WorldWideScience

Sample records for trade secret information

  1. 42 CFR 405.215 - Confidential commercial and trade secret information.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Confidential commercial and trade secret information. 405.215 Section 405.215 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF... trade secret information. To the extent that CMS relies on confidential commercial or trade secret...

  2. 40 CFR 370.64 - What information can I claim as trade secret or confidential?

    Science.gov (United States)

    2010-07-01

    ... secret or confidential? 370.64 Section 370.64 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY... secret or confidential? (a) Trade secrets. You may be able to withhold the name of a specific chemical... trade secret. The requirements for withholding trade secret information are set forth in EPCRA section...

  3. Trade Secret Law and Information Systems: Can Your Students Keep a Secret?

    Science.gov (United States)

    Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L.

    2011-01-01

    The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…

  4. Trade Secrets in Life Science and Pharmaceutical Companies

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M.; Cai, Yu

    2015-01-01

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through “improper means” is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today’s interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees’ careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. PMID:25414378

  5. Trade secrets in life science and pharmaceutical companies.

    Science.gov (United States)

    Nealey, Tara; Daignault, Ronald M; Cai, Yu

    2014-11-20

    Trade secret protection arises under state common law and state statutes. In general, a trade secret is information that is not generally known to the public and is maintained as a secret, and it provides a competitive advantage or economic benefit to the trade secret holder. Trade secrets can be worth tens or hundreds of millions of dollars, and damage awards in trade secret litigation have been high; often, there is a lot at stake. Obtaining a trade secret through "improper means" is misappropriation. If the alleged trade secret, however, was developed independently, known publicly, or not maintained as a secret, then those defenses may successfully overcome a claim for trade secret misappropriation. With today's interconnectedness in the biotechnology and pharmaceutical fields, more collaborations, joint ventures, and outsourcing arrangements among firms, and increased mobility of employees' careers, life science companies need to not only understand how to protect their trade secrets, but also know how to defend against a claim for trade secret theft. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  6. The limitations of contractual clauses to determine the legal nature of information and to protect trade secrets

    Directory of Open Access Journals (Sweden)

    Nelson Remolina Angarita

    2017-12-01

    Full Text Available This text analyses the legal requirements for information to be considered a trade secret based on Colombian regulations and rulings issued by the Superintendencia de Industria y Comercio. A contractual clause, by itself, does not have the power to define the information that can be considered a trade secret because freedom of choice cannot disregard the legal nature of the information.

  7. The problem of using trade secrets in economic relations

    Directory of Open Access Journals (Sweden)

    А. О. Олефір

    2015-05-01

    Full Text Available Problem setting. In a market economy and increased competition between enterprises become increasingly important concepts such as business information, trade secrets, know-how, confidential information, the information with restricted access. Given the fact that only one patent protection is unable to meet the needs of researchers, in addition to formal public protection and secured legal means we would like to pay attention at private legal measures, particular, the mode of trade secrets. Recent research and publications analysis. Different aspects of the protection of trade secrets were investigated by specialists such as G. Androschuk, J. Berzhye, I. Davydov, O. Davydyuk, D. Zadyhaylo, P. Kraynov, G. Nikiforov, S. Nikiforov, V. Rubanov, E. Solovyov, L. Hoffman, V. Chaplygin, A. Cherniavsky and others. However, at present there is a lack of comprehensive research of this legal phenomenon, equally useful for innovators and businesses that actively protect corporate security. Paper objective. This article is planned to determine the legal characteristics, structural elements and mechanisms by which the use of trade secrets in business have a positive impact on innovation development and corporate security entities. Paper main body. On the basis of requirements of Art. 505 Civil Code of Ukraine and art. 39 of the TRIPS Agreement we formulated commercial information signs under which it receives legal protection as an object of intellectual property: (1 privacy (real or potential in the sense that it is as a whole or in a precise combination of aggregate and its components are not generally known or available to persons in the circles that normally deal with such information; (2 commercial value (not purely industrial or industrial, due to its secrecy; this information is unknown to others, which is a commercial interest; (3 the lawful holder of the information provides active special measures (technical, organizational, legal to preserve secrecy

  8. 77 FR 34037 - Agency Information Collection Activities; Proposed Collection; Comment Request; Trade Secret...

    Science.gov (United States)

    2012-06-08

    ... Activities; Proposed Collection; Comment Request; Trade Secret Claims for Emergency Planning and Community... Planning and Community Right-to- Know Act (EPCRA). Title: Trade Secret Claims for Emergency Planning and...). Estimated total number of potential respondents: 481. Frequency of response: Trade secret claims are...

  9. 21 CFR 20.61 - Trade secrets and commercial or financial information which is privileged or confidential.

    Science.gov (United States)

    2010-04-01

    ... ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PUBLIC INFORMATION Exemptions § 20.61 Trade..., preparing, compounding, or processing of trade commodities and that can be said to be the end product of either innovation or substantial effort. There must be a direct relationship between the trade secret and...

  10. Independent consultants : fiduciary duties, trade secrets and confidential information

    International Nuclear Information System (INIS)

    Fraser, B.; Wilhelmson, M.

    1999-01-01

    Because of cutbacks and downsizing within the petroleum industry, it has become one of the largest users of contract personnel to provide services that were previously provided by senior levels of management. This paper explored the application of common law fiduciary duties and the duty of confidence to the independent workforce. It examined to what extent fiduciary duties apply to independent consultants and the best way for the employer to protect itself from the potential misuse of confidential information. Part 1 of the paper described fiduciary duties. A fiduciary relationship was described as one that possesses the following three characteristics: (1) the fiduciary has scope for the exercise of some discretion of power, (2) the fiduciary can unilaterally exercise that power to affect the beneficiary's practical interests, and (3) the beneficiary is peculiarly vulnerable to the fiduciary holding the discretion of power. Three examples of how the courts treated some arguments regarding fiduciaries were presented. Part 2 of this paper discussed how trade secrets and confidential information should be handled. It was explained, that regardless of fiduciary duties, the unauthorized use of confidential information by an independent contractor can give rise to liability and an award of damages by the courts. Some examples where the Supreme Court of Canada found breach of confidence by a party were presented. Information communicated from an employer to an employee can be divided into the following three categories: (1) publicly accessible and not confidential, (2) confidential and must be treated as such while an employee is employed, but if learned becomes part of the employees skill and knowledge, and (3) specific confidential trade secrets that cannot lawfully be used for anyone's benefit but the employer's. Issues regarding defining rights and obligations by contract were also discussed

  11. A trade secret model for genomic biobanking.

    Science.gov (United States)

    Conley, John M; Mitchell, Robert; Cadigan, R Jean; Davis, Arlene M; Dobson, Allison W; Gladden, Ryan Q

    2012-01-01

    Genomic biobanks present ethical challenges that are qualitatively unique and quantitatively unprecedented. Many critics have questioned whether the current system of informed consent can be meaningfully applied to genomic biobanking. Proposals for reform have come from many directions, but have tended to involve incremental change in current informed consent practice. This paper reports on our efforts to seek new ideas and approaches from those whom informed consent is designed to protect: research subjects. Our model emerged from semi-structured interviews with healthy volunteers who had been recruited to join either of two biobanks (some joined, some did not), and whom we encouraged to explain their concerns and how they understood the relationship between specimen contributors and biobanks. These subjects spoke about their DNA and the information it contains in ways that were strikingly evocative of the legal concept of the trade secret. They then described the terms and conditions under which they might let others study their DNA, and there was a compelling analogy to the commonplace practice of trade secret licensing. We propose a novel biobanking model based on this trade secret concept, and argue that it would be a practical, legal, and ethical improvement on the status quo. © 2012 American Society of Law, Medicine & Ethics, Inc.

  12. Some Economics of Trade Secret Law

    OpenAIRE

    David D. Friedman; William M. Landes; Richard A. Posner

    1991-01-01

    Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.

  13. EPCRA Trade Secret Form Instructions (PDF)

    Science.gov (United States)

    Detail on what information is required for each section of the form. Only the specific chemical identity required to be disclosed in EPCRA sections 303, 311,312, and 313 submissions may be claimed trade secret on the EPCRA report.

  14. 40 CFR 350.15 - Public petitions requesting disclosure of chemical identity claimed as trade secret.

    Science.gov (United States)

    2010-07-01

    ... of chemical identity claimed as trade secret. 350.15 Section 350.15 Protection of Environment... TRADE SECRECY CLAIMS FOR EMERGENCY PLANNING AND COMMUNITY RIGHT-TO-KNOW INFORMATION: AND TRADE SECRET... chemical identity claimed as trade secret. (a) The public may request the disclosure of chemical identity...

  15. 29 CFR 1903.9 - Trade secrets.

    Science.gov (United States)

    2010-07-01

    ... INSPECTIONS, CITATIONS AND PROPOSED PENALTIES § 1903.9 Trade secrets. (a) Section 15 of the Act provides: “All... concerns or relates to the trade secrets, processes, operations, style of work, or apparatus, or to the...

  16. 40 CFR 350.18 - Release of chemical identity determined to be non-trade secret; notice of intent to release...

    Science.gov (United States)

    2010-07-01

    ... determined to be non-trade secret; notice of intent to release chemical identity. 350.18 Section 350.18... INFORMATION: AND TRADE SECRET DISCLOSURES TO HEALTH PROFESSIONALS Trade Secrecy Claims § 350.18 Release of chemical identity determined to be non-trade secret; notice of intent to release chemical identity. (a...

  17. 76 FR 26579 - Procedures for Submitting to the Department of Energy Trade Secrets and Commercial or Financial...

    Science.gov (United States)

    2011-05-09

    ... assistance can take the form of financial assistance (i.e., grants, cooperative agreements, and technology... Department of Energy Trade Secrets and Commercial or Financial Information That Is Privileged or Confidential... of trade secrets and commercial or financial information that is privileged or confidential, where...

  18. Trade Secrets in the Legal Studies Curriculum--A Case Study

    Science.gov (United States)

    Evans, Michelle

    2012-01-01

    Trade secrets can be a valuable company asset because of their potential to last forever. Unfortunately, along with such a significant benefit, there is also a significant risk--the risk that the trade secret can be lost in an instant if it is not sufficiently protected. Companies must be vigilant in protecting these secrets. However, the law is…

  19. Cigarette company trade secrets are not secret: an analysis of reverse engineering reports in internal tobacco industry documents released as a result of litigation.

    Science.gov (United States)

    Velicer, Clayton; Lempert, Lauren K; Glantz, Stanton

    2015-09-01

    Use previously secret tobacco industry documents to assess tobacco companies' routine claims of trade secret protection for information on cigarette ingredients, additives and construction made to regulatory agencies, as well as the companies' refusal to publicly disclose this information. We analysed previously secret tobacco industry documents available at (http://legacy.library.ucsf.edu) to identify 100 examples of seven major tobacco companies' reverse engineering of their competitors' brands between 1937 and 2001. These reverse engineering reports contain detailed data for 142 different measurements for at least two companies, including physical parameters of the cigarettes, tobacco types, humectants, additives, flavourings, and smoke constituents of competitors' cigarettes. These 100 documents were distributed to 564 employees, including top managers in domestic and foreign offices across multiple departments, including executive leadership, research and design, product development, marketing and legal. These documents reported new competitors' products, measured ingredient changes over time, and informed companies' decisions regarding ingredients in their own products. Because cigarette companies routinely analyse their competitors' cigarettes in great detail, this information is neither secret nor commercially valuable and, thus, does not meet the legal definition of a 'trade secret.' This information is only being kept 'secret' from the people consuming cigarettes and the scientific community. Public agencies should release this detailed information because it would provide valuable information about how ingredients affect addictiveness and toxicity, and would help the public health community and consumers better understand the impact of cigarette design on human health. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. Employees, Trade Secrets and Restrictive Covenants

    NARCIS (Netherlands)

    Kamperman Sanders, Anselm; Heath, C.

    2017-01-01

    The book covers the protection of trade secrets and the law on post-contractual non-compete clauses (restrictive covenants) in an employment context. The topic is approached on an international and comparative level (chapters 1–3 and 10), and by way of country reports covering several European and

  1. Trading secrets: Jews and the early modern quest for clandestine knowledge.

    Science.gov (United States)

    Jütte, Daniel

    2012-12-01

    This essay explores the significance and function of secrecy and secret sciences in Jewish-Christian relations and in Jewish culture in the early modern period. It shows how the trade in clandestine knowledge and the practice of secret sciences became a complex, sometimes hazardous space for contact between Jews and Christians. By examining this trade, the essay clarifies the role of secrecy in the early modern marketplace of knowledge. The attribution of secretiveness to Jews was a widespread topos in early modern European thought. However, relatively little is known about the implications of such beliefs in science or in daily life. The essay pays special attention to the fact that trade in secret knowledge frequently offered Jews a path to the center of power, especially at court. Furthermore, it becomes clear that the practice of secret sciences, the trade in clandestine knowledge, and a mercantile agenda were often inextricably interwoven. Special attention is paid to the Italian-Jewish alchemist, engineer, and entrepreneur Abramo Colorni (ca. 1544-1599), whose career illustrates the opportunities provided by the marketplace of secrets at that time. Much scholarly (and less scholarly) attention has been devoted to whether and what Jews "contributed" to what is commonly called the "Scientific Revolution." This essay argues that the question is misdirected and that, instead, we should pay more attention to the distinctive opportunities offered by the early modern economy of secrecy.

  2. Analysis of the “Human Factor” as an Information Threat to Trade Secrets and Counteractions – Spying is in!

    OpenAIRE

    Marjanova Jovanov, Tamara

    2010-01-01

    “Economic espionage and trade secret theft threaten our nation’s national security and economic well being.” Since the 1970s brought the explosion of the Information Revolution and the rise of personal computers, we’ve become even more interested in the brain and how it works. We shouldn’t be aware of Artificial Intelligence and the smart machines of the 21st Century, but of the people in our surroundings and their ability to be corrupted from our competitors. How can we know who is rea...

  3. The trade secrets protection in U.S. and in Europe: a comparative study

    Directory of Open Access Journals (Sweden)

    Chiara Gaido

    2017-12-01

    Full Text Available Only by deeply understanding the new laws that govern trade secrets protection in the United States and Europe, companies will be able to effectively protect their own trade secrets. The purpose of this paper is to highlight the similarities and differences between both regulations to give useful guidelines to international companies who deal in both geographical areas. Therefore, the paper will focus first on the economic value of trade secrets and the costs related to cybercrime and cyberespionage. Then, it will analyze the US and EU historical legal backgrounds that brought to the adoption of both laws. Finally, this article will make a comparative analysis of the provisions in each law. Hence, the paper makes potential suggestions for companies that deal in both regimes.

  4. The constitutional protection of trade secrets and patents under the Biologics Price Competition and Innovation Act of 2009.

    Science.gov (United States)

    Epstein, Richard A

    2011-01-01

    The Biologics Price Competition and Innovation Act of 2009 ("Biosimilars Act") is for the field of pharmaceutical products the single most important legislative development since passage of the Drug Price Competition and Patent Term Restoration Act of 1984 ("Hatch-Waxman Act"), on which portions of the Biosimilars Act are clearly patterned. Congress revised section 351 of the Public Health Service Act (PHSA) to create a pathway for FDA approval of "biosimilar" biological products. Each biosimilar applicant is required to cite in its application a "reference product" that was approved on the basis of a full application containing testing data and manufacturing information, which is owned and was submitted by another company and much of which constitutes trade secret information subject to constitutional protection. Because the Biosimilars Act authorizes biosimilar applicants to cite these previously approved applications, the implementation of the new legislative scheme raises critical issues under the Fifth Amendment of the Constitution, pursuant to which private property--trade secrets included--may not be taken for public use, without "just compensation." FDA must confront those issues as it implements the scheme set out in the Biosimilars Act. This article will discuss these issues, after providing a brief overview of the Biosimilars Act and a more detailed examination of the law of trade secrets.

  5. Open Secrets

    OpenAIRE

    Madison, Michael

    2017-01-01

    The law of trade secrets is often conceptualized in bilateral terms, as creating and enforcing rights between trade secret owners, on the one hand, and misappropriators on the other hand. This paper, a chapter in a forthcoming collection on the law of trade secrets, argues that trade secrets and the law that guards them can serve structural and insitutional roles as well. Somewhat surprisingly, given the law’s focus on secrecy, among the institutional products of trade secrets law are commons...

  6. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  7. 40 CFR 350.7 - Substantiating claims of trade secrecy.

    Science.gov (United States)

    2010-07-01

    ... publications or other information sources available to the public or your competitors (of which you are aware... of the chemical claimed as trade secret and explain why it is a secret of interest to competitors... competitors could deduce this use from disclosure of the chemical identity together with other information on...

  8. EnviroTRADE information system

    International Nuclear Information System (INIS)

    Harlan, C.; Harrington, M.W.

