence of global warming is the increase in evaporation. However, lots of observations show that the rate of evaporation from open pans of water has been steadily decreasing all over the world in the past 50 years. The contrast between expectation and observation is called "evaporation paradox". Based on data from 317 weather stations in China from 1956 to 2005, the trends of pan evaporation and air temperature were obtained and evaporation paradox was analyzed. The conclusions include: (1 From 1956 to 2005, pan evaporation paradox existed in China as a whole while pan evaporation kept decreasing and air temperature became warmer and warmer, but it does not apply to Northeast and Southeast China; (2 From 1956 to 1985, pan evaporation paradox existed narrowly as a whole with unobvious climate warming trend, but it does not apply to Northeast China; (3 From 1986 to 2005, in the past 20 years, pan evaporation paradox did not exist for the whole period while pan evaporation kept increasing, although it existed in South China. Furthermore, the trend of other weather factors including sunshine duration, windspeed, humidity and vapor pressure deficit, and their relations with pan evaporation are discussed. As a result, it can be concluded that pan evaporation decreasing is caused by the decreasing in radiation and wind speed before 1985 and pan evaporation increasing is caused by the decreasing in vapor pressure deficit due to strong warming after 1986. With the Budyko curve, it can be concluded that the actual evaporation decreased in the former 30 years and increased in the latter 20 year for the whole China.

  2. Existence and Comparability of data sources

    OpenAIRE

    KUHNIMHOF, T; ARMOOGUM, J

    2007-01-01

    The deliverable at hand comprises a comprehensive overview over existing data sources which can be used for analysis of long distance travel demand. This encompasses both national and international data sources with a focus on household travel surveys. Three types of relevant surveys were identified: - National travel surveys with focus on daily mobility - Travel survey elements dedicated to long distance mobility - Long distance travel surveys. RAPPORT DE CONTRAT

  3. Transgender Parenting: A Review of Existing Research

    OpenAIRE

    Stotzer, Rebecca L; Herman, Jody L; Hasenbush, Amira

    2014-01-01

    The authors of this report reviewed 51 studies that analyze data about transgender parents. This report reviews the existing research on the prevalence and characteristics of transgender people who are parents, the quality of relationships between transgender parents and their children, outcomes for children with a transgender parent, and the reported needs of transgender parents. Overall, the authors found that substantial numbers of transgender people are parents, though at rates below the ...

  4. Streamlining Research by Using Existing Tools

    OpenAIRE

    Greene, Sarah M.; Baldwin, Laura-Mae; Dolor, Rowena J.; Thompson, Ella; Neale, Anne Victoria

    2011-01-01

    Over the past two decades, the health research enterprise has matured rapidly, and many recognize an urgent need to translate pertinent research results into practice, to help improve the quality, accessibility, and affordability of U.S. health care. Streamlining research operations would speed translation, particularly for multi-site collaborations. However, the culture of research discourages reusing or adapting existing resources or study materials. Too often, researchers start studies and...

  5. A Recommended Set of Key Arctic Indicators

    Science.gov (United States)

    Stanitski, D.; Druckenmiller, M.; Fetterer, F. M.; Gerst, M.; Intrieri, J. M.; Kenney, M. A.; Meier, W.; Overland, J. E.; Stroeve, J.; Trainor, S.

    2017-12-01

    The Arctic is an interconnected and environmentally sensitive system of ice, ocean, land, atmosphere, ecosystems, and people. From local to pan-Arctic scales, the area has already undergone major changes in physical and societal systems and will continue at a pace that is greater than twice the global average. Key Arctic indicators can quantify these changes. Indicators serve as the bridge between complex information and policy makers, stakeholders, and the general public, revealing trends and information people need to make important socioeconomic decisions. This presentation evaluates and compiles more than 70 physical, biological, societal and economic indicators into an approachable summary that defines the changing Arctic. We divided indicators into "existing," "in development," "possible," and "aspirational". In preparing a paper on Arctic Indicators for a special issue of the journal Climatic Change, our group established a set of selection criteria to identify indicators to specifically guide decision-makers in their responses to climate change. A goal of the analysis is to select a manageable composite list of recommended indicators based on sustained, reliable data sources with known user communities. The selected list is also based on the development of a conceptual model that identifies components and processes critical to our understanding of the Arctic region. This list of key indicators is designed to inform the plans and priorities of multiple groups such as the U.S. Global Change Research Program (USGCRP), Interagency Arctic Research Policy Committee (IARPC), and the Arctic Council.

  6. Soil fauna: key to new carbon models

    Science.gov (United States)

    Filser, Juliane; Faber, Jack H.; Tiunov, Alexei V.; Brussaard, Lijbert; Frouz, Jan; De Deyn, Gerlinde; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, Michel; Wall, Diana H.; Querner, Pascal; Eijsackers, Herman; José Jiménez, Juan

    2016-11-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential services provided by soils, policy makers depend on robust, predictive models identifying key drivers of SOM dynamics. Existing SOM models and suggested guidelines for future SOM modelling are defined mostly in terms of plant residue quality and input and microbial decomposition, overlooking the significant regulation provided by soil fauna. The fauna controls almost any aspect of organic matter turnover, foremost by regulating the activity and functional composition of soil microorganisms and their physical-chemical connectivity with soil organic matter. We demonstrate a very strong impact of soil animals on carbon turnover, increasing or decreasing it by several dozen percent, sometimes even turning C sinks into C sources or vice versa. This is demonstrated not only for earthworms and other larger invertebrates but also for smaller fauna such as Collembola. We suggest that inclusion of soil animal activities (plant residue consumption and bioturbation altering the formation, depth, hydraulic properties and physical heterogeneity of soils) can fundamentally affect the predictive outcome of SOM models. Understanding direct and indirect impacts of soil fauna on nutrient availability, carbon sequestration, greenhouse gas emissions and plant growth is key to the understanding of SOM dynamics in the context of global carbon cycling models. We argue that explicit consideration of soil fauna is essential to make realistic modelling predictions on SOM dynamics and to detect expected non-linear responses of SOM dynamics to global change. We present a decision framework, to be further developed through the activities of KEYSOM, a European COST Action, for when mechanistic SOM models

  7. Seismic evaluation of existing nuclear power plants

    International Nuclear Information System (INIS)

    2003-01-01

    The IAEA nuclear safety standards publications address the site evaluation and the design of new nuclear power plants (NPPs), including seismic hazard assessment and safe seismic design, at the level of the Safety Requirements as well as at the level of dedicated Safety Guides. It rapidly became apparent that the existing nuclear safety standards documents were not adequate for handling specific issues in the seismic evaluation of existing NPPs, and that a dedicated document was necessary. This is the purpose of this Safety Report, which is written in the spirit of the nuclear safety standards and can be regarded as guidance for the interpretation of their intent. Worldwide experience shows that an assessment of the seismic capacity of an existing operating facility can be prompted for the following: (a) Evidence of a greater seismic hazard at the site than expected before, owing to new or additional data and/or to new methods; (b) Regulatory requirements, such as periodic safety reviews, to ensure that the plant has adequate margins for seismic loads; (c) Lack of anti-seismic design or poor anti-seismic design; (d) New technical finding such as vulnerability of some structures (masonry walls) or equipment (relays), other feedback and new experience from real earthquakes. Post-construction evaluation programmes evaluate the current capability of the plant to withstand the seismic concern and identify any necessary upgrades or changes in operating procedures. Seismic qualification is distinguished from seismic evaluation primarily in that seismic qualification is intended to be performed at the design stage of a plant, whereas seismic evaluation is intended to be applied after a plant has been constructed. Although some guidelines do exist for the evaluation of existing NPPs, these are not established at the level of a regulatory guide or its equivalent. Nevertheless, a number of existing NPPs throughout the world have been and are being subjected to review of their

  8. Fibre Optic Communication Key Devices

    CERN Document Server

    Grote, Norbert

    2012-01-01

    The book gives an in-depth description of the key devices of current and next generation fibre optic communication networks. In particular, the book covers devices such as semiconductor lasers, optical amplifiers, modulators, wavelength filters, and detectors but the relevant properties of optical fibres as well. The presentations include the physical principles underlying the various devices, the technologies used for the realization of the different devices, typical performance characteristics and limitations, and development trends towards more advanced components are also illustrated. Thus the scope of the book spans relevant principles, state-of-the-art implementations, the status of current research and expected future components.

  9. Key energy technologies for Europe

    DEFF Research Database (Denmark)

    Jørgensen, B.H.

    2005-01-01

    This report on key energy technologies is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. Senior Scientist BirteHolst Jørgensen, Risø National Laboratory...... contributed by Scientific Officer Edgar Thielmann, DG TREN, Head of Department Hans Larsen, RisøNational Laboratory, Senior Asset Manager Aksel Hauge Pedersen, DONG VE, Consultant Timon Wehnert, IZT-Berlin, and Senior Scientist Martine Uyterlinde, ECN...

  10. Key concepts in social pedagogy

    DEFF Research Database (Denmark)

    Harbo, Lotte Junker

    2011-01-01

    and activities around key social pedagogical concepts, such as the Common Third, the 3 P’s, the Zone of Proximal Development and the Learning Zone model. In the article we explore how a joint activity, for example playing soccer, can be seen as a pedagogical activity and with what intentions it is undertaken......“Now I can actually play soccer with the young people without fearing that my colleagues think I am escaping the paper work.” These were the words from a participant in a social pedagogy training course in England a few years ago. This understanding emerged through in-depth discussions...

  11. Existing and new techniques in uranium exploration

    International Nuclear Information System (INIS)

    Bowie, S.H.U.; Cameron, J.

    1976-01-01

    The demands on uranium exploration over the next 25 years will be very great indeed and will call for every possible means of improvement in exploration capability. The first essential is to increase geological knowledge of the mode of occurrence of uranium ore deposits. The second is to improve existing exploration techniques and instrumentation while, at the same time, promoting research and development on new methods to discover uranium ore bodies on the earth's surface and at depth. The present symposium is an effort to increase co-operation and the exchange of information in the critical field of uranium exploration techniques and instrumentation. As an introduction to the symposium a brief review is presented, firstly of what can be considered as existing techniques and, secondly, of techniques which have not yet been used on an appreciable scale. Some fourteen techniques used over the last 30 years are identified and their appropriate application, advantages and limitations are briefly summarized and the possibilities of their further development considered. The aim of future research on new techniques, in addition to finding new ways and means of identifying surface deposits, should be mainly directed to devising methods and instrumentation capable of detecting buried ore bodies that do not give a gamma signal at the surface. To achieve this aim, two contributory factors are essential: adequate financial support for research and development and increased specialized training in uranium exploration and instrumentation design. The papers in this symposium describe developments in the existing techniques, proposals for future research and development and case histories of exploration programmes

  12. Does the Kuleshov Effect Really Exist?

    DEFF Research Database (Denmark)

    Barratt, Daniel; Rédei, Anna Cabak; Innes-Ker, Åse

    2016-01-01

    to replicate Kuleshov’s original experiment using an improved experimental design. In a behavioral and eye tracking study, 36 participants were each presented with 24 film sequences of neutral faces across six emotional conditions. For each film sequence, the participants were asked to evaluate the emotion...... of the target person in terms of valence, arousal, and category. The participants’ eye movements were recorded throughout. The results suggest that some sort of Kuleshov effect does in fact exist. For each emotional condition, the participants tended to choose the appropriate category more frequently than...... between the emotional conditions....

  13. Energy Savings Measure Packages. Existing Homes

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Booten, Chuck [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2011-11-01

    This document presents the most cost effective Energy Savings Measure Packages (ESMP) for existing mixed-fuel and all electric homes to achieve 15% and 30% savings for each BetterBuildings grantee location across the United States. These packages are optimized for minimum cost to homeowners for source energy savings given the local climate and prevalent building characteristics (i.e. foundation types). Maximum cost savings are typically found between 30% and 50% energy savings over the reference home; this typically amounts to $300 - $700/year.

  14. Analysis of field errors in existing undulators

    International Nuclear Information System (INIS)

    Kincaid, B.M.

    1990-01-01

    The Advanced Light Source (ALS) and other third generation synchrotron light sources have been designed for optimum performance with undulator insertion devices. The performance requirements for these new undulators are explored, with emphasis on the effects of errors on source spectral brightness. Analysis of magnetic field data for several existing hybrid undulators is presented, decomposing errors into systematic and random components. An attempts is made to identify the sources of these errors, and recommendations are made for designing future insertion devices. 12 refs., 16 figs

  15. Public/private key certification authority and key distribution. Draft

    Energy Technology Data Exchange (ETDEWEB)

    Long, J.P.; Christensen, M.J.; Sturtevant, A.P.; Johnston, W.E.

    1995-09-25

    Traditional encryption, which protects messages from prying eyes, has been used for many decades. The present concepts of encryption are built from that heritage. Utilization of modern software-based encryption techniques implies much more than simply converting files to an unreadable form. Ubiquitous use of computers and advances in encryption technology coupled with the use of wide-area networking completely changed the reasons for utilizing encryption technology. The technology demands a new and extensive infrastructure to support these functions. Full understanding of these functions, their utility and value, and the need for an infrastructure, takes extensive exposure to the new paradigm. This paper addresses issues surrounding the establishment and operation of a key management system (i.e., certification authority) that is essential to the successful implementation and wide-spread use of encryption.

  16. Three key affordances for serendipity

    DEFF Research Database (Denmark)

    Björneborn, Lennart

    2017-01-01

    Purpose Serendipity is an interesting phenomenon to study in information science as it plays a fundamental – but perhaps underestimated – role in how we discover, explore, and learn in all fields of life. The purpose of this paper is to operationalize the concept of serendipity by providing termi...... terminological “building blocks” for understanding connections between environmental and personal factors in serendipitous encounters. Understanding these connections is essential when designing affordances in physical and digital environments that can facilitate serendipity. Design....../methodology/approach In this paper, serendipity is defined as what happens when we, in unplanned ways, encounter resources (information, things, people, etc.) that we find interesting. In the outlined framework, serendipity is understood as an affordance, i.e., a usage potential when environmental and personal factors correspond...... the three key affordances and three key personal serendipity factors: curiosity, mobility, and sensitivity. Ten sub-affordances for serendipity and ten coupled personal sub-factors are also briefly outlined. Related research is compared with and mapped into the framework aiming at a theoretical validation...

  17. Key energy technologies for Europe

    International Nuclear Information System (INIS)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO 2 capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  18. Does prevention for Alzheimer's disease exist?

    Directory of Open Access Journals (Sweden)

    Sonia Maria Dozzi Brucki

    Full Text Available Abstract The prevention of Alzheimer's disease is a growing public health concern amidst an ageing population. Meanwhile, there is no effective or curative treatment available where prevention could greatly reduce health costs. This review was based on reports of potential preventive factors, including modifiable lifestyle factors, as well as preventive pharmacological strategies. Although the present review was not systematic, the reports selected from PubMed using "Alzheimer's disease" and "prevention" as key-words, allow us to affirm that pursuing a healthy lifestyle; physical, cognitive, leisure activities; good social engagement; a high consumption of fish, low consumption of dietary fat and moderate consumption of wine, and control of vascular risk factors appear to be potential factors for delaying dementia.

  19. The surgical personality: does it exist?

    Science.gov (United States)

    Whitaker, Matthew

    2018-01-01

    Introduction This study aims to answer the question of whether surgeons have different personalities to non-surgeons. Methods Members of the Royal College of Surgeons of England were sent an email survey containing 50 standard questions from the Five Factor personality assessment, which scores each respondent in five key personality traits (conscientiousness, agreeableness, neuroticism, openness, extroversion). Results were analysed and compared with a population-level data set from a survey conducted by the BBC. Results Five hundred and ninety-nine surgeons completed the survey. Analysis showed that surgeons scored significantly higher for conscientiousness, agreeableness, openness and neuroticism than non-surgeons (P personality, as well as indicating that female surgeons have significantly different personality profiles from male surgeons, and that age affects surgeons' personalities in different ways to non-surgeons.

  20. Quasistatic elastoplasticity via Peridynamics: existence and localization

    Science.gov (United States)

    Kružík, Martin; Mora-Corral, Carlos; Stefanelli, Ulisse

    2018-04-01

    Peridynamics is a nonlocal continuum mechanical theory based on minimal regularity on the deformations. Its key trait is that of replacing local constitutive relations featuring spacial differential operators with integrals over differences of displacement fields over a suitable positive interaction range. The advantage of such perspective is that of directly including nonregular situations, in which discontinuities in the displacement field may occur. In the linearized elastic setting, the mechanical foundation of the theory and its mathematical amenability have been thoroughly analyzed in the last years. We present here the extension of Peridynamics to linearized elastoplasticity. This calls for considering the time evolution of elastic and plastic variables, as the effect of a combination of elastic energy storage and plastic energy dissipation mechanisms. The quasistatic evolution problem is variationally reformulated and solved by time discretization. In addition, by a rigorous evolutive Γ -convergence argument we prove that the nonlocal peridynamic model converges to classic local elastoplasticity as the interaction range goes to zero.

  1. Strategy Guideline: Quality Management in Existing Homes; Cantilever Floor Example

    Energy Technology Data Exchange (ETDEWEB)

    Taggart, J.; Sikora, J.; Wiehagen, J.; Wood, A.

    2011-12-01

    This guideline is designed to highlight the QA process that can be applied to any residential building retrofit activity. The cantilevered floor retrofit detailed in this guideline is included only to provide an actual retrofit example to better illustrate the QA activities being presented. The goal of existing home high performing remodeling quality management systems (HPR-QMS) is to establish practices and processes that can be used throughout any remodeling project. The research presented in this document provides a comparison of a selected retrofit activity as typically done versus that same retrofit activity approached from an integrated high performance remodeling and quality management perspective. It highlights some key quality management tools and approaches that can be adopted incrementally by a high performance remodeler for this or any high performance retrofit. This example is intended as a template and establishes a methodology that can be used to develop a portfolio of high performance remodeling strategies.

  2. Education for a Culture of Peace and Co-Existence

    Directory of Open Access Journals (Sweden)

    Silvia Guetta

    2016-07-01

    Full Text Available Education is a key and fundamental tool required to achieve social change, especially regarding social cohesion and co-existence. Education affects the most critical issues facing humanity, including the proliferation of various forms of violence, environmental degradation, and annihilation of cultures. I argue that the impact of education is equal to that of economics, politics, and technological advances. Therefore, if we wish to see change, educational reform has to be designed to operate in a global-human context, empowering and allowing people to achieve their potential. It should instil in individuals and groups respect for others with whom they interact, in a global as well as local sense. The article draws on the theories of Edgar Morin, Reuven Feuerstein, and Jerome Bruner, and their contributions to the development of educational approaches that encourage a culture of responsible, participatory, and creative coexistence. .

  3. Existence families, functional calculi and evolution equations

    CERN Document Server

    deLaubenfels, Ralph

    1994-01-01

    This book presents an operator-theoretic approach to ill-posed evolution equations. It presents the basic theory, and the more surprising examples, of generalizations of strongly continuous semigroups known as 'existent families' and 'regularized semigroups'. These families of operators may be used either to produce all initial data for which a solution in the original space exists, or to construct a maximal subspace on which the problem is well-posed. Regularized semigroups are also used to construct functional, or operational, calculi for unbounded operators. The book takes an intuitive and constructive approach by emphasizing the interaction between functional calculus constructions and evolution equations. One thinks of a semigroup generated by A as etA and thinks of a regularized semigroup generated by A as etA g(A), producing solutions of the abstract Cauchy problem for initial data in the image of g(A). Material that is scattered throughout numerous papers is brought together and presented in a fresh, ...

  4. LDEF data: Comparisons with existing models

    Science.gov (United States)

    Coombs, Cassandra R.; Watts, Alan J.; Wagner, John D.; Atkinson, Dale R.

    1993-04-01

    The relationship between the observed cratering impact damage on the Long Duration Exposure Facility (LDEF) versus the existing models for both the natural environment of micrometeoroids and the man-made debris was investigated. Experimental data was provided by several LDEF Principal Investigators, Meteoroid and Debris Special Investigation Group (M&D SIG) members, and by the Kennedy Space Center Analysis Team (KSC A-Team) members. These data were collected from various aluminum materials around the LDEF satellite. A PC (personal computer) computer program, SPENV, was written which incorporates the existing models of the Low Earth Orbit (LEO) environment. This program calculates the expected number of impacts per unit area as functions of altitude, orbital inclination, time in orbit, and direction of the spacecraft surface relative to the velocity vector, for both micrometeoroids and man-made debris. Since both particle models are couched in terms of impact fluxes versus impactor particle size, and much of the LDEF data is in the form of crater production rates, scaling laws have been used to relate the two. Also many hydrodynamic impact computer simulations were conducted, using CTH, of various impact events, that identified certain modes of response, including simple metallic target cratering, perforations and delamination effects of coatings.

  5. Eternally existing self-reproducing inflationary universe

    International Nuclear Information System (INIS)

    Linde, A.D.

    1986-05-01

    It is shown that the large-scale quantum fluctuations of the scalar field φ generated in the chaotic inflation scenario lead to an infinite process of self-reproduction of inflationary mini-universes. A model of eternally existing chaotic inflationary universe is suggested. It is pointed out that whereas the universe locally is very homogeneous as a result of inflation, which occurs at the classical level, the global structure of the universe is determined by quantum effects and is highly non-trivial. The universe consists of exponentially large number of different mini-universes, inside which all possible (metastable) vacuum states and all possible types of compactification are realized. The picture differs crucially from the standard picture of a one-domain universe in a ''true'' vacuum state. Our results may serve as a justification of the anthropic principle in the inflationary cosmology. These results may have important implications for the elementary particle theory as well. Namely, since all possible types of mini-universes, in which inflation may occur, should exist in our universe, there is no need to insist (as it is usually done) that in realistic theories the vacuum state of our type should be the only possible one or the best one. (author)

  6. Hawaii Clean Energy Initiative Existing Building Energy Efficiency Analysis: November 17, 2009 - June 30, 2010

    Energy Technology Data Exchange (ETDEWEB)

    Finch, P.; Potes, A.

    2010-06-01

    In June 2009, the State of Hawaii enacted an Energy Efficiency Portfolio Standard (EEPS) with a target of 4,300 gigawatt hours (GWh) by 2030 (Hawaii 2009). Upon setting this goal, the Hawaii Clean Energy Initiative, Booz Allen Hamilton (BAH), and the National Renewable Energy Laboratory (NREL), working with select local stakeholders, partnered to execute the first key step toward attaining the EEPS goal: the creation of a high-resolution roadmap outlining key areas of potential electricity savings. This roadmap was divided into two core elements: savings from new construction and savings from existing buildings. BAH focused primarily on the existing building analysis, while NREL focused on new construction forecasting. This report presents the results of the Booz Allen Hamilton study on the existing building stock of Hawaii, along with conclusions on the key drivers of potential energy efficiency savings and on the steps necessary to attain them.