    1993-01-01

    Environmental Technologies for Remedial Actions Data Exchange (EnviroTRADE) is a graphical/textual information management system being developed for the cleanup program of the U.S. Department of Energy's (DOE) Weapons Complex. Its principal purpose is to provide a single, powerful, interactive database that addresses environmental restoration and waste management (ER/WM) problems and the technologies currently under development or already available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational Database Management System (RDBMS) is employed in EnviroTRADE. EnviroTRADE will be a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues. An early focus for the Beta version of EnviroTRADE has been to find matches between specific environmental problems at particular sites (e.g., in terms of waste composition and form) and available and new technologies suited to solve problems. The current prototype EnviroTRADE database includes both U.S. and foreign problems and technologies. A Beta version was developed and demonstrated during FY92 and was expanded in FY93. This system was delivered to EM-523 as a stand-alone resident system for demonstration and feedback purposes. The resident system demonstrates the feasibility of this kind of multi-purpose system and also provides a test bed for refining the system architecture. As the architecture and database grow, an increasing range of possible applications is envisioned. The ability to import very large quantities of graphical, textual, and numerical information into the database is of particular importance. Since a great deal of appropriate data already exists in various electronic formats, a rapid expansion into EnviroTRADE-accessible data is possible without relying on manual entry methods

  9. Information, Overconfidence and Trading: Do the Sources of Information Matter?

    OpenAIRE

    Margarida Abreu; Victor Mendes

    2011-01-01

    We investigate how the strength of the positive association between frequency of trading and information acquisition is dependent on investors’ self‐confidence and on the sources of information used by investors. Our results confirm that the more frequently individual investors invest in information, the more they trade in financial products. Our results also confirm previous findings that overconfident investors, who show a better than average bias, trade more frequently. In this paper, we a...

  10. High Frequency Trading, Information, and Takeovers

    NARCIS (Netherlands)

    Humphery-Jenner, M.

    2011-01-01

    This paper (1) proposes new variables to detect informed high-frequency trading (HFT), (2) shows that HFT can help to predict takeover targets, and (3) shows that HFT in uences target announcement announcement returns. Prior literature suggests that informed trade may occur before takeovers, but has

  11. The Characteristics of Informed Trading

    DEFF Research Database (Denmark)

    Aslan, Hadiye; Easley, David; Hvidkjær, Søren

    2011-01-01

    This paper investigates the linkage of microstructure, accounting, and asset pricing. We determine the relationship between firm characteristics as captured by accounting and market data and a firm's probability of private information-based trade (PIN) as estimated from trade data. This allows us...

  12. Trade Credit and Informational Asymmetry.

    OpenAIRE

    Smith, Janet Kiholm

    1987-01-01

    Commonly used trade credit terms implicitly define a high interest rate that operates as an efficient screening device where information about buyer default risk is asymmetrically held. By offering trade credit, a seller can identify prospective defaults more quickl y than if financial institutions were the sole providers of short-ter m financing. The information is valuable in cases where a seller has made nonsalvageable investments in buyers since it enables the seller to take actions to pr...

  13. Multiparty secret sharing of quantum information based on entanglement swapping

    International Nuclear Information System (INIS)

    Li Yongmin; Zhang Kuanshou; Peng Kunchi

    2004-01-01

    A protocol of multiparty secret sharing of quantum information based on entanglement swapping is analyzed. In this protocol, Bell states are needed in order to realize the quantum information secret sharing and it is convenient to realize the quantum secret sharing among the members of any subset of users

  14. Measuring the Information Content of Stock Trades.

    OpenAIRE

    Hasbrouck, Joel

    1991-01-01

    This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE issues suggest a trade's full price impact arrives only with a protracted lag; the impact is a positive and concave function of the trade size; large trades cause the spread to widen; trades occurring in ...

  15. Trade Credit Insurance and Asymmetric Information Problem

    Directory of Open Access Journals (Sweden)

    Sokolovska Olena

    2017-03-01

    Full Text Available The presence of different risk factors in international trade gives evidence of the necessity of support in gaps that may affect exporters’ activity. To maximize the trade volumes and in the same time to minimize the exporters’ risks the stakeholders use trade credit insurance. The paper provides analysis of conceptual background of the trade credit insurance in the world. We analyzed briefly the problems, arising in insurance markets due to asymmetric information, such as adverse selection and moral hazard. Also we discuss the main stages of development of trade credit insurance in countries worldwide. Using comparative and graphical analysis we provide a brief evaluation of the dynamics of claims and recoveries for different forms of trade credit insurance. We found that the claims related to the commercial risk for medium and long trade credits in recent years exceed the recoveries, while with the political risk the reverse trend holds. And we originally consider these findings in terms of information asymmetry in the trade credit insurance differentiated by type of risk.

  16. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  17. Trade secrets protection mode of nuclear power plant

    International Nuclear Information System (INIS)

    Zeng Bin

    2015-01-01

    The paper analyzes the legal environment in which nuclear power enterprises are stayed, and mainly discusses the business secret protection modes of China's nuclear power enterprises. It is expected to provide a revelation and help for these enterprises to protect their business secrets. Firstly, the paper briefly expounds the legal basis of business secret protection and China's legalization status in this regard. Then it mainly puts forward the business secret management framework and postulations for nuclear power enterprises, and key points in application and protection of nuclear power business secret. (author)

  18. 7 CFR 993.71 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 993.71 Section 993.71 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... information constituting a trade secret or disclosing of the trade position, financial condition, or business...

  19. The Impact of Competition and Information on Intraday Trading

    DEFF Research Database (Denmark)

    Malinova, Katya; Park, Andreas

    2014-01-01

    In a dynamic model of financial market trading multiple heterogeneously informed traders choose when to place orders. Better informed traders trade immediately, worse informed delay - even though they expect the market to move against them. This behavior generates intraday patterns with decreasing...

  20. 76 FR 24026 - Federal Acquisition Regulation; Information Collection; Trade Agreements Certificate

    Science.gov (United States)

    2011-04-29

    ...; Information Collection; Trade Agreements Certificate AGENCY: Department of Defense (DOD), General Services... approved information collection requirement concerning trade agreements certificate. Public comments are...-mail [email protected] . SUPPLEMENTARY INFORMATION: A. Purpose Under the Trade Agreements Act of...

  1. Insider Trading as a Signal of Private Information.

    OpenAIRE

    Damodaran, Aswath; Liu, Crocker H

    1993-01-01

    There is substantial evidence that insider trading is present around corporate announcements and that this insider trading is motivated by private information. Using real estate investment trusts that choose to reappraise themselves as our sample, we establish that the appraisals contain information, but find no market response to the public announcement of this information in these appraisals. We consider two possible explanations for this inconsistency: the first that the appraisal informat...

  2. Information needs for problem holders/solution providers: EnviroTRADE

    International Nuclear Information System (INIS)

    Robson, W.M.; Harrington, M.W.; Harlan, C.P.

    1994-01-01

    EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy's nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues

  3. Information needs for problem holders/solution providers: EnviroTRADE

    Energy Technology Data Exchange (ETDEWEB)

    Robson, W.M. [Lawrence Livermore National Lab., CA (United States); Harrington, M.W.; Harlan, C.P. [Sandia National Labs., Livermore, CA (United States)

    1994-12-31

    EnviroTRADE (or Environmental Technologies for Remedial Actions Data Exchange) is a domestic and international information system that matches environmental problems with potential technologies solutions by combining state of the art information management techniques, graphical interfaces and a Geographic Information System (GIS). Its search and match algorithms locate technologies relevant to specific environmental problems and identify sites where technology may be applicable. EnviroTRADE also provides many other kinds of database searches and reports. EnviroTRADE is a graphical/textural information management system being developed for the cleanup program of US Department of energy`s nuclear weapons complex. Its principal purpose is to provide a single, powerful, interactive data source on the many environmental restoration and waste management (ER/WM) problems and on the technologies currently under development and available to resolve them. Because the volume and complexity of the information is so large, a sophisticated Relational database Management System (RDBMS) is employed for EnviroTRADE which accommodates graphical images, technical data, structured textural descriptions, and a variety of advanced multi-media data types. EnviroTRADE is a multi-purpose, multi-user system capable of addressing a broad range of environmental assessment and cleanup issues.

  4. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  5. 48 CFR 1837.203-70 - Providing contractors access to sensitive information.

    Science.gov (United States)

    2010-10-01

    ... documents as in sensitive-secret-top secret. (2) As used in this subpart, “requiring organization” refers to... Freedom of Information Act, which is not currently in the public domain, may embody trade secrets or...

  6. Volatility Informed Trading in the Options Market: Evidence from India

    Directory of Open Access Journals (Sweden)

    Rajesh Pathak

    2015-12-01

    Full Text Available The purpose of this paper is to investigate the trading activity in options market based on information about expected future volatility in spot market. We employ Common Implied Volatility as a measure of expected volatility and options volume and changes in Open Interests as measures of options trading activity. We first test for simultaneous information flow in the two markets using multiple regression technique. Next, we test for information based or hedge based use of options using Trivariate Vector-auto Regression framework. We further consider the classes of options moneyness and the market trends in our analysis to examine if the trader’s preference of options changes with change in description of options intrinsic value and market environment. We use daily closing data of S&P CNX Nifty Index options traded on National Stock Exchange, India. We, for the most part, find negative and significant relationship in contemporaneous regression suggesting active trading by arbitrageurs. A feedback relationship is observed in vector auto regression analysis suggesting that options are traded in India for both information based trading and hedging purposes. We also observe the relationship to be varying when market trends and classes of options moneyness are considered. This indicates that traders are not indifferent in their choice of trading venue when market conditions and factors change. The results of this study are helpful for traders in managing the risk and return of their portfolio based on volatility forecast. This study is distinctive as it examines the scarcely researched area of volatility informed trading in an emerging market set up.

  7. 7 CFR 926.19 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... RECORDKEEPING REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.19... data or information constituting a trade secret or disclosing the trade position or financial condition...

  8. 7 CFR 930.73 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 930.73 Section 930.73 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... a trade secret or disclosing trade position, financial condition, or business operations of the...

  9. 7 CFR 982.70 - Confidential information.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Confidential information. 982.70 Section 982.70 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing... trade secret or disclosing of the trade position, financial condition, or business operations of the...

  10. Towards informed and multi-faceted wildlife trade interventions

    Directory of Open Access Journals (Sweden)

    Daniel W.S. Challender

    2015-01-01

    Full Text Available International trade in wildlife is a key threat to biodiversity conservation. CITES, the Convention on International Trade in Endangered Species of Wild Fauna and Flora, seeks to ensure international wildlife trade is sustainable, relying on trade bans and controls. However, there has been little comprehensive review of its effectiveness and here we review approaches taken to regulate wildlife trade in CITES. Although assessing its effectiveness is problematic, we assert that CITES boasts few measurable conservation successes. We attribute this to: non-compliance, an over reliance on regulation, lack of knowledge and monitoring of listed species, ignorance of market forces, and influence among CITES actors. To more effectively manage trade we argue that interventions should go beyond regulation and should be multi-faceted, reflecting the complexity of wildlife trade. To inform these interventions we assert an intensive research effort is needed around six key areas: (1 factors undermining wildlife trade governance at the national level, (2 determining sustainable harvest rates for, and adaptive management of CITES species, (3 gaining the buy-in of local communities in implementing CITES, (4 supply and demand based market interventions, (5 means of quantifying illicit trade, and (6 political processes and influence within CITES.

  11. 77 FR 43081 - Federal Acquisition Regulation; Information Collection; Buy American Act-Free Trade Agreements...

    Science.gov (United States)

    2012-07-23

    ...; Information Collection; Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate AGENCIES... approved information collection requirement concerning the Buy American Act--Free Trade Agreements--Israeli..., Buy American Act--Free Trade Agreements--Israeli Trade Act Certificate, by any of the following...

  12. EPCRA Trade Secret Forms and Instructions

    Science.gov (United States)

    This form is required in order to substantiate claims of trade secrecy. You must be able to describe safeguarding measures and disclosure history for the specific chemical identity, and identify harm to your competitive position.

  13. Man or machine? Rational trading without information about fundamentals

    OpenAIRE

    Rossi, Stefano; Tinn, Katrin

    2014-01-01

    18/09/13 MEB, Working paper, not yet pub. Systematic trading contingent on observed prices by agents uninformed about fundamentals has long been considered at odds with efficient markets populated by rational agents. In this paper we show that price-contingent trading is the equilibrium strategy of rational agents in efficient markets in which there is uncertainty about whether a large trader is informed. In this environment, knowing his own type and past trades (or lack of them) will be e...

  14. A new equilibrium trading model with asymmetric information

    Directory of Open Access Journals (Sweden)

    Lianzhang Bao

    2018-03-01

    Full Text Available Taking arbitrage opportunities into consideration in an incomplete market, dealers will pricebonds based on asymmetric information. The dealer with the best offering price wins the bid. The riskpremium in dealer’s offering price is primarily determined by the dealer’s add-on rate of change tothe term structure. To optimize the trading strategy, a new equilibrium trading model is introduced.Optimal sequential estimation scheme for detecting the risk premium due to private inforamtion isproposed based on historical prices, and the best bond pricing formula is given with the accordingoptimal trading strategy. Numerical examples are provided to illustrate the economic insights underthe certain stochastic term structure interest rate models.

  15. Economic Culture and Trading Behaviors in Information Markets

    Science.gov (United States)

    Alhayyan, Khalid N.

    2012-01-01

    There are four main components for influencing traders' behaviors in an information market context: trader characteristics, organizational characteristics, market design, and external information. This dissertation focuses on investigating the impact of individual trader characteristics on trading behaviors. Two newly-developed constructs,…

  16. The Next Generation Information Infrastructure for International Trade

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Gal, Uri; Bjørn-Andersen, Niels

    2011-01-01

    that are in control of their business. Trusted traders are entitled to trade facilitations, faster border crossing, and fewer physical inspections. To enable the use of trusted traders, changes are required to the information infrastructure (II) of international trade. This article complements existing works on e......-Government interoperability by a theoretically driven approach with theoretical development of the II concept and how II can be modified as additional focus. Following the principles of IS design research, this paper presents a design proposition for the II of international trade. Using theories of II development and change......Regulators and actors in international trade are facing a difficult challenge of increasing control and security while at the same time lowering the administrative burden for traders. As a tentative response, the European Commission has introduced the concept of “trusted traders”: certified traders...

  17. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  18. Information and Heterogeneous Beliefs: Cost of Capital, Trading Volume, and Investor Welfare

    DEFF Research Database (Denmark)

    Christensen, Peter Ove; Qin, Zhenjiang

    In an incomplete market setting with heterogeneous prior beliefs, we show that public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. In a model with exponential utility investors and an asset with a normally distributed dividend...... information system. In an effectively complete market setting, in which investors do not need to trade dynamically in order to take full advantage of their differences in beliefs, the ex ante cost of capital and the investor welfare are both higher than in the incomplete market setting......, the Pareto efficient public information system is the system which enjoys the maximum ex ante cost of capital, and the maximum expected abnormal trading volume. The public information system facilitates improved dynamic trading opportunities based on heterogeneously updated posterior beliefs in order to take...

  19. Information and Heterogeneous Beliefs: Cost of Capital, Trading Volume, and Investor Welfare

    DEFF Research Database (Denmark)

    Christensen, Peter Ove; Qin, Zhenjiang

    information system. In an effectively complete market setting, in which investors do not need to trade dynamically in order to take full advantage of their differences in beliefs, the ex ante cost of capital and the investor welfare are both higher than in the incomplete market setting......In an incomplete market setting with heterogeneous prior beliefs, we show that public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. In a model with exponential utility investors and an asset with a normally distributed dividend......, the Pareto efficient public information system is the system which enjoys the maximum ex ante cost of capital, and the maximum expected abnormal trading volume. The public information system facilitates improved dynamic trading opportunities based on heterogeneously updated posterior beliefs in order to take...

  20. Applying systems thinking to inform studies of wildlife trade in primates.

    Science.gov (United States)

    Blair, Mary E; Le, Minh D; Thạch, Hoàng M; Panariello, Anna; Vũ, Ngọc B; Birchette, Mark G; Sethi, Gautam; Sterling, Eleanor J

    2017-11-01

    Wildlife trade presents a major threat to primate populations, which are in demand from local to international scales for a variety of uses from food and traditional medicine to the exotic pet trade. We argue that an interdisciplinary framework to facilitate integration of socioeconomic, anthropological, and biological data across multiple spatial and temporal scales is essential to guide the study of wildlife trade dynamics and its impacts on primate populations. Here, we present a new way to design research on wildlife trade in primates using a systems thinking framework. We discuss how we constructed our framework, which follows a social-ecological system framework, to design an ongoing study of local, regional, and international slow loris (Nycticebus spp.) trade in Vietnam. We outline the process of iterative variable exploration and selection via this framework to inform study design. Our framework, guided by systems thinking, enables recognition of complexity in study design, from which the results can inform more holistic, site-appropriate, and effective trade management practices. We place our framework in the context of other approaches to studying wildlife trade and discuss options to address foreseeable challenges to implementing this new framework. © 2017 Wiley Periodicals, Inc.

  1. Do Managers Trade on Public or Private Information? : Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    D. Veenman (David)

    2012-01-01

    textabstractUsing accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999- 2008), I find

  2. Trade-off between information and disturbance in qubit thermometry

    Science.gov (United States)

    Seveso, Luigi; Paris, Matteo G. A.