  7. Do Bare Rocks Exist on the Moon?

    Science.gov (United States)

    Allen, Carlton; Bandfield, Joshua; Greenhagen, Benjamin; Hayne, Paul; Leader, Frank; Paige, David

    2017-01-01

    Astronaut surface observations and close-up images at the Apollo and Chang'e 1 landing sites confirm that at least some lunar rocks have no discernable dust cover. However, ALSEP (Apollo Lunar Surface Experiments Package) measurements as well as astronaut and LADEE (Lunar Atmosphere and Dust Environment Explorer) orbital observations and laboratory experiments possibly suggest that a fine fraction of dust is levitated and moves across and above the lunar surface. Over millions of years such dust might be expected to coat all exposed rock surfaces. This study uses thermal modeling, combined with Diviner (a Lunar Reconnaissance Orbiter experiment) orbital lunar eclipse temperature data, to further document the existence of bare rocks on the lunar surface.

  8. Integrating existing software toolkits into VO system

    Science.gov (United States)

    Cui, Chenzhou; Zhao, Yong-Heng; Wang, Xiaoqian; Sang, Jian; Luo, Ze

    2004-09-01

    Virtual Observatory (VO) is a collection of interoperating data archives and software tools. Taking advantages of the latest information technologies, it aims to provide a data-intensively online research environment for astronomers all around the world. A large number of high-qualified astronomical software packages and libraries are powerful and easy of use, and have been widely used by astronomers for many years. Integrating those toolkits into the VO system is a necessary and important task for the VO developers. VO architecture greatly depends on Grid and Web services, consequently the general VO integration route is "Java Ready - Grid Ready - VO Ready". In the paper, we discuss the importance of VO integration for existing toolkits and discuss the possible solutions. We introduce two efforts in the field from China-VO project, "gImageMagick" and "Galactic abundance gradients statistical research under grid environment". We also discuss what additional work should be done to convert Grid service to VO service.

  9. Seismic review of existing nuclear power plants

    International Nuclear Information System (INIS)

    Yanev, P.I.; Mayes, R.L.; Jones, L.R.

    1975-01-01

    Because of developments in the fields of earthquake and structural engineering over the last two decades, the codes, standards and design criteria for Nuclear Power Plants and other critical structures have changed substantially. As a result, plants designed only a few years ago do not satisfy the requirements for new plants. Accordingly, the Regulatory Agencies are requiring owners of older Nuclear Power Plants to re-qualify the plants seismically, using codes, standards, analytical techniques and knowledge developed in recent years. Seismic review consists of three major phases: establishing the design and performance criteria, re-qualifying the structures, and re-qualifying the equipment. The authors of the paper have been recently involved in the seismic review of existing nuclear power plants in the United States. This paper is a brief summary of their experiences

  10. Welfare Economics: A Story of Existence

    Directory of Open Access Journals (Sweden)

    Khalid Iqbal

    2017-06-01

    Full Text Available The purpose of this study is to explore that, despite severe challenges, welfare economics still exists. This descriptive study is conducted through some specific time line developments in this field. Economists are divided over the veracity and survival of the welfare economics. Welfare economics emphasizes on the optimum resource and goods allocation with the objective of better living standard, materialistic gains, social welfare and ethical decisions. It origins back to the political economics and utilitarianism. Adam Smith, Irving Fisher and Pareto contributed significantly towards it. During 1930 to 1940, American and British approaches were developed. Many economists tried to explore the relationship between level of income and happiness. Amartya Sen gave the comparative approach and Tinbergen pioneered the theory of equity. Contemporarily the futuristic restoration of welfare economics is on trial and hopes are alive. This study may be useful to understand the transitional and survival process of welfare economics.

  11. Testing Metadata Existence of Web Map Services

    Directory of Open Access Journals (Sweden)

    Jan Růžička

    2011-05-01

    Full Text Available For a general user is quite common to use data sources available on WWW. Almost all GIS software allow to use data sources available via Web Map Service (ISO/OGC standard interface. The opportunity to use different sources and combine them brings a lot of problems that were discussed many times on conferences or journal papers. One of the problem is based on non existence of metadata for published sources. The question was: were the discussions effective? The article is partly based on comparison of situation for metadata between years 2007 and 2010. Second part of the article is focused only on 2010 year situation. The paper is created in a context of research of intelligent map systems, that can be used for an automatic or a semi-automatic map creation or a map evaluation.

  12. On the existence of hot positronium reactions

    International Nuclear Information System (INIS)

    Lazzarini, E.

    1984-01-01

    The existence of hot Ps reactions is nowadays questioned; the controversy arises from the two models (the Ore gap and the spur theories) advanced in order to explain the mechanism of the positronium formation and of its inhibition in liquids by dissolution of certain compounds. The hypothesis of the hot Ps reactions was initially advanced as an additional statement for explaining the inhibition phenomenon within the framework of the Ore gap theory, but it is not considered necessary for the spur theory. The present paper is chiefly intended as a presentation of this particular aspect of Ps chemistry to hot atom chemists unspecialized in the field. The reader is assumed to be familiar with the basic physics and experimental methods used in positronium chemistry. Contents: positrons and positronium formation; inhibition and enhancement of Ps formation in solutions; positronium reactions in gases. (Auth.)

  13. Sustainability in the existing building stock

    DEFF Research Database (Denmark)

    Elle, Morten; Nielsen, Susanne Balslev; Hoffmann, Birgitte

    2005-01-01

    , QRWfacilities management’s most important contribution to sustainable development in the built environment. Space management is an essential tool in facilities management – and it could be considered a powerful tool in sustainable development; remembering that the building not being built is perhaps the most......This paper explores the role of Facilities Management in the relation to sustainable development in the existing building stock. Facilities management is a concept still developing as the management of buildings are becoming more and more professional. Many recognize today that facilities...... management is a concept relevant to others than large companies. Managing the flows of energy and other resources is a part of facilities management, and an increased professionalism could lead to the reduction of the use of energy and water and the generation of waste and wastewater. This is, however...

  14. Compilation of Existing Neutron Screen Technology

    Directory of Open Access Journals (Sweden)

    N. Chrysanthopoulou

    2014-01-01

    Full Text Available The presence of fast neutron spectra in new reactors is expected to induce a strong impact on the contained materials, including structural materials, nuclear fuels, neutron reflecting materials, and tritium breeding materials. Therefore, introduction of these reactors into operation will require extensive testing of their components, which must be performed under neutronic conditions representative of those expected to prevail inside the reactor cores when in operation. Due to limited availability of fast reactors, testing of future reactor materials will mostly take place in water cooled material test reactors (MTRs by tailoring the neutron spectrum via neutron screens. The latter rely on the utilization of materials capable of absorbing neutrons at specific energy. A large but fragmented experience is available on that topic. In this work a comprehensive compilation of the existing neutron screen technology is attempted, focusing on neutron screens developed in order to locally enhance the fast over thermal neutron flux ratio in a reactor core.

  15. [The depression epidemic does not exist].

    Science.gov (United States)

    van der Feltz-Cornelis, Christina M

    2009-01-01

    There has been much discussion in the media about the question of the existence of a depression epidemic. This leads on to the questions of whether the social and economic approaches are adequate, and what the alternatives are. The concept of the disease 'depression' can be defined using a medical model, or from a patient's or a societal perspective. From a medical perspective, indeed a depression epidemic has ensued from the increased prosperity and the associated decompression of the mortality rate. Society responded with preventative measures and policies aimed at improving functioning in the workplace. However, patients with a major depressive disorder (MDD) who are eligible for treatment are often not motivated to take it up, or are undertreated. Research is necessary in order to explore what patients think about the identification and treatment of depression. The confusion regarding the concept of depression found in the media, needs to be cleared.

  16. On the existence of Levi Foliations

    Directory of Open Access Journals (Sweden)

    RENATA N. OSTWALD

    2001-03-01

    Full Text Available Let L be a real 3 dimensional analytic variety. For each regular point p L there exists a unique complex line l p on the space tangent to L at p. When the field of complex line p l p is completely integrable, we say that L is Levi variety. More generally; let L M be a real subvariety in an holomorphic complex variety M. If there exists a real 2 dimensional integrable distribution on L which is invariant by the holomorphic structure J induced by M, we say that L is a Levi variety. We shall prove: Theorem. Let be a Levi foliation and let be the induced holomorphic foliation. Then, admits a Liouvillian first integral. In other words, if is a 3 dimensional analytic foliation such that the induced complex distribution defines an holomorphic foliation ; that is, if is a Levi foliation; then admits a Liouvillian first integral--a function which can be constructed by the composition of rational functions, exponentiation, integration, and algebraic functions (Singer 1992. For example, if f is an holomorphic function and if theta is real a 1-form on ; then the pull-back of theta by f defines a Levi foliation : f*theta = 0 which is tangent to the holomorphic foliation : df = 0. This problem was proposed by D. Cerveau in a meeting (see Fernandez 1997.Seja L Ì uma variedade real de dimensão 3. Para todo ponto regular p Î L existe uma única reta complexa l p no espaço tangente à L em p. Quando o campo de linhas complexas p l p é completamente integrável, dizemos que L é uma variedade de Levi. Mais geralmente, seja L Ì M uma subvariedade real em uma variedade analítica complexa. Se existe uma distribuição real integrável de dimensão 2 em L que é invariante pela estrutura holomorfa J induzida pela variedade complexa M, dizemos que L é uma variedade de Levi. Vamos provar: Teorema. Seja uma folheação de Levi e seja a folheação holomorfa induzida. Então tem integral primeira Liouvilliana. Em outras palavras, se é uma folheação real de

  17. Key to Language Learning Success

    Directory of Open Access Journals (Sweden)

    Oktavian Mantiri

    2015-01-01

    Full Text Available This paper looks at the important elements of language learning and teaching i.e. the role of teachers as well as the attitude and motivation of learners. Teachers undoubtedly play crucial roles in students’ language learning outcome which could ignite or diminish students’ motivation. Positive attitudes and motivation – instrumental or integrative and intrinsic or extrinsic – are key to successful learning. Therefore it is paramount for language teachers as well as learners to know these roles and nurture the best possible ways where language teaching and learning will thrive. This paper also suggested that both stake-holders should be open to holistic approach of language learning and that other factors such as the environment could play an important part in language teaching and learning success.

  18. Cogeneration: Key feasibility analysis parameters

    International Nuclear Information System (INIS)

    Coslovi, S.; Zulian, A.

    1992-01-01

    This paper first reviews the essential requirements, in terms of scope, objectives and methods, of technical/economic feasibility analyses applied to cogeneration systems proposed for industrial plants in Italy. Attention is given to the influence on overall feasibility of the following factors: electric power and fuel costs, equipment coefficients of performance, operating schedules, maintenance costs, Italian Government taxes and financial and legal incentives. Through an examination of several feasibility studies that were done on cogeneration proposals relative to different industrial sectors, a sensitivity analysis is performed on the effects of varying the weights of different cost benefit analysis parameters. With the use of statistical analyses, standard deviations are then determined for key analysis parameters, and guidelines are suggested for analysis simplifications

  19. Fibre optic communication key devices

    CERN Document Server

    Grote, Norbert

    2017-01-01

    The book gives an in-depth description of key devices of current and next generation fibre optic communication networks. Devices treated include semiconductor lasers, optical amplifiers, modulators, wavelength filters and other passives, detectors, all-optical switches, but relevant properties of optical fibres and network aspects are included as well. The presentations include the physical principles underlying the various devices, technologies used for their realization, typical performance characteristics and limitations, but development trends towards more advanced components are also illustrated. This new edition of a successful book was expanded and updated extensively. The new edition covers among others lasers for optical communication, optical switches, hybrid integration, monolithic integration and silicon photonics. The main focus is on Indium phosphide-based structures but silicon photonics is included as well. The book covers relevant principles, state-of-the-art implementations, status of curren...

  20. How many N = 4 strings exist?

    International Nuclear Information System (INIS)

    Ketov, S.V.

    1994-09-01

    Possible ways of constructing extended fermionic strings with N=4 world-sheet supersymmetry are reviewed. String theory constraints form, in general, a non-linear quasi(super)conformal algebra, and can have conformal dimensions ≥1. When N=4, the most general N=4 quasi-superconformal algebra to consider for string theory building is D(1, 2; α), whose linearisation is the so-called ''large'' N=4 superconformal algebra. The D(1, 2; α) algebra has su(2)sub(κ + )+su(2)sub(κ - )+u(1) Kac-Moody component, and α=κ - /κ + . We check the Jacobi identities and construct a BRST charge for the D(1, 2; α) algebra. The quantum BRST operator can be made nilpotent only when κ + =κ - =-2. The D(1, 2; 1) algebra is actually isomorphic to the SO(4)-based Bershadsky-Knizhnik non-linear quasi-superconformal algebra. We argue about the existence of a string theory associated with the latter, and propose the (non-covariant) hamiltonian action for this new N=4 string theory. Our results imply the existence of two different N=4 fermionic string theories: the old one based on the ''small'' linear N=4 superconformal algebra and having the total ghost central charge c gh =+12, and the new one with non-linearly realised N=4 supersymmetry, based on the SO(4) quasi-superconformal algebra and having c gh =+6. Both critical string theories have negative ''critical dimensions'' and do not admit unitary matter representations. (orig.)

  1. Key energy technologies for Europe

    Energy Technology Data Exchange (ETDEWEB)

    Holst Joergensen, Birte

    2005-09-01

    The report is part of the work undertaken by the High-Level Expert Group to prepare a report on emerging science and technology trends and the implications for EU and Member State research policies. The outline of the report is: 1) In the introductory section, energy technologies are defined and for analytical reasons further narrowed down; 2) The description of the socio-economic challenges facing Europe in the energy field is based on the analysis made by the International Energy Agency going back to 1970 and with forecasts to 2030. Both the world situation and the European situation are described. This section also contains an overview of the main EU policy responses to energy. Both EU energy R and D as well as Member State energy R and D resources are described in view of international efforts; 3) The description of the science and technology base is made for selected energy technologies, including energy efficiency, biomass, hydrogen, and fuel cells, photovoltaics, clean fossil fuel technologies and CO{sub 2} capture and storage, nuclear fission and fusion. When possible, a SWOT is made for each technology and finally summarised; 4) The forward look highlights some of the key problems and uncertainties related to the future energy situation. Examples of recent energy foresights are given, including national energy foresights in Sweden and the UK as well as links to a number of regional and national foresights and roadmaps; 5) Appendix 1 contains a short description of key international organisations dealing with energy technologies and energy research. (ln)

  2. APPROACH ON THE EXISTENCE OF INNOVATION IN TOURISM

    Directory of Open Access Journals (Sweden)

    Cristina BURGHELEA

    2015-04-01

    Full Text Available This article aimed to highlight the existence of innovation in tourism based on the international literature. From conceptualization of the research period it was found that definition can be universally valid applied in all sectors of the economy and, equally, in the tertiary sector, where there are tourist services. Coming either from English or French, "innovation" defines both a process and its results. Adapting to the constantly varying wishes of customers, innovation is a key element underpinning the survival and existence of competition in a dynamic environment that is changing radically. Current studies reveal that there are other indirect benefits of innovations such as image enhancement, improved customer loyalty, and ability to attract new ones. In this study, it was paid a special attention to the long-term prospects related to the tourism sector in countries such as Australia, Latin America, Africa, China and emerging markets such as India and Indonesia. This has resulted in tourism expenditure forecast for the period 2013 - 2019 performed using information provided by the Ministry of Business, Innovation and Employment.

  3. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  4. A continuous variable quantum deterministic key distribution based on two-mode squeezed states

    International Nuclear Information System (INIS)

    Gong, Li-Hua; Song, Han-Chong; Liu, Ye; Zhou, Nan-Run; He, Chao-Sheng

    2014-01-01

    The distribution of deterministic keys is of significance in personal communications, but the existing continuous variable quantum key distribution protocols can only generate random keys. By exploiting the entanglement properties of two-mode squeezed states, a continuous variable quantum deterministic key distribution (CVQDKD) scheme is presented for handing over the pre-determined key to the intended receiver. The security of the CVQDKD scheme is analyzed in detail from the perspective of information theory. It shows that the scheme can securely and effectively transfer pre-determined keys under ideal conditions. The proposed scheme can resist both the entanglement and beam splitter attacks under a relatively high channel transmission efficiency. (paper)

  5. Energy consumptions in existing buildings; Les consommations d'energie des batiments existants

    Energy Technology Data Exchange (ETDEWEB)

    Nuss, St. [Ecole Nationale Superieure des Arts et Industries de Strasbourg, 78 - Saint-Remy-Les-Chevreuse (France)]|[Costic, 78 - Sainte Remy les Chevreuses (France)

    2002-05-01

    This document presents a sectoral analysis of the energy consumptions in existing French buildings: 1) - residential sector: social buildings, private dwellings; 2) - tertiary sector: office buildings, hotels, commercial buildings, school buildings, hospitals; 3) - industry; 4) - general status. (J.S.)

  6. FTTH: the overview of existing technologies

    Science.gov (United States)

    Nowak, Dawid; Murphy, John

    2005-06-01

    The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.

  7. Estimation of marginal costs at existing waste treatment facilities.

    Science.gov (United States)

    Martinez-Sanchez, Veronica; Hulgaard, Tore; Hindsgaul, Claus; Riber, Christian; Kamuk, Bettina; Astrup, Thomas F

    2016-04-01

    This investigation aims at providing an improved basis for assessing economic consequences of alternative Solid Waste Management (SWM) strategies for existing waste facilities. A bottom-up methodology was developed to determine marginal costs in existing facilities due to changes in the SWM system, based on the determination of average costs in such waste facilities as function of key facility and waste compositional parameters. The applicability of the method was demonstrated through a case study including two existing Waste-to-Energy (WtE) facilities, one with co-generation of heat and power (CHP) and another with only power generation (Power), affected by diversion strategies of five waste fractions (fibres, plastic, metals, organics and glass), named "target fractions". The study assumed three possible responses to waste diversion in the WtE facilities: (i) biomass was added to maintain a constant thermal load, (ii) Refused-Derived-Fuel (RDF) was included to maintain a constant thermal load, or (iii) no reaction occurred resulting in a reduced waste throughput without full utilization of the facility capacity. Results demonstrated that marginal costs of diversion from WtE were up to eleven times larger than average costs and dependent on the response in the WtE plant. Marginal cost of diversion were between 39 and 287 € Mg(-1) target fraction when biomass was added in a CHP (from 34 to 303 € Mg(-1) target fraction in the only Power case), between -2 and 300 € Mg(-1) target fraction when RDF was added in a CHP (from -2 to 294 € Mg(-1) target fraction in the only Power case) and between 40 and 303 € Mg(-1) target fraction when no reaction happened in a CHP (from 35 to 296 € Mg(-1) target fraction in the only Power case). Although average costs at WtE facilities were highly influenced by energy selling prices, marginal costs were not (provided a response was initiated at the WtE to keep constant the utilized thermal capacity). Failing to systematically

  8. Effectiveness of Existing International Nuclear Liability Regime

    International Nuclear Information System (INIS)

    Al-Doais, Salwa; Kessel, Daivd

    2015-01-01

    The first convention was the Paris Convention on Third Party Liability in the Field of Nuclear Energy (the Paris Convention) had been adopted on 29 July 1960 under the auspices of the OECD, and entered into force on 1 April 1968. In 1963,the Brussels Convention - supplementary to the Paris Convention- was adopted in to provide additional funds to compensate damage as a result of a nuclear incident where Paris Convention funds proved to be insufficient. The IAEA's first convention was the Vienna Convention on Civil Liability for Nuclear Damage (the Vienna Convention) which adopted on 21 May 1963,and entered into force in 1977. Both the Paris Convention and the Vienna Convention laid down very similar nuclear liability rules based on the same general principles. The broad principles in these conventions can be summarized as follows: 1- The no-fault liability principle (strict liability) 2- Liability is channeled exclusively to the operator of the nuclear installation (legal channeling) 3- Only courts of the state in which the nuclear accident occurs would have jurisdiction (exclusive jurisdiction) 4- Limitation of the amount of liability and the time frame for claiming damages (limited liability) 5- The operator is required to have adequate insurance or financial guarantees to the extent of its liability amount (liability must be financially secured). 6- Liability is limited in time. Compensation rights are extinguished after specific time. 7- Non-discrimination of victims on the grounds of nationality, domicile or residence. Nuclear liability conventions objective is to provide adequate compensation payments to victims of a nuclear accident. Procedures for receiving these compensation are controlled by some rules such as exclusive jurisdiction, that rule need a further amendment to ensure the effectiveness of the exiting nuclear liability regime . Membership of the Conventions is a critical issue, because the existence of the conventions without being party to

  9. Existing facilities and past practices: Lessons learned

    International Nuclear Information System (INIS)

    Huizenga, D.; Tonkay, D.W.; Owens, K.