    2018-03-01

    We address the trade-off between information and disturbance in qubit thermometry from the perspective of quantum estimation theory. Given a quantum measurement, we quantify information via the Fisher information of the measurement and disturbance via four different figures of merit, which capture different aspects (statistical, thermodynamical, geometrical) of the trade-off. For each disturbance measure, the efficient measurements, i.e., the measurements that introduce a disturbance not greater than any other measurement extracting the same amount of information, are determined explicitly. The family of efficient measurements varies with the choice of the disturbance measure. On the other hand, commutativity between the elements of the probability operator-valued measure (POVM) and the equilibrium state of the thermometer is a necessary condition for efficiency with respect to any figure of disturbance.

  3. Source of information-driven trading on the Prague Stock Exchange

    Czech Academy of Sciences Publication Activity Database

    Kopřiva, František

    -, č. 365 (2008), s. 1-39 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : trading systems * informed trading * emerging markets Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp365.pdf

  4. Do Managers Trade on Public or Private Information? Evidence from Fundamental Valuations

    NARCIS (Netherlands)

    Veenman, D.

    2013-01-01

    Using accounting-based (residual income) valuations, this study examines the extent to which abnormal returns after insider share trades are explained by private information versus mispricing of public information. For a sample of insider trades in the Netherlands (1999–2008), I find that managers'

  5. Fragmentation and East Asia’s Information Technology Trade

    OpenAIRE

    Carl Bonham; Byron Gangnes; Ari Van Assche

    2004-01-01

    This paper studies the growth and determinants of information technology (IT) trade in the Asia-Pacific region. We argue that the rise of IT trade must be understood within the context o increasing vertical fragmentation of production processes that has occurred over the past two decades. To evaluate this empirically, we estimate a set of pooled bilateral IT export equations for eight Asian countries, the U.S. and the E.U., where FDI inflows are introduced as a proxy for fragmentation. We app...

  6. 78 FR 30934 - Agency Information Collection Activities: Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-05-23

    ... Activities: Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... information collection requirement concerning the Customs-Trade Partnership Against Terrorism (C-TPAT). This... information collection: Title: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077...

  7. Security classification of information

    Energy Technology Data Exchange (ETDEWEB)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  8. 78 FR 61959 - Agency Information Collection Activities: Announcement of Board Approval Under Delegated...

    Science.gov (United States)

    2013-10-08

    ... Freedom of Information Act (FOIA), which covers ``trade secrets and commercial or financial information... request for disclosure. Abstract: The FR H-(b)11 collects from most top-tier SLHCs information on filings...

  9. Source of information-driven trading on the Prague Stock Exchange

    Czech Academy of Sciences Publication Activity Database

    Kopřiva, František

    -, č. 365 (2008), s. 1-39 ISSN 1211-3298 R&D Projects: GA ČR(CZ) GA402/08/1376; GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : trading systems * informed trading * emerging markets Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp365.pdf

  10. 76 FR 42674 - Notice of Request for Approval of an Information Collection; Smuggling, Interdiction, and Trade...

    Science.gov (United States)

    2011-07-19

    ...; Smuggling, Interdiction, and Trade Compliance Program; Smuggling Form AGENCY: Animal and Plant Health... intention to initiate an information collection to support our smuggling, interdiction, and trade compliance... coming. FOR FURTHER INFORMATION CONTACT: For information on the smuggling, interdiction, and trade...

  11. THE EVOLUTION OF ROMANIAN TRADE IN INFORMATION PRODUCTS AND

    Directory of Open Access Journals (Sweden)

    CECILIA IRINA RABONTU

    2015-10-01

    Full Text Available The trade in Romania has seen an increased dynamism in many areas. When it comes to food or non food products, or services are bringing into question we can say that the period of consumerism in which we are living hallmarks the commercial activities. Trade in information products and services had lately a remarkable richness, being the categories that arouses greatest interest from certain consumers becoming more and more numerous and demanding in terms of technology. In this paper we proposed to analyze how much the sales of information products and services respond to the many needs expressed by Romanian customers and to capture the dynamics in which this type of commerce evolved.

  12. Gravity Models of Trade-Based Money Laundering

    NARCIS (Netherlands)

    Ferwerda, Joras|info:eu-repo/dai/nl/314405526; Kattenberg, Marc|info:eu-repo/dai/nl/357208986; Chang, Han-Hsin|info:eu-repo/dai/nl/357209370; Unger, Brigitte|info:eu-repo/dai/nl/290994926; Groot, Loek|info:eu-repo/dai/nl/073642398; Bikker, Jaap|info:eu-repo/dai/nl/06912261X

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is trade-based money laundering (TBML), a special form of trade

  13. Tools for Trade Analysis and Open Source Information Monitoring for Non-proliferation

    International Nuclear Information System (INIS)

    Cojazzi, G.G.M.; Versino, C.; Wolfart, E.; Renda, G.; Janssens, W.A.M.; )

    2015-01-01

    The new state level approach being proposed by IAEA envisions an objective based and information driven safeguards approach utilizing all relevant information to improve the effectiveness and efficiency of safeguards. To this goal the IAEA makes also use of open source information, here broadly defined as any information that is neither classified nor proprietary. It includes, but is not limited to: media sources, government and non-governmental reports and analyzes, commercial data, and scientific/technical literature, including trade data. Within the EC support programme to IAEA, JRC has surveyed and catalogued open sources on import-export customs trade data and developed tools for supporting the use of the related databases in safeguards. The JRC software The Big Table, (TBT), supports i.a.: a) the search through a collection of reference documents relevant to trade analysis (legal/regulatory documents, technical handbooks); b) the selection of items of interests to specific verifications and c) the mapping of these items to customs commodities searchable in trade databases. In the field of open source monitoring, JRC is developing and operating a ''Nuclear Security Media Monitor'' (NSMM), which is a web-based multilingual news aggregation system that automatically collects news articles from pre-defined web sites. NSMM is a domain specific version of the general JRC-Europe Media Monitor (EMM). NSMM has been established within the EC support programme with the aim, i.e., to streamline IAEA's process of open source information monitoring. In the first part, the paper will recall the trade data sources relevant for non-proliferation and will then illustrate the main features of TBT, recently coupled with the IAEA Physical Model, and new visualization techniques applied to trade data. In the second part it will present the main aspects of the NSMM also by illustrating some of uses done at JRC. (author)

  14. OntoTrader: An Ontological Web Trading Agent Approach for Environmental Information Retrieval

    Directory of Open Access Journals (Sweden)

    Luis Iribarne

    2014-01-01

    Full Text Available Modern Web-based Information Systems (WIS are becoming increasingly necessary to provide support for users who are in different places with different types of information, by facilitating their access to the information, decision making, workgroups, and so forth. Design of these systems requires the use of standardized methods and techniques that enable a common vocabulary to be defined to represent the underlying knowledge. Thus, mediation elements such as traders enrich the interoperability of web components in open distributed systems. These traders must operate with other third-party traders and/or agents in the system, which must also use a common vocabulary for communication between them. This paper presents the OntoTrader architecture, an Ontological Web Trading agent based on the OMG ODP trading standard. It also presents the ontology needed by some system agents to communicate with the trading agent and the behavioral framework for the SOLERES OntoTrader agent, an Environmental Management Information System (EMIS. This framework implements a “Query-Searching/Recovering-Response” information retrieval model using a trading service, SPARQL notation, and the JADE platform. The paper also presents reflection, delegation and, federation mediation models and describes formalization, an experimental testing environment in three scenarios, and a tool which allows our proposal to be evaluated and validated.

  15. 77 FR 5015 - Proposed Agency Information Collection Activities; Comment Request

    Science.gov (United States)

    2012-02-01

    ... needed. Reporters: Individuals, households, and financial and non-financial businesses. Estimated annual... 552(b)(4) and (b)(8)). Abstract: For federally related transactions, Title XI of the Financial..., which applies to ``trade secrets and commercial or financial information,'' would protect information...

  16. Mutual trust method for forwarding information in wireless sensor networks using random secret pre-distribution

    Directory of Open Access Journals (Sweden)

    Chih-Hsueh Lin

    2016-04-01

    Full Text Available In wireless sensor networks, sensing information must be transmitted from sensor nodes to the base station by multiple hopping. Every sensor node is a sender and a relay node that forwards the sensing information that is sent by other nodes. Under an attack, the sensing information may be intercepted, modified, interrupted, or fabricated during transmission. Accordingly, the development of mutual trust to enable a secure path to be established for forwarding information is an important issue. Random key pre-distribution has been proposed to establish mutual trust among sensor nodes. This article modifies the random key pre-distribution to a random secret pre-distribution and incorporates identity-based cryptography to establish an effective method of establishing mutual trust for a wireless sensor network. In the proposed method, base station assigns an identity and embeds n secrets into the private secret keys for every sensor node. Based on the identity and private secret keys, the mutual trust method is utilized to explore the types of trust among neighboring sensor nodes. The novel method can resist malicious attacks and satisfy the requirements of wireless sensor network, which are resistance to compromising attacks, masquerading attacks, forger attacks, replying attacks, authentication of forwarding messages, and security of sensing information.

  17. Information Trading by Corporate Insiders Based on Accounting Accruals - Forecasting Economic Performance

    NARCIS (Netherlands)

    Hodgson, A.; van Praag, B.

    2006-01-01

    In this paper, we test whether directors’ (corporate insiders) trading in Australia, based on accounting accruals, provides incremental information in forecasting a firm's economic performance. We determine that directors’ trading on negative accruals in larger firms has greater forecasting content

  18. 77 FR 74685 - Chemical Facility Anti-Terrorism Standards (CFATS) Chemical-Terrorism Vulnerability Information...

    Science.gov (United States)

    2012-12-17

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0057] Chemical Facility Anti-Terrorism Standards (CFATS) Chemical- Terrorism Vulnerability Information (CVI) AGENCY: National Protection and...: Comments that include trade secrets, confidential commercial or financial information, Chemical-terrorism...

  19. Information Asymmetries as Trade Barriers: ISO 9000 Increases International Commerce

    Science.gov (United States)

    Potoski, Matthew; Prakash, Aseem

    2009-01-01

    Spatial, cultural, and linguistic barriers create information asymmetries between buyers and sellers that impede international trade. The International Organization for Standardization's ISO 9000 program is designed to reduce these information asymmetries by providing assurance about the product quality of firms that receive its certification.…

  20. Measuring global oil trade dependencies: An application of the point-wise mutual information method

    International Nuclear Information System (INIS)

    Kharrazi, Ali; Fath, Brian D.

    2016-01-01

    Oil trade is one of the most vital networks in the global economy. In this paper, we analyze the 1998–2012 oil trade networks using the point-wise mutual information (PMI) method and determine the pairwise trade preferences and dependencies. Using examples of the USA's trade partners, this research demonstrates the usefulness of the PMI method as an additional methodological tool to evaluate the outcomes from countries' decisions to engage in preferred trading partners. A positive PMI value indicates trade preference where trade is larger than would be expected. For example, in 2012 the USA imported 2,548.7 kbpd despite an expected 358.5 kbpd of oil from Canada. Conversely, a negative PMI value indicates trade dis-preference where the amount of trade is smaller than what would be expected. For example, the 15-year average of annual PMI between Saudi Arabia and the U.S.A. is −0.130 and between Russia and the USA −1.596. We reflect the three primary reasons of discrepancies between actual and neutral model trade can be related to position, price, and politics. The PMI can quantify the political success or failure of trade preferences and can more accurately account temporal variation of interdependencies. - Highlights: • We analyzed global oil trade networks using the point-wise mutual information method. • We identified position, price, & politics as drivers of oil trade preference. • The PMI method is useful in research on complex trade networks and dependency theory. • A time-series analysis of PMI can track dependencies & evaluate policy decisions.

  1. 75 FR 68808 - Agency Information Collection Activities: Free Trade Agreements

    Science.gov (United States)

    2010-11-09

    ...: Free trade agreements are established to reduce and eliminate barriers, strengthen and develop economic... information collection: Chile, Singapore, Australia, Morocco, Bahrain, Jordan, Oman, and Peru. These...

  2. An Empirical Analysis of the Role of the Trading Intensity in Information Dissemination on the NYSE

    NARCIS (Netherlands)

    Spierdijk, L.

    2002-01-01

    Asymmetric information models predict comovements among trade characteristics such as returns, bid-ask spread, and trade volume on one hand and the trading intensity on the other hand.In this paper we investigate empirically the two-sided causality between trade characteristics and trading

  3. Collecting Safeguards Relevant Trade Information: The IAEA Procurement Outreach Programme

    International Nuclear Information System (INIS)

    Schot, P.; El Gebaly, A.; Tarvainen, M.

    2010-01-01

    The increasing awareness of activities of transnational procurement networks to covertly acquire sensitive nuclear related dual use equipment prompted an evolution of safeguards methodologies. One of the responses to this challenge by the Department of Safeguards in the IAEA was to establish the Trade and Technology Unit (TTA) in November 2004 to analyse and report on these covert nuclear related trade activities. To obtain information relevant to this analysis, TTA is engaging States that might be willing to provide this information to the Secretariat on a voluntary basis. This paper will give an overview of current activities, sum up the results achieved and discuss suggestions to further improve this programme made by Member States. (author)

  4. EnviroTRADE: An International Environmental Restoration and Waste Management Information System

    International Nuclear Information System (INIS)

    Johnson, S.W.; Harlan, C.P.; Harrington, M.W.; Bergeron, K.D.; Rehorn, A.S.

    1993-01-01

    The US Department of Energy (DOE) has collected, and will continue to collect, large amounts of information on its environmental waste sites and associated technology development efforts. This information is being gathered in a variety of formats for various purposes. Integration and delivery of this information WW benefit decision makers, waste site managers, technology developers, regulators, and the private sector. No computer system currently exists that acts as an easy-to-use computer umbrella over all of the DOE's environmental information. The EnviroTRADE Information System, currently under development for the DOE's Environmental Restoration and Waste Management's (EM's) Office of Technology Development, provides access to a wide variety of information within a single architecture. Ongoing system development is expected to result in an extensive, networked interface to EM's diverse data benefiting a variety of users. This paper discusses the present status of the EnviroTRADE Information System as well as current and future development activities

  5. Quantum strongly secure ramp secret sharing

    DEFF Research Database (Denmark)

    Zhang, Paul; Matsumoto, Rytaro Yamashita

    2015-01-01

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together...... however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced....... This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can...

  6. 77 FR 21560 - Agency Information Collection Activities: Announcement of Board Approval Under Delegated...

    Science.gov (United States)

    2012-04-10

    ... monthly, as needed. Reporters: Individuals, households, and financial and non-financial businesses...) and (b)(8)). Abstract: For federally related transactions, Title XI of the Financial Institutions..., which applies to ``trade secrets and commercial or financial information,'' would protect information...

  7. 我國侵害營業秘密與競業禁止違約判決之量化研究 Quantitative Analysis of the ROC Court Decisions on Trade Secret Infringements and Violation of Non-Compete Clauses

    Directory of Open Access Journals (Sweden)

    洪榮宗 Oliver Hung

    2007-12-01

    Full Text Available 營業秘密法生效迄今十年,其對於營業秘密的保護是否已周延?實有待觀察。又離職後競業禁止約款之相關實務運作現況為何?亦為探討營業秘密保護議題時,無法切割之問題。 本文利用司法院之系統查詢我國地方法院自1999 年8 月1 日起至2006年6 月30 日止,侵害營業秘密或違反競業禁止約款之民事判決,並以量化分析方式探討司法實務之態度。 本文之量化分析顯示:營業秘密與競業禁止訴訟之勝率均偏低;主張違反競業禁止明顯比主張侵害營業秘密來得容易;兩類訴訟之平均審理時間恐無法因應其急迫性需求;未約定違反競業禁止約款之違約賠償罰則的敗訴機率極高;競業禁止約款之五原則在法院實務上並未被遵守等。本文希望透過上開發現與確認,能期待找出改善之道。 The ROC Trade Secret Act has come into force for 10 years. However, whether it has sufficiently protected the trade secrets remains unanswered. In addition, the current operation and practice of “Non-Compete Clauses after Employment Relationship” are also important issues while discussing the trade secrets issues. Through the database of the ROC Judicial Yuan, we reviewed all the cases in the ROC district courts in connection with infringements on trade secrets and breach of non-compete clauses from August 1, 1999 to June 30, 2006 and conducted quantitative analysis of the courts’ opinions in this regard. The results of our quantitative analysis show that: 1. most of the decisions related to trade secret infringements and breach of non-compete clauses are in favor of defendants; 2. it is easier to claim violation of the non-compete clauses than infringements on trade secrets; 3. the trial period is too long to protect the plaintiffs given that the time is of essence; 4. it is quite probable that plaintiffs will lose the lawsuits if no penalty clause for

  8. The Secret Driving Force Behind Mongolia’s Successful Democracy

    Science.gov (United States)

    2016-03-01

    the nation’s democracy movement its earliest stages. Courtesy of the Democratic Union of Mongolia PRISM 6, no. 1 FROM THE FIELD | 141 The Secret Driving...assistance and trade. Our state budget PRISM 6, no. 1 FROM THE FIELD | 143 THE SECRET DRIVING FORCE BEHIND MONGOLIA’S SUCCESSFUL DEMOCRACY collapsed; we...O yungerel Tsedevdam ba (2006) PRISM 6, no. 1 FROM THE FIELD | 145 THE SECRET DRIVING FORCE BEHIND MONGOLIA’S SUCCESSFUL DEMOCRACY significantly as

  9. 10 CFR 603.895 - Protection of information in programmatic reports.

    Science.gov (United States)

    2010-01-01

    ... AGREEMENTS Award Terms Related to Other Administrative Matters Financial and Programmatic Reporting § 603.895... transaction that would be trade secret, or commercial or financial information that is privileged or... 10 Energy 4 2010-01-01 2010-01-01 false Protection of information in programmatic reports. 603.895...

  10. Quantum information theoretical analysis of various constructions for quantum secret sharing

    NARCIS (Netherlands)

    Rietjens, K.P.T.; Schoenmakers, B.; Tuyls, P.T.

    2005-01-01

    Recently, an information theoretical model for quantum secret sharing (QSS) schemes was introduced. By using this model, we prove that pure state quantum threshold schemes (QTS) can be constructed from quantum MDS codes and vice versa. In particular, we consider stabilizer codes and give a

  11. ACCOUNTING INFORMATION SYSTEM - QUALITATIVE CHARACTERISTICS AND THE IMPORTANCE OF ACCOUNTING INFORMATION AT TRADE ENTITIES

    Directory of Open Access Journals (Sweden)

    CARAIMAN ADRIAN-COSMIN

    2015-03-01

    Full Text Available Financial and accounting information systems, today, no longer are the traditional ones, they are subject to the normalisation and harmonisation, in the idea of globalization, and as a natural consequence of this situation, the users of accounting information require more and more diverse information from these systems. The economic entities in general, and those in the trade, in particular, performance management, management of the current situation, with multiple phenomena of crisis, require substantiation of decisions on the basis of a system of real information, pertinent, relevant and provided in a timely manner (Radu, 2011 [7]. Apart from users and goals of information provided by entities of the accounting information system of trade entities, they must have certain qualitative characteristics that facilitate the process of interpretation and use of accounting information. At the same time they are needed because their accounting information through its better goal, to represent the support base for the elaboration of certain decisions by those interested. In this article I propose to introduce qualitative characteristics of accounting information provided by IASB (International Accounting Standards Board, which, incidentally, have been taken up initially by the Romanian accounting regulations, with their subsequent amendments and additions, so far, because, in the end, as a conclusion, I consider that I should be noted that these qualities cannot be effective unlessin turn, the users themselves have the quality to have the knowledge required to understand the information that is intended for them.

  12. 16 CFR 14.12 - Use of secret coding in marketing research.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Use of secret coding in marketing research... STATEMENTS § 14.12 Use of secret coding in marketing research. (a) The Federal Trade Commission has determined to close its industry-wide investigation of marketing research firms that was initiated in...

  13. 77 FR 26253 - Agency Information Collection Activities; Proposed Collection; Comment Request; Notification...

    Science.gov (United States)

    2012-05-03

    ... appliance rule have been approved by the Office of Management and Budget (``OMB'') under OMB control number... manufacturers and importers introducing new products or models, or making changes to labels, instructions, or... not submit confidential business information, trade secret information, or other sensitive or...

  14. Detecting information-driven trading in a dealers market

    Czech Academy of Sciences Publication Activity Database

    Hanousek, Jan; Kopřiva, František

    2011-01-01

    Roč. 61, č. 3 (2011), s. 204-229 ISSN 0015-1920 R&D Projects: GA ČR(CZ) GAP403/11/0020; GA MŠk LC542 Institutional research plan: CEZ:MSM0021620846 Keywords : dealers’ market * emerging markets * informed trading Subject RIV: AH - Economics Impact factor: 0.346, year: 2011 http://journal.fsv.cuni.cz/storage/1212_hanousek.pdf

  15. 75 FR 71152 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2010-11-22

    ... information, such as trade secrets and commercial or financial information provided by the Agreement States.... Comments submitted in writing or in electronic form will be made available for public inspection. Because... following methods: Electronic comments: Go to http://www.regulations.gov and search for Docket No. NRC-2010...

  16. 78 FR 79016 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2013-12-27

    ... information, such as trade secrets and commercial or financial information provided by the Agreement States... electronic form will be made available for public inspection. Because your comments will not be edited to... Docket No. NRC-2013-0270. You may submit your comments by any of the following methods: Electronic...

  17. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  18. 45 CFR 1622.5 - Grounds on which meetings may be closed or information withheld.

    Science.gov (United States)

    2010-10-01

    ... in a civil action or proceeding, an action in a foreign court or international tribunal, or an... matters to be withheld; (c) Disclose trade secrets and commercial or financial information obtained from a...

  19. TRADE EFFECTS: REGULATORY, ACCOUNTING PRACTICES AND REPORTING OF INFORMATION RELATED

    Directory of Open Access Journals (Sweden)

    ARISTIŢA ROTILĂ

    2014-05-01

    Full Text Available It is known that within trade relations providers often credit customers for the value of goods or services which are the subject of conducted commercial transactions, this aspect being materialized in the issuance and acceptance of a trade effect. From the time of acceptance until maturity / settlement, trade effects should be reflected separately in the accounts and, to the extent that were not settled until the end of exercise, their value must be presented in the financial statements. Based on analysis of the Romanian accounting regulations, also taking into consideration the opinions expressed in specific literature concerning accounting reflection of trade effects, in this article we try to point out some aspects which, in our opinion, require clarification. We also want to point out some contradictions / inconsistencies regarding the reporting of information on the trade effects, specifically between the text of accounting regulations concerning the definition of accounting structures „cash and bank accounts” and “short term investments” and their contents when presented as positions in the balance sheet structure. In relation to the issues raised we try to prove the effects on the indicators concerning financial position and to make some suggestions that would have effects on Romanian accounting regulations, namely the improvement of financial reporting performed by the economic operators.

  20. 40 CFR 1603.7 - Grounds on which meetings may be closed or information may be withheld.

    Science.gov (United States)

    2010-07-01

    ... court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by the... withheld; (d) Disclose trade secrets and commercial or financial information obtained from a person and...

  1. The cultivation of information infrastructures for international trade : Stakeholder challenges and engagement reasons

    NARCIS (Netherlands)

    Knol, A.J.; Tan, Y.

    2018-01-01

    The development of information infrastructures for international trade to improve supply chain visibility and security has gained momentum due to technological advances. An information infrastructure is a shared, open, and evolving assemblage of interlinked information systems providing distinct

  2. Gathering and Using Information for the Selection of Trading Partners

    NARCIS (Netherlands)

    Nijssen, E.J.; Douglas, S.P.; Calis, G.

    1999-01-01

    Examines the nature of the search process used by international firms in identifying trading partners in emerging markets, and to what extent systematic information collection on potential partners is likely to enhance the choice of satisfactory partners. The results, based on 46 Dutch companies,

  3. 76 FR 6830 - Agency Information Collection Activities: Submission for the Office of Management and Budget (OMB...

    Science.gov (United States)

    2011-02-08

    ... non- sensitive, per the considerations in 10 CFR 2.390 and 9.17. This does not apply to financial... information, such as trade secrets and commercial or financial information provided by the Agreement States, that is considered privileged or confidential. Information such as financial assurance and the status...

  4. Reinforcement Learning for Constrained Energy Trading Games With Incomplete Information.

    Science.gov (United States)

    Wang, Huiwei; Huang, Tingwen; Liao, Xiaofeng; Abu-Rub, Haitham; Chen, Guo

    2017-10-01

    This paper considers the problem of designing adaptive learning algorithms to seek the Nash equilibrium (NE) of the constrained energy trading game among individually strategic players with incomplete information. In this game, each player uses the learning automaton scheme to generate the action probability distribution based on his/her private information for maximizing his own averaged utility. It is shown that if one of admissible mixed-strategies converges to the NE with probability one, then the averaged utility and trading quantity almost surely converge to their expected ones, respectively. For the given discontinuous pricing function, the utility function has already been proved to be upper semicontinuous and payoff secure which guarantee the existence of the mixed-strategy NE. By the strict diagonal concavity of the regularized Lagrange function, the uniqueness of NE is also guaranteed. Finally, an adaptive learning algorithm is provided to generate the strategy probability distribution for seeking the mixed-strategy NE.

  5. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  6. Trading in markets with noisy information: an evolutionary analysis

    Science.gov (United States)

    Bloembergen, Daan; Hennes, Daniel; McBurney, Peter; Tuyls, Karl

    2015-07-01

    We analyse the value of information in a stock market where information can be noisy and costly, using techniques from empirical game theory. Previous work has shown that the value of information follows a J-curve, where averagely informed traders perform below market average, and only insiders prevail. Here we show that both noise and cost can change this picture, in several cases leading to opposite results where insiders perform below market average, and averagely informed traders prevail. Moreover, we investigate the effect of random explorative actions on the market dynamics, showing how these lead to a mix of traders being sustained in equilibrium. These results provide insight into the complexity of real marketplaces, and show under which conditions a broad mix of different trading strategies might be sustainable.

  7. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  8. 26 CFR 1.971-1 - Definitions with respect to export trade corporations.

    Science.gov (United States)

    2010-04-01

    ..., copyrights, secret processes and formulas, goodwill, trademarks, trade brands, franchises, and other like... trade income, the anticipated future needs of the business will be taken into account to the extent that... determination date; anticipated future needs relating to a later period will not be taken into account unless it...

  9. Gravity Models of Trade-based Money Laundering

    NARCIS (Netherlands)

    Ferwerda, J.|info:eu-repo/dai/nl/314405526; Kattenberg, M.A.C.|info:eu-repo/dai/nl/357208986; Chang, H.-S.; Unger, B.|info:eu-repo/dai/nl/290994926; Groot, L.F.M.|info:eu-repo/dai/nl/073642398; Bikker, J.A.|info:eu-repo/dai/nl/06912261X

    2011-01-01

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade

  10. Introduction : Borders, Informality, International Trade and Customs

    OpenAIRE

    Cantens, Thomas; Ireland, Robert; Raballand, Gael

    2015-01-01

    Trading goods is an original human activity that precedes borders (Renfrew, 1969). With the rise of nation-states with demarcated political boundaries, trade that crosses borders became regulated by government institutions such as Customs, with tariffs, quotas, or outright prohibitions. While borders are perhaps not quite “the dead, the fixed, the undialectical, the immobile” (Foucault, 1970, p. 70), they are a formal structure that places less flexibility on trade activities. Focusing on inf...

  11. Trade associations and labor organizations as intermediaries for disseminating workplace safety and health information.

    Science.gov (United States)

    Okun, Andrea H; Watkins, Janice P; Schulte, Paul A

    2017-09-01

    There has not been a systematic study of the nature and extent to which business and professional trade associations and labor organizations obtain and communicate workplace safety and health information to their members. These organizations can serve as important intermediaries and play a central role in transferring this information to their members. A sample of 2294 business and professional trade associations and labor organizations in eight industrial sectors identified by the National Occupational Research Agenda was surveyed via telephone. A small percent of these organizations (40.9% of labor organizations, 15.6% of business associations, and 9.6% of professional associations) were shown to distribute workplace safety and health information to their members. Large differences were also observed between industrial sectors with construction having the highest total percent of organizations disseminating workplace safety and health information. There appears to be significant potential to utilize trade and labor organizations as intermediaries for transferring workplace safety and health information to their members. Government agencies have a unique opportunity to partner with these organizations and to utilize their existing communication channels to address high risk workplace safety and health concerns. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  12. Directory of Book Trade and Related Organizations. Books Trade Associations, United States and Canada; International and Foreign Book Trade Associations; National Information Standards Organization (NISO) Standards; Calendar, 2003-2012; Acronyms; Index of Organizations; Subject Index.

    Science.gov (United States)

    Bowker Annual Library and Book Trade Almanac, 2003

    2003-01-01

    Includes two lists: one of book trade associations in the United States and Canada, and one of international and foreign book trade associations. Concludes with National Information Standards Organization (NISO) standards; calendar, 2003-2012; acronyms; index of organizations; and subject index. (LRW)

  13. Information Theoretic Secret Key Generation: Structured Codes and Tree Packing

    Science.gov (United States)

    Nitinawarat, Sirin

    2010-01-01

    This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…

  14. Satisfying the demand for financial information in public traded companies

    DEFF Research Database (Denmark)

    Holm, Claus

    A public traded company which wishes to comply with IAS standards and stock exchange requirements for full public disclosure of relevant information faces a major communication task. The Investor Relation policy of such a company has to satisfy a demand for financial information which seems...... line focus to the disclosure of cash flow surrogates like EBITA and EBITDA. Overall, the findings suggest a communication strategy intended to satisfy the demand from the professional analysts. However, the shear number of different key figures and financial ratios identified in the study suggest...

  15. Empirical Evidence on the Role of Trading Suspensions in Disseminating New Information to the Capital Market

    NARCIS (Netherlands)

    Engelen, Peter-Jan; Kabir, Mohammed Rezaul

    2006-01-01

    This paper examines the effect of temporarily suspending the trading of exchange-listed individual stocks. We evaluate whether regulatory authorities can successfully use the mechanism of trading suspension in forcing companies to disclose new and material information to the capital market. Previous

  16. Physicians and Insider Trading.

    Science.gov (United States)

    Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven

    2015-12-01

    Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.

  17. Insider trading

    International Nuclear Information System (INIS)

    Maslechko, W.S.

    1998-01-01

    The policy arguments for and against prohibiting insider trading within the petroleum industry are discussed. Legal definitions of all relevant terms (e.g. 'special relationship' 'tippees', 'material facts', material changes' 'generally disclosed' information', 'necessary course of business') are provided. Enforcement of insider trading/tipping prohibitions are also defined. The recommended practice is: do not trade; do not tell or advise; encourage timely disclosure; do not speculate; implement a corporate disclosure and trading policy

  18. An Information-Based Trade Off between Foreign Direct Investment and Foreign Portfolio Investment

    OpenAIRE

    Itay Goldstein; Assaf Razin

    2005-01-01

    The paper develops a model of foreign direct investments (FDI) and foreign portfolio investments (FPI).The model describes an information-based trade off between direct investments and portfolio investments. Direct investors are more informed about the fundamentals of their projects. This information enables them to manage their projects more efficiently. However, it also creates an asymmetric-information problem in case they need to sell their projects prematurely, and reduces the price they...

  19. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  20. Information data systems for a global change technology initiative architecture trade study

    Science.gov (United States)

    Murray, Nicholas D.

    1991-01-01

    The Global Change Technology Initiative (GCTI) was established to develop technology which will enable use of satellite systems of Earth observations on a global scale, enable use of the observations to predictively model Earth's changes, and provide scientists, government, business, and industry with quick access to the resulting information. At LaRC, a GCTI Architecture Trade Study was undertaken to develop and evaluate the architectural implications to meet the requirements of the global change studies and the eventual implementation of a global change system. The output of the trade study are recommended technologies for the GCTI. That portion of the study concerned with the information data system is documented. The information data system for an earth global change modeling system can be very extensive and beyond affordability in terms of today's costs. Therefore, an incremental approach to gaining a system is most likely. An options approach to levels of capability versus needed technologies was developed. The primary drivers of the requirements for the information data system evaluation were the needed science products, the science measurements, the spacecraft orbits, the instruments configurations, and the spacecraft configurations and their attendant architectures. The science products requirements were not studied here; however, some consideration of the product needs were included in the evaluation results. The information data system technology items were identified from the viewpoint of the desirable overall information system characteristics.

  1. Trade unionism in the information technology (IT) industry: an employee's perspective.

    Science.gov (United States)

    Dhar, Rajib Lochan

    2012-01-01

    This research aimed to understand the information technology (IT) employees' perception and approach towards union formation in the Indian IT Industry. Fifty IT professionals from three different organizations participated in this study who were dispersed throughout the organizational hierarchy and were selected via randomized quota sampling to reflect a mix of age, experience, gender and position they held with the organization. Qualitative methods were used in order to collect the data, through phenomenological principles. Discussion with the participants led to the emergence of four themes which influence the employees' perception of trade union formation the Indian IT industry. These were: (a) feeling of a blue collar, (b) collective to individual bargaining, (c) changing role of HR and (d) other reasons. This study provided a tentative starting point towards the greater understanding of the employee's perceived notion of organizational life that influences employee's outlook towards trade unionism. Based on the study findings, there is an imperative that the human resource department, organizational forerunners and trade union philosophers continue to use research findings to understand employees' views about union formation in the IT industry.

  2. Understanding the limit order book: Conditioning on trade informativeness

    OpenAIRE

    Beltran, Héléna; Grammig, Joachim; Menkveld, Albert J.

    2005-01-01

    Electronic limit order books are ubiquitous in markets today. However, theoretical models for limit order markets fail to explain the real world data well. Sandas (2001) tests the classic Glosten (1994) model for order book equilibrium and rejects it. We reconfirm this result for one of the largest European stock markets. We then relax one of the model's assumptions and allow the informational content of trades to change over time. Adapting Hasbrouck's (1991a,b) methodology to estimate time v...

  3. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  4. 45 CFR 5.65 - Exemption four: Trade secrets and confidential commercial or financial information.

    Science.gov (United States)

    2010-10-01

    ... can be said to be the end product of either innovation or substantial effort. There must be a direct... commercial or financial information. 5.65 Section 5.65 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES... attorney-client privilege or the work product privilege. Information may be privileged for this purpose...

  5. 21 CFR 803.9 - What information from the reports do we disclose to the public?