    2000-01-01

    Article 12 of the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management (Joint Convention) requires parties to the Joint Convention to review the safety of existing radioactive waste management facilities 'to ensure that, if necessary, all reasonably practicable improvements are made to upgrade the safety of such a facility'. Also required is a review of the results of past practices to determine 'whether any intervention is needed for reasons of radiation protection' and to consider whether the benefits of the intervention or remediation are sufficient, with regard to the costs and the impact on workers, the public and the environment. This paper discusses the experience of the United States Department of Energy in terms of the lessons learned from operating radioactive waste management facilities and from undertaking intervention or remedial action, and from decision making in an international context. Overarching safety principles are discussed, including integrating safety into all work practices and minimizing the generation of waste. Safety review lessons learned with existing facilities are discussed with respect to: applying new requirements to old facilities, taking a life-cycle perspective of waste management, improving high level waste facility management, and blending current and past practices with respect to the process used to arrive at decisions for intervention. Special emphasis is placed on the need to provide for early and substantive input from the involved regulatory agencies, Native American tribes, and those citizens and groups with an interest in the decisions. Examples of intervention decisions are discussed, including examples taken from uranium mill tailings operations, from cleanup of a former uranium processing plant site, from evaluation of pre-1970 buried 'transuranic waste' sites, and from decommissioning or closure of high level waste storage tanks. The paper concludes that on the

  10. Effectiveness of Existing International Nuclear Liability Regime

    Energy Technology Data Exchange (ETDEWEB)

    Al-Doais, Salwa; Kessel, Daivd [KEPCO International Nuclear Graduate School, Daejeon (Korea, Republic of)

    2015-10-15

    The first convention was the Paris Convention on Third Party Liability in the Field of Nuclear Energy (the Paris Convention) had been adopted on 29 July 1960 under the auspices of the OECD, and entered into force on 1 April 1968. In 1963,the Brussels Convention - supplementary to the Paris Convention- was adopted in to provide additional funds to compensate damage as a result of a nuclear incident where Paris Convention funds proved to be insufficient. The IAEA's first convention was the Vienna Convention on Civil Liability for Nuclear Damage (the Vienna Convention) which adopted on 21 May 1963,and entered into force in 1977. Both the Paris Convention and the Vienna Convention laid down very similar nuclear liability rules based on the same general principles. The broad principles in these conventions can be summarized as follows: 1- The no-fault liability principle (strict liability) 2- Liability is channeled exclusively to the operator of the nuclear installation (legal channeling) 3- Only courts of the state in which the nuclear accident occurs would have jurisdiction (exclusive jurisdiction) 4- Limitation of the amount of liability and the time frame for claiming damages (limited liability) 5- The operator is required to have adequate insurance or financial guarantees to the extent of its liability amount (liability must be financially secured). 6- Liability is limited in time. Compensation rights are extinguished after specific time. 7- Non-discrimination of victims on the grounds of nationality, domicile or residence. Nuclear liability conventions objective is to provide adequate compensation payments to victims of a nuclear accident. Procedures for receiving these compensation are controlled by some rules such as exclusive jurisdiction, that rule need a further amendment to ensure the effectiveness of the exiting nuclear liability regime . Membership of the Conventions is a critical issue, because the existence of the conventions without being party to

  11. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  12. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  13. Existing reflection seismic data re-processing

    International Nuclear Information System (INIS)

    Higashinaka, Motonori; Sano, Yukiko; Kozawa, Takeshi

    2005-08-01

    This document is to report the results of existing seismic data re-processing around Horonobe town, Hokkaido, Japan, which is a part of the Horonobe Underground Research Project. The main purpose of this re-processing is to recognize the subsurface structure of Omagari Fault and fold system around Omagari Fault. The seismic lines for re-processing are TYHR-A3 line and SHRB-2 line, which JAPEX surveyed in 1975. Applying weathering static correction using refraction analysis and noise suppression procedure, we have much enhanced seismic profile. Following information was obtained from seismic re-processing results. TYHR-A3 line: There are strong reflections, dipping to the west. These reflections are corresponding western limb of anticline to the west side of Omagari Fault. SHRB-2 line: There are strong reflections, dipping to the west, at CDP 60-140, while there are reflections, dipping to the east, to the east side of CDP 140. These reflections correspond to the western limb and the eastern limb of the anticline, which is parallel to Omagari FAULT. This seismic re-processing provides some useful information to know the geological structure around Omagari Fault. (author)

  14. On the Existence of Evolutionary Learning Equilibriums

    Directory of Open Access Journals (Sweden)

    Masudul Alam Choudhury

    2011-12-01

    Full Text Available The usual kinds of Fixed-Point Theorems formalized on the existence of competitive equilibrium that explain much of economic theory at the core of economics can operate only on bounded and closed sets with convex mappings. But these conditions are hardly true of the real world of economic and financial complexities and perturbations. The category of learning sets explained by continuous fields of interactive, integrative and evolutionary behaviour caused by dynamic preferences at the individual and institutional and social levels cannot maintain the assumption of closed, bounded and convex sets. Thus learning sets and multi-system inter-temporal relations explained by pervasive complementarities and  participation between variables and entities, and evolution by learning, have evolutionary equilibriums. Such a study requires a new methodological approach. This paper formalizes such a methodology for evolutionary equilibriums in learning spaces. It briefly points out the universality of learning equilibriums in all mathematical structures. For a particular case though, the inter-systemic interdependence between sustainable development and ethics and economics in the specific understanding of learning domain is pointed out.

  15. Does the chromatic Mach bands effect exist?

    Science.gov (United States)

    Tsofe, Avital; Spitzer, Hedva; Einav, Shmuel

    2009-06-30

    The achromatic Mach bands effect is a well-known visual illusion, discovered over a hundred years ago. This effect has been investigated thoroughly, mainly for its brightness aspect. The existence of Chromatic Mach bands, however, has been disputed. In recent years it has been reported that Chromatic Mach bands are not perceived under controlled iso-luminance conditions. However, here we show that a variety of Chromatic Mach bands, consisting of chromatic and achromatic regions, separated by a saturation ramp, can be clearly perceived under iso-luminance and iso-brightness conditions. In this study, observers' eye movements were recorded under iso-brightness conditions. Several observers were tested for their ability to perceive the Chromatic Mach bands effect and its magnitude, across different cardinal and non-cardinal Chromatic Mach bands stimuli. A computational model of color adaptation, which predicted color induction and color constancy, successfully predicts this variation of Chromatic Mach bands. This has been tested by measuring the distance of the data points from the "achromatic point" and by calculating the shift of the data points from predicted complementary lines. The results suggest that the Chromatic Mach bands effect is a specific chromatic induction effect.

  16. Evaluation and modification of existing CETP.

    Science.gov (United States)

    Sharma, Bhavisha; Shah, A R

    2013-07-01

    For the development of small and medium scale industries in various Gujarat industrial development corporation (GIDC) areas and in clusters of industrial areas, the common effluent treatment plant (CETP) has always been found advantageous in view of cost of treatment, operation and maintenance and disposal of residues being produced. In small scale industrial units due to market requirement, product changes and quantity enhancement are taking place. Due to such changes, the effluent characteristics are continuously changing which affects performance of CETP. Hence it has been found necessary to study continuously the performance, evaluation and modification in the working of the CETP. This paper contains a case study of one of the existing CETP near Baroda which is facing the problem of disposal of treated effluent in which the important parameters like COD, BOD, Suspended Solid, NH3-N and oil and grease were analyzed. Based on the characterization of wastewater, the various treatability studies were carried out on CETP wastewater. To comply with disposal standard prescribed by Effluent Channel Project Ltd.(ECPL)* and Gujarat Pollution Control Board (GPCB) for discharge of industrial effluent into channel, various treatments in form of ammonia stripping, coagulation and flocculation, biological treatment, filtration and chlorination are suggested.

  17. On the existence of tropical anvil clouds

    Science.gov (United States)

    Seeley, J.; Jeevanjee, N.; Langhans, W.; Romps, D.

    2017-12-01

    In the deep tropics, extensive anvil clouds produce a peak in cloud cover below the tropopause. The dominant paradigm for cloud cover attributes this anvil peak to a layer of enhanced mass convergence in the clear-sky upper-troposphere, which is presumed to force frequent detrainment of convective anvils. However, cloud cover also depends on the lifetime of cloudy air after it detrains, which raises the possibility that anvil clouds may be the signature of slow cloud decay rather than enhanced detrainment. Here we measure the cloud decay timescale in cloud-resolving simulations, and find that cloudy updrafts that detrain in the upper troposphere take much longer to dissipate than their shallower counterparts. We show that cloud lifetimes are long in the upper troposphere because the saturation specific humidity becomes orders of magnitude smaller than the typical condensed water loading of cloudy updrafts. This causes evaporative cloud decay to act extremely slowly, thereby prolonging cloud lifetimes in the upper troposphere. As a consequence, extensive anvil clouds still occur in a convecting atmosphere that is forced to have no preferential clear-sky convergence layer. On the other hand, when cloud lifetimes are fixed at a characteristic lower-tropospheric value, extensive anvil clouds do not form. Our results support a revised understanding of tropical anvil clouds, which attributes their existence to the microphysics of slow cloud decay rather than a peak in clear-sky convergence.

  18. Mapping key antecedents of employee-driven innovations

    DEFF Research Database (Denmark)

    Smith, Pernille; Ulhøi, John Parm; Kesting, Peter

    2012-01-01

    Research on employee-driven innovation (EDI) is still in its infancy, and as yet there is no independent body of literature on the topic. The aim of this paper is to review existing insights into the key antecedents of EDI in other research contexts. In particular, we focus on: leader support......, autonomy, collaboration, and organisational norms of exploration. The main contribution of this paper is to discuss how these key antecedents apply to the specific case of EDI and to identify an agenda for new research....

  19. Quantum key distribution and cryptography

    International Nuclear Information System (INIS)

    Alleaume, R.

    2005-01-01

    Full text: Originally proposed by classical cryptographers, the ideas behind Quantum Key Distribution (QKD) have attracted considerable interest among the quantum optics community, which has significantly helped bring these ideas to reality. Experimental realizations have quickly evolved from early lab demonstrations to QKD systems that are now deployed in real conditions and targeting commercial applications. Although QKD can be theoretically proven to rely on 'unconditional security proofs' and should thus be able to provide security levels unachievable through computationally-based cryptographic techniques, the debate on the cryptographic applications of QKD remains somehow controversial. It seems that a consensus on that matter cannot be reached without a careful analysis of assumptions and definitions related to security models used in classical or in quantum cryptography. In this talk, we will try to present a comprehensive synthesis on this topic. We have initiated this work as a contribution to the European IP SECOQC project, confronting views and knowledge among experimental and theoretical quantum physicists, as well as classical cryptographers. (author)

  20. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  1. Talent Management: Working lines and key processes

    Directory of Open Access Journals (Sweden)

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  2. Interim Storage of Plutonium in Existing Facilities

    International Nuclear Information System (INIS)

    Woodsmall, T.D.

    1999-01-01

    'In this era of nuclear weapons disarmament and nonproliferation treaties, among many problems being faced by the Department of Energy is the safe disposal of plutonium. There is a large stockpile of plutonium at the Rocky Flats Environmental Technology Center and it remains politically and environmentally strategic to relocate the inventory closer to a processing facility. Savannah River Site has been chosen as the final storage location, and the Actinide Packaging and Storage Facility (APSF) is currently under construction for this purpose. With the ability of APSF to receive Rocky Flats material an estimated ten years away, DOE has decided to use the existing reactor building in K-Area of SRS as temporary storage to accelerate the removal of plutonium from Rocky Flats. There are enormous cost savings to the government that serve as incentive to start this removal as soon as possible, and the KAMS project is scheduled to receive the first shipment of plutonium in January 2000. The reactor building in K-Area was chosen for its hardened structure and upgraded seismic qualification, both resulting from an effort to restart the reactor in 1991. The KAMS project has faced unique challenges from Authorization Basis and Safety Analysis perspectives. Although modifying a reactor building from a production facility to a storage shelter is not technically difficult, the nature of plutonium has caused design and safety analysis engineers to make certain that the design of systems, structures and components included will protect the public, SRS workers, and the environment. A basic overview of the KAMS project follows. Plutonium will be measured and loaded into DOT Type-B shipping packages at Rocky Flats. The packages are 35-gallon stainless steel drums with multiple internal containment boundaries. DOE transportation vehicles will be used to ship the drums to the KAMS facility at SRS. They will then be unloaded, stacked and stored in specific locations throughout the

  3. Sharing information among existing data sources

    Science.gov (United States)

    Ashley, W. R., III

    1999-01-01

    The sharing of information between law enforcement agencies is a premise for the success of all jurisdictions. A wealth of information resides in both the databases and infrastructures of local, state, and regional agencies. However, this information is often not available to the law enforcement professionals who require it. When the information is, available, individual investigators must not only know that it exists, but where it resides, and how to retrieve it. In many cases, these types of cross-jurisdictional communications are limited to personal relationships that result from telephone calls, faxes, and in some cases, e-mail. As criminal elements become more sophisticated and distributed, law enforcement agencies must begin to develop infrastructures and common sharing mechanisms that address a constantly evolving criminal threat. Historically, criminals have taken advantage of the lack of communication between law enforcement agencies. Examples of this are evident in the search for stolen property and monetary dealings. Pawned property, cash transactions, and failure to supply child support are three common cross- jurisdictional crimes that could be better enforced by strengthening the lines of communication. Criminal behavior demonstrates that it is easier to profit from their actions by dealing in separate jurisdictions. For example, stolen property is sold outside of the jurisdiction of its origin. In most cases, simply traveling a short distance to the adjoining county or municipality is sufficient to ensure that apprehension of the criminal or seizure of the stolen property is highly unlikely. In addition to the traditional burglar, fugitives often sell or pawn property to finance their continued evasion from the law. Sharing of information in a rapid manner would increase the ability of law enforcement personnel to track and capture fugitives, as well as criminals. In an example to combat this threat, the State of Florida recently acted on the need to

  4. Seismic evaluation of existing nuclear facilities. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-07-01

    Programmes for re-evaluation and upgrading of safety of existing nuclear facilities are presently under way in a number of countries around the world. An important component of these programmes is the re-evaluation of the seismic safety through definition of new seismic parameters at the site and evaluation of seismic capacity of structures, equipment and distribution systems following updated information and criteria. The Seminar is intended to provide a forum for the exchange of information and discussion of the state-of-the-art on seismic safety of nuclear facilities in operation or under construction. Both analytical and experimental techniques for the evaluation of seismic capacity of structures, equipment and distribution systems are discussed. Full scale and field tests of structures and components using shaking tables, mechanical exciters, explosive and shock tests, and ambient vibrations are included in the seminar programme with emphasis on recent case histories. Presentations at the Seminar also include analytical techniques for the determination of dynamic properties of soil-structure systems from experiments as well as calibration of numerical models. Methods and criteria for seismic margin assessment based on experience data obtained from the behaviour of structures and components in real earthquakes are discussed. Guidelines for defining technical requirements for capacity re-evaluation (i.e. acceptable behaviour limits and design and implementation of structure and components upgrades are also presented and discussed. The following topics were covered during 7 sessions: earthquake experience and seismic re-evaluation; country experience in seismic re-evaluation programme; generic WWER studies; analytical methods for seismic capacity re-evaluation; experimental methods for seismic capacity re-evaluation; case studies.

  5. Does Glocal Political Power Already Exist?

    Directory of Open Access Journals (Sweden)

    Lorenzo Ornaghi

    2017-05-01

    Full Text Available Large periods of history are usually characterized by equally important moments of change in scientific knowledge and, in particular, in the understanding of political power. We still need to study in depth whether the former provokes (almost of out necessity the latter, or whether they are “great” because they are favored by the innovation of the paradigms of knowledge. The passage from medieval universalism to the particularism of the modern age represents an extremely interesting analogy when compared to the transformations that are now underway. The example of John of Salisbury’s Policratus, the starting point of this article, is illuminating in our comprehension of the relevance of the interweaving between the persistence of the ancient forms of recognition of power and the search for new forms. The existence of glocal realities is already a fact. Even if it is relatively easy to recognize these realities (a business, a university, a humanitarian association, not a few of the same “parts” which constitute the traditional organization of the State, it is more difficult to define the specific characteristics of the power at their disposal. Moving from the widening gap between “actual” power and “potential” power, the article examines the motives for which the classical definitions of power are always becoming more insufficient in understanding the role now emerging from glocal realities. And, in particular, by looking at how the “command-obedience” relationship is changing also as a consequence of communication networks and information technology, the article analyzes that specific “contamination” within global elements and local elements, which seems to be the main base of glocal political power.

  6. David Barker: the revolution that anticipates existence

    Directory of Open Access Journals (Sweden)

    Italo Farnetani

    2014-01-01

    Full Text Available David Barker is the man who “anticipated" the existence of babies by focusing attention on the importance of the fetus and what takes place during intrauterine life. Barker was one of the physicians who in the last decades brought about the greatest changes in medicine, changes so important as to represent a veritable revolution in medical thought. According to Barker's studies, the embryo obviously has a genetic complement coming from the mother and father, but from the very first stages of development it begins to undergo the influence of the outside environment, just as occurs for adults whose biological, psychological and pathological aspects are influenced by the environment to a not well-established percentage between genetic complement and epigenetics. Much of our future lives as adults is decided in our mothers' wombs. If Barker's discovery was revolutionary from the cultural standpoint, it was even more so from the strictly medical one. Barker's research method was rigid from the methodological standpoint, but innovative and speculative in its working hypotheses, with a humanistic slant. Barker's idea has another practical corollary: it is evident that the role of obstetricians, perinatologists and neonatologists is more and more relevant in medicine and future prevention. Unquestionably, besides the enormous merits of his clinical research, among the benefits that Barker has contributed there is that of having helped us to see things from new points of view. Not only is the neonate (and even more so the fetus not an adult of reduced proportions, but perhaps the neonate is the "father" of the adult person.

  7. Virtual existence in contemporary Serbian novel

    Directory of Open Access Journals (Sweden)

    Gordić-Petković Vladislava S.

    2017-01-01

    Full Text Available The paper sets out to explore the perspectives and strategies of virtual existence in contemporary Serbian novel in order to illustrate radical changes in the concept of reality and writers' concern with the fidelity to experience. A new surge of the so-called digital realism emerges simultaneously with the increase of awareness that the line between our digital selves and our real-world selves has become blurred and difficult to explain, while new technologies are required to go beyond what our human senses can encompass and deliver. The fictional realism of the digital age will also commit itself to young or middle-aged individuals that passionately attempt to define their aims and objectives so that they could fit into a newly constructed and acquired concept of reality. This is the case with the protagonists in the novels by Ivančica Đerić, Tamara Jecić and Aleksandar Ilić, all of them questioning both their offline and online identities. Their everyday life in a postmillennial world includes many intersecting empirical and virtual realities: love, career and sex take place in a dimension which ignores geography and physical distance and ultimately alters the concepts of time and space, as well the concepts of privacy and intimacy. The paper intends to examine the ways new digital technologies contribute to representations of reality in the novels of both accomplished and aspiring authors whose novels deal with ways of life amid social networks. The novels we analyzed show that the distinction between the virtual and the real world narrows, as the narratives range from intimate confession in letters and journals to tweets, notes and statuses, introducing verbal and structural experimental practices which involve shifting points of view.

  8. Thallium exists in opioid poisoned patients.

    Science.gov (United States)

    Ghaderi, Amir; Vahdati-Mashhadian, Naser; Oghabian, Zohreh; Moradi, Valiallah; Afshari, Reza; Mehrpour, Omid

    2015-08-01

    Thallium (Tl) is a toxic heavy metal that exists in nature. Tl poisoning (thallotoxicosis) may occur in opioid addicts. This study was designed to evaluate the frequency and level of urinary Tl in opioid abusers. In addition, clinical findings were evaluated. A total of 150 subjects were examined. Cases with a history of at least 3 years of abuse were admitted in the Imam Reza Hospital as the case group; 50 non-opioid abusers from the target population were included as the control group. Twenty-four hour urinary qualitative and quantitative Tl analyses were performed on both groups. Out of the 150 subjects, 128 (85 %) were negative for qualitative urinary Tl, followed by 5 % (trace), 7 % (1+), 2 % (2+), and 1 % (3+). Mean (standard error (SE), Min-Max) quantitative urinary Tl level was 14 μg/L (3.5 μg/L, 0-346 μg/L). Mean urinary Tl level in the case group was 21 μg/L (5 μg/L, 0-346 μg/L) and that in the controls was 1 μg/L (0.14 μg/L, 0-26 μg/L), which were significantly different (P = 0.001). The most frequent clinical findings were ataxia (86 %), sweating (81 %), and constipation (54 %). In all cases (n = 150), the mean (SE) value for cases with positive qualitative urinary Tl was 26.8 μg/L (0.9 μg/L) and that in the negative cases was 2.3 μg/L (0.2 μg/L), which were significantly different (P = 0.002). This study showed that long-term opioid abuse may lead to Tl exposure. In opioid abusers with the clinical manifestation of thallotoxicosis, urinary Tl should be determined.

  9. Seismic evaluation of existing nuclear facilities. Proceedings

    International Nuclear Information System (INIS)

    1995-01-01

    Programmes for re-evaluation and upgrading of safety of existing nuclear facilities are presently under way in a number of countries around the world. An important component of these programmes is the re-evaluation of the seismic safety through definition of new seismic parameters at the site and evaluation of seismic capacity of structures, equipment and distribution systems following updated information and criteria. The Seminar is intended to provide a forum for the exchange of information and discussion of the state-of-the-art on seismic safety of nuclear facilities in operation or under construction. Both analytical and experimental techniques for the evaluation of seismic capacity of structures, equipment and distribution systems are discussed. Full scale and field tests of structures and components using shaking tables, mechanical exciters, explosive and shock tests, and ambient vibrations are included in the seminar programme with emphasis on recent case histories. Presentations at the Seminar also include analytical techniques for the determination of dynamic properties of soil-structure systems from experiments as well as calibration of numerical models. Methods and criteria for seismic margin assessment based on experience data obtained from the behaviour of structures and components in real earthquakes are discussed. Guidelines for defining technical requirements for capacity re-evaluation (i.e. acceptable behaviour limits and design and implementation of structure and components upgrades are also presented and discussed. The following topics were covered during 7 sessions: earthquake experience and seismic re-evaluation; country experience in seismic re-evaluation programme; generic WWER studies; analytical methods for seismic capacity re-evaluation; experimental methods for seismic capacity re-evaluation; case studies

  10. KEY TOPICS IN SPORTS MEDICINE

    Directory of Open Access Journals (Sweden)

    Amir Ali Narvani

    2006-12-01

    Full Text Available Key Topics in Sports Medicine is a single quick reference source for sports and exercise medicine. It presents the essential information from across relevant topic areas, and includes both the core and emerging issues in this rapidly developing field. It covers: 1 Sports injuries, rehabilitation and injury prevention, 2 Exercise physiology, fitness testing and training, 3 Drugs in sport, 4 Exercise and health promotion, 5 Sport and exercise for special and clinical populations, 6 The psychology of performance and injury. PURPOSE The Key Topics format provides extensive, concise information in an accessible, easy-to-follow manner. AUDIENCE The book is targeted the students and specialists in sports medicine and rehabilitation, athletic training, physiotherapy and orthopaedic surgery. The editors are authorities in their respective fields and this handbook depends on their extensive experience and knowledge accumulated over the years. FEATURES The book contains the information for clinical guidance, rapid access to concise details and facts. It is composed of 99 topics which present the information in an order that is considered logical and progressive as in most texts. Chapter headings are: 1. Functional Anatomy, 2. Training Principles / Development of Strength and Power, 3. Biomechanical Principles, 4. Biomechanical Analysis, 5. Physiology of Training, 6. Monitoring of Training Progress, 7. Nutrition, 8. Hot and Cold Climates, 9. Altitude, 10. Sport and Travelling, 11. Principles of Sport Injury Diagnosis, 12. Principles of Sport and Soft Tissue Management, 13. Principles of Physical Therapy and Rehabilitation, 14. Principles of Sport Injury Prevention, 15. Sports Psychology, 16. Team Sports, 17. Psychological Aspects of Injury in Sport, 18. Injury Repair Process, 19. Basic Biomechanics of Tissue Injury, 20. Plain Film Radiography in Sport, 21. Nuclear Medicine, 22. Diagnostic Ultrasound, 23. MRI Scan, 24. Other Imaging, 5. Head Injury, 26. Eye

  11. Key issues in transplant tourism.

    Science.gov (United States)

    Akoh, Jacob A

    2012-02-24

    Access to organ transplantation depends on national circumstances, and is partly determined by the cost of health care, availability of transplant services, the level of technical capacity and the availability of organs. Commercial transplantation is estimated to account for 5%-10% (3500-7000) of kidney transplants performed annually throughout the world. This review is to determine the state and outcome of renal transplantation associated with transplant tourism (TT) and the key challenges with such transplantation. The stakeholders of commercial transplantation include: patients on the waiting lists in developed countries or not on any list in developing countries; dialysis funding bodies; middlemen, hosting transplant centres; organ-exporting countries; and organ vendors. TT and commercial kidney transplants are associated with a high incidence of surgical complications, acute rejection and invasive infection which cause major morbidity and mortality. There are ethical and medical concerns regarding the management of recipients of organs from vendors. The growing demand for transplantation, the perceived failure of altruistic donation in providing enough organs has led to calls for a legalised market in organ procurement or regulated trial in incentives for donation. Developing transplant services worldwide has many benefits - improving results of transplantation as they would be performed legally, increasing the donor pool and making TT unnecessary. Meanwhile there is a need to re-examine intrinsic attitudes to TT bearing in mind the cultural and economic realities of globalisation. Perhaps the World Health Organization in conjunction with The Transplantation Society would set up a working party of stakeholders to study this matter in greater detail and make recommendations.

  12. Does GaH5 exist?

    Science.gov (United States)

    Speakman, Lucas D.; Turney, Justin M.; Schaefer, Henry F.

    2005-11-01

    The existence or nonexistence of GaH5 has been widely discussed [N. M. Mitzel, Angew. Chem. Int. Ed. 42, 3856 (2003)]. Seven possible structures for gallium pentahydride have been systematically investigated using ab initio electronic structure theory. Structures and vibrational frequencies have been determined employing self-consistent field, coupled cluster including all single and double excitations (CCSD), and CCSD with perturbative triples levels of theory, with at least three correlation-consistent polarized-valence-(cc-pVXZ and aug-cc-pVXZ) type basis sets. The X˜A'1 state for GaH5 is predicted to be weakly bound complex 1 between gallane and molecular hydrogen, with Cs symmetry. The dissociation energy corresponding to GaH5→GaH3+H2 is predicted to be De=2.05kcalmol-1. The H-H stretching fundamental is predicted to be v =4060cm-1, compared to the tentatively assigned experimental feature of Wang and Andrews [J. Phys. Chem. A 107, 11371 (2003)] at 4087cm-1. A second Cs structure 2 with nearly equal energy is predicted to be a transition state, corresponding to a 90° rotation of the H2 bond. Thus the rotation of the hydrogen molecule is essentially free. However, hydrogen scrambling through the C2v structure 3 seems unlikely, as the activation barrier for scrambling is at least 30kcalmol-1 higher in energy than that for the dissociation of GaH5 to GaH3 and H2. Two additional structures consisting of GaH3 with a dihydrogen bond perpendicular to gallane (C3v structure 4) and an in-plane dihydrogen bond [Cs(III) structure 5] were also examined. A C3v symmetry second-order saddle point has nearly the same energy as the GaH3+H2 dissociation limit, while the Cs(III) structure 5 is a transition structure to the C3v structure. The C4v structure 6 and the D3h structure 7 are much higher in energy than GaH3+H2 by 88 and 103kcalmol-1, respectively.

  13. PASSCLAIM - Synthesis and review of existing processes.

    Science.gov (United States)

    Richardson, David P; Affertsholt, Tage; Asp, Nils-Georg; Bruce, Ake; Grossklaus, Rolf; Howlett, John; Pannemans, Daphne; Ross, Richard; Verhagen, Hans; Viechtbauer, Volker

    2003-03-01

    Several approaches to the use of health claims on foods have been made around the world, and the common theme is that any health claim will require scientific validation and substantiation. There is also broad consensus that any regulatory framework should protect the consumer, promote fair trade and encourage innovation in the food industry.This paper is based on a critical evaluation of existing international approaches to the scientific substantiation of health claims, with a view to identifying common new ideas, definitions, best practice and a methodology to underpin current and future developments. There is a clear need to have uniform understanding, terminology and description of types of nutrition and health claims. Two broad categories were defined: Nutrition Claims, i. e. what the product contains, and Health Claims, i. e. relating to health, well-being and/or performance, including well-established nutrient function claims, enhanced function claims and disease risk reduction claims. Such health claims relate to what the food or food components does or do. The categories of health claims are closely and progressively related and are, in practice, part of a continuum. Provision is also made for "generic" or well-established, generally accepted claims and for "innovative" or "product-specific" claims. Special attention was paid to reflect the health-promoting properties of a food or food component in such a way as to facilitate the making of risk reduction claims outside the medical scope of the term prevention. The paper sets out basic principles and guidelines for communication of health claims and principles of nutritional safety. The main body of the work examines the process for the assessment of scientific support for health claims on food and emphasises an evidence-based approach consisting of: Identification of all relevant studies exploring the collection of evidence, data searches, the nature of the scientific evidence, sources of scientific data

  14. Key challenges to expanding renewable energy

    International Nuclear Information System (INIS)

    Stram, Bruce N.

    2016-01-01

    The key advantage of renewables is that they are free of direct pollution and carbon emissions. Given concern over global warming caused by carbon emissions, there are substantial policy efforts to increase renewable penetrations. The purpose of this paper is to outline and evaluate the challenges presented by increasing penetrations of renewable electricity generation. These generation sources primarily include solar and wind which are growing rapidly and are new enough to the grid that the impact of high penetrations is not fully understood. The intrinsic nature of solar and wind power is very likely to present greater system challenges than “conventional” sources. Within limits, those challenges can be overcome, but at a cost. Later sections of the paper will draw on a variety of sources to identify a range of such costs, at least as they are foreseen by researchers helping prepare ambitious plans for grids to obtain high shares (30–50%) of their megawatt hours from primarily solar and wind generation. Energy poverty issues are outlined and related to renewable costs issues. - Highlights: •Integration of intermittent renewables with existing power grids. •Renewable ramping and over production issues. •Renewable caused system costs. •Energy poverty circumstances and consequences.

  15. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  16. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.

  17. A precariedade humana e a existência estilizada Human precariousness and stylized existence

    Directory of Open Access Journals (Sweden)

    Rita Paiva

    2013-04-01

    Full Text Available Este artigo tematiza o desamparo vivenciado pela consciência ante a ausência de bases sólidas para seus anseios de felicidade e para suas representações simbólicas. Com esse propósito, toma como objeto de reflexão um dos ensaios filosóficos de Albert Camus, O mito de Sísifo, equacionando a possibilidade de uma ética que estilize a vida, sem que se minimize a dolorosa precariedade da existência humana. Posteriormente, em diálogo com alguns textos de M. Foucault, a reflexão procura estabelecer os vínculos possíveis entre a ética camusiana e a ética como uma estética da existência, tal como pensada entre os gregos antigos.This article discusses the helplessness experienced by the consciousness vis-à-vis the absence of solid bases for its longings for happiness and for its symbolic representations. For this purpose, the object of reflection of the article is one of Albert Camus' philosophical essays, The Myth of Sisyphus, and we inquire into the possibility of an ethics that stylizes life without minimizing the painful precariousness of human existence. Making reference to certain texts by Foucault, we attempt to establish possible connections between Camus' ethics and an ethics of the aesthetics of existence as found in the thinkers of ancient Greece.

  18. Existence and non-existence of solutions for a singular problem with variable potentials

    Directory of Open Access Journals (Sweden)

    Kamel Saoudi

    2017-11-01

    Full Text Available The purpose of this article is to prove some existence and nonexistence theorems for the inhomogeneous singular Dirichlet problem $$ - \\Delta_p u = \\frac{\\lambda k(x}{u^\\delta}\\pm h(x u^q. $$ For proving our results we use the sub and super solution method, and monotonicity arguments.

  19. DISTANCE AS KEY FACTOR IN MODELLING STUDENTS’ RECRUITMENT BY UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    SIMONA MĂLĂESCU

    2015-10-01

    Full Text Available Distance as Key Factor in Modelling Students’ Recruitment by Universities. In a previous paper analysing the challenge of keeping up with the current methodologies in the analysis and modelling of students’ recruitment by universities in the case of some ECE countries which still don’t register or develop key data to take advantage from the state of the art knowledge on the domain, we have promised to approach the factor distance in a future work due to the extent of the topic. This paper fulfill that promise bringing a review of the literature especially dealing with modelling the geographical area of recruiting students of an university, where combining distance with the proximate key factors previously reviewed, complete the meta-analysis of existing literature we have started a year ago. Beyond the theoretical benefit from a practical perspective, the metaanalysis aimed at synthesizing elements of good practice that can be applied to the local university system.

  20. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  1. Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

    International Nuclear Information System (INIS)

    Hayashi, Masahito; Nakayama, Ryota

    2014-01-01

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. (paper)

  2. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  3. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  4. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  5. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  6. Black Hole Caught Zapping Galaxy into Existence?

    Science.gov (United States)

    2009-11-01

    , construction and operation of powerful ground-based observing facilities enabling astronomers to make important scientific discoveries. ESO also plays a leading role in promoting and organising cooperation in astronomical research. ESO operates three unique world-class observing sites in Chile: La Silla, Paranal and Chajnantor. At Paranal, ESO operates the Very Large Telescope, the world's most advanced visible-light astronomical observatory. ESO is the European partner of a revolutionary astronomical telescope ALMA, the largest astronomical project in existence. ESO is currently planning a 42-metre European Extremely Large optical/near-infrared Telescope, the E-ELT, which will become "the world's biggest eye on the sky".

  7. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  8. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  9. Existence and non-existence of solutions for a p(x-biharmonic problem

    Directory of Open Access Journals (Sweden)

    Ghasem A. Afrouzi

    2015-06-01

    Full Text Available In this article, we study the following problem with Navier boundary conditions $$\\displaylines{ \\Delta (|\\Delta u|^{p(x-2}\\Delta u+|u|^{p(x-2}u =\\lambda |u|^{q(x-2}u +\\mu|u|^{\\gamma(x-2}u\\quad \\text{in } \\Omega,\\cr u=\\Delta u=0 \\quad \\text{on } \\partial\\Omega. }$$ where $\\Omega$ is a bounded domain in $\\mathbb{R}^{N}$ with smooth boundary $\\partial \\Omega$, $N\\geq1$. $p(x,q(x$ and $\\gamma(x$ are continuous functions on $\\overline{\\Omega}$, $\\lambda$ and $\\mu$ are parameters. Using variational methods, we establish some existence and non-existence results of solutions for this problem.

  10. Introducing Virtual Law offices in the Existing Judiciary

    Directory of Open Access Journals (Sweden)

    Rizul KHANNA

    2013-05-01

    Full Text Available With the rise of omnipresent foundation of computing resources over the past years, every IT Setup is expanding their horizons in the Cloud services and related technologies. Cloud provides dynamically scalable virtualized computing resources as a service over the Internet and this key characteristic differentiates it from traditional computing paradigm. It is the application of Cloud and mobile computing technologies for improving communication between lawyers, their clients, and any other person involved. This framework basically digitalizes the existing judicial file system to form an e-library using Clouds infrastructure and using the internet services like GPRS or GSM / CDMA or 3G/4G etc for information retrieval from this e-library after the request has received proper authorization and authentication of the regulatory body. Data is received from both Web and mobile based applications so that each person can access the judicial data anytime and anywhere. For the realization of this system, a web interface is created with e-library serving as the main database and with user-friendly interface to do the above data acquisition and analysis which ultimately gives pace to the slow process of case management.

  11. Structural Safety Assessment of Existing Multiarch Tunnel: A Case Study

    Directory of Open Access Journals (Sweden)

    Jinxing Lai

    2017-01-01

    Full Text Available Structural health assessment is one of the key activities in maintaining the performance of a tunnel during its service life. Due to the development of modern detection technology, comprehensive structural health assessment system is being established for operating tunnels. To evaluate the actual operational state of Shitigou tunnel, overall detection of the liner crack, tunnel seepage, and liner void was conducted by employing the modern detection technology, such as crack width monitoring technology, concrete strength monitoring technology, and electromagnetic wave nondestructive monitoring technology. Through the statistical analysis of the detection results, the distribution characteristic, development law, and damage grade of structural defects were obtained. Tunnel liner cracks are mainly located on the middle wall; serious water leakage is encountered on the side wall, middle wall, and vault; the strength of foundation and liner structure of left tunnel does not meet the design requirement; the liner voids are mostly located at the tunnel entrance section, especially, on the tunnel vault; and the proportion of influence factors of structural defects should be considered. The research results presented for this study can serve as references for effective design and health assessment of existing multiarch tunnel projects.

  12. On the Edge of Existence: Malian Migrants in the Maghreb

    Directory of Open Access Journals (Sweden)

    Line Richter

    2016-04-01

    Full Text Available Based on ethnographic fieldwork among Malian migrants and migration brokers in Mali, Algeria, Morocco, and France, this article investigates life in exile on the edge of Europe. Zooming in on the experiences of interlocutors in Morocco and Algeria, the article will explore the experiential dimensions of living in an extended liminal-ity. Anthropologically, life in so-called places of transit, such as the Maghreb countries, has often been dealt with through the lens of liminality. In this article my aim is to build on the insights from such endeavors, and reorient the focus by illumi-nating what this specific type of permanent liminality entails. I posit that a more suitable term to call this is 'limbo'. This, I argue, consists of three main features. First, the motivation for leaving Mali is for most migrants embedded in the lack of opportunities for social mobility: the Malian youth who end up leaving, are in Honwana's words, stuck in 'waithood' at home, in what many argue is a liminal social position. Second, social and political structures are not absent in the Maghreb, rather they are quite discernable and can be seen as continuations and mim-icking of existing structures. Third, experiences of dramatic ruptures with humanity and morality are key characteristics of life on the edge of Europe.

  13. 40 CFR 427.34 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Starch Binder) Subcategory § 427.34 Pretreatment standards for existing sources. Any existing source subject to...

  14. 40 CFR 427.44 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS ASBESTOS MANUFACTURING POINT SOURCE CATEGORY Asbestos Paper (Elastomeric Binder) Subcategory § 427.44 Pretreatment standards for existing sources. Any existing source subject to...

  15. 40 CFR 417.84 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS SOAP AND DETERGENT MANUFACTURING POINT SOURCE CATEGORY Manufacture of Liquid Soaps Subcategory § 417.84 Pretreatment standards for existing sources. Any existing source...

  16. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  17. Chaotic map based key agreement with/out clock synchronization

    International Nuclear Information System (INIS)

    Han, S.; Chang, E.

    2009-01-01

    In order to address Bergamo et al.'s attack, Xiao et al. proposed a key agreement protocol using chaotic maps. Han then presented three attacks on Xiao et al.'s protocol. To enhance the security of key agreement based on chaotic maps, Chang et al. proposed a new key agreement using passphrase, which works in clock synchronization environment. However, their protocol still has some issues: one is its passphrase is not easy to remember and much longer than password; the second one is it cannot resist guessing attack if the constructed passphrase is easy to remember and also has already existed in some rational dictionaries; the third one is it cannot work without clock synchronization. In this paper, we will present two different key agreement protocols, which can resist guessing attack. The first one works in clock synchronization environment. The second one can work without clock synchronization. They both use authenticated password for secure communications. The protocols are secure against replaying attacks and a shared session key can be established.

  18. Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud

    Directory of Open Access Journals (Sweden)

    Qingqing Gan

    2017-01-01

    Full Text Available With the rapid development of network and storage technology, cloud storage has become a new service mode, while data sharing and user revocation are important functions in the cloud storage. Therefore, according to the characteristics of cloud storage, a revocable key-aggregate encryption scheme is put forward based on subset-cover framework. The proposed scheme not only has the key-aggregate characteristics, which greatly simplifies the user’s key management, but also can revoke user access permissions, realizing the flexible and effective access control. When user revocation occurs, it allows cloud server to update the ciphertext so that revoked users can not have access to the new ciphertext, while nonrevoked users do not need to update their private keys. In addition, a verification mechanism is provided in the proposed scheme, which can verify the updated ciphertext and ensure that the user revocation is performed correctly. Compared with the existing schemes, this scheme can not only reduce the cost of key management and storage, but also realize user revocation and achieve user’s access control efficiently. Finally, the proposed scheme can be proved to be selective chosen-plaintext security in the standard model.

  19. VLSI IMPLEMENTATION OF NOVEL ROUND KEYS GENERATION SCHEME FOR CRYPTOGRAPHY APPLICATIONS BY ERROR CONTROL ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. SENTHILKUMAR

    2015-05-01

    Full Text Available A novel implementation of code based cryptography (Cryptocoding technique for multi-layer key distribution scheme is presented. VLSI chip is designed for storing information on generation of round keys. New algorithm is developed for reduced key size with optimal performance. Error Control Algorithm is employed for both generation of round keys and diffusion of non-linearity among them. Two new functions for bit inversion and its reversal are developed for cryptocoding. Probability of retrieving original key from any other round keys is reduced by diffusing nonlinear selective bit inversions on round keys. Randomized selective bit inversions are done on equal length of key bits by Round Constant Feedback Shift Register within the error correction limits of chosen code. Complexity of retrieving the original key from any other round keys is increased by optimal hardware usage. Proposed design is simulated and synthesized using VHDL coding for Spartan3E FPGA and results are shown. Comparative analysis is done between 128 bit Advanced Encryption Standard round keys and proposed round keys for showing security strength of proposed algorithm. This paper concludes that chip based multi-layer key distribution of proposed algorithm is an enhanced solution to the existing threats on cryptography algorithms.

  20. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  1. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  2. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  3. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  4. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  5. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  6. EPA Monthly Key Performance Indicator Dashboards 2017

    Science.gov (United States)

    Each month, the Web Analytics Program posts updated Key Performance Indicator (KPI) dashboards that correspond to three Web performance goals: content consumption, content discovery, and audience engagement.

  7. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  8. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  9. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  10. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  11. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  12. Existing roles of traditional healers (mor baan) in southern Thailand.

    Science.gov (United States)

    Suwankhong, Dusanee; Liamputtong, Pranee; Rumbold, Bruce

    2011-06-01

    Traditional healers (mor baan) played an important role in Thai health long before the introduction of Western medicine. Although modern health professional play a key role of health care provider of Thai health care system, traditional healers and their practice still exist in most rural areas of Thailand. In this article, we address the roles and practices of traditional healers in southern Thailand. An ethnographic method was employed. This approach is the hallmark method used to describe the role and the practice of traditional healers and to grasp in-depth understanding of their everyday life. Participation observation and unstructured interview with 18 traditional healers were conducted. Thematic analysis method was used to analyse the data. Most of the traditional healers chose their role because they were influenced by their ancestors, although a few others chose it because of individual interests and a desire to help ill people. All are trained in multiple skills, using supernatural spirits, ceremonies and natural plant products as resources for counteracting various health problems. They refer patients to modern hospitals or other healers if they cannot adequately manage illness themselves. Their service provision is flexible and based on a holistic approach that suits people's lifestyles and needs. The role of traditional healer tends not to attract the interest of younger generations, although traditional healers have contributed greatly to people's health. Their presence improves people's access to healthcare and offers an alternative to modern medicine, which often has a limited role. We conclude that the services of traditional healers should be incorporated into contemporary healthcare provision of Thai health care system.

  13. Integrated testing strategies for toxicity employing new and existing technologies.

    Science.gov (United States)

    Combes, Robert D; Balls, Michael

    2011-07-01

    We have developed individual, integrated testing strategies (ITS) for predicting the toxicity of general chemicals, cosmetics, pharmaceuticals, inhaled chemicals, and nanoparticles. These ITS are based on published schemes developed previously for the risk assessment of chemicals to fulfil the requirements of REACH, which have been updated to take account of the latest developments in advanced in chemico modelling and in vitro technologies. In addition, we propose an ITS for neurotoxicity, based on the same principles, for incorporation in the other ITS. The technologies are deployed in a step-wise manner, as a basis for decision-tree approaches, incorporating weight-of-evidence stages. This means that testing can be stopped at the point where a risk assessment and/or classification can be performed, with labelling in accordance with the requirements of the regulatory authority concerned, rather than following a checklist approach to hazard identification. In addition, the strategies are intelligent, in that they are based on the fundamental premise that there is no hazard in the absence of exposure - which is why pharmacokinetic modelling plays a key role in each ITS. The new technologies include the use of complex, three-dimensional human cell tissue culture systems with in vivo-like structural, physiological and biochemical features, as well as dosing conditions. In this way, problems of inter-species extrapolation and in vitro/in vivo extrapolation are minimised. This is reflected in the ITS placing more emphasis on the use of volunteers at the whole organism testing stage, rather than on existing animal testing, which is the current situation. 2011 FRAME.

  14. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  15. Eight Key Facets of Small Business Management.

    Science.gov (United States)

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  16. Quantum key distribution using three basis states

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 54; Issue 5. Quantum key distribution using three ... This note presents a method of public key distribution using quantum communication of photons that simultaneously provides a high probability that the bits have not been tampered. It is a variant of the quantum ...

  17. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  18. Locks & keys service moves to building 55

    CERN Multimedia

    2012-01-01

    Please note that as of July 12 Locks & keys service will be at building 55 second floor. The opening hours are as follows: 08:30 am to 12:30 pm - 1:30 pm to 5:30 pm. The procedures and rules relating to applications for key and cylinder have not changed. GI-IS Group

  19. Strategy Keys as Tools for Problem Solving

    Science.gov (United States)

    Herold-Blasius, Raja

    2017-01-01

    Problem solving is one of the main competences we seek to teach students at school for use in their future lives. However, when dealing with mathematical problems, teachers encounter a wide variety of difficulties. To foster students' problem-solving skills, the authors developed "strategy keys." Strategy keys can serve as material to…

  20. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  1. A survey on exploring key performance indicators

    Directory of Open Access Journals (Sweden)

    Mohammed Badawy

    2016-12-01

    Full Text Available Key Performance Indicators (KPIs allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI's either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for exploring and predicting key performance indicators (KPIs.

  2. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  3. Optimal grazing management strategies: evaluating key concepts ...