    Science.gov (United States)

    2010-04-01

    ... AND HUMAN SERVICES (CONTINUED) MEDICAL DEVICES MEDICAL DEVICE REPORTING General Provisions § 803.9... following: (1) Any information that constitutes trade secret or confidential commercial or financial.... (c) We may not disclose the identity of a device user facility that makes a report under this part...

  6. Combining personal with social information facilitates host defences and explains why cuckoos should be secretive

    Science.gov (United States)

    Thorogood, Rose; Davies, Nicholas B.

    2016-01-01

    Individuals often vary defences in response to local predation or parasitism risk. But how should they assess threat levels when it pays their enemies to hide? For common cuckoo hosts, assessing parasitism risk is challenging: cuckoo eggs are mimetic and adult cuckoos are secretive and resemble hawks. Here, we show that egg rejection by reed warblers depends on combining personal and social information of local risk. We presented model cuckoos or controls at a pair’s own nest (personal information of an intruder) and/or on a neighbouring territory, to which they were attracted by broadcasts of alarm calls (social information). Rejection of an experimental egg was stimulated only when hosts were alerted by both social and personal information of cuckoos. However, pairs that rejected eggs were not more likely to mob a cuckoo. Therefore, while hosts can assess risk from the sight of a cuckoo, a cuckoo cannot gauge if her egg will be accepted from host mobbing. Our results reveal how hosts respond rapidly to local variation in parasitism, and why it pays cuckoos to be secretive, both to avoid alerting their targets and to limit the spread of social information in the local host neighbourhood. PMID:26794435

  7. From 'precarious informal employment' to 'protected employment': The 'positive transitioning effect' of trade unions

    OpenAIRE

    Serrano, Melisa R.; Xhafa, Edlira

    2016-01-01

    This paper aims at contributing to the discussions on the challenge of transitioning from precarious informal employment to more protected employment. This paper looks into a rather under-researched area - the role of trade unions in facilitating this process of 'transitioning' as well as in containing the spread of this type of employment. We refer to this process, along with its outcomes, as the 'positive transitioning effect' of trade unions. Through 10 case studies from nine countries (Br...

  8. Informed trading and the bid-ask spread: evidence from an emerging market

    Czech Academy of Sciences Publication Activity Database

    Hanousek, Jan; Podpiera, R.

    2003-01-01

    Roč. 31, č. 2 (2003), s. 275-296 ISSN 0147-5967 R&D Projects: GA MŠk ME 595 Institutional research plan: CEZ:AV0Z7085904 Keywords : market microstructure * bid-ask spread * informed trading Subject RIV: AH - Economics Impact factor: 0.746, year: 2003

  9. 17 CFR 249.821 - Form PILOT, information required of self-regulatory organizations operating pilot trading systems...

    Science.gov (United States)

    2010-04-01

    ... required of self-regulatory organizations operating pilot trading systems pursuant to § 240.19b-5 of this... Associations § 249.821 Form PILOT, information required of self-regulatory organizations operating pilot trading systems pursuant to § 240.19b-5 of this chapter. This form shall be used by all self-regulatory...

  10. Secrets and Disclosures: How Young Children Handle Secrets

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J.; Papathanasiou, Athanasia

    2013-01-01

    The authors examined the influence of content and verbal cues on young children's understanding of secret information and of its disclosure. Participants were 209 5- and 6-year-old children in an experiment where a puppet, named Zinc, was the protagonist. Children were asked to whom Zinc would disclose a list of pieces of information, some of…

  11. 5 CFR 1312.27 - Top secret control.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Top secret control. 1312.27 Section 1312... Classified Information § 1312.27 Top secret control. The EOP Security Officer serves as the Top Secret... Top Secret material. The ATSCOs will be responsible for the accountability and custodianship of Top...

  12. Rights, Regulation and Bureaucratic Impact: The Impact of Human Rights Litigation on the Regulation of Informal Trade in Johannesburg

    Directory of Open Access Journals (Sweden)

    Marius Pieterse

    2017-01-01

    Full Text Available In contemplating the extent to which rights-based litigation is conducive to positive social change, attention ought to be paid to the bureaucratic impact of court judgments that vindicate rights against the State. As a case study of such impact, this article considers the effects of human rights litigation on the regulation of informal trade in the City of Johannesburg, where a 2013 attempt by local government to clamp down on informal trade in the central business district (CBD led to high-profile court action. After describing and problematising the City's general approach to managing informal trade, the article focuses on "Operation Clean Sweep", which aimed to rid much of the CBD of informal traders and became the focal point of rights-based resistance. It then briefly describes the constitutional and jurisprudential framework within which the legal challenge to "Operation Clean Sweep" was to be decided, before critically discussing the judgment of the Constitutional Court in South African Informal Traders Forum v City of Johannesburg 2014 4 SA 371 (CC, which effectively halted "Operation Clean Sweep" by interdicting the City from removing traders from their places of business. The article then proceeds to consider the aftermath of the judgment, and assesses its impact on the City's informal trade policy and urban management practices, as well as on the broader regulatory and political environment around street trade in South African cities. The article shows that the bureaucratic impact of the judgment has, at best, been mixed, and that the judgment has not been entirely successful in disrupting the legal and bureaucratic mindsets, frameworks and processes that simultaneously create, exacerbate and unsuccessfully attempt to address the "unmanageability" of street trade in Johannesburg.

  13. Impact of information cost and switching of trading strategies in an artificial stock market

    Science.gov (United States)

    Liu, Yi-Fang; Zhang, Wei; Xu, Chao; Vitting Andersen, Jørgen; Xu, Hai-Chuan

    2014-08-01

    This paper studies the switching of trading strategies and its effect on the market volatility in a continuous double auction market. We describe the behavior when some uninformed agents, who we call switchers, decide whether or not to pay for information before they trade. By paying for the information they behave as informed traders. First we verify that our model is able to reproduce some of the stylized facts in real financial markets. Next we consider the relationship between switching and the market volatility under different structures of investors. We find that there exists a positive relationship between the market volatility and the percentage of switchers. We therefore conclude that the switchers are a destabilizing factor in the market. However, for a given fixed percentage of switchers, the proportion of switchers that decide to buy information at a given moment of time is negatively related to the current market volatility. In other words, if more agents pay for information to know the fundamental value at some time, the market volatility will be lower. This is because the market price is closer to the fundamental value due to information diffusion between switchers.

  14. 75 FR 19654 - U.S. Customs and Border Protection Agency Information Collection Activities: Customs-Trade...

    Science.gov (United States)

    2010-04-15

    ... change). Affected Public: Businesses, Individuals. Estimated Number of Respondents: 6,500. Estimated Time... previously approved. CBP is proposing that this information collection be extended with no change to the... other technological techniques or other forms of information. Title: Customs-Trade Partnership Against...

  15. Information/disturbance trade-off in single and sequential measurements on a qudit signal

    Energy Technology Data Exchange (ETDEWEB)

    Genoni, Marco G; Paris, Matteo G A [Dipartimento di Fisica, Universita degli studi di Milano (Italy)

    2007-05-15

    We address the trade-off between information gain and state disturbance in measurement performed on qudit systems and devise a class of optimal measurement schemes that saturate the ultimate bound imposed by quantum mechanics to estimation and transmission fidelities. The schemes are minimal, i.e. they involve a single additional probe qudit, and optimal, i.e. they provide the maximum amount of information compatible with a given level of disturbance. The performances of optimal single-user schemes in extracting information by sequential measurements in a N-user transmission line are also investigated, and the optimality is analyzed by explicit evaluation of fidelities. We found that the estimation fidelity does not depend on the number of users, neither for single-measure inference nor for collective one, whereas the transmission fidelity decreases with N. The resulting trade-off is no longer optimal and degrades with increasing N. We found that optimality can be restored by an effective preparation of the probe states and present explicitly calculations for the 2-user case.

  16. The state of the international organ trade: a provisional picture based on integration of available information.

    Science.gov (United States)

    Shimazono, Yosuke

    2007-12-01

    Organ transplantation is widely practised worldwide. The expansion of organ transplantation has led to a critical shortage of organs and the development of the organ trade. Many patients travel to areas where organs are obtainable through commercial transactions. Although the international organ trade is regarded as an important health policy issue, its current state remains obscure because of scarce data and the lack of efforts to synthesize available data. This paper is an attempt to integrate information about the current international organ trade and create a tentative global picture based on a systematic review of 309 media reports, journal articles and other documents. The international organ trade is described in terms of its forms, the organ-exporting countries, the organ-importing countries and its outcomes and consequences.

  17. Analysis of secreted proteins from Aspergillus flavus.

    Science.gov (United States)

    Medina, Martha L; Haynes, Paul A; Breci, Linda; Francisco, Wilson A

    2005-08-01

    MS/MS techniques in proteomics make possible the identification of proteins from organisms with little or no genome sequence information available. Peptide sequences are obtained from tandem mass spectra by matching peptide mass and fragmentation information to protein sequence information from related organisms, including unannotated genome sequence data. This peptide identification data can then be grouped and reconstructed into protein data. In this study, we have used this approach to study protein secretion by Aspergillus flavus, a filamentous fungus for which very little genome sequence information is available. A. flavus is capable of degrading the flavonoid rutin (quercetin 3-O-glycoside), as the only source of carbon via an extracellular enzyme system. In this continuing study, a proteomic analysis was used to identify secreted proteins from A. flavus when grown on rutin. The growth media glucose and potato dextrose were used to identify differentially expressed secreted proteins. The secreted proteins were analyzed by 1- and 2-DE and MS/MS. A total of 51 unique A. flavus secreted proteins were identified from the three growth conditions. Ten proteins were unique to rutin-, five to glucose- and one to potato dextrose-grown A. flavus. Sixteen secreted proteins were common to all three media. Fourteen identifications were of hypothetical proteins or proteins of unknown functions. To our knowledge, this is the first extensive proteomic study conducted to identify the secreted proteins from a filamentous fungus.

  18. 49 CFR 804.5 - Grounds on which meetings may be closed or information may be withheld.

    Science.gov (United States)

    2010-10-01

    ... withheld; (d) Disclose trade secrets and commercial or financial information obtained from a person and... subpoena, or the NTSB's participation in a civil action or proceeding, an action in a foreign court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by the NTSB of a...

  19. 10 CFR 1704.4 - Grounds on which meetings may be closed or information may be withheld.

    Science.gov (United States)

    2010-01-01

    ...) Disclose trade secrets and commercial or financial information obtained from a person and privileged or... subpoena, or the Board's participation in a civil action or proceeding, an action in a foreign court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by the Board of a...

  20. Clandestine Bushmeat Trade in Cross River State, Nigeria ...

    African Journals Online (AJOL)

    This paper surveyed the herp species traded in secret bush meat markets of Cross River State, with the view of assessing their conservation status and uses they are put to. The study mainly focused on six selected communities in Akamkpa Local Government Area (LGA) of Cross Rivers State, Nigeria – the host LGA of ...

  1. International trade agreements: hazards to health?

    Science.gov (United States)

    Shaffer, Ellen R; Brenner, Joseph E

    2004-01-01

    Since the 1980s, neoliberal policies have prescribed reducing the role of governments, relying on market forces to organize and provide health care and other vital human services. In this context, international trade agreements increasingly serve as mechanisms to enforce the privatization, deregulation, and decentralization of health care and other services, with important implications for democracy as well as for health. Critics contend that social austerity and "free" trade agreements contribute to the rise in global poverty and economic inequality and instability, and therefore to increased preventable illness and death. Under new agreements through the World Trade Organization that cover vital human services such as health care, water, education, and energy, unaccountable, secret trade tribunals could overrule decisions by democratically elected officials on public financing for national health care systems, licensing and training standards for health professionals, patient safety and quality regulations, occupational safety and health, control of hazardous substances such as tobacco and alcohol, the environment, and affordable access to safe water and sanitation. International negotiations in 2003 in Cancun and in Miami suggested that countervailing views are developing momentum. A concerned health care community has begun to call for a moratorium on trade negotiations on health care and water, and to reinvigorate an alternative vision of universal access to vital services.

  2. Trade Analysis and Safeguards

    International Nuclear Information System (INIS)

    Chatelus, R.; Schot, P.M.

    2010-01-01

    In order to verify compliance with safeguards and draw conclusions on the absence of undeclared nuclear material and activities, the International Atomic Energy Agency (IAEA) collects and analyses trade information that it receives from open sources as well as from Member States. Although the IAEA does not intervene in national export controls, it has to monitor the trade of dual use items. Trade analysis helps the IAEA to evaluate global proliferation threats, to understand States' ability to report exports according to additional protocols but also to compare against State declarations. Consequently, the IAEA has explored sources of trade-related information and has developed analysis methodologies beyond its traditional safeguards approaches. (author)

  3. 77 FR 74677 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Science.gov (United States)

    2012-12-17

    ... information provided. Special Instructions: Comments that include trade secrets, confidential commercial or.... Comments containing trade secrets, confidential commercial or financial information, CVI, SSI, or PCII.... Instrument: Notification of a New Top Screen. Frequency: On occasion/Other. Affected Public: Business or...

  4. 77 FR 74678 - Chemical Security Assessment Tool (CSAT)

    Science.gov (United States)

    2012-12-17

    ... information provided. Special Instructions: Comments that include trade secrets, confidential commercial or.... Comments containing trade secrets, confidential commercial or financial information, CVI, SSI, or PCII... March 31, 2013. The Department's Methodology in Estimating the Burden for the Top- Screen Number of...

  5. Insider trading under trading ban regulation in China’s A-share market

    Directory of Open Access Journals (Sweden)

    Chafen Zhu

    2015-09-01

    Full Text Available This study examines the effects of China’s 2008 trading ban regulation on the insider trading of large shareholders in China’s A-share market. It finds no evidence of insider trading during the ban period (one month before the announcement of a financial report, due to high regulation risk. However, the ban only constrains the profitability of insider trades during the ban period, while trades outside it remain highly profitable. Informed insider trading before the ban period is 2.83 times more profitable than uninformed trading. The regulation has changed insider trading patterns, but has been ineffective in preventing insider trading by large shareholders due to rigid administrative supervision and a lack of civil litigation and flexible market monitoring. This study enhances understanding of large shareholders’ trading behavior and has important implications for regulators.

  6. Dynamics of trade between the formal sector and informal traders

    Directory of Open Access Journals (Sweden)

    Cyril Nhlanhla Ngiba

    2011-04-01

    Full Text Available The informal sector in South Africa is a significant, but not well understood phenomenon. One important question relates to the nature of the relationship between the formal and informal sector. This article uses Porter’s five forces model to interrogate the linkages between informal fruit and vegetable traders in the Natalspruit Market (Ekurhuleni and their formal suppliers, primarily the Johannesburg Fresh Produce Market. While the threat of new products is low, the street traders’ position is weakened by the threat of new entrants, consumer bargaining power and lack of cooperation among street traders. In relation to supplier power, we conclude that while this varies according to a number of factors, the formal sector is dominant over informal fruit and vegetable sellers in this market. This finding rests primarily on the observation that, because of their fragmentation, the informal traders’ collective buying power is not being used in the same way as large formal retailers of fruit and vegetables to obtain better terms of trade with the formal economy supplier.

  7. Expatriates and trade

    Czech Academy of Sciences Publication Activity Database

    Konečný, Tomáš

    2012-01-01

    Roč. 13, č. 1 (2012), s. 83-98 ISSN 1488-3473 R&D Projects: GA MŠk LC542 Institutional research plan: CEZ:AV0Z70850503 Keywords : migration * trade * informal trade barriers Subject RIV: AH - Economics

  8. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  9. Secret Key Agreement: Fundamental Limits and Practical Challenges

    KAUST Repository

    Rezki, Zouheir

    2017-02-15

    Despite the tremendous progress made toward establishing PLS as a new paradigm to guarantee security of communication systems at the physical layerthere is a common belief among researchers and industrials that there are many practical challenges that prevent PLS from flourishing at the industrial scale. Most secure message transmission constructions available to date are tied to strong assumptions on CSI, consider simple channel models and undermine eavesdropping capabilities; thus compromising their practical interest to a big extent. Perhaps arguably, the most likely reasonable way to leverage PLS potential in securing modern wireless communication systems is via secret-key agreement. In the latter setting, the legitimate parties try to agree on a key exploiting availability of a public channel with high capacity which is also accessible to the eavesdropper. Once a key is shared by the legitimate parties, they may use it in a one-time pad encryption, for instance. In this article, we investigate two performance limits of secret-key agreement communications; namely, the secret-key diversity-multiplexing trade-off and the effect of transmit correlation on the secretkey capacity. We show via examples how secretkey agreement offers more flexibility than secure message transmissions. Finally, we explore a few challenges of secret-key agreement concept and propose a few guidelines to overturn them.

  10. 76 FR 12967 - Agency Information Collection Activities; Proposed Collection; Comment Request; Channels of Trade...

    Science.gov (United States)

    2011-03-09

    ...] Agency Information Collection Activities; Proposed Collection; Comment Request; Channels of Trade Policy...)--Extension The Food Quality Protection Act of 1996 (FQPA), which amended the Federal Insecticide, Fungicide... Burden \\1\\ Annual Activity No. of frequency per Total annual Hours per Total hours respondents response...

  11. The information seeking and procurment needs of attendees at an industrial trade show

    Directory of Open Access Journals (Sweden)

    N. C. Bresler

    2009-12-01

    Full Text Available Purpose: The purpose of this article is to describe what attracts visitors to an industrial trade show, and to profile them. This will enable the show organisers to attract the right mix of exhibitors and fulfil their dual role of satisfying the needs of both attendees and exhibitors and improve the role of exhibitions in the latter's marketing mix. Problem investigated: The research seeks to elicit the attendance objectives of participants in order to ascertain their information seeking and procurement needs. This can be used to improve the marketing communication of both the organisers and exhibitors. Research methodology: The research design is a multi method, descriptive study. A non probability, judgemental sample was drawn; 1020 interviews were conducted per Electra Mining Africa expo in 2004 and 2006. Both open ended and fixed response questions were posed and due to the similarity of responses, 300 per show were analysed. The researcher fulfilled a participant observer role to enhance the validity and reliability of the findings. Findings/implications: The prime reason for visitation was to see what is new, discover, and gather information, and attendees were not disappointed in that. The trade shows attracted an informed, niche audience. Exhibitors gained access to key decision makers with buying influence. Attendees represented all roles in the buying process and intended to buy some capital items exhibited within the following year. Business contacts were made. The attraction and contact efficiency of the exhibition's were high and may result in conversion efficiency. In terms of market and geographical coverage it is a vertical international show. Originality: This paper contributes to limited research conducted on trade shows, especially in South Africa. It is unique in that it describes the effectiveness of an industrial trade show from a demand perspective in order to improve the facilitating role of exhibition organisers. It

  12. Trading strategies of corporate insiders

    NARCIS (Netherlands)

    Klein, O.; Maug, E.; Schneider, Christoph

    2017-01-01

    We test two complementary theories of optimal trading strategies by analyzing the transaction patterns of corporate insiders. According to information-based theories, investors trade faster if they compete with others for exploiting the same information, while liquidity-based theories predict the

  13. Special Issue: Intellectual Property in the Information Age: Knowledge as Commodity and its Legal Implications for Higher Education

    Science.gov (United States)

    Sun, Jeffrey C., Ed.; Baez, Benjamin, Ed.

    2009-01-01

    This monograph examines in great detail two kinds of intellectual property: copyrights and patents. Though the authors recognize the significance of trademarks and trade secrets, they focus primarily on copyrights and patents in this monograph because they represent the most significant issues in higher education in the information age.…

  14. 40 CFR 350.5 - Assertion of claims of trade secrecy.

    Science.gov (United States)

    2010-07-01

    ... deleted, and the generic class or category of the chemical identity or identities inserted in its place... place of the specific chemical identity claimed as trade secret, the generic class or category of the... the specific chemical identity of an extremely hazardous substance under sections 303 (d)(2) and (d)(3...

  15. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  16. Secret Sharing of a Quantum State.

    Science.gov (United States)

    Lu, He; Zhang, Zhen; Chen, Luo-Kan; Li, Zheng-Da; Liu, Chang; Li, Li; Liu, Nai-Le; Ma, Xiongfeng; Chen, Yu-Ao; Pan, Jian-Wei

    2016-07-15

    Secret sharing of a quantum state, or quantum secret sharing, in which a dealer wants to share a certain amount of quantum information with a few players, has wide applications in quantum information. The critical criterion in a threshold secret sharing scheme is confidentiality: with less than the designated number of players, no information can be recovered. Furthermore, in a quantum scenario, one additional critical criterion exists: the capability of sharing entangled and unknown quantum information. Here, by employing a six-photon entangled state, we demonstrate a quantum threshold scheme, where the shared quantum secrecy can be efficiently reconstructed with a state fidelity as high as 93%. By observing that any one or two parties cannot recover the secrecy, we show that our scheme meets the confidentiality criterion. Meanwhile, we also demonstrate that entangled quantum information can be shared and recovered via our setting, which shows that our implemented scheme is fully quantum. Moreover, our experimental setup can be treated as a decoding circuit of the five-qubit quantum error-correcting code with two erasure errors.

  17. To Trade or Not to Trade: Firm-Level Analysis of Emissions Trading in Santiago, Chile

    International Nuclear Information System (INIS)

    Coria, Jessica; Loefgren, Aasa; Sterner, Thomas

    2009-01-01

    Whether tradable permits are appropriate for use in transition and developing economies - given special social and cultural circumstances, such as the lack of institutions and lack of expertise with market-based policies - is much debated. We conducted interviews and surveyed a sample of firms subject to emissions trading programs in Santiago, Chile, one of the first cities outside the OECD that has implemented such trading. The information gathered allow us to study what factors affect the performance of the trading programs in practice and the challenges and advantages of applying tradable permits in less developed countries

  18. The Anatomy of Digital Trade Infrastructures

    DEFF Research Database (Denmark)

    Rukanova, Boriana; Zinner Henriksen, Helle; Henningsson, Stefan

    2017-01-01

    In global supply chains information about transactions resides in fragmented pockets within business and government systems. The introduction of digital trade infrastructures (DTI) that transcend organizational and systems domains is driven by the prospect of reducing this information fragmentation......, thereby enabling improved security and efficiency in trade process. To understand the problem at hand and build cumulative knowledge about its resolution a way to conceptualize the different digital trade infrastructure initiatives is needed. This paper develops the Digital Trade Infrastructure Framework...

  19. Spacetime Replication of Quantum Information Using (2 , 3) Quantum Secret Sharing and Teleportation

    Science.gov (United States)

    Wu, Yadong; Khalid, Abdullah; Davijani, Masoud; Sanders, Barry

    The aim of this work is to construct a protocol to replicate quantum information in any valid configuration of causal diamonds and assess resources required to physically realize spacetime replication. We present a set of codes to replicate quantum information along with a scheme to realize these codes using continuous-variable quantum optics. We use our proposed experimental realizations to determine upper bounds on the quantum and classical resources required to simulate spacetime replication. For four causal diamonds, our implementation scheme is more efficient than the one proposed previously. Our codes are designed using a decomposition algorithm for complete directed graphs, (2 , 3) quantum secret sharing, quantum teleportation and entanglement swapping. These results show the simulation of spacetime replication of quantum information is feasible with existing experimental methods. Alberta Innovates, NSERC, China's 1000 Talent Plan and the Institute for Quantum Information and Matter, which is an NSF Physics Frontiers Center (NSF Grant PHY-1125565) with support of the Gordon and Betty Moore Foundation (GBMF-2644).

  20. Bitcoin trading system

    OpenAIRE

    Turšič, Samo

    2015-01-01

    In this thesis an information solution was developed that enables the implementation of different trading strategies and backtesting over cryptocurrency Bitcoin trading data. Supported exchanges are Bitstamp, BTC-e and MtGox. In the field of technical analysis there already exist various solutions for Bitcoin that help traders to trade and advise them on basis of technical indicators and patterns. However, each has its own drawbacks, which we are aiming to fix. A web application was developed...

  1. Bitcoin trading system

    OpenAIRE

    Turšič, Samo

    2014-01-01

    In this thesis an information solution was developed that enables the implementation of different trading strategies and backtesting over cryptocurrency Bitcoin trading data. Supported exchanges are Bitstamp, BTC-e and MtGox. In the field of technical analysis there already exist various solutions for Bitcoin that help traders to trade and advise them on basis of technical indicators and patterns. However, each has its own drawbacks, which we are aiming to fix. A web application was developed...

  2. The hidden hyperbolic geometry of international trade: World Trade Atlas 1870-2013.

    Science.gov (United States)

    García-Pérez, Guillermo; Boguñá, Marián; Allard, Antoine; Serrano, M Ángeles

    2016-09-16

    Here, we present the World Trade Atlas 1870-2013, a collection of annual world trade maps in which distance combines economic size and the different dimensions that affect international trade beyond mere geography. Trade distances, based on a gravity model predicting the existence of significant trade channels, are such that the closer countries are in trade space, the greater their chance of becoming connected. The atlas provides us with information regarding the long-term evolution of the international trade system and demonstrates that, in terms of trade, the world is not flat but hyperbolic, as a reflection of its complex architecture. The departure from flatness has been increasing since World War I, meaning that differences in trade distances are growing and trade networks are becoming more hierarchical. Smaller-scale economies are moving away from other countries except for the largest economies; meanwhile those large economies are increasing their chances of becoming connected worldwide. At the same time, Preferential Trade Agreements do not fit in perfectly with natural communities within the trade space and have not necessarily reduced internal trade barriers. We discuss an interpretation in terms of globalization, hierarchization, and localization; three simultaneous forces that shape the international trade system.

  3. Expatriates and trade

    Czech Academy of Sciences Publication Activity Database

    Konečný, Tomáš

    -, č. 387 (2009), s. 1-29 ISSN 1211-3298 R&D Projects: GA MŠk LC542 Grant - others:GA UK(CZ) 118909 Institutional research plan: CEZ:MSM0021620846 Keywords : international trade * migration * informal trade barriers Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp387.pdf

  4. Methods of Information Subjects and Objects Interaction Rules Formalization in the Electronic Trading Platform System

    Directory of Open Access Journals (Sweden)

    Emma Emanuilova Yandybaeva

    2015-03-01

    Full Text Available The methods of information subjects and objects interaction rules formalization in the electronic trading platform system has been developed. They are based on mathematical model of mandatory role-based access control. As a result of the work we have defined set of user roles and constructed roles hierarchy. For the roles hierarchy restrictions have been imposed to ensure the safety of the information system.

  5. Application of EnviroTRADE information system for the cleanup of the former Soviet Union (FSU) site at Komarom Base, Hungary

    International Nuclear Information System (INIS)

    Matalucci, R.V.; Harrington, M.W.; Harlan, C.P.; Kuperberg, J.M.; Biczo, I.L.

    1994-01-01

    During a NATO Advanced Research Workshop (ARW) held in Visegrad, Hungary, June 21-23, 1994, portions of contamination data from the Former Soviet Union (FSU) site at Komarom, Hungary were used to demonstrate the international EnviroTRADE Information System as a tool to assist with the identification of alternative cleanup measures for contaminated sites. The NATO ARW was organized and conducted by the joint Florida State University and the Technical University of Budapest, Center for Hungarian-American Environmental Research, Studies, and Exchanges (CHAERSE). The purpose of the workshop was to develop a strategy for the identification and selection of appropriate low-cost and innovative site remediation technologies and approaches for a typical abandoned FSU site. The EnviroTRADE information system is a graphical, photographical, and textual environmental management tool under development by the U.S. Department of Energy (USDOE) at Sandia National Laboratories (SNL) as a part of the cleanup program of the nuclear weapons complex. EnviroTRADE provides a single, powerful, multi-purpose, multi-user, multi-media, and interactive computer information system for worldwide environmental restoration and waste management (ER/WM). Graphical, photographic, and textual data from the Komarom FSU site were entered into EnviroTRADE. These data were used to make comparative evaluations of site characterization and remediation technologies that might be used to clean up primarily hydrocarbon contamination in the groundwater and soil. Available Hydrogeological and geological features, contaminated soil profiles, and topographical maps were included in the information profiles. Although EnviroTRADE is currently only partially populated (approximately 350 technologies for cleanup are included in the database), the utility of the information system to evaluate possible options for cleanup of the Komarom site has been demonstrated

  6. Molecular Mechanisms of Insulin Secretion and Insulin Action.

    Science.gov (United States)

    Flatt, Peter R.; Bailey, Clifford J.

    1991-01-01

    Information and current ideas on the factors regulating insulin secretion, the mechanisms underlying the secretion and biological actions of insulin, and the main characteristics of diabetes mellitus are presented. (Author)

  7. Gravity Models of Trade-Based Money Laundering

    OpenAIRE

    Ferwerda, Joras; Kattenberg, Marc; Chang, Han-Hsin; Unger, Brigitte; Groot, Loek; Bikker, Jaap

    2011-01-01

    Several attempts have been made in the economics literature to measure money laundering. However, the adequacy of these models is difficult to assess, as money laundering takes place secretly and, hence, goes unobserved. An exception is tradebased money laundering (TBML), a special form of trade abuse that has been discovered only recently. TBML refers to criminal proceeds that are transferred around the world using fake invoices that under- or overvalue imports and exports. This article is a...

  8. Dig It! The Secrets of Soil

    Science.gov (United States)

    It! The Secrets of Soil Come and Explore! Discover the amazing world of soils with images and information from the Dig It! The Secrets of Soil exhibit from the Smithsonian's National Museum of Natural and new web content will be added over the coming months including a new soil blog. New Interactives

  9. The role of conflict minerals, artisanal mining, and informal trading networks in African intrastate and regional conflicts

    Science.gov (United States)

    Chirico, Peter G.; Malpeli, Katherine C.

    2014-01-01

    The relationship between natural resources and armed conflict gained public and political attention in the 1990s, when it became evident that the mining and trading of diamonds were connected with brutal rebellions in several African nations. Easily extracted resources such as alluvial diamonds and gold have been and continue to be exploited by rebel groups to fund their activities. Artisanal and small-scale miners operating under a quasi-legal status often mine these mineral deposits. While many African countries have legalized artisanal mining and established flow chains through which production is intended to travel, informal trading networks frequently emerge in which miners seek to evade taxes and fees by selling to unauthorized buyers. These networks have the potential to become international in scope, with actors operating in multiple countries. The lack of government control over the artisanal mining sector and the prominence of informal trade networks can have severe social, political, and economic consequences. In the past, mineral extraction fuelled violent civil wars in Sierra Leone, Liberia, and Angola, and it continues to do so today in several other countries. The significant influence of the informal network that surrounds artisanal mining is therefore an important security concern that can extend across borders and have far-reaching impacts.

  10. 75 FR 41142 - Proposed Information Collection; Comment Request; Report of Requests for Restrictive Trade...

    Science.gov (United States)

    2010-07-15

    ... Request; Report of Requests for Restrictive Trade Practice or Boycott AGENCY: Bureau of Industry and... foreign boycotts against countries friendly to the U.S. which are received by U.S. persons. The information is also used to identify trends in such boycott activity and to assist in carrying out U.S. policy...

  11. Quantum secret sharing with classical Bobs

    International Nuclear Information System (INIS)

    Li Lvzhou; Qiu Daowen; Mateus, Paulo

    2013-01-01

    Boyer et al (2007 Phys. Rev. Lett. 99 140501) proposed a novel idea of semi-quantum key distribution, where a key can be securely distributed between Alice, who can perform any quantum operation, and Bob, who is classical. Extending the ‘semi-quantum’ idea to other tasks of quantum information processing is of interest and worth considering. In this paper, we consider the issue of semi-quantum secret sharing, where a quantum participant Alice can share a secret key with two classical participants, Bobs. After analyzing the existing protocol, we propose a new protocol of semi-quantum secret sharing. Our protocol is more realistic, since it utilizes product states instead of entangled states. We prove that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate users could notice. (paper)

  12. Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state

    International Nuclear Information System (INIS)

    Ye, Tian-Yu; Jiang, Li-Zhen

    2014-01-01

    In order to avoid the risk of information leakage during the information mutual transmission between two authorized participants, i.e. Alice and Bob, a quantum dialogue protocol based on the entanglement swapping between any two Bell states and the shared secret Bell state is proposed. The proposed protocol integrates the ideas of block transmission, two-step transmission and unitary operation encoding together using the Bell states as the information carriers. Besides the entanglement swapping between any two Bell states, a shared secret Bell state is also used to overcome the information leakage problem, which not only makes Bob aware of the prepared initial state but also is used for Bob's encoding and entanglement swapping. Security analysis shows that the proposed protocol can resist the general active attacks from an outside eavesdropper Eve. Moreover, the relation between the maximal amount of information Eve can gain and the detection probability is derived. (paper)

  13. 10 CFR 1016.34 - Accountability for Secret Restricted Data.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Accountability for Secret Restricted Data. 1016.34 Section... Information § 1016.34 Accountability for Secret Restricted Data. Each permittee possessing documents containing Secret Restricted Data shall establish a document accountability procedure and shall maintain...

  14. The hidden hyperbolic geometry of international trade: World Trade Atlas 1870–2013

    Science.gov (United States)

    García-Pérez, Guillermo; Boguñá, Marián; Allard, Antoine; Serrano, M. Ángeles

    2016-01-01

    Here, we present the World Trade Atlas 1870–2013, a collection of annual world trade maps in which distance combines economic size and the different dimensions that affect international trade beyond mere geography. Trade distances, based on a gravity model predicting the existence of significant trade channels, are such that the closer countries are in trade space, the greater their chance of becoming connected. The atlas provides us with information regarding the long-term evolution of the international trade system and demonstrates that, in terms of trade, the world is not flat but hyperbolic, as a reflection of its complex architecture. The departure from flatness has been increasing since World War I, meaning that differences in trade distances are growing and trade networks are becoming more hierarchical. Smaller-scale economies are moving away from other countries except for the largest economies; meanwhile those large economies are increasing their chances of becoming connected worldwide. At the same time, Preferential Trade Agreements do not fit in perfectly with natural communities within the trade space and have not necessarily reduced internal trade barriers. We discuss an interpretation in terms of globalization, hierarchization, and localization; three simultaneous forces that shape the international trade system. PMID:27633649

  15. Digital Trade Infrastructures: A Framework for Analysis

    Directory of Open Access Journals (Sweden)

    Boriana Boriana

    2018-04-01

    Full Text Available In global supply chains, information about transactions resides in fragmented pockets within business and government systems. The lack of reliable, accurate and complete information makes it hard to detect risks (such as safety, security, compliance and commercial risks and at the same time makes international trade inefficient. The introduction of digital infrastructures that transcend organizational and system domains is driven by the prospect of reducing the fragmentation of information, thereby enabling improved security and efficiency in the trading process. This article develops a digital trade infrastructure framework through an empirically grounded analysis of four digital infrastructures in the trade domain, using the conceptual lens of digital infrastructure.