    African Journals Online (AJOL)

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  4. KeyWare: an open wireless distributed computing environment

    Science.gov (United States)

    Shpantzer, Isaac; Schoenfeld, Larry; Grindahl, Merv; Kelman, Vladimir

    1995-12-01

    Deployment of distributed applications in the wireless domain lack equivalent tools, methodologies, architectures, and network management that exist in LAN based applications. A wireless distributed computing environment (KeyWareTM) based on intelligent agents within a multiple client multiple server scheme was developed to resolve this problem. KeyWare renders concurrent application services to wireline and wireless client nodes encapsulated in multiple paradigms such as message delivery, database access, e-mail, and file transfer. These services and paradigms are optimized to cope with temporal and spatial radio coverage, high latency, limited throughput and transmission costs. A unified network management paradigm for both wireless and wireline facilitates seamless extensions of LAN- based management tools to include wireless nodes. A set of object oriented tools and methodologies enables direct asynchronous invocation of agent-based services supplemented by tool-sets matched to supported KeyWare paradigms. The open architecture embodiment of KeyWare enables a wide selection of client node computing platforms, operating systems, transport protocols, radio modems and infrastructures while maintaining application portability.

  5. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  6. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  7. Security by quantum key distribution and IPSEC (SEQKEIP): feasibility

    International Nuclear Information System (INIS)

    Sfaxi, M.A.; Ghernaouti-Helie, S.; Ribordy, G; Gay, O.

    2005-01-01

    Full text: Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. On the contrary, quantum cryptography is a method for sharing secret keys, whose security can be formally demonstrated. It is based on the laws of physics. The possible applications of quantum cryptography are mainly linked to telecommunication services that require very high level of security. Quantum cryptography could be integrated in various existing concepts and protocols. One of the possible use of quantum cryptography is within IPSEC. The aim of this paper is to analyse the feasibility of using quantum cryptography in IPSEC and to present the estimated performances of this solution. (author)

  8. Tight finite-key analysis for quantum cryptography.

    Science.gov (United States)

    Tomamichel, Marco; Lim, Charles Ci Wen; Gisin, Nicolas; Renner, Renato

    2012-01-17

    Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

  9. Turn-key SRF accelerators to drive subcritical reactors

    International Nuclear Information System (INIS)

    Johnson, Rolland P.

    2011-01-01

    Large particle accelerator projects, both accomplished and proposed, have been used to engage US industry through contracts and grants to develop efficient capabilities to design, develop, produce, and deliver entire accelerator systems or any needed subsystems. Staffed in many cases by experienced scientists and engineers from National Laboratories and Universities, existing companies could extend their portfolios to offer turn-key accelerators with parameters to match the needs of ADS. If the reactors were based on molten salt fuel such that trip rate requirements were relaxed, the developments needed for a multi-MW proton accelerator for ADS would be minimal. Turn-key SRF proton linacs for ADS operation can be ordered now to enable GW-level power generation from natural thorium, natural uranium, or nuclear waste from conventional reactors. (author)

  10. Key thrusts in next generation CANDU. Annex 10

    International Nuclear Information System (INIS)

    Shalaby, B.A.; Torgerson, D.F.; Duffey, R.B.

    2002-01-01

    Current electricity markets and the competitiveness of other generation options such as CCGT have influenced the directions of future nuclear generation. The next generation CANDU has used its key characteristics as the basis to leap frog into a new design featuring improved economics, enhanced passive safety, enhanced operability and demonstrated fuel cycle flexibility. Many enabling technologies spinning of current CANDU design features are used in the next generation design. Some of these technologies have been developed in support of existing plants and near term designs while others will need to be developed and tested. This paper will discuss the key principles driving the next generation CANDU design and the fuel cycle flexibility of the CANDU system which provide synergism with the PWR fuel cycle. (author)

  11. OPTIMALISASI EDITING GREEN SCREEN MENGGUNAKAN TEKNIK LIGHTING PADA CHROMA KEY

    Directory of Open Access Journals (Sweden)

    Arin Yuli Astuti

    2016-10-01

    Full Text Available In the film world greenscreen or bluescreen is already widely in use as a background making technology . Utilization of this technology is very great because filmmakers can imagine changing the background to the shape or the desired atmosphere without having to perform image capture directly to the location . Chroma key is a technique for combining two images made with a video camera as well , in which a background color of an image to remove (made transparent , was replaced by another image behind it. Deficiencies that exist in the chroma key is that at the time of editing of the hair . Here the author tries to do research on how to minimize the weaknesses mengilangkan edge portion of hair at the time of editing green screen by optimizing lighting / lighting .

  12. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    International Nuclear Information System (INIS)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-01-01

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  13. 75 FR 45013 - Pre-Existing Condition Insurance Plan Program

    Science.gov (United States)

    2010-07-30

    ... Department of Homeland Security's U.S. Citizenship and Immigration Services (USCIS) Systematic Alien... pre-existing condition based on evidence of the existence or history of certain medical or health...

  14. EXISTENCE OF POSITIVE SOLUTIONS FOR AN ELASTIC CURVED BEAM EQUATION

    Directory of Open Access Journals (Sweden)

    Béla Kovacs

    2017-06-01

    Full Text Available This paper investigates the existence of positive solutions for a sixth-order differential equations. By using the Leggett-Williams fixed point theorem we give some new existence results.

  15. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  16. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  17. NoSQL Key-Value DBs Riak and Redis

    Directory of Open Access Journals (Sweden)

    Cristian Andrei BARON

    2016-05-01

    Full Text Available In the context of today's business needs we must focus on the NoSQL databases because they are the only alternative to the RDBMS that can resolve the modern problems related to storing different data structures, processing continue flows of data and fault tolerance. The object of the paper is to explain the NoSQL databases, the needs behind their appearance, the different types of NoSQL databases that current exist and to focus on two key-value databases, Riak and Redis.

  18. Simplicity: the key to improved safety, performance and economics

    International Nuclear Information System (INIS)

    McCandless, R.J.; Redding, J.R.

    1989-01-01

    In General Electric's Simplified Boiling Water Reactor (SBWR) design every feature, every system, every piece of equipment must justify its existence - or it must go. Each must perform a needed function in the simplest way because simplification is the key to high performance and competitive economics. The SBWR has the potential to become a safe, economical and environmentally sound energy source for the 1990s, GE believes. The distinctive features of the reactor are described. It is illustrated on a wall chart which also gives its main specifications

  19. HVDC: A key solution in future transmission systems

    Energy Technology Data Exchange (ETDEWEB)

    Heyman, Olof H.; Weimers, Lars; Bohl, Mie-Lotte

    2010-09-15

    With the transition of power grids, based on sustainable generation, HVDC is a key technology with new applications. This includes connection of remote wind parks and strengthening of existing AC grids. In addition, traditional applications, such as bulk hydropower transfer and interconnections between regions, play a major role in our transition to sustainable generation and the associated grids. The technology for regional grids with a limited number of nodes is already in place and commercial projects are commissioned. For extensive grids, development and verification are ongoing in parallel to industry standards being discussed in groups such as ENTSO-E and CIGRE.

  20. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  1. Continuous Variable Quantum Key Distribution with a Noisy Laser

    DEFF Research Database (Denmark)

    Jacobsen, Christian Scheffmann; Gehring, Tobias; Andersen, Ulrik Lund

    2015-01-01

    Existing experimental implementations of continuous-variable quantum key distribution require shot-noise limited operation, achieved with shot-noise limited lasers. However, loosening this requirement on the laser source would allow for cheaper, potentially integrated systems. Here, we implement...... a theoretically proposed prepare-and-measure continuous-variable protocol and experimentally demonstrate the robustness of it against preparation noise stemming for instance from technical laser noise. Provided that direct reconciliation techniques are used in the post-processing we show that for small distances...

  2. An alternative green screen keying method for film visual effects

    OpenAIRE

    Zhi, Jin

    2015-01-01

    This study focuses on a green screen keying method developed especially for film visual effects. There are a series of ways of using existing tools for creating mattes from green or blue screen plates. However, it is still a time-consuming process, and the results vary especially when it comes to retaining tiny details, such as hair and fur. This paper introduces an alternative concept and method for retaining edge details of characters on a green screen plate, also, a number of connected mat...

  3. 40 CFR 406.34 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Pretreatment standards for existing sources. 406.34 Section 406.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... § 406.34 Pretreatment standards for existing sources. Any existing source subject to this subpart that...

  4. 40 CFR 406.44 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 28 2010-07-01 2010-07-01 true Pretreatment standards for existing sources. 406.44 Section 406.44 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED... § 406.44 Pretreatment standards for existing sources. Any existing source subject to this subpart that...

  5. Existence of pareto equilibria for multiobjective games without compactness

    OpenAIRE

    Shiraishi, Yuya; Kuroiwa, Daishi

    2013-01-01

    In this paper, we investigate the existence of Pareto and weak Pareto equilibria for multiobjective games without compactness. By employing an existence theorem of Pareto equilibria due to Yu and Yuan([10]), several existence theorems of Pareto and weak Pareto equilibria for the multiobjective games are established in a similar way to Flores-B´azan.

  6. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-03-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  7. Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States

    Science.gov (United States)

    Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua

    2018-06-01

    A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.

  8. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  9. Key Facts about Seasonal Flu Vaccine

    Science.gov (United States)

    ... Swine Variant Pandemic Other Key Facts About Seasonal Flu Vaccine Language: English (US) Español Recommend on Facebook ... the flu is to get vaccinated each year. Flu Vaccination Why should people get vaccinated against the ...

  10. China demonstrates intercontinental quantum key distribution

    Science.gov (United States)

    Johnston, Hamish

    2017-11-01

    A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.

  11. Key Principles of Superfund Remedy Selection

    Science.gov (United States)

    Guidance on the primary considerations of remedy selection which are universally applicable at Superfund sites. Key guidance here include: Rules of Thumb for Superfund Remedy Selection and Role of the Baseline Risk Assessment.

  12. Key Royale bridge five year evaluation.

    Science.gov (United States)

    2013-06-01

    This report describes the design, construction, instrumentation, and five-year evaluation of the Key Royale Bridge substructure. The primary focus was the evaluation of the implementation of highly reactive supplementary cementitious materials (SCM) ...

  13. Keys to Successful EPIQ Business Demonstrator Implementation

    NARCIS (Netherlands)

    Shoikova, Elena; Denishev, Vladislav

    2009-01-01

    Shoikova, E., & Denishev, V. (2009). Keys to Successful EPIQ Business Demonstrator Implementation. Paper presented at the 'Open workshop of TENCompetence - Rethinking Learning and Employment at a Time of Economic Uncertainty-event'. November, 19, 2009, Manchester, United Kingdom: TENCompetence.

  14. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  15. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  16. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  17. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  18. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  19. A Key to the Art of Letters

    DEFF Research Database (Denmark)

    Jensen-Rix, Robert William

    2008-01-01

    The article examines A. Lane's grammar A Key to the Art of Letters and its contexts. Symbolically published at the threshold to the eighteenth century, Lane presents an unusually bold plan to make English a world language. Although Lane's book holds a key position in the development of English...... that Lane is the first to use English as the basis for writing universal grammar, as part of his strategy to promote English as a universal code for learning and science...

  20. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  1. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  2. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  3. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  4. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  5. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  6. Long distance free-space quantum key distribution

    International Nuclear Information System (INIS)

    Schmitt-Manderbach, T.

    2007-01-01

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional ''decoy'' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250 bit

  7. Long distance free-space quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt-Manderbach, T.

    2007-10-16

    The aim of the presented experiment was to investigate the feasibility of satellite-based global quantum key distribution. In this context, a free-space quantum key distribution experiment over a real distance of 144 km was performed. The transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively. The small and compact transmitter unit generated attenuated laser pulses, that were sent to the receiver via a 15-cm optical telescope. The receiver unit for polarisation analysis and detection of the sent pulses was integrated into an existing mirror telescope designed for classical optical satellite communications. To ensure the required stability and efficiency of the optical link in the presence of atmospheric turbulence, the two telescopes were equipped with a bi-directional automatic tracking system. Still, due to stray light and high optical attenuation, secure key exchange would not be possible using attenuated pulses in connection with the standard BB84 protocol. The photon number statistics of attenuated pulses follows a Poissonian distribution. Hence, by removing a photon from all pulses containing two or more photons, an eavesdropper could measure its polarisation without disturbing the polarisation state of the remaining pulse. In this way, he can gain information about the key without introducing detectable errors. To protect against such attacks, the presented experiment employed the recently developed method of using additional 'decoy' states, i.e., the the intensity of the pulses created by the transmitter were varied in a random manner. By analysing the detection probabilities of the different pulses individually, a photon-number-splitting attack can be detected. Thanks to the decoy-state analysis, the secrecy of the resulting quantum key could be ensured despite the Poissonian nature of the emitted pulses. For a channel attenuation as high as 35 dB, a secret key rate of up to 250

  8. Method and refrigerants for replacing existing refrigerants in centrifugal compressors

    International Nuclear Information System (INIS)

    Kopko, W.L.

    1991-01-01

    This patent describes a method for replacing an existing refrigerant in a centrifugal compressor. It comprises selecting a desired impeller Mach number for the centrifugal compressor; selecting a base refrigerant constituent; combining at least one additive refrigerant constituent with the base refrigerant constituent to form a replacement refrigerant having at least one physical or chemical property different from the existing refrigerant and substantially providing the desired impeller Mach number in the centrifugal compressor; and replacing the existing refrigerant with the replacement refrigerant

  9. Magnetic nesting and co-existence of ferromagnetism and superconductivity

    International Nuclear Information System (INIS)

    Elesin, V.F.; Kapaev, V.V.; Kopaev, Yu.V.

    2004-01-01

    In the case of providing for the magnetic nesting conditions of the electron spin dispersion law the co-existence of ferromagnetism and superconductivity is possible by any high magnetization. The co-existence of ferromagnetism and superconductivity in the layered cuprate compounds of the RuSr 2 GdCu 2 O 8 -type is explained on this basis, wherein due to the nonstrict provision of the magnetic nesting condition there exists the finite but sufficiently high critical magnetization [ru

  10. The global existence problem and cosmic censorship in general relativity

    International Nuclear Information System (INIS)

    Moncrief, V.; Eardley, D.M.

    1981-01-01

    Two global existence conjectures for the Einstein equations are formulated and their relevance to the cosmic censorship conjecture discussed. It is argued that the reformulation of the cosmic censorship conjecture as a global existence problem renders it more amenable to direct analytical attack. To demonstrate the facility of this approach the cosmological version of the global existence conjecture is proved for the Gowdy spacetimes on T 3 X R. (author)

  11. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  12. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  13. Key determinants of managing the marketing asset of global companies

    Directory of Open Access Journals (Sweden)

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  14. Optimisation of key performance measures in air cargo demand management

    Directory of Open Access Journals (Sweden)

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  15. 40 CFR 407.74 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS CANNED AND PRESERVED FRUITS AND VEGETABLES PROCESSING POINT SOURCE CATEGORY Canned and Preserved Vegetables Subcategory § 407.74 Pretreatment standards for existing sources...

  16. INFORMATION SECURITY RISK ASSESSMENT USING EXISTING LEGAL AND METHODOLOGICAL BASE

    Directory of Open Access Journals (Sweden)

    A. I. Trubei

    2015-01-01

    Full Text Available The article provides a survey of the existing regulatory framework for information security riskmanagement. Practical methods for information security risk and vulnerability assessment are proposed.

  17. Expandable External Payload Carrier for Existing Launch Vehicles, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Numerous existing launch vehicles have excess performance that is not being optimized. By taking advantage of excess, unused, performance, additional NASA...

  18. O discurso racional cartesiano na segunda prova da existência de Deus (The racional cartesian discourse on the second proof of God’s existence

    Directory of Open Access Journals (Sweden)

    Monica Fernandes Abreu

    2010-09-01

    Full Text Available Esta reflexão pretende mostrar o discurso racional cartesiano na segunda prova da existência de Deus. Para tanto, Descartes se depara com uma pergunta central: qual  a causa da existência da res cogitans que é finita e possui a ideia de infinito? A resposta é encontrada na desproporcionalidade ontológica entre o finito e o infinito. Essa desproporcionalidade é elucidada mediante dois conceitos: o princípio de causalidade que determina que a causa deve ser igual ou superior a coisa causada e o princípio de criação contínua em que a causa que criou o ser não é menor do que aquela que o conserva em sua existência. As objeções destacadas no texto contra os argumentos cartesianos foram escolhas deliberadas que servem para elucidar a importância da racionalidade como fundamento para a prova da existência de Deus. A relação entre o  entendimento e a liberdade, apresentada  no texto sucintamente, justifica a impossibilidade da res cogitans ser causa de si mesma.Palavras-chave:  Infinito; finito; causalidade; criação contínua AbstractThis essay aims to show the rational Cartesian discourse on the second proof of God’s existence. In order to do so, Descartes faces a core question: which is the cause for the existence of the res cogitans that is finite in front of the idea of the infinite? The answer is found in the ontological disproportionality between the finite and the infinite. This disproportionality is elucidated through a couple crucial concepts: the principle of causality, which determines that the cause must be equal or superior to the caused thing and the principle of continuous creation, in which the cause that created the being is not inferior than the one that preserves its existence. The objections highlighted in the text against the Cartesian arguments were deliberated choices, to elucidate the relevance of rationality as the foundation for the proof of God’s existence. The relation between the understanding

  19. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  20. Key scientific problems from Cosmic Ray History

    Science.gov (United States)

    Lev, Dorman

    2016-07-01

    Recently was published the monograph "Cosmic Ray History" by Lev Dorman and Irina Dorman (Nova Publishers, New York). What learn us and what key scientific problems formulated the Cosmic Ray History? 1. As many great discoveries, the phenomenon of cosmic rays was discovered accidentally, during investigations that sought to answer another question: what are sources of air ionization? This problem became interesting for science about 230 years ago in the end of the 18th century, when physics met with a problem of leakage of electrical charge from very good isolated bodies. 2. At the beginning of the 20th century, in connection with the discovery of natural radioactivity, it became apparent that this problem is mainly solved: it was widely accepted that the main source of the air ionization were α, b, and γ - radiations from radioactive substances in the ground (γ-radiation was considered as the most important cause because α- and b-radiations are rapidly absorbed in the air). 3. The general accepted wrong opinion on the ground radioactivity as main source of air ionization, stopped German meteorologist Franz Linke to made correct conclusion on the basis of correct measurements. In fact, he made 12 balloon flights in 1900-1903 during his PhD studies at Berlin University, carrying an electroscope to a height of 5500 m. The PhD Thesis was not published, but in Thesis he concludes: "Were one to compare the presented values with those on ground, one must say that at 1000 m altitude the ionization is smaller than on the ground, between 1 and 3 km the same amount, and above it is larger with values increasing up to a factor of 4 (at 5500 m). The uncertainties in the observations only allow the conclusion that the reason for the ionization has to be found first in the Earth." Nobody later quoted Franz Linke and although he had made the right measurements, he had reached the wrong conclusions, and the discovery of CR became only later on about 10 years. 4. Victor Hess, a

  1. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  2. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  3. Identifying Key Actors in Heterogeneous Networks

    Science.gov (United States)

    2017-11-29

    Department of Defense (DOD) present social situations that are outside the scope and violate the assumptions of existing formal social science models. SNA by...assumptions of these existing social science models. SNA by its very construction focuses on dyadic relations and standard SNA metrics are focused only on...problematic for our purposes of determining relative valuations among vertices, but it is in contrast to the behavior of valuations like the Shapley value

  4. Metropolitan Quantum Key Distribution with Silicon Photonics

    Directory of Open Access Journals (Sweden)

    Darius Bunandar

    2018-04-01

    Full Text Available Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss. Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  5. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  6. Metropolitan Quantum Key Distribution with Silicon Photonics

    Science.gov (United States)

    Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk

    2018-04-01

    Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.

  7. KEY PERFORMANCE INDICATORS FOR HEALTHCARE RESEARCH ORGANIZATIONS BETWEEN 2011 AND 2015

    OpenAIRE

    ANISKEVICH A.S.; HALFIN R.A.

    2017-01-01

    In this work we identify 16 key indicators to evaluate the performance of healthcare research organizations. These indicators comprehensively characterize such aspects of performance as research output and relevance, human resource development, integration into the international scientific community, distribution of scientific knowledge, promotion of the prestige of science, and resource provision. Below, we review the existing classification of medical research institutions and their key fea...

  8. Tachyons imply the existence of a privileged frame

    Energy Technology Data Exchange (ETDEWEB)

    Sjoedin, T.; Heylighen, F.

    1985-12-16

    It is shown that the existence of faster-than-light signals (tachyons) would imply the existence (and detectability) of a privileged inertial frame and that one can avoid all problems with reversed-time order only by using absolute synchronization instead of the standard one. The connection between these results and the EPR-paradox is discussed.

  9. Safety assessment of existing highway bridges and viaducts

    NARCIS (Netherlands)

    Maljaars, J.; Steenbergen, R.; Abspoel, L.; Kolstein, M.H.

    2012-01-01

    The assessment of the structural safety of existing br idges and viaducts becomes increasingly important in many countries owing to an increase in traffic loads. Most existing standards, however, are developed for the design of new structures. For this reason, an assessment method for determining

  10. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  11. The Relationship among Localization Skill, Existence Constancy and Object Permanence.

    Science.gov (United States)

    Townes-Rosenwein, Linda

    Two component skills of object permanence were studied: existence constancy -- the infants' ability to expect that an object continues to exist after it is hidden, and localization skill -- infants' ability to search in the correct place for a hidden object. Contradictions within the literature may occur because of task lability caused by failure…

  12. 40 CFR 63.312 - Existing regulations and requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 9 2010-07-01 2010-07-01 false Existing regulations and requirements. 63.312 Section 63.312 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... National Emission Standards for Coke Oven Batteries § 63.312 Existing regulations and requirements. (a) The...

  13. Existence of solutions of nonlinear integrodifferential equations of ...

    Indian Academy of Sciences (India)

    The results are obtained by using semigroup theory and the Schauder fixed point ... The problem of existence of solutions of evolution equations with nonlocal ... we assume that there exists an operator E on DЕEЖИX given by the formula.

  14. The solution of location problems with certain existing facility structures

    DEFF Research Database (Denmark)

    Juel, Henrik; Love, Robert F.

    1983-01-01

    It is known that in the Euclidean distance case, the optimal minisum location of a new facility in relation to four existing facilities is at the intersection of the two lines joining two pairs of the facilities. The authors extend this concept to minisum problems having any even number of existing...... facilities and characterized by generalized distance norms...

  15. Existence of the Stark-Wannier quantum resonances

    Energy Technology Data Exchange (ETDEWEB)

    Sacchetti, Andrea, E-mail: andrea.sacchetti@unimore.it [Department of Physics, Computer Sciences and Mathematics, University of Modena e Reggio Emilia, Modena (Italy)

    2014-12-15

    In this paper, we prove the existence of the Stark-Wannier quantum resonances for one-dimensional Schrödinger operators with smooth periodic potential and small external homogeneous electric field. Such a result extends the existence result previously obtained in the case of periodic potentials with a finite number of open gaps.

  16. Does Absolute Synonymy exist in Owere-Igbo? | Omego | AFRREV ...

    African Journals Online (AJOL)

    Among Igbo linguistic researchers, determining whether absolute synonymy exists in Owere–Igbo, a dialect of the Igbo language predominantly spoken by the people of Owerri, Imo State, Nigeria, has become a thorny issue. While some linguistic scholars strive to establish that absolute synonymy exists in the lexical ...

  17. Existence and attractors of solutions for nonlinear parabolic systems

    Directory of Open Access Journals (Sweden)

    Hamid El Ouardi

    2001-01-01

    Full Text Available We prove existence and asymptotic behaviour results for weak solutions of a mixed problem (S. We also obtain the existence of the global attractor and the regularity for this attractor in $\\left[H^{2}(\\Omega \\right] ^{2}$ and we derive estimates of its Haussdorf and fractal dimensions.

  18. Remarks on the existence of non equilibrium dynamics

    International Nuclear Information System (INIS)

    Marchioro, C.; Pellegrinotti, A.; Pulvirenti, M.

    1981-01-01

    The authors give an existence theorem for the dynamics of an infinite system of anharmonic oscillators. They obtain another proof of the existence of the dynamics in the case of one-dimensional system of infinitely many particles interacting via a bounded potential. The case of very singular potential is also solved. (Auth.)

  19. Global existence of small solutions to semilinear Schroedinger equations

    International Nuclear Information System (INIS)

    Chihara, Hiroyuki

    1996-01-01

    We present global existence theorem for semilinear Schrodinger equations. In general, Schrodinger-type equations do not admit the classical energy estimates. To avoid this difficulty, we use S. Doi's method for linear Schrodinger-type equations. Combining his method and L p -L q estimates, we prove the global existence of solutions with small initial data

  20. 49 CFR 223.15 - Requirements for existing passenger cars.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Requirements for existing passenger cars. 223.15... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION SAFETY GLAZING STANDARDS-LOCOMOTIVES, PASSENGER CARS AND CABOOSES Specific Requirements § 223.15 Requirements for existing passenger cars. (a) Passenger cars built or...

  1. Existing knowledge related to mainstreaming IKS into Educational ...

    African Journals Online (AJOL)

    The study aimed at determining existing knowledge related to mainstreaming of IKS into education system. The qualitative research methodology was appropriate for this study to explore and describe the mainstreaming of IKS into the existing education system. The study included 10 school teachers (5male and 5 females) ...

  2. An existence result of energy minimizer maps between Riemannian polyhedra

    International Nuclear Information System (INIS)

    Bouziane, T.

    2004-06-01

    In this paper, we prove the existence of energy minimizers in each free homotopy class of maps between polyhedra with target space without focal points. Our proof involves a careful study of some geometric properties of Riemannian polyhedra without focal points. Among other things, we show that on the relevant polyhedra, there exists a convex supporting function. (author)

  3. 30 CFR 784.12 - Operation plan: Existing structures.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Operation plan: Existing structures. 784.12... PLAN § 784.12 Operation plan: Existing structures. (a) Each application shall contain a description of... and reclamation operation. The description shall include: (1) Location; (2) Plans of the structure...

  4. 30 CFR 780.12 - Operation plan: Existing structures.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Operation plan: Existing structures. 780.12... PLAN § 780.12 Operation plan: Existing structures. (a) Each application shall contain a description of... and reclamation operation. The description shall include— (1) Location; (2) Plans of the structure...

  5. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  6. Big data and data repurposing - using existing data to answer new questions in vascular dementia research.

    Science.gov (United States)

    Doubal, Fergus N; Ali, Myzoon; Batty, G David; Charidimou, Andreas; Eriksdotter, Maria; Hofmann-Apitius, Martin; Kim, Yun-Hee; Levine, Deborah A; Mead, Gillian; Mucke, Hermann A M; Ritchie, Craig W; Roberts, Charlotte J; Russ, Tom C; Stewart, Robert; Whiteley, William; Quinn, Terence J

    2017-04-17

    Traditional approaches to clinical research have, as yet, failed to provide effective treatments for vascular dementia (VaD). Novel approaches to collation and synthesis of data may allow for time and cost efficient hypothesis generating and testing. These approaches may have particular utility in helping us understand and treat a complex condition such as VaD. We present an overview of new uses for existing data to progress VaD research. The overview is the result of consultation with various stakeholders, focused literature review and learning from the group's experience of successful approaches to data repurposing. In particular, we benefitted from the expert discussion and input of delegates at the 9 th International Congress on Vascular Dementia (Ljubljana, 16-18 th October 2015). We agreed on key areas that could be of relevance to VaD research: systematic review of existing studies; individual patient level analyses of existing trials and cohorts and linking electronic health record data to other datasets. We illustrated each theme with a case-study of an existing project that has utilised this approach. There are many opportunities for the VaD research community to make better use of existing data. The volume of potentially available data is increasing and the opportunities for using these resources to progress the VaD research agenda are exciting. Of course, these approaches come with inherent limitations and biases, as bigger datasets are not necessarily better datasets and maintaining rigour and critical analysis will be key to optimising data use.

  7. Kierkegaard e a existência possível

    Directory of Open Access Journals (Sweden)

    Roberto S. Kahlmeyer-Mertens

    2013-05-01

    Full Text Available Resumo: A relação entre a existência e a possibilidade, objeto deste artigo, merece especial atenção quando se trata de Kierkegaard. Isso porque, estes dois conceitos ocupam papéis primordiais na filosofia do autor, constituindo, justamente, o ponto a partir do qual o pensador se distancia criticamente da tradição filosófica. Caracterizar sumariamente os conceitos de existência e possibilidade na filosofia de Kierkegaard, bem como ambientar o filósofo em sua época como um pensador da existência, para além do rótulo de “existencialista”, são nossos presentes objetivos.   Palavras-chave: Kierkegaard, filosofia da existência, existência, possibilidade

  8. Management of industrial sulfur dioxide and nitrogen oxides emissions in Alberta - description of the existing system

    International Nuclear Information System (INIS)

    Macdonald, W.S.; Bietz, B.F.

    1999-01-01

    In addition to being key primary air contaminants, sulfur dioxide and nitrogen oxides are also major contributors to acidic deposition. The current management system for controlling industrial sources of SO(2) and NO(x) emissions in Alberta was developed in the late 1960s/early 1970s. The focus is on control of point source emissions through the use of appropriate technology. The approach taken for managing SO(2) and NO(x) emissions is similar to the approach taken to other industrial air and wastewater pollutants in Alberta. It is a command and control regulatory system. There are three main industry categories in Alberta which emit SO(2): sour gas processing, oil sand plants and thermal power plants. For NO(x) emissions, the two main categories with emissions: are natural gas production and thermal power plants. The two main goals of the existing industrial air quality management systems are to ensire that: (1) emissions from industrial facilities are minimized through the use of best available demonstrated technology, and (2) ambient levels of air contaminants in the vicinity of industrial facilities do not exceed Alberta guidelines. The four main policies which support these two goals of the existing management system are described. There are a number of key components of the existing management system including: ambient guideline levels, source emission standards, plume dispersion modelling, ambient air and source emission monitoring, environmental reporting, emission inventories, and approvals. 32 refs., 13 figs

  9. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  10. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  11. Quantum cryptography using coherent states: Randomized encryption and key generation

    Science.gov (United States)

    Corndorf, Eric

    With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic

  12. Mining key elements for severe convection prediction based on CNN

    Science.gov (United States)

    Liu, Ming; Pan, Ning; Zhang, Changan; Sha, Hongzhou; Zhang, Bolei; Liu, Liang; Zhang, Meng

    2017-04-01

    Severe convective weather is a kind of weather disasters accompanied by heavy rainfall, gust wind, hail, etc. Along with recent developments on remote sensing and numerical modeling, there are high-volume and long-term observational and modeling data accumulated to capture massive severe convective events over particular areas and time periods. With those high-volume and high-variety weather data, most of the existing studies and methods carry out the dynamical laws, cause analysis, potential rule study, and prediction enhancement by utilizing the governing equations from fluid dynamics and thermodynamics. In this study, a key-element mining method is proposed for severe convection prediction based on convolution neural network (CNN). It aims to identify the key areas and key elements from huge amounts of historical weather data including conventional measurements, weather radar, satellite, so as numerical modeling and/or reanalysis data. Under this manner, the machine-learning based method could help the human forecasters on their decision-making on operational weather forecasts on severe convective weathers by extracting key information from the real-time and historical weather big data. In this paper, it first utilizes computer vision technology to complete the data preprocessing work of the meteorological variables. Then, it utilizes the information such as radar map and expert knowledge to annotate all images automatically. And finally, by using CNN model, it cloud analyze and evaluate each weather elements (e.g., particular variables, patterns, features, etc.), and identify key areas of those critical weather elements, then help forecasters quickly screen out the key elements from huge amounts of observation data by current weather conditions. Based on the rich weather measurement and model data (up to 10 years) over Fujian province in China, where the severe convective weathers are very active during the summer months, experimental tests are conducted with

  13. Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Feng; Zhang, Chun-Hui; Liu, Ai-Ping [Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003 (China); Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003 (China); Wang, Qin, E-mail: qinw@njupt.edu.cn [Institute of Signal Processing Transmission, Nanjing University of Posts and Telecommunications, Nanjing 210003 (China); Key Lab of Broadband Wireless Communication and Sensor Network Technology, Nanjing University of Posts and Telecommunications, Ministry of Education, Nanjing 210003 (China); Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2016-04-01

    In this paper, we propose to implement the heralded pair-coherent source into the measurement-device-independent quantum key distribution. By comparing its performance with other existing schemes, we demonstrate that our new scheme can overcome many shortcomings existing in current schemes, and show excellent behavior in the quantum key distribution. Moreover, even when taking the statistical fluctuation into account, we can still obtain quite high key generation rate at very long transmission distance by using our new scheme. - Highlights: • Implement the heralded pair-coherent source into the measurement-device-independent quantum key distribution. • Overcome many shortcomings existing in current schemes and show excellent behavior. • Obtain quite high key generation rate even when taking statistical fluctuation into account.

  14. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  15. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  16. Key characteristics of different management styles

    OpenAIRE

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  17. Election 2000: The Keys Point to Gore.

    Science.gov (United States)

    Lichtman, Allan J.

    2000-01-01

    Asserts that Vice President Al Gore will be elected in 2000 based on the performance of the Clinton administration. Utilizes the key to the White House, 13 true-or-false diagnostic questions stated as propositions. If five or less are false then the party in power wins. (CMK)

  18. Radiology Aide. Instructor Key [and] Student Manual.

    Science.gov (United States)

    Hartwein, Jon; Dunham, John

    This manual can be used independently by students in secondary health occupations programs or by persons receiving on-the-job training in a radiology department. The manual includes an instructor's key that provides answers to the activity sheets and unit evaluations. The manual consists of the following five units: (1) orientation to radiology;…

  19. Key Competences in vocational education and training

    DEFF Research Database (Denmark)

    Andersen, Ole Dibbern; Kruse, Katrine

    This article presents and discusses how key competences in the school based learning are embedded in the VET curricula during the last five years. It gives an overview of how their role has developed in light of the comprehensive Danish VET reform agreed in 2014 and implemented since August 2015....

  20. Memory for melody and key in childhood.

    Directory of Open Access Journals (Sweden)

    E Glenn Schellenberg

    Full Text Available After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  1. Secure Hybrid Encryption from Weakened Key Encapsulation

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); E. Kiltz (Eike); A. Menezes

    2007-01-01

    textabstractWe put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmetric encryption. Constrained chosen-ciphertext security is a new security notion for KEMs that we propose. It

  2. Public-key encryption with chaos

    Science.gov (United States)

    Kocarev, Ljupco; Sterjev, Marjan; Fekete, Attila; Vattay, Gabor

    2004-12-01

    We propose public-key encryption algorithms based on chaotic maps, which are generalization of well-known and commercially used algorithms: Rivest-Shamir-Adleman (RSA), ElGamal, and Rabin. For the case of generalized RSA algorithm we discuss in detail its software implementation and properties. We show that our algorithm is as secure as RSA algorithm.

  3. Quantum key distribution on Hannover Campus

    Energy Technology Data Exchange (ETDEWEB)

    Duhme, Joerg; Franz, Torsten; Werner, Reinhard F. [Leibniz Universitaet Hannover, Institut fuer Theoretische Physik, AG Quanteninformation (Germany); Haendchen, Vitus; Eberle, Tobias; Schnabel, Roman [Albert Einstein Institut, Quantum Interferometry (Germany)

    2012-07-01

    We report on the progress of the implementation of an entanglement-based quantum key distribution on Hannover campus using squeezed gaussian states (continuous variables). This poster focuses on the theoretical aspects of the project. Experimental data has been compared with the theoretical simulation of the experimental setup. We especially discuss effects of the homodyne detection and postprocessing in use on the measurement outcome.

  4. Memory for melody and key in childhood.

    Science.gov (United States)

    Schellenberg, E Glenn; Poon, Jaimie; Weiss, Michael W

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age.

  5. Five Keys for Teaching Mental Math

    Science.gov (United States)

    Olsen, James R.

    2015-01-01

    After studying the Common Core State Standards for Mathematics (CCSSM) and brain-based learning research, James Olsen believes mental math instruction in secondary school mathematics (grades 7-12) and in teacher education programs needs increased attention. The purpose of this article is to share some keys for teaching mental math. Olsen also…

  6. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  7. Student Engagement: Key to Personalized Learning

    Science.gov (United States)

    Ferlazzo, Larry

    2017-01-01

    Personalized learning has the potential to greatly improve student achievement--but realistic teachers know that any instructional strategy will only be effective if students are willing to do the work. That is why Larry Ferlazzo emphasizes the importance of weaving intrinsic motivation into every personalized learning classroom. Four key elements…

  8. Time to refine key climate policy models

    Science.gov (United States)

    Barron, Alexander R.

    2018-05-01

    Ambition regarding climate change at the national level is critical but is often calibrated with the projected costs — as estimated by a small suite of energy-economic models. Weaknesses in several key areas in these models will continue to distort policy design unless collectively addressed by a diversity of researchers.

  9. The LOFAR Magnetism Key Science Project

    NARCIS (Netherlands)

    Anderson, James; Beck, Rainer; Bell, Michael; de Bruyn, Ger; Chyzy, Krzysztof; Eislöffel, Jochen; Enßlin, Torsten; Fletcher, Andrew; Haverkorn, Marijke; Heald, George; Horneffer, Andreas; Noutsos, Aris; Reich, Wolfgang; Scaife, Anna; the LOFAR collaboration, [No Value

    2012-01-01

    Measuring radio waves at low frequencies offers a new window to study cosmic magnetism, and LOFAR is the ideal radio telescope to open this window widely. The LOFAR Magnetism Key Science Project (MKSP) draws together expertise from multiple fields of magnetism science and intends to use LOFAR to

  10. Memory for melody and key in childhood

    Science.gov (United States)

    Poon, Jaimie; Weiss, Michael W.

    2017-01-01

    After only two exposures to previously unfamiliar melodies, adults remember the tunes for over a week and the key for over a day. Here, we examined the development of long-term memory for melody and key. Listeners in three age groups (7- to 8-year-olds, 9- to 11-year-olds, and adults) heard two presentations of each of 12 unfamiliar melodies. After a 10-min delay, they heard the same 12 old melodies intermixed with 12 new melodies. Half of the old melodies were transposed up or down by six semitones from initial exposure. Listeners rated how well they recognized the melodies from the exposure phase. Recognition was better for old than for new melodies, for adults compared to children, and for older compared to younger children. Recognition ratings were also higher for old melodies presented in the same key at test as exposure, and the detrimental effect of the transposition affected all age groups similarly. Although memory for melody improves with age and exposure to music, implicit memory for key appears to be adult-like by 7 years of age. PMID:29077726

  11. Soil fauna: key to new carbon models

    NARCIS (Netherlands)

    Filser, Juliane; Faber, J.H.; Tiunov, Alexei V.; Brussaard, L.; Frouz, J.; Deyn, de G.B.; Uvarov, Alexei V.; Berg, Matty P.; Lavelle, Patrick; Loreau, M.; Wall, D.H.; Querner, Pascal; Eijsackers, Herman; Jimenez, Juan Jose

    2016-01-01

    Soil organic matter (SOM) is key to maintaining soil fertility, mitigating climate change, combatting land degradation, and conserving above- and below-ground biodiversity and associated soil processes and ecosystem services. In order to derive management options for maintaining these essential

  12. Using USB Keys to Promote Mobile Learning

    Directory of Open Access Journals (Sweden)

    Marilyne Rosselle

    2009-07-01

    Full Text Available M-learning (i.e. mobile learning is a field of e-learning that provides learners learning environments using mobile technology. In this context, learning can take place anywhere and anytime, in open and distance learning. Depending on the type of technology it may be done through software called nomadic (i.e. prepared to mobility. Among these technologies, there are those composed of digital interfaces and with autonomy of treatment: Smartphone, PDA, calculator and even mp3 key. In this article we propose to take into account storage devices as mobile technologies. Our focus was on the USB key. We present a procedure to test whether a learning environment embarked on a USB key can be described as nomadic or not. This procedure has been tested on a sample of three ILE (Interactive Learning Environment. This approach has allowed us to define criteria of nomadism, criteria which were then included in the design of a synchronous Weblog on USB key.

  13. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  14. Expectations as a key element in trusting

    DEFF Research Database (Denmark)

    Rasmussen, Mette Apollo; Hansen, Uffe Kjærgaard; Conradsen, Maria Bosse

    Considering the need for a tangible focus for qualitative research on trusting, we propose that expectations to the behavior of others can provide that. By focusing on expectations, researchers can produce narrative descriptions that explains how trusting develops and changes. Then the key theore...

  15. Key Performance Indicators for Primary Schools.

    Science.gov (United States)

    Strand, Steve

    Focusing mostly on their application for primary schools, this document describes the educational key performance indicators (KPI) employed by the Wendsworth, England, Local Educational Authority (LEA). Indicators are divided into 3 areas, educational context, resource development, and outcomes. Contextual indicators include pupil mobility, home…

  16. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  17. Cryptanalysis of a chaotic block cipher with external key and its improved version

    International Nuclear Information System (INIS)

    Li Chengqing; Li Shujun; Alvarez, Gonzalo; Chen Guanrong; Lo, K.-T.

    2008-01-01

    Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: (1) a number of weak keys exist; (2) some important intermediate data of the cipher are not sufficiently random; (3) the whole secret key can be broken by a known-plaintext attack with only 120 consecutive known plain-bytes in one known plaintext. In addition, it is pointed out that an improved version of the chaotic cipher proposed by Wei et al. still suffers from all the same security defects

  18. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Ying; Shi, Ronghua [School of Information Science and Engineering, Central South University, Changsha 410083 (China); Zeng, Guihua [Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200030 (China)], E-mail: sdguoying@gmail.com, E-mail: rhshi@mail.edu.com, E-mail: ghzeng@sjtu.edu.cn

    2010-04-15

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  19. Secure networking quantum key distribution schemes with Greenberger-Horne-Zeilinger states

    International Nuclear Information System (INIS)

    Guo, Ying; Shi, Ronghua; Zeng, Guihua

    2010-01-01

    A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger-Horne-Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.

  20. A coupled chemotaxis-fluid model: Global existence

    KAUST Repository

    Liu, Jian-Guo; Lorz, Alexander

    2011-01-01

    We consider a model arising from biology, consisting of chemotaxis equations coupled to viscous incompressible fluid equations through transport and external forcing. Global existence of solutions to the Cauchy problem is investigated under certain conditions. Precisely, for the chemotaxis-Navier- Stokes system in two space dimensions, we obtain global existence for large data. In three space dimensions, we prove global existence of weak solutions for the chemotaxis-Stokes system with nonlinear diffusion for the cell density.© 2011 Elsevier Masson SAS. All rights reserved.

  1. A coupled chemotaxis-fluid model: Global existence

    KAUST Repository

    Liu, Jian-Guo

    2011-09-01

    We consider a model arising from biology, consisting of chemotaxis equations coupled to viscous incompressible fluid equations through transport and external forcing. Global existence of solutions to the Cauchy problem is investigated under certain conditions. Precisely, for the chemotaxis-Navier- Stokes system in two space dimensions, we obtain global existence for large data. In three space dimensions, we prove global existence of weak solutions for the chemotaxis-Stokes system with nonlinear diffusion for the cell density.© 2011 Elsevier Masson SAS. All rights reserved.

  2. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  3. 40 CFR 407.64 - Pretreatment standards for existing sources.

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS CANNED AND PRESERVED FRUITS AND VEGETABLES PROCESSING POINT SOURCE CATEGORY Canned and Preserved Fruits Subcategory § 407.64 Pretreatment standards for existing sources. Any...

  4. Branding in children: a barbaric practice still exists in India.

    Science.gov (United States)

    Patra, Pratap Kumar

    2016-01-01

    Branding is an inhuman traditional practice most commonly employed to treat various disorders in neonates and children in certain community in India. Though stringent law exists to prevent such harmful practices, cases of branding is not uncommon in current era.

  5. Non-existence of limit cycles for planar vector fields

    Directory of Open Access Journals (Sweden)

    Jaume Gine

    2014-03-01

    Full Text Available This article presents sufficient conditions for the non-existence of limit cycles for planar vector fields. Classical methods for the nonexistence of limit cycles are connected with the theory developed here.

  6. 31 CFR 370.26 - What limitations exist on liability?

    Science.gov (United States)

    2010-07-01

    ... TRANSFERS RELATING TO UNITED STATES SECURITIES Debit Entries § 370.26 What limitations exist on liability? If we sustain a loss because a financial institution fails to handle an entry in accordance with this...

  7. Protection of continued economic existence and major changes. 1. paper

    International Nuclear Information System (INIS)

    Backherms, J.

    1980-01-01

    On the issue of protecting continued economic existence according to Sect. 18 of the Atomic Energy Law, a difference is made between changes occurring in the environment of the plant, in the existing knowledge in science and technology, and changes occurring in the safety philosophy held by the authorities. In case of conditions being subsequently imposed because of a change in the existing knowledge in science and technology, the liability of the authorities to pay compensation is ruled out according to Sect. 18, para. 2 No. 3 of the Atomic Energy Law. The difference made between a change in the safety philosophy held by the authorities and a change in the existing knowledge in science and technology seems to be obvious. In the first case it is a matter of changing the legal evaluation of unchanged technological findings, in the legal evaluation, however, the licence granted has to have a lasting effect on principle. (HP) [de

  8. Existence results for anisotropic discrete boundary value problems

    Directory of Open Access Journals (Sweden)

    Avci Avci

    2016-06-01

    Full Text Available In this article, we prove the existence of nontrivial weak solutions for a class of discrete boundary value problems. The main tools used here are the variational principle and critical point theory.