  16. 78 FR 16692 - Chemical Facility Anti-Terrorism Standards (CFATS)

    Science.gov (United States)

    2013-03-18

    ... trade secrets, confidential commercial or financial information, Chemical-terrorism Vulnerability... from other comments in response to this notice. Comments containing trade secrets, confidential... Burden Cost (operating/maintaining): $3,977. Instrument: Notification of a New Top Screen. Frequency: On...

  17. Behavior of temperature dependent SRAM-PUFs, and consequences for secret-key capacity

    NARCIS (Netherlands)

    Kusters, C.J.; Ignatenko, T.; Willems, F.M.J.

    2017-01-01

    Physical Unclonable Functions (PUFs) are a resource for generating and sharing secret keys. The mutual information between two respective observations of the same PUF gives an upper bound for the achievable secret-key rate of a secret-sharing scheme that relies on this PUF. This mutual information

  18. Online stock trading platform

    Directory of Open Access Journals (Sweden)

    Ion LUNGU

    2006-01-01

    Full Text Available The Internet is the perfect tool that can assure the market’s transparency for any user who wants to trade on the stock market. The investor can have access to the market news, financial calendar or the press releases of the issuers. A good online trading platform also provides real-time intraday quotes, trading history and technical analysis giving the investor a clearer view of the supply and demand in the market. All this information provides the investor a good image of the market and encourages him to trade. This paper wishes to draft the pieces of an online trading platform and to analyze the impact of developing and implementing one in a brokerage firm.

  19. Trade credit supply, market power and the matching of trade credit terms

    NARCIS (Netherlands)

    Fabbri, D.; Klapper, L.F.

    2008-01-01

    This paper studies the decision of firms to extend trade credit to customers and its relation with their financing decisions. We use a novel firm-level database with unique information on market power in both output and input markets and on the amount, terms and payment history of trade credit

  20. 美國聯邦經濟間諜法之回顧與展望──兼論我國營業秘密法之刑罰化 Reviewing the U.S. Economic Espionage Act—With the Extending Comments on the 2013 Amendment of Taiwan’s Trade Secret Act

    Directory of Open Access Journals (Sweden)

    林志潔 Carol Chih-Chieh Lin

    2016-06-01

    Full Text Available 科技、經濟、國家安全,看似不相關的三個名詞,因營業秘密的存在而牢牢相扣。美國自1996 年起以聯邦層級的經濟間諜法來保護營業秘密,對於侵害營業秘密者課予刑事責任,並明確區分竊取營業秘密行為及經濟間諜行為,以嚇阻企業競爭對手竊取營業秘密,防止國家經濟、安全受到危害。然而,美國聯邦經濟間諜法施行至今已十九年,關於經濟間諜罪的案件,經法院判決確定有罪者卻為數不多,本文擬分析經濟間諜法實務上施行之困境,並提出改革建議。又,我國營業秘密法於2013 年增訂刑事規範第13 條之1至第13 條之4,主要參考自經濟間諜法,為分析比較,本文亦將一併檢討我國營業秘密法刑罰化後之問題。 “Technology, economic and national security,” these three words seem to be irrelevant on the surface; however, they are tightly bounded by the existence of the word—trade secret. The federal government of the U.S. passed the Economic Espionage Act in 1996 in an attempt to create a “comprehensive and systematic” approach to address trade secrecy misappropriation, drawing a clear line between economic espionage and theft of trade secrets through federal criminal justice system. It is established to prevent trade rivals from stealing other business’s most precious property—trade secret, and to protect the national economy, security from any harm. While the Economic Espionage Act has been implemented for 19 years, there are only few cases brought in a verdict of guilty, which seemingly contradicts to the legislative purposes. Therefore, this article aims to analyze the predicamentof the Act, and to give constructive propositions. Furthermore, the Trade Secret Act in Taiwan was revised in 2013. It mainly referred to the Economic Espionage, adding article 13-1 to 13-4. In order to compare and assay, this article will also probe into

  1. Quantifying immediate price impact of trades based on the k-shell decomposition of stock trading networks

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Xu, Hai-Chuan; Chen, Wei; Zhou, Wei-Xing; Stanley, H. Eugene

    2016-10-01

    Traders in a stock market exchange stock shares and form a stock trading network. Trades at different positions of the stock trading network may contain different information. We construct stock trading networks based on the limit order book data and classify traders into k classes using the k-shell decomposition method. We investigate the influences of trading behaviors on the price impact by comparing a closed national market (A-shares) with an international market (B-shares), individuals and institutions, partially filled and filled trades, buyer-initiated and seller-initiated trades, and trades at different positions of a trading network. Institutional traders professionally use some trading strategies to reduce the price impact and individuals at the same positions in the trading network have a higher price impact than institutions. We also find that trades in the core have higher price impacts than those in the peripheral shell.

  2. Trade Intelligence and Contemporary Exports Strategy

    Directory of Open Access Journals (Sweden)

    M. Tayfun Gülle

    2013-11-01

    Full Text Available The book mainly focuses on the divergences in the competitive environment resulting from the entrance of information and communications technologies into commercial life. Denoting that these divergences are rooted, above all, in the differences among countries in historical, social and geographic terms, the book claims that the increased use of trade information combined with these divergences will facilitate obtaining results in trade and that the synergy to emerge will pave the way for trade intelligence. The book also underlines that such trade intelligence, which is actually the natural commercial manner of Turkish entrepreneurs, could be accepted as the Turkish Style in international trade, with the rational management of the export process, and that this would ferment the national competition intelligence, as the strategy of contemporary exports.

  3. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  4. 5 CFR 1312.26 - Control of secret and confidential material.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Control of secret and confidential... Accountability of Classified Information § 1312.26 Control of secret and confidential material. Classified... Document Control, will be used to establish accountability controls on all Secret material received or...

  5. Electric trade in the United States, 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-01

    Wholesale trade in electricity plays an important role for the US electric utility industry. Wholesale, or bulk power, transactions allow electric utilities to reduce power costs, increase power supply options, and improve reliability. In 1996, the wholesale trade market totaled 2.3 trillion kilowatthours, over 73% of total sales to ultimate consumers. This publication, Electric Trade in the United States 1996 (ELECTRA), is the sixth in a series of reports on wholesale power transactions prepared by the Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1996. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. 1 fig., 43 tabs.

  6. A linear construction of perfect secret sharing schemes

    NARCIS (Netherlands)

    Dijk, van M.; Santis, De A.

    1995-01-01

    In this paper, we generalize the vector space construction due to Brickell [5]. This generalization, introduced by Bertilsson [1], leads to perfect secret sharing schemes with rational information rates in which the secret can be computed efficiently by each qualified group. A one to one

  7. Informational Efficiency in the USD/KRW Spot Market: Some Evidence from a Joint Runs Test and Foreigners’ Trading Rule Profits

    Directory of Open Access Journals (Sweden)

    Changmo Ahn

    2010-12-01

    Full Text Available This paper examines whether the USD/KRW spot market is efficient in processing new information by employing both the Runs Test and the foreigners' securities trading rule profitability approach. Excluding the period of 2008 financial crisis, the USD/KRW spot market is efficient in terms of close rates, but not efficient in terms of open rates. The foreigners' securities trading rule can also produce statistically significant profits if the trades are based on open prices, though not high. This implies that traders can predict future exchange rates, to some degree, with the information on foreign net purchases of securities in the Korean stock/ bond markets. If we consider the related interest differentials and transaction costs, however, the profits fade out to marginal level or below. This result implies that traders can expect the existence of predictability in the USD/KRW spot market, but not profitability.

  8. Foreign Trade

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Foreign Trade database has monthly volume and value information for US imports, exports, and re-exports of fishery or fishery derived products. Data is...

  9. Permit trading and credit trading

    DEFF Research Database (Denmark)

    Boom, Jan-Tjeerd; R. Dijstra, Bouwe

    This paper compares emissions trading based on a cap on total emissions (permit trading) and on relative standards per unit of output (credit trading). Two types of market structure are considered: perfect competition and Cournot oligopoly. We find that output, abatement costs and the number...... of firms are higher under credit trading. Allowing trade between permit-trading and credit-trading sectors may increase in welfare. With perfect competition, permit trading always leads to higher welfare than credit trading. With imperfect competition, credit trading may outperform permit trading....... Environmental policy can lead to exit, but also to entry of firms. Entry and exit have a profound impact on the performance of the schemes, especially under imperfect competition. We find that it may be impossible to implement certain levels of total industry emissions. Under credit trading several levels...

  10. Authenticated quantum secret sharing with quantum dialogue based on Bell states

    International Nuclear Information System (INIS)

    Abulkasim, Hussein; Hamad, Safwat; El Bahnasy, Khalid; Rida, Saad Z

    2016-01-01

    This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice’s secret, they must authenticate their identity using parts of a pre-shared key. In addition, the whole pre-shared key is reused as part of recovering the secret data to avoid any leaks of information. In comparison with previous schemes, the proposed method can efficiently detect eavesdropping and it is free from information leaks. Furthermore, the proposed scheme proved to be secure against man-in-the-middle attacks, impersonation attacks, entangled-and-measure attacks, participant attacks, modification attacks and Trojan-horse attacks. (paper)

  11. A FRAMEWORK FOR TRANSPARENCY IN INTERNATIONAL TRADE

    Directory of Open Access Journals (Sweden)

    Bernal Turnes, Paloma

    2015-01-01

    Full Text Available The aim of this paper is to cover the gap in literature about transparency in the context of international trade facilitation. It focuses on the importance of transparency in achieving growth in international trade and the differences between non-transparent practices and corruption in global trade. Managing the disclosure of information about rules, regulations and laws is not the only trade policy instrument where transparency becomes important. To build a framework on levels of transparency we developed a matrix classifying the transparency of each country based on ease of doing business and levels of bribery. Four different strategies are explained based on the different scenarios of transparency in international trade. The main conclusions reflect that disclosure of information is not enough to guarantee transparency and monitoring of transparency must be improved.

  12. Collaborating with the Private Sector

    Science.gov (United States)

    2009-08-01

    circumstances to maintain its secrecy. 110 For information to be considered a trade secret, it must remain a secret. For example, the Coca - Cola recipe... Advertising .‖ Center for Democracy & Technology. 14 Aug. 2009 <http://www.cdt.org/privacy/20080708ISPtraffic.pdf>. 19 18 U.S.C. §§ 2510-2522 20 Hudson...is a trade secret because the recipe has been kept a secret for over 100 years to protect Coca -Cola‘s economic interests. 111

  13. 78 FR 16694 - Chemical Security Assessment Tool (CSAT)

    Science.gov (United States)

    2013-03-18

    ... information provided. Comments that include trade secrets, confidential commercial or financial information... secrets, confidential commercial or financial information, CVI, SSI, or PCII should be appropriately... Department make the instruments (e.g., Top-Screen, Security Vulnerability Assessment [SVA]/ Alternative...

  14. Takeover bids and insider trading

    NARCIS (Netherlands)

    Nelemans, Matthijs; Bainbridge, Stephen M.

    2014-01-01

    This paper analyses the law and economics of insider trading in the context of takeover bids, focusing on the European regulatory framework. We distinguish between trading by the bidder, by the target and by classical insiders and first address the issue of precisely when information about potential

  15. Preparing enterprises in Baden-Wuerttemberg for emission trading: determining their need for information, consulting services and training.; Vorbereitung baden-wuerttembergischer Unternehmen auf den Emissionsrechtehandel: Ermittlung von Informations-, Beratungs- und Schulungsbedarf

    Energy Technology Data Exchange (ETDEWEB)

    Schleich, J.; Betz, R.; Kaeser, S.

    2004-03-19

    In order to achieve the climate-related objectives of the Kyoto Protocol in the most profitable way, the EU Parliament and the Ministers' Council have decided on a regulation which obligates the operators of certain CO2-intensive systems to participate in the emission trading (Published in the Union's official gazette of 25 October 2003: Regulation 2003/87/EG OF THE EUROPEAN PARLIAMENT AND THE COUNCIL dt. 13 October 2003 on a system for the trade with greenhouse emission certificates in the Union and for the amendment of the regulation 96/61/EG of the Council). Starting in 2005, this includes the operators of certain systems like larger power and heat generation plants, refineries and coking plants, production plants of the iron and steel industry, cement, glass and ceramics industries and the cellulose and paper industry. To the German environmental politics, the European system of emission trading means a change in the paradigms, bringing new strategical and organisatory challenges for the enterprises involved. In order to complete lacking information regarding the approaching trading with emission rights, the first thing to do is to identify Baden-Wuerttemberg's enterprises' needs for information, consulting services and training. This should be the basis for the development of a draft concept for the need for information, consulting services and training.

  16. Free trade versus strategic trade as a choice between two 'second best' policies: a symmetric versus asymmetric information analysis

    Czech Academy of Sciences Publication Activity Database

    Ionascu, D.; Žigić, Krešimir

    2005-01-01

    Roč. 19, č. 3 (2005), s. 417-446 ISSN 1016-8737 Institutional research plan: CEZ:AV0Z70850503 Keywords : strategic trade policy * free trade * government´s commitment Subject RIV: AH - Economics http://dx.doi.org/10.1080/10168730500199640

  17. Methodological aspects on international biofuels trade: International streams and trade of solid and liquid biofuels in Finland

    International Nuclear Information System (INIS)

    Heinimoe, J.

    2008-01-01

    The use of biomass for fuel is increasing in industrialised countries. Rapidly developing biomass markets for energy purposes along with weak information on biofuels trade that statistics offer have been incentives for several recently published studies investigating the status of biofuels trade. The comparison of the studies is often challenging due particularly to the various approaches to the indirect trade of biofuels and the diverse data sources utilised. The purpose of this study was to provide an overview of the Finnish situation with respect to the status of the streams of international biofuels trade. Parallel to this, the study aimed to identify methodological and statistical challenges in observing international biofuels trade. The study analysed available statistical information and introduced a procedure to obtain a clear overview on import and export streams of biofuels. In Finland, the total direct import and export of biofuels, being mainly composed of wood pellets and tall oil, is tiny in comparison with the total consumption of biofuels. Instead, the indirect trade has remarkable importance. Large import volumes of industrial raw wood make Finland a net importer of biofuels. In 2004, approximately 22% (64 PJ) of wood-based energy in Finland originated from imported wood. The study showed that the indirect trade of biofuels may be a significant sector of global biofuels trade. In the case of Finland, a comprehensive compilation of statistics on energy and forestry enabled the determination of the trade status satisfactory. However, national and international statistics should be further developed to take better into consideration international trade and to support continuously developing biofuels markets. (author)

  18. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  19. Standpoints and protection of business secrets

    Directory of Open Access Journals (Sweden)

    Brane Bertoncelj

    2001-06-01

    Full Text Available The human impact on an information system where data bases, containing business secretes, are stored is one of the most unreliable and unforeseeable factors. For this reason, it must not be underestimated. The results of this study indicate a correlation between behavioural intention and protection of business secretes. There is a statistically significant correlation between behavioural intention and behavioural supervision. This means that an increased level of perceived supervision over one's own behaviour is related to behavioural intention. A great majority of participants would not divulge a business secret due to internal moral factors, i.e., they possess the appropriate capabilities to determine the advantages of social moral values over personal values.

  20. Optical threshold secret sharing scheme based on basic vector operations and coherence superposition

    Science.gov (United States)

    Deng, Xiaopeng; Wen, Wei; Mi, Xianwu; Long, Xuewen

    2015-04-01

    We propose, to our knowledge for the first time, a simple optical algorithm for secret image sharing with the (2,n) threshold scheme based on basic vector operations and coherence superposition. The secret image to be shared is firstly divided into n shadow images by use of basic vector operations. In the reconstruction stage, the secret image can be retrieved by recording the intensity of the coherence superposition of any two shadow images. Compared with the published encryption techniques which focus narrowly on information encryption, the proposed method can realize information encryption as well as secret sharing, which further ensures the safety and integrality of the secret information and prevents power from being kept centralized and abused. The feasibility and effectiveness of the proposed method are demonstrated by numerical results.

  1. Trading in Target Stocks Before Takeover Announcements: An Analysis of Stock and Option Markets

    OpenAIRE

    Marcus Clements; Harminder Singh; Antonie Van Eekelen

    2007-01-01

    In this study we examine both informed trading and contraire trading preceding takeover announcements on US target firms. Our findings suggest that both informed trading and contraire trading exists within the period preceding takeover announcements on both the stock and option markets as evident through abnormal returns and trading volumes. In regard to contraire trading, this study investigates possible explanations for its existence including liquidity clustering, falsely informed trading ...