  9. Possible existence of wormholes in the central regions of halos

    Energy Technology Data Exchange (ETDEWEB)

    Rahaman, Farook, E-mail: rahaman@iucaa.ernet.in [Department of Mathematics, Jadavpur University, Kolkata 700032, West Bengal (India); Salucci, P., E-mail: salucci@sissa.it [SISSA, International School for Advanced Studies, Via Bonomea 265, 34136, Trieste (Italy); INFN, Sezione di Trieste, Via Valerio 2, 34127, Trieste (Italy); Kuhfittig, P.K.F., E-mail: kuhfitti@msoe.edu [Department of Mathematics, Milwaukee School of Engineering, Milwaukee, WI 53202-3109 (United States); Ray, Saibal, E-mail: saibal@iucaa.ernet.in [Department of Physics, Government College of Engineering and Ceramic Technology, Kolkata 700010, West Bengal (India); Rahaman, Mosiur, E-mail: mosiurju@gmail.com [Department of Mathematics, Meghnad Saha Institute of Technology, Kolkata 700150 (India)

    2014-11-15

    An earlier study (Rahaman, et al., 2014 and Kuhfittig, 2014) has demonstrated the possible existence of wormholes in the outer regions of the galactic halo, based on the Navarro–Frenk–White (NFW) density profile. This paper uses the Universal Rotation Curve (URC) dark matter model to obtain analogous results for the central parts of the halo. This result is an important compliment to the earlier result, thereby confirming the possible existence of wormholes in most of the spiral galaxies. - Highlights: • Earlier we showed possible existence of wormholes in the outer regions of halo. • We obtain here analogous results for the central parts of the galactic halo. • Our result is an important compliment to the earlier result. • This confirms possible existence of wormholes in most of the spiral galaxies.

  10. DOES ABSOLUTE SYNONYMY EXIST IN OWERE-IGBO?

    African Journals Online (AJOL)

    USER

    The researcher also interviewed native speakers of the dialect. The study ... The word 'synonymy' means sameness of meaning, i.e., a relationship in which more ... whether absolute synonymy exists in Owere–Igbo or not. ..... 'close this book'.

  11. Existence of Solutions of Nonlinear Integrodifferential Equations of ...

    Indian Academy of Sciences (India)

    Abstract. In this paper we prove the existence of mild and strong solutions of a nonlinear integrodifferential equation of Sobolev type with nonlocal condition. The results are obtained by using semigroup theory and the Schauder fixed point theorem.

  12. Problem of mathematical deduction of the existence of black holes

    Directory of Open Access Journals (Sweden)

    Yuan-Shun Chin

    1990-01-01

    Full Text Available The mathematical proof of existence of Black Hole is based on the assumption of mass being independent of speed. Considering the effect of special relativity of the dependence of mass with speed there is no Black hole.

  13. On the existence and dynamics of braneworld black holes

    International Nuclear Information System (INIS)

    Fitzpatrick, Andrew Liam; Randall, Lisa; Wiseman, Toby

    2006-01-01

    Based on holographic arguments Tanaka and Emparan et al have claimed that large localized static black holes do not exist in the one-brane Randall-Sundrum model. If such black holes are time-dependent as they propose, there are potentially significant phenomenological and theoretical consequences. We revisit the issue, arguing that their reasoning does not take into account the strongly coupled nature of the holographic theory. We claim that static black holes with smooth metrics should indeed exist in these theories, and give a simple example. However, although the existence of such solutions is relevant to exact and numerical solution searches, such static solutions might be dynamically unstable, again leading to time dependence with phenomenological consequences. We explore a plausible instability, suggested by Tanaka, analogous to that of Gregory and Laflamme, but argue that there is no reliable reason at this point to assume it must exist

  14. A corrosion monitoring system for existing reinforced concrete structures.

    Science.gov (United States)

    2015-05-01

    This study evaluated a multi-parameter corrosion monitoring system for existing reinforced concrete structures in chloride-laden service environments. The system was fabricated based on a prototype concrete corrosion measurement system that : had bee...

  15. Report on the Pre-existing Condition Insurance Plan Program

    Data.gov (United States)

    U.S. Department of Health & Human Services — Before the Affordable Care Act, Americans with pre-existing conditions who did not receive health coverage through their employers had few affordable options to get...

  16. Existence for a class of discrete hyperbolic problems

    Directory of Open Access Journals (Sweden)

    Luca Rodica

    2006-01-01

    Full Text Available We investigate the existence and uniqueness of solutions to a class of discrete hyperbolic systems with some nonlinear extreme conditions and initial data, in a real Hilbert space.

  17. Existence of Weak Solutions for a Nonlinear Elliptic System

    Directory of Open Access Journals (Sweden)

    Gilbert RobertP

    2009-01-01

    Full Text Available We investigate the existence of weak solutions to the following Dirichlet boundary value problem, which occurs when modeling an injection molding process with a partial slip condition on the boundary. We have in ; in ; , and on .

  18. Existence of Positive Solutions for Nonlinear Eigenvalue Problems

    Directory of Open Access Journals (Sweden)

    Wong Fu-Hsiang

    2010-01-01

    Full Text Available We use a fixed point theorem in a cone to obtain the existence of positive solutions of the differential equation, , , with some suitable boundary conditions, where is a parameter.

  19. comparative performance evaluation of an existing and modified

    African Journals Online (AJOL)

    PROF. BARTH EKWEME

    and fan speeds of 2800 rpm as against the existing cylinder and fan speeds of 934 rpm. The performance evaluation for ... KEYWORDS: Acha, fonio, dehuller, performance evaluation, ... centrifugal force as a result of the rotation of the cylinder.

  20. Global exponential stability and existence of periodic solutions of CNNs with delays

    Science.gov (United States)

    Dong, Meifang

    2002-07-01

    In this Letter, we establish general sufficient conditions for global exponential stability and existence of periodic solutions of a class of cellular neural networks (CNNs) with delays. The key to proving the sufficient conditions is the construction of a new Lyapunov functional. An elementary inequality, which may be of independent interest, has been employed in the proof. Checking the sufficient conditions is often reduced to checking some algebraic relations among certain set of parameter. Our sufficient conditions recover the known results in literature as special cases. Finally, we give two examples to illustrate the usage of our main results.

  1. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  2. Newspaper and internet display advertising: Co-existence or substitution?

    OpenAIRE

    Lindstädt, Nadine; Budzinski, Oliver

    2012-01-01

    Newspapers have been experiencing declining circulation figures and diminishing advertising revenues for several years – both effects might pose a threat to the continuing existence of (print) newspapers. In an earlier paper, Lindstädt & Budzinski (2011) argued from a theoretical viewpoint that industry-specific patterns exist that determine substitution or complementation effects between internet and newspaper advertising. It was argued that retail advertising, in particular, may offer a nic...

  3. Evaluation of the integrity of existing NFS waste tanks

    International Nuclear Information System (INIS)

    1977-12-01

    Various means of investigating the integrity of the existing NFS waste tanks are presented, including: visual inspection, ultrasonic testing, acoustic-emission monitoring, radiography, and forced-vibration testing. The experience that exists in performing such investigations of high-level radioactive waste tanks is documented, including: visual inspections, photography, wall-thickness measurements, and forced-vibration testing. An evaluation is made on the relative merits of the presented inspection and testing alternatives

  4. Non-existence criteria for Laurent polynomial first integrals

    Directory of Open Access Journals (Sweden)

    Shaoyun Shi

    2003-01-01

    Full Text Available In this paper we derived some simple criteria for non-existence and partial non-existence Laurent polynomial first integrals for a general nonlinear systems of ordinary differential equations $\\dot x = f(x$, $x \\in \\mathbb{R}^n$ with $f(0 = 0$. We show that if the eigenvalues of the Jacobi matrix of the vector field $f(x$ are $\\mathbb{Z}$-independent, then the system has no nontrivial Laurent polynomial integrals.

  5. Existence of solitary waves in dipolar quantum gases

    KAUST Repository

    Antonelli, Paolo; Sparber, Christof

    2011-01-01

    We study a nonlinear Schrdinger equation arising in the mean field description of dipolar quantum gases. Under the assumption of sufficiently strong dipolar interactions, the existence of standing waves, and hence solitons, is proved together with some of their properties. This gives a rigorous argument for the possible existence of solitary waves in BoseEinstein condensates, which originate solely due to the dipolar interaction between the particles. © 2010 Elsevier B.V. All rights reserved.

  6. The existence and persistence of household financial hardship

    OpenAIRE

    Brown, S.; Ghosh, P.; Taylor, K.

    2012-01-01

    We investigate the existence and persistence of financial hardship at the household level using data from the British Household Panel Survey. Our modelling strategy makes three important contributions to the existing literature on household finances. Firstly, we model nine different types of household financial problems within a joint framework, allowing for correlation in the random effects across the nine equations. Secondly, we develop a dynamic framework in order to model the persistence ...

  7. Existence of solutions to quasilinear Schrodinger equations with indefinite potential

    Directory of Open Access Journals (Sweden)

    Zupei Shen

    2015-04-01

    Full Text Available In this article, we study the existence and multiplicity of solutions of the quasilinear Schrodinger equation $$ -u''+V(xu-(|u| ^2''u=f(u $$ on $\\mathbb{R}$, where the potential $V$ allows sign changing and the nonlinearity satisfies conditions weaker than the classical Ambrosetti-Rabinowitz condition. By a local linking theorem and the fountain theorem, we obtain the existence and multiplicity of solutions for the equation.

  8. How Do We Know Protons, Electrons, and Quarks Really Exist?

    Science.gov (United States)

    Robertson, Bill

    2005-01-01

    Scientific explanations often make use of things that cannot be seen or felt, such as protons, electrons, and quarks. Do these things really exist? If so, how do is it known that they exist? Imagine being enclosed in a completely dark room with no light at all and not being able to see a thing. Being chained to a chair somewhere in the room, and…

  9. Existence of solitary waves in dipolar quantum gases

    KAUST Repository

    Antonelli, Paolo

    2011-02-01

    We study a nonlinear Schrdinger equation arising in the mean field description of dipolar quantum gases. Under the assumption of sufficiently strong dipolar interactions, the existence of standing waves, and hence solitons, is proved together with some of their properties. This gives a rigorous argument for the possible existence of solitary waves in BoseEinstein condensates, which originate solely due to the dipolar interaction between the particles. © 2010 Elsevier B.V. All rights reserved.

  10. Comparative Application of Capacity Models for Seismic Vulnerability Evaluation of Existing RC Structures

    International Nuclear Information System (INIS)

    Faella, C.; Lima, C.; Martinelli, E.; Nigro, E.

    2008-01-01

    Seismic vulnerability assessment of existing buildings is one of the most common tasks in which Structural Engineers are currently engaged. Since, its is often a preliminary step to approach the issue of how to retrofit non-seismic designed and detailed structures, it plays a key role in the successful choice of the most suitable strengthening technique. In this framework, the basic information for both seismic assessment and retrofitting is related to the formulation of capacity models for structural members. Plenty of proposals, often contradictory under the quantitative standpoint, are currently available within the technical and scientific literature for defining the structural capacity in terms of force and displacements, possibly with reference to different parameters representing the seismic response. The present paper shortly reviews some of the models for capacity of RC members and compare them with reference to two case studies assumed as representative of a wide class of existing buildings

  11. Interfacing the existing cask fleet with the MRS

    International Nuclear Information System (INIS)

    Doman, J.W.; Hahn, R.E.

    1992-01-01

    This paper reports that the Department of Energy (DOE) is considering the possibility of using the existing fleet of casks to achieve spent fuel receipt at the Monitored Retrievable Storage (MRS) facility. The existing cask fleet includes the NLI-1/2, the NAC-LWT, the TN-8 (and TN-8L), the TN-9, and the IF-300 casks. Other casks may be available, but their status is not certain. Use of the existing cask fleet at the MRS places additional design requirements on the system, and specifically affects the cask-to-MRS interface. The decision to use the existing cask fleet also places additional demands on training needs and operator certification, and the configuration management system. Some existing cask designs may not be able to mate with a bottom opening hot cell MRS. Use of the existing cask fleet also greatly increases the number of shipments that must be received, to the point that a facility larger than originally envisioned may be required

  12. Study of structural reliability of existing concrete structures

    Science.gov (United States)

    Druķis, P.; Gaile, L.; Valtere, K.; Pakrastiņš, L.; Goremikins, V.

    2017-10-01

    Structural reliability of buildings has become an important issue after the collapse of a shopping center in Riga 21.11.2013, caused the death of 54 people. The reliability of a building is the practice of designing, constructing, operating, maintaining and removing buildings in ways that ensure maintained health, ward suffered injuries or death due to use of the building. Evaluation and improvement of existing buildings is becoming more and more important. For a large part of existing buildings, the design life has been reached or will be reached in the near future. The structures of these buildings need to be reassessed in order to find out whether the safety requirements are met. The safety requirements provided by the Eurocodes are a starting point for the assessment of safety. However, it would be uneconomical to require all existing buildings and structures to comply fully with these new codes and corresponding safety levels, therefore the assessment of existing buildings differs with each design situation. This case study describes the simple and practical procedure of determination of minimal reliability index β of existing concrete structures designed by different codes than Eurocodes and allows to reassess the actual reliability level of different structural elements of existing buildings under design load.

  13. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  14. GLOBAL TRADE. THE KEY TO TRANSATLANTIC COMPETITIVENESS

    Directory of Open Access Journals (Sweden)

    Mădălina Laura CUCIURIANU

    2015-04-01

    Full Text Available Global trade has an important characteristic in terms of open global markets by means of eliminating barriers to trade and investment. The United States and the European Union, two major international actors and competitors in the economic field, have both the opportunity to change the global trade by concluding the negotiations of the Transatlantic Trade and Investment Partnership. For this reason, this paper tries to find the connections between global trade and transatlantic competitiveness in the way that the global trade can be considered a key to transatlantic competitiveness. The United States and the European Union are global actors and competitors in the global economy and the play field is the global trade. In order to be aware of the importance ofglobal trade in the transatlantic competitiveness, this paper includes also an analysis of the concrete actions that both economic powers are taking in key-sectors of the transatlantic economy.

  15. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  16. Secure quantum key distribution using squeezed states

    International Nuclear Information System (INIS)

    Gottesman, Daniel; Preskill, John

    2001-01-01

    We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q. If the noise in the quantum channel is weak, squeezing signal states by 2.51 dB (a squeeze factor e r =1.34) is sufficient in principle to ensure the security of a protocol that is suitably enhanced by classical error correction and privacy amplification. Secure key distribution can be achieved over distances comparable to the attenuation length of the quantum channel

  17. Key parameters analysis of hybrid HEMP simulator

    International Nuclear Information System (INIS)

    Mao Congguang; Zhou Hui

    2009-01-01

    According to the new standards on the high-altitude electromagnetic pulse (HEMP) developed by International Electrotechnical Commission (IEC), the target parameter requirements of the key structure of the hybrid HEMP simulator are decomposed. Firstly, the influences of the different excitation sources and biconical structures to the key parameters of the radiated electric field wave shape are investigated and analyzed. Then based on the influence curves the target parameter requirements of the pulse generator are proposed. Finally the appropriate parameters of the biconical structure and the excitation sources are chosen, and the computational result of the electric field in free space is presented. The results are of great value for the design of the hybrid HEMP simulator. (authors)

  18. A ''master key'' to chemical separation processes

    International Nuclear Information System (INIS)

    Madic, Ch.; Hill, C.

    2002-01-01

    One of the keys to sorting nuclear waste is extracting minor actinides - the most troublesome long-lived elements - from the flow of waste by separating them from lanthanides, which have very similar chemical properties to actinides, for possible transmutation into shorter-lived elements. Thanks to a European initiative coordinated by CEA, this key is now available: its name is Sanex. There now remains to develop tough, straightforward industrial processes to integrate it into a new nuclear waste management approach by 2005. Sanex joins the Diamex process, used for the combined separation of lanthanides and minor actinides from fission products. A third process, Sesame, designed to separate americium, completes the list of available separation processes. (authors)

  19. Molecular beam epitaxy applications to key materials

    CERN Document Server

    Farrow, Robin F C

    1995-01-01

    In this volume, the editor and contributors describe the use of molecular beam epitaxy (MBE) for a range of key materials systems that are of interest for both technological and fundamental reasons. Prior books on MBE have provided an introduction to the basic concepts and techniques of MBE and emphasize growth and characterization of GaAs-based structures. The aim in this book is somewhat different; it is to demonstrate the versatility of the technique by showing how it can be utilized to prepare and explore a range of distinct and diverse materials. For each of these materials systems MBE has played a key role both in their development and application to devices.

  20. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  1. Evaluation of Existing Situation of University Institutional Autonomy in Moldova

    DEFF Research Database (Denmark)

    Turcan, Romeo V.; Bugaian, Larisa; Gulieva, Valeria

    2014-01-01

    This chapter introduces four studies in which the current status of university institutional autonomy in Moldova is evaluated. At the same time it discusses the methodology employed in the study, provide a brief introduction to the higher education sector in Moldova and summaries key findings fro...... the evaluation of organizational, financial, HR and academic autonomy in Moldova.......This chapter introduces four studies in which the current status of university institutional autonomy in Moldova is evaluated. At the same time it discusses the methodology employed in the study, provide a brief introduction to the higher education sector in Moldova and summaries key findings from...

  2. Memory-assisted measurement-device-independent quantum key distribution

    Science.gov (United States)

    Panayi, Christiana; Razavi, Mohsen; Ma, Xiongfeng; Lütkenhaus, Norbert

    2014-04-01

    A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement-device-independent QKD, which only requires optical source equipment at the user's end. For certain memories with short access times, our scheme allows a higher repetition rate than that of quantum repeaters with single-mode memories, thereby requiring lower coherence times. By accounting for various sources of nonideality, such as memory decoherence, dark counts, misalignment errors, and background noise, as well as timing issues with memories, we develop a mathematical framework within which we can compare QKD systems with and without memories. In particular, we show that with the state-of-the-art technology for quantum memories, it is potentially possible to devise memory-assisted QKD systems that, at certain distances of practical interest, outperform current QKD implementations.

  3. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  4. Comprehension: The Key to Reading Success.

    Science.gov (United States)

    Chevalier, Kim; Del Santo, Jolene; Scheiner, Deb; Skok, Elly; Tucci, Leah Rae

    This report describes a program for using explicit instruction of reading strategies through the implementation of guided reading groups to improve student comprehension. The targeted population consisted of elementary school students in growing, middle class communities, located in northern Illinois. Evidence for the existence of a deficiency of…

  5. Key Success Factors in Medical Tourism Marketing

    OpenAIRE

    Yung-Sheng Yang

    2013-01-01

    The planners in tourism businesses and medical institutes, the evaluation criteria and dimensions for Medical Tourism Marketing are determined by experts through expert interviews. The weights and correlations among the dimensions and criteria are determined by Analytic Hierarchy Process (AHP) to construct an evaluating indicator model suitable for Medical Tourism Marketing. By organizing the overall weight of the key success factors in Medical Tourism Marketing, the top five indicators conta...

  6. PROVIDING QUALITY – A KEY TO SUCCESS

    OpenAIRE

    Oana Staiculescu; Angel-Cristian Staiculescu

    2012-01-01

    Providing a high quality products and services is a key to business success. That is because high quality promotes customer satisfaction and customer satisfaction has a direct link to business revenue. Clients want quality products and services in order to feel they are getting value for money, especially in these hard economic times. Although it is well known that advertising may win new customers, quality can be the reason to keep them. A good manager is aware that the costs of winning mark...

  7. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  8. Key factors of teenagers' mobile advertising acceptance

    OpenAIRE

    Martí Parreño, José; Sanz Blas, Silvia; Ruiz Mafé, Carla; Aldás Manzano, Joaquín

    2013-01-01

    Purpose – The purpose of this paper is to analyse key drivers of teenagers’ attitude toward mobile advertising and its effects on teenagers’ mobile advertising acceptance. Design/methodology/approach – A proposed model of affective (irritation and entertainment) and cognitive (perceived usefulness) antecedents of attitude toward mobile advertising and its effects on mobile advertising acceptance is analysed. The sample consisted of 355 Spanish teenagers. The model was tested us...

  9. Key performance indicators for successful simulation projects

    OpenAIRE

    Jahangirian, M; Taylor, SJE; Young, T; Robinson, S

    2016-01-01

    There are many factors that may contribute to the successful delivery of a simulation project. To provide a structured approach to assessing the impact various factors have on project success, we propose a top-down framework whereby 15 Key Performance Indicators (KPI) are developed that represent the level of successfulness of simulation projects from various perspectives. They are linked to a set of Critical Success Factors (CSF) as reported in the simulation literature. A single measure cal...

  10. Some Key Principles for Developing Grammar Skills

    Institute of Scientific and Technical Information of China (English)

    张威

    2008-01-01

    Grammar is sometimes defined aft"the way words are put together to make correct sentences"(Ur,2004,P.75).The aim of teaching grammar is to raise the rates of the correctness of language use and help the students transfer the isolated language points to apply language.In this essay,the author introduces two kinds of Conlnlon methods in English grammar class. And there are some key principles in grammar teaching.

  11. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  12. Parallel Device-Independent Quantum Key Distribution

    OpenAIRE

    Jain, Rahul; Miller, Carl A.; Shi, Yaoyun

    2017-01-01

    A prominent application of quantum cryptography is the distribution of cryptographic keys with unconditional security. Recently, such security was extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parame...

  13. Feasibility of satellite quantum key distribution

    OpenAIRE

    Bonato, Cristian; Tomaello, Andrea; Da Deppo, Vania; Naletto, Giampiero; Villoresi, Paolo

    2009-01-01

    In this paper we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected e...

  14. Process improvement to enhance existing stroke team activity toward more timely thrombolytic treatment.

    Science.gov (United States)

    Cho, Han-Jin; Lee, Kyung Yul; Nam, Hyo Suk; Kim, Young Dae; Song, Tae-Jin; Jung, Yo Han; Choi, Hye-Yeon; Heo, Ji Hoe

    2014-10-01

    Process improvement (PI) is an approach for enhancing the existing quality improvement process by making changes while keeping the existing process. We have shown that implementation of a stroke code program using a computerized physician order entry system is effective in reducing the in-hospital time delay to thrombolysis in acute stroke patients. We investigated whether implementation of this PI could further reduce the time delays by continuous improvement of the existing process. After determining a key indicator [time interval from emergency department (ED) arrival to intravenous (IV) thrombolysis] and conducting data analysis, the target time from ED arrival to IV thrombolysis in acute stroke patients was set at 40 min. The key indicator was monitored continuously at a weekly stroke conference. The possible reasons for the delay were determined in cases for which IV thrombolysis was not administered within the target time and, where possible, the problems were corrected. The time intervals from ED arrival to the various evaluation steps and treatment before and after implementation of the PI were compared. The median time interval from ED arrival to IV thrombolysis in acute stroke patients was significantly reduced after implementation of the PI (from 63.5 to 45 min, p=0.001). The variation in the time interval was also reduced. A reduction in the evaluation time intervals was achieved after the PI [from 23 to 17 min for computed tomography scanning (p=0.003) and from 35 to 29 min for complete blood counts (p=0.006)]. PI is effective for continuous improvement of the existing process by reducing the time delays between ED arrival and IV thrombolysis in acute stroke patients.

  15. Interactive simulations for quantum key distribution

    International Nuclear Information System (INIS)

    Kohnle, Antje; Rizzoli, Aluna

    2017-01-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels. (paper)

  16. Interactive simulations for quantum key distribution

    Science.gov (United States)

    Kohnle, Antje; Rizzoli, Aluna

    2017-05-01

    Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.

  17. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  18. Triple symmetric key cryptosystem for data security

    Science.gov (United States)

    Fuzail, C. Md; Norman, Jasmine; Mangayarkarasi, R.

    2017-11-01

    As the technology is getting spreads in the macro seconds of speed and in which the trend changing era from human to robotics the security issue is also getting increased. By means of using machine attacks it is very easy to break the cryptosystems in very less amount of time. Cryptosystem is a process which provides the security in all sorts of processes, communications and transactions to be done securely with the help of electronical mechanisms. Data is one such thing with the expanded implication and possible scraps over the collection of data to secure predominance and achievement, Information Security is the process where the information is protected from invalid and unverified accessibilities and data from mishandling. So the idea of Information Security has risen. Symmetric key which is also known as private key.Whereas the private key is mostly used to attain the confidentiality of data. It is a dynamic topic which can be implemented over different applications like android, wireless censor networks, etc. In this paper, a new mathematical manipulation algorithm along with Tea cryptosystem has been implemented and it can be used for the purpose of cryptography. The algorithm which we proposed is straightforward and more powerful and it will authenticate in harder way and also it will be very difficult to break by someone without knowing in depth about its internal mechanisms.

  19. Key Research Issues in Clostridium difficile

    Directory of Open Access Journals (Sweden)

    George Zhanel

    2005-01-01

    Full Text Available Clostridium difficile is an emerging pathogen that causes C difficile-associated diarrhea, an important nosocomial infection. Control of this infection remains a challenge, and much needs to be determined about the antimicrobial resistance of the organism, antibiotic stewardship, contamination of the patient environment, and various host factors that determine susceptibility or resistance to infection. A national symposium focusing on C difficile infections, the Clostridium difficile Symposium on Emerging Issues and Research, was hosted on November 23, 2004, by the Department of Medical Microbiology and Infectious Diseases at the University of Manitoba, Winnipeg, Manitoba, in partnership with the Canadian Institutes of Health Research. This symposium, which aimed to summarize key research issues regarding C difficile infections in Canada, had the following objectives: to provide a forum for learning and discussion about C difficile and its impact on the health of Canadians; to identify the key research issues that should be addressed; and to explore potential research funding opportunities and collaboration. The present report summarizes key research issues identified for C difficile infections in Canada by addressing four major themes: diagnosis and surveillance, infection prevention and control, antibiotic stewardship, and clinical management.

  20. Commitment is the key to these accounts

    International Nuclear Information System (INIS)

    Yborra, S.

    1996-01-01

    Key accounts--A.G.A.'s name for regional and national multi-unit accounts--affect gas load and market share in several ways. Many make their equipment and energy policies and decisions at the corporate or regional level, making gas company sales and marketing efforts to them critical, since multiple installations will likely emanate from a single decision. To survive, chains often mimic each other; a money-saving idea implemented by one chain can lead to others in that market sector copying it. A successful equipment field trial with one of these accounts can lead to others following suit. Chains also can play a critical role in launching a new or emerging technology. It a gas equipment test demonstrate meets the chain's energy goals, it can lead to a significant number of orders, accelerating a product's market penetration, improving manufacturing economies of scale, lowering prices and speeding up delivery times. A.G.A.'s key-accounts program's marketing activities fall into three basic categories: assisting chain clients, either directly or through members; enhancing members' key-account program development through training and networking; and increasing chains' awareness of the benefits of gas energy, equipment and services through national forums such as trade expos, seminars, conferences and press exposure

  1. Benchmarking Organisational Capability using The 20 Keys

    Directory of Open Access Journals (Sweden)

    Dino Petrarolo

    2012-01-01

    Full Text Available Organisations have over the years implemented many improvement initiatives, many of which were applied individually with no real, lasting improvement. Approaches such as quality control, team activities, setup reduction and many more seldom changed the fundamental constitution or capability of an organisation. Leading companies in the world have come to realise that an integrated approach is required which focuses on improving more than one factor at the same time - by recognising the importance of synergy between different improvement efforts and the need for commitment at all levels of the company to achieve total system-wide improvement.

    The 20 Keys approach offers a way to look at the strenqth of organisations and to systemically improve it, one step at a time by focusing on 20 different but interrelated aspects. One feature of the approach is the benchmarking system which forms the main focus of this paper. The benchmarking system is introduced as an important part of the 20 Keys philosophy in measuring organisational strength. Benchmarking results from selected South African companies are provided, as well as one company's results achieved through the adoption of the 20 Keys philosophy.

  2. Dementia ascertainment using existing data in UK longitudinal and cohort studies: a systematic review of methodology.

    Science.gov (United States)

    Sibbett, Ruth A; Russ, Tom C; Deary, Ian J; Starr, John M

    2017-07-03

    Studies investigating the risk factors for or causation of dementia must consider subjects prior to disease onset. To overcome the limitations of prospective studies and self-reported recall of information, the use of existing data is key. This review provides a narrative account of dementia ascertainment methods using sources of existing data. The literature search was performed using: MEDLINE, EMBASE, PsychInfo and Web of Science. Included articles reported a UK-based study of dementia in which cases were ascertained using existing data. Existing data included that which was routinely collected and that which was collected for previous research. After removing duplicates, abstracts were screened and the remaining articles were included for full-text review. A quality tool was used to evaluate the description of the ascertainment methodology. Of the 3545 abstracts screened, 360 articles were selected for full-text review. 47 articles were included for final consideration. Data sources for ascertainment included: death records, national datasets, research databases and hospital records among others. 36 articles used existing data alone for ascertainment, of which 27 used only a single data source. The most frequently used source was a research database. Quality scores ranged from 7/16 to 16/16. Quality scores were better for articles with dementia ascertainment as an outcome. Some papers performed validation studies of dementia ascertainment and most indicated that observed rates of dementia were lower than expected. We identified a lack of consistency in dementia ascertainment methodology using existing data. With no data source identified as a "gold-standard", we suggest the use of multiple sources. Where possible, studies should access records with evidence to confirm the diagnosis. Studies should also calculate the dementia ascertainment rate for the population being studied to enable a comparison with an expected rate.

  3. Existence conditions of optimal trajectories in dynamic control processes; Conditions d'existence de trajectoires optimales des processus dynamiques commandes

    Energy Technology Data Exchange (ETDEWEB)

    Bonnemay-Juricek, L [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1968-07-01

    The existence of solutions in the optimal control problems with free endpoints is studied in this report and existence conditions are established without the usual assumption that the control region is convex. Furthermore the results, in order to be of some utility in physical applications, are expressed only by means of conditions on the parameters defining the system. (author) [French] Ce rapport etudie l'existence de solutions optimales dans les problemes de commande ou le point terminal est libre et ou la duree de l'evolution du systeme a optimiser est connue. Des conditions d'existence y sont formulees sans recourir a l'hypothese usuelle de convexite du domaine des valeurs des commandes. De plus on a cherche a rendre utilisables les resultats en ne faisant porter les conditions que sur les parametres directement accessibles du systeme. (auteur)

  4. Proposed system for measuring project performance using process-based key performance indicators

    NARCIS (Netherlands)

    Haponava, T.; Al-Jibouri, Saad H.S.

    2012-01-01

    Despite some evidence of its usefulness, performance measurement by using Key Performance Indicators (KPIs) in the construction industry also has its critics. Among the shortcomings attributed to existing KPIs is the fact that almost all of them are product oriented. This means that the indicators

  5. GPU: the biggest key processor for AI and parallel processing

    Science.gov (United States)

    Baji, Toru

    2017-07-01

    Two types of processors exist in the market. One is the conventional CPU and the other is Graphic Processor Unit (GPU). Typical CPU is composed of 1 to 8 cores while GPU has thousands of cores. CPU is good for sequential processing, while GPU is good to accelerate software with heavy parallel executions. GPU was initially dedicated for 3D graphics. However from 2006, when GPU started to apply general-purpose cores, it was noticed that this architecture can be used as a general purpose massive-parallel processor. NVIDIA developed a software framework Compute Unified Device Architecture (CUDA) that make it possible to easily program the GPU for these application. With CUDA, GPU started to be used in workstations and supercomputers widely. Recently two key technologies are highlighted in the industry. The Artificial Intelligence (AI) and Autonomous Driving Cars. AI requires a massive parallel operation to train many-layers of neural networks. With CPU alone, it was impossible to finish the training in a practical time. The latest multi-GPU system with P100 makes it possible to finish the training in a few hours. For the autonomous driving cars, TOPS class of performance is required to implement perception, localization, path planning processing and again SoC with integrated GPU will play a key role there. In this paper, the evolution of the GPU which is one of the biggest commercial devices requiring state-of-the-art fabrication technology will be introduced. Also overview of the GPU demanding key application like the ones described above will be introduced.

  6. Greening Existing Buildings in Contemporary Iraqi Urban Reality/ Virtual Model

    Directory of Open Access Journals (Sweden)

    Saba Jabar Neama Al-Khafaji

    2015-11-01

    Full Text Available The approach of greening existing buildings, is an urgent necessity, because the greening operation provides the speed and optimal efficiency in the environmental performance, as well as keeping up with the global green architecture revolution. Therefore, greening existing buildings in Iraq is important for trends towards renewable energies, because of what the country went through economic conditions and crises and wars which kept the country away from what took place globally in this issue. The research problem is: insufficient knowledge about the importance and the mechanism of the greening of existing buildings, including its environmental and economic dimensions, by rationalization of energy consumption and preserving the environment. The research objective is: clarifying the importance of greening existing buildings environmentally and economically, providing a virtual experience for greening the presidency building of Baghdad University, through advanced computer program. The main conclusions is: there is difference representing by reducing the disbursed thermal loads amount for cooling in summer and heating in winter through the use of computerized program (DesignBuilder and that after the implementation of greening operations on the building envelope, which confirms its effectiveness in raising the energy performance efficiency inside the building. Hence, the importance of the application of greening existing buildings approach in Iraq, to bring back Iraqi architecture to environmental and local track proper.

  7. Seismic performance of existing R.C. framed buildings

    Directory of Open Access Journals (Sweden)

    Sameh A. El-Betar

    2017-08-01

    Full Text Available The earthquakes disasters basically occur due to buildings damage not because of the earth shaking. Therefore, the countries have being updated the seismic codes. The seismic loads for buildings design in Egyptian Code have been changed from (EC-1994 to (ECP-201, 2012. On the other hand, the need is raised to study the vulnerability of existing buildings, which can be divided into the buildings designed to resist the gravity loads only (GLD and the buildings designed according to Egyptian code (EC-1994. Comparison between forces due to Egyptian code for loads (EC-1994 and (ECP-201, 2012 is carried out on the multi-stories R.C. framed buildings which are the most common type of existing buildings in Egypt. To investigate the vulnerability of existing buildings, nonlinear static pushover analysis is conducted to evaluate the real strength of the existing buildings. Moreover, it is considered a useful and effective tool for the performance of three framed buildings: 3, 6 and 10 stories due to expected future earthquakes. Finally, it is found that the vulnerability of existing GLD buildings occurs at expected ground accelerations (ag greater than 0.125 g in Egyptian seismic map, while the EC-94 designed buildings behave elastically up to (ag equals to 0.2 g and above that a slight damage may occur.

  8. Energy and architecture: improvement of energy performance in existing buildings

    Energy Technology Data Exchange (ETDEWEB)

    Haase, Matthias; Wycmans, Annemie; Solbraa, Anne; Grytli, Eir

    2011-07-01

    This book aims to give an overview of different aspects of retrofitting existing buildings. The target group is students of architecture and building engineering as well as building professionals. Eight out of ten buildings which we will inhabit in 2050 already exist. This means that a great potential for reducing our carbon footprint lies in the existing building stock. Students from NTNU have used the renovation of a 1950s school building at Linesoeya in Soer-Trondelag as a case to increase their awareness and knowledge about the challenges building professionals need to overcome to unite technical details and high user quality into good environmental performance. The students were invited by the building owners and initiators of LIPA Eco Project to contribute to its development: By retrofitting an existing building to passive house standards and combining this with energy generated on site, LIPA Eco Project aims to provide a hands-on example with regard to energy efficiency, architectural design and craftsmanship for a low carbon society. The overall goal for this project is to raise awareness regarding resource efficiency measures in architecture and particularly in existing building mass.(au)

  9. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  10. Comorbid forms of psychopathology: key patterns and future research directions.

    Science.gov (United States)

    Cerdá, Magdalena; Sagdeo, Aditi; Galea, Sandro

    2008-01-01

    The purpose of this review is to systematically appraise the peer-reviewed literature about clustered forms of psychopathology and to present a framework that can be useful for studying comorbid psychiatric disorders. The review focuses on four of the most prevalent types of mental health problems: anxiety, depression, conduct disorder, and substance abuse. The authors summarize existing empirical research on the distribution of concurrent and sequential comorbidity in children and adolescents and in adults, and they review existing knowledge about exogenous risk factors that influence comorbidity. The authors include articles that used a longitudinal study design and used psychiatric definitions of the disorders. A total of 58 articles met the inclusion criteria and were assessed. Current evidence demonstrates a reciprocal, sequential relation between most comorbid pairs, although the mechanisms that mediate such links remain to be explained. Methodological concerns include the inconsistency of measurement of the disorders across studies, small sample sizes, and restricted follow-up times. Given the significant mental health burden placed by comorbid disorders, and their high prevalence across populations, research on the key risk factors for clustering of psychopathology is needed.

  11. Existence domains of dust-acoustic solitons and supersolitons

    International Nuclear Information System (INIS)

    Maharaj, S. K.; Bharuthram, R.; Singh, S. V.; Lakhina, G. S.

    2013-01-01

    Using the Sagdeev potential method, the existence of large amplitude dust-acoustic solitons and supersolitons is investigated in a plasma comprising cold negative dust, adiabatic positive dust, Boltzmann electrons, and non-thermal ions. This model supports the existence of positive potential supersolitons in a certain region in parameter space in addition to regular solitons having negative and positive potentials. The lower Mach number limit for supersolitons coincides with the occurrence of double layers whereas the upper limit is imposed by the constraint that the adiabatic positive dust number density must remain real valued. The upper Mach number limits for negative potential (positive potential) solitons coincide with limiting values of the negative (positive) potential for which the negative (positive) dust number density is real valued. Alternatively, the existence of positive potential solitons can terminate when positive potential double layers occur

  12. The Existence of a Sticking Region in Free Weight Squats

    Directory of Open Access Journals (Sweden)

    Tillaar Roland van den

    2014-10-01

    Full Text Available The aim of this study was to investigate the existence of the sticking region in two legged free weight squats. Fifteen resistance-training males (age 24 ± 4 years, body mass 82 ± 11 kg, body height 179 ± 6 cm with 6 ± 3 years of resistance-training experience performed 6-RM in free weight squats. The last repetition was analyzed for the existence of a sticking region. Only in 10 out of 15 participants a sticking region was observed. The observed sticking region was much shorter than in the bench press. Furthermore, rectus femoris decreased the EMG activity in contrast to increased EMG activity in biceps femoris around the sticking and surrounding region. No significant change in EMG activity was found for the lateral and medial vastus muscles. It is suggested that a combination of these muscle activity changes could be one of the causes of the existence of the sticking region in free weight squats

  13. The existence of a sticking region in free weight squats.

    Science.gov (United States)

    van den Tillaar, Roland; Andersen, Vidar; Saeterbakken, Atle Hole

    2014-09-29

    The aim of this study was to investigate the existence of the sticking region in two legged free weight squats. Fifteen resistance-training males (age 24 ± 4 years, body mass 82 ± 11 kg, body height 179 ± 6 cm) with 6 ± 3 years of resistance-training experience performed 6-RM in free weight squats. The last repetition was analyzed for the existence of a sticking region. Only in 10 out of 15 participants a sticking region was observed. The observed sticking region was much shorter than in the bench press. Furthermore, rectus femoris decreased the EMG activity in contrast to increased EMG activity in biceps femoris around the sticking and surrounding region. No significant change in EMG activity was found for the lateral and medial vastus muscles. It is suggested that a combination of these muscle activity changes could be one of the causes of the existence of the sticking region in free weight squats.

  14. Islamic Banking Existence and Domestic Credit: Study at Seven Countries

    Directory of Open Access Journals (Sweden)

    Hamdan Yuafi

    2017-05-01

    Full Text Available This paper empirically investigates the determinants of domestic credit across a wide range of 7 countries; these are United Kingdom, Malaysia, Egypt, Kuwait, Qatar, Bahrain and Indonesia. We use dynamic panel estimation to examine effects of exchange rate, inflation, lending interest rate, banking crisis and existence of wholesale Islamic banking on domestic credit. We obtain several notable empirical results. First, the lending interest rate, banking crisis negatively and insignificantly contribute to domestic credit. The existence of Islamic bank has positive and insignificant contribution to domestic credit, while exchange rate positively and significantly contributes to domestic credit.  Inflation negatively and significantly contributes to domestic credit. Second, banking crisis and existence of wholesale Islamic banking show insignificant effect on domestic credit. Third, we find that today’s domestic credit is depended on domestic credit in the previous year.DOI: 10.15408/aiq9i2.4906

  15. Existing sustainable renovation concepts for single-family houses

    DEFF Research Database (Denmark)

    Tommerup, Henrik M.; Vanhoutteghem, Lies; Svendsen, Svend

    2010-01-01

    In the Nordic Innovation Centre Project, SuccessFamilies, the main objective is to change the business environment in order to speed up the implementation of sustainable renovation of single-family houses – proposing new service concepts that will combine both the technical solutions, financing...... with individual solutions, traditional warehouses ”do-it-yourself-shops” and some actors marketing single products. To speed up the implementation of sustainable renovation of single-family houses there is a great need for full-service packages. Existing technical renovation concepts, typically focusing...... services as well as other promoting issues to overcome the behavioural, organizational, legal and social barriers that exist in sustainable renovation. A starting point for such a change has been to get an overview of the existing sustainable renovation concepts, i.e. full-service concepts and technical...

  16. Intersubjective Dimension of Existence in the Philosophy of Gabriel Marcel

    Directory of Open Access Journals (Sweden)

    Martín Grassi

    2016-05-01

    Full Text Available The present work intends to introduce the reader to the essential dimension of intersubjectivity in personal existence in Gabriel Marcel’s philosophy. We will first attend to the characterization of persona; secondly, how we should understand the terms I and the other in concrete interpersonal relationships; in the third place, we will analize the way in which the other is given as an other, through the notion of presence. The main objective of this article is to show that personal existence is uncomprehensible without its reference to the other, that is to say, that identity has no sense without alterity. Moreover, the essential intencionality of identity to alterity does not imply only a practical or accidental character, but a metaphysical one, as communion constitutes the very being of personal existence.

  17. Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Mobile authentication can be used to verify a mobile user’s identity. Normally this is accomplished through the use of logon passwords, but this can raise the secret-key agreement problem between entities. This issue can be resolved by using a public-key cryptosystem, but mobile devices have limited computation ability and battery capacity and a PKI is needed. In this paper, we propose an efficient, non-PKI, authenticated, and blind issued symmetric key protocol for mobile access control systems. An easy-to-deploy authentication and authenticated key agreement system is designed such that empowered mobile devices can directly authorize other mobile devices to exchange keys with the server upon authentication using a non-PKI system without trusted parties. Empowered mobile users do not know the key value of the other mobile devices, preventing users from impersonating other individuals. Also, for security considerations, this system can revoke specific keys or keys issued by a specific user. The scheme is secure, efficient, and feasible and can be implemented in existing environments.

  18. A Study on the Key Management Strategy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  19. DoD Key Technologies Plan

    Science.gov (United States)

    1992-07-01

    cryoelec- devices with high tronics. mobility semiconduc- - Demonstration of HTS * Demonstration of HTS tors and magnetic interconnects and high motor ...for rotating electrical machine is 1 kJ/kg, which is the capability of the most compact existing pulse power supply: a homopolar generator/inductor...of the art from 0.2 up to 2 Id/k.g several years ago, using a homopolar generator/inductor combination for single shot rep-ratcs. Fabrication of a

  20. Quantum key distribution with entangled photon sources

    International Nuclear Information System (INIS)

    Ma Xiongfeng; Fung, Chi-Hang Fred; Lo, H.-K.

    2007-01-01

    A parametric down-conversion (PDC) source can be used as either a triggered single-photon source or an entangled-photon source in quantum key distribution (QKD). The triggering PDC QKD has already been studied in the literature. On the other hand, a model and a post-processing protocol for the entanglement PDC QKD are still missing. We fill in this important gap by proposing such a model and a post-processing protocol for the entanglement PDC QKD. Although the PDC model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. Since an entangled PDC source is a basis-independent source, we apply Koashi and Preskill's security analysis to the entanglement PDC QKD. We also investigate the entanglement PDC QKD with two-way classical communications. We find that the recurrence scheme increases the key rate and the Gottesman-Lo protocol helps tolerate higher channel losses. By simulating a recent 144-km open-air PDC experiment, we compare three implementations: entanglement PDC QKD, triggering PDC QKD, and coherent-state QKD. The simulation result suggests that the entanglement PDC QKD can tolerate higher channel losses than the coherent-state QKD. The coherent-state QKD with decoy states is able to achieve highest key rate in the low- and medium-loss regions. By applying the Gottesman-Lo two-way post-processing protocol, the entanglement PDC QKD can tolerate up to 70 dB combined channel losses (35 dB for each channel) provided that the PDC source is placed in between Alice and Bob. After considering statistical fluctuations, the PDC setup can tolerate up to 53 dB channel losses