  2. Electric trade in the United States 1994

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-08-01

    Wholesale trade in electricity plays an important role for the US electric utility industry. Wholesale, or bulk power, transactions allow electric utilities to reduce power costs, increase power supply options, and improve reliability. In 1994, the wholesale trade market totaled 1.9 trillion kilowatthours, about 66% of total sales to ultimate consumers. This publication, Electric Trade in the United States 1994 (ELECTRA), is the fifth in a series of reports on wholesale power transactions prepared by the Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1994.

  3. Electric trade in the United States 1994

    International Nuclear Information System (INIS)

    1998-08-01

    Wholesale trade in electricity plays an important role for the US electric utility industry. Wholesale, or bulk power, transactions allow electric utilities to reduce power costs, increase power supply options, and improve reliability. In 1994, the wholesale trade market totaled 1.9 trillion kilowatthours, about 66% of total sales to ultimate consumers. This publication, Electric Trade in the United States 1994 (ELECTRA), is the fifth in a series of reports on wholesale power transactions prepared by the Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1994

  4. 75 FR 25206 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-05-07

    ... Products, Services, and Technology Rights): Export Trade Facilitation Services include professional... issued. FOR FURTHER INFORMATION CONTACT: Joseph E. Flynn, Director, Office of Competition and Economic... number) or e- mail at [email protected] . SUPPLEMENTARY INFORMATION: Title III of the Export Trading...

  5. Threshold quantum secret sharing based on single qubit

    Science.gov (United States)

    Lu, Changbin; Miao, Fuyou; Meng, Keju; Yu, Yue

    2018-03-01

    Based on unitary phase shift operation on single qubit in association with Shamir's ( t, n) secret sharing, a ( t, n) threshold quantum secret sharing scheme (or ( t, n)-QSS) is proposed to share both classical information and quantum states. The scheme uses decoy photons to prevent eavesdropping and employs the secret in Shamir's scheme as the private value to guarantee the correctness of secret reconstruction. Analyses show it is resistant to typical intercept-and-resend attack, entangle-and-measure attack and participant attacks such as entanglement swapping attack. Moreover, it is easier to realize in physic and more practical in applications when compared with related ones. By the method in our scheme, new ( t, n)-QSS schemes can be easily constructed using other classical ( t, n) secret sharing.

  6. Preliminary observation of genital secretions, growth rate and ...

    African Journals Online (AJOL)

    Cane rats are large terrestial rodents which have the potential to increase animal protein intake. There is paucity of information on the genital secretions and growth rate of caged cane rats. This study observed the genital secretions, growth rate, feeds, feeding and the behaviour of caged cane rats. When animals adjusted to ...

  7. Extension Resources for International Trade

    Science.gov (United States)

    Seal, Susan D.

    2016-01-01

    With the opening of additional trade partnerships, the reduction of global transportation and communication costs, and the increase in demand for U.S. agricultural products and services, international trade is an area of great importance to more and more Extension clients and stakeholders. This article provides information about the primary…

  8. Legal market abuse regulations of WpHG (law on stock trading) and the REMIT-VO in the electricity spot trading

    International Nuclear Information System (INIS)

    Retsch, Alexander T.

    2014-01-01

    The thesis on legal market abuse regulations of WpHG (law on stock trading) and the REMIT-VO in the electricity spot trading include the discussion of the following issues: market abuse, its forms of appearance (market manipulation, insider trade, insider information), electricity spot trading, relevant legislative frame, market abuse regulations (WpHG), interdiction of market manipulation and related regulations.

  9. Oil trading manual

    International Nuclear Information System (INIS)

    Long, D.

    1995-01-01

    This manual provides basic information on all aspects of oil trading. Topics reviewed in Part 1 include physical characteristics and refining and oil pricing arrangements. Part 2 on instruments and markets contains chapters on crude oil markets, product markets, forward and futures contracts, forward paper markets, oil future exchanges, options, swaps and long term oil markets. Part 3 deals with administration and has chapters on operations and logistics, credit control, accounting, taxation of oil trading, contracts and legal and regulatory issues. (UK)

  10. Secretive eating among youth with overweight or obesity.

    Science.gov (United States)

    Kass, Andrea E; Wilfley, Denise E; Eddy, Kamryn T; Boutelle, Kerri N; Zucker, Nancy; Peterson, Carol B; Le Grange, Daniel; Celio-Doyle, Angela; Goldschmidt, Andrea B

    2017-07-01

    Secretive eating, characterized by eating privately to conceal being seen, may reflect eating- and/or body-related shame, be associated with depression, and correlate with binge eating, which predicts weight gain and eating disorder onset. Increasing understanding of secretive eating in youth may improve weight status and reduce eating disorder risk. This study evaluated the prevalence and correlates of secretive eating in youth with overweight or obesity. Youth (N = 577) presented to five research/clinical institutions. Using a cross-sectional design, secretive eating was evaluated in relation to eating-related and general psychopathology via linear and logistic regression analyses. Secretive eating was endorsed by 111 youth, who were, on average, older than youth who denied secretive eating (mean age = 12.07 ± 2.83 versus 10.97 ± 2.31). Controlling for study site and age, youth who endorsed secretive eating had higher eating-related psychopathology and were more likely to endorse loss of control eating and purging than their counterparts who did not endorse secretive eating. Groups did not differ in excessive exercise or behavioral problems. Dietary restraint and purging were elevated among adolescents (≥13y) but not children (<13y) who endorsed secretive eating; depression was elevated among children, but not adolescents, who endorsed secretive eating. Secretive eating may portend heightened risk for eating disorders, and correlates of secretive eating may differ across pediatric development. Screening for secretive eating may inform identification of problematic eating behaviors, and understanding factors motivating secretive eating may improve intervention tailoring. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. A Trading Agent for a Multi-Issue Clearing House

    Science.gov (United States)

    Debenham, John

    The potential size of the electronic business market offers great incentives to trading agents that can bargain, bid in auctions and trade in exchanges. Much of business negotiation is multi-issue. A generic 'information-based' agent is proposed for multi-issue negotiation. Successful negotiation depends on shrewd strategies driven by the right information. This agent has machinery to value information and to manage its integrity. A multi-issue, many-to-many clearing house, and an agent to trade in it, are proposed.

  12. Security of the AES with a Secret S-Box

    DEFF Research Database (Denmark)

    Tiessen, Tyge; Knudsen, Lars Ramkilde; Kölbl, Stefan

    2015-01-01

    How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of encryption rounds? In this paper, we demonstrate attacks based on integral cryptanalysis which allow to recover both the secret...... key and the secret S-box for respectively four, five, and six rounds of the AES. Despite the significantly larger amount of secret information which an adversary needs to recover, the attacks are very efficient with time/data complexities of 217/216, 238/240 and 290/264, respectively. Another...

  13. Geographies of High Frequency Trading

    DEFF Research Database (Denmark)

    Grindsted, Thomas Skou

    2016-01-01

    This paper investigates the geographies of high frequency trading. Today shares shift hands within micro seconds, giving rise to a form of financial geographies termed algorithmic capitalism. This notion refers to the different spatio-temporalities produced by high frequency trading, under...... the valuation of time. As high frequency trading accelerates financial markets, the paper examines the spatio-temporalities of automated trading by the ways in which the speed of knowledge exploitation in financial markets is not only of interest, but also the expansion between different temporalities....... The paper demonstrates how the intensification of time-space compression produces radical new dynamics in the financial market and develops information rent in HFT as convertible to a time rent and a spatio-temporal rent. The final section discusses whether high frequency trading only responds to crises...

  14. When is public enforcement of insider trading regulations effective?

    NARCIS (Netherlands)

    Wielhouwer, J.L.

    2013-01-01

    In this paper we investigate when public enforcement of insider trading regulations reduces the amount of insider trading. We model a game between a potentially self-interested regulator enforcing insider trading laws and a trader who may be trading on inside information. We show that equilibrium

  15. 76 FR 70491 - Exemptions From Certain Prohibited Transaction Restrictions

    Science.gov (United States)

    2011-11-14

    ...) shall be authorized to examine trade secrets of Applicant, or commercial or financial information which... paragraph (d)(1)(B)- (D) shall be authorized to examine trade secrets of FRC, RTC or their affiliates, or... in the Notice, which is located at the conclusion of Representation 15 near the top of page 34266 of...

  16. BENEFITS AND DRAWBACKS OF ONLINE TRADING VERSUS TRADITIONAL TRADING. EDUCATIONAL FACTORS IN ONLINE TRADING

    Directory of Open Access Journals (Sweden)

    Petric (Iancu Ioana Ancuta

    2015-07-01

    Full Text Available In terms of marketing, online trading is a new distribution channel and trading platforms are products of Investment and Financial Services Companies. Internet shortens the connection between the investor and the products they wish to purchase (shares, futures, CFDs, government securities, bonds, etc., and in some cases it no longer needs a security broker. Increasing use of the Internet and increasing competitiveness between Investment and Financial Services Companies do the latter, to seek new distribution channels to specific products. The purpose of this paper is to examine to what extent the investor education level affects the decision to move from traditional trading to online trading and the benefits and disadvantages of these types of transactions. To whom should the Investment and Financial Services Companies guide their marketing campaign to attract more investors for online platforms? The work presented is part of a larger project that will be part of author thesis, studying other factors that influence the decision to move from traditional to online trading: cost factor, time factor, psychological and social attributes of investors, yield portfolios and technological capacities of Investment and Financial Services Companies. Starting from the idea that with the increase of experience in stock investments the investors will want to make their own decisions, Investment and Financial Services Companies should provide new products. Compared to competitors, an Investment and Financial Services Company must innovate, and information technology currently offers the tools for innovation facilities. At the same time, the existence and development of the Internet has made the transaction without assistance or with minimal human intervention possible (Voss, 2000. The difference is in the knowledge about stock market, the speed the transaction orders arrive in the stock market, direct access to multiple markets, transaction costs and the level

  17. Measuring performance at trade shows

    DEFF Research Database (Denmark)

    Hansen, Kåre

    2004-01-01

    Trade shows is an increasingly important marketing activity to many companies, but current measures of trade show performance do not adequately capture dimensions important to exhibitors. Based on the marketing literature's outcome and behavior-based control system taxonomy, a model is built...... that captures a outcome-based sales dimension and four behavior-based dimensions (i.e. information-gathering, relationship building, image building, and motivation activities). A 16-item instrument is developed for assessing exhibitors perceptions of their trade show performance. The paper presents evidence...

  18. 77 FR 17086 - U.S. Customs and Border Protection 2012 West Coast Trade Symposium: “Transforming Trade for a...

    Science.gov (United States)

    2012-03-23

    ... Protection 2012 West Coast Trade Symposium: ``Transforming Trade for a Stronger Economy'' AGENCY: U.S... been changed to ``Transforming Trade for a Stronger Economy''; and to inform the public that the fees... from 8:30 a.m. until 4 p.m.; and that registration will open to the public on or about March 20, 2012...

  19. Applying secret sharing for HIS backup exchange.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto; Sato, Atsushi

    2013-01-01

    To secure business continuity is indispensable for hospitals to fulfill its social responsibility under disasters. Although to back up the data of the hospital information system (HIS) at multiple remote sites is a key strategy of business continuity plan (BCP), the requirements to treat privacy sensitive data jack up the cost for the backup. The secret sharing is a method to split an original secret message up so that each individual piece is meaningless, but putting sufficient number of pieces together to reveal the original message. The secret sharing method eases us to exchange HIS backups between multiple hospitals. This paper evaluated the feasibility of the commercial secret sharing solution for HIS backup through several simulations. The result shows that the commercial solution is feasible to realize reasonable HIS backup exchange platform when template of contract between participating hospitals is ready.

  20. U.S. International Agricultural Trade Policy: Interests, Institutions and Information in the Corn Supply Chain

    Directory of Open Access Journals (Sweden)

    Laís Forti Thomaz

    2016-04-01

    Full Text Available The purpose of this article is to analyze the U.S. international agricultural trade policy by focusing on instruments and institutional arrangements. Policy decision-making is analyzed by means of three variables: 1 how interests are mobilized; 2 how information is disseminated; and 3 how spaces are occupied in deliberation arenas. The study refers to the corn sector and observes how the National Corn Growers Association operated to ensure subsidies and incentives for this supply chain along the elaboration of the 2002 and 2008 Farm Bills, as well as from other laws pertaining to agricultural and energy incentives. This paper provides evidences in favor of four arguments: first, empirical studies on the formulation and implementation of foreign trade policy, especially when it comes to agricultural issues, would greatly benefit with a greater attention on understanding the role domestic actors play in the decision-making processes; second, interest groups play a key role in this decision-making process; third, they provide the rationale for the formulation and implementation of the U.S. international agricultural trade policy; and, fourth, when the economic sector coordinates complex and relevant supply chains in the U.S. economy, it is hardly possible to revert the U.S. protectionist position in the Legislative branch.

  1. 18 CFR 401.75 - Protection of trade secrets; Confidential information.

    Science.gov (United States)

    2010-04-01

    ..., confidential statistical data, amount or source of any income, profits, losses, or expenditures of any person... States Code which provides: Whoever, being an officer or employee of the United States or of any...

  2. Community Resources for International Trade Education.

    Science.gov (United States)

    Blanco, Virgil H.; Channing, Rose M.

    1985-01-01

    Describes Middlesex Community College's involvement in education and training programs aimed at encouraging local business involvement in international trade and the activities of its National Resource for International Trade Education (e.g., information dissemination; consulting services; seminars and workshops; a speakers bank; research; staff…

  3. Electric trade in the United States 1992

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This publication, Electric Trade in the US 1992 (ELECTRA), is the fourth in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1992. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. Information on the physical transmission system are being included for the first time in this publication. Transmission data covering investor-owned electric utilities were shifted from the Financial Statistics of Selected Investor-Owned Electric Utilities to the ELECTRA publication. Some of the prominent features of this year`s report include information and data not published before on transmission lines for publicly owned utilities and transmission lines added during 1992 by investor-owned electric utilities.

  4. Electric trade in the United States 1992

    International Nuclear Information System (INIS)

    1994-09-01

    This publication, Electric Trade in the US 1992 (ELECTRA), is the fourth in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1992. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. Information on the physical transmission system are being included for the first time in this publication. Transmission data covering investor-owned electric utilities were shifted from the Financial Statistics of Selected Investor-Owned Electric Utilities to the ELECTRA publication. Some of the prominent features of this year's report include information and data not published before on transmission lines for publicly owned utilities and transmission lines added during 1992 by investor-owned electric utilities

  5. International bioenergy trade in the Netherlands

    OpenAIRE

    Junginger, H.M.; de Wit, M.P.; Sikkema, R.; Faaij, A.P.C.

    2008-01-01

    The international biomass trade in the Netherlands has been growing strongly over the last few years, but information on the corresponding volumes, origins and prices is barely available. The objectives of this paper are to quantify imported and exported biomass volumes and origins, and identify drivers and barriers behind the trade flows. Data collection was based on existing statistics and information obtained from biomass traders and end-users. Net import of biomass for energy purposes has...

  6. 37 CFR 10.57 - Preservation of confidences and secrets of a client.

    Science.gov (United States)

    2010-07-01

    ... and secrets of a client. 10.57 Section 10.57 Patents, Trademarks, and Copyrights UNITED STATES PATENT... confidences and secrets of a client. (a) “Confidence” refers to information protected by the attorney-client or agent-client privilege under applicable law. “Secret” refers to other information gained in the...

  7. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  8. The semantics of secrecy: young children's classification of secret content.

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J

    2010-01-01

    The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.

  9. Temporal trade-offs in psychophysics.

    Science.gov (United States)

    Barack, David L; Gold, Joshua I

    2016-04-01

    Psychophysical techniques typically assume straightforward relationships between manipulations of real-world events, their effects on the brain, and behavioral reports of those effects. However, these relationships can be influenced by many complex, strategic factors that contribute to task performance. Here we discuss several of these factors that share two key features. First, they involve subjects making flexible use of time to process information. Second, this flexibility can reflect the rational regulation of information-processing trade-offs that can play prominent roles in particular temporal epochs: sensitivity to stability versus change for past information, speed versus accuracy for current information, and exploitation versus exploration for future goals. Understanding how subjects manage these trade-offs can be used to help design and interpret psychophysical studies. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Streamlining digital signal processing a tricks of the trade guidebook

    CERN Document Server

    2012-01-01

    Streamlining Digital Signal Processing, Second Edition, presents recent advances in DSP that simplify or increase the computational speed of common signal processing operations and provides practical, real-world tips and tricks not covered in conventional DSP textbooks. It offers new implementations of digital filter design, spectrum analysis, signal generation, high-speed function approximation, and various other DSP functions. It provides:Great tips, tricks of the trade, secrets, practical shortcuts, and clever engineering solutions from seasoned signal processing professionalsAn assortment.

  11. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  12. Price volatility, trading volume, and market depth in Asian commodity futures exchanges

    Directory of Open Access Journals (Sweden)

    Tanachote Boonvorachote

    2016-01-01

    Full Text Available This paper empirically investigates the impact of trading activity including trading volume and open interest on price volatility in Asian futures exchanges. Trading volume and open interest represent market information for investors. This study uses three different definitions of volatility: (1 daily volatility measured by close-to-close returns, (2 non-trading volatility measured by close-to-open returns, and (3 trading volatility measured by open-to-close returns. The impact of trading volume and open interest on price volatility is investigated. Following Bessembinder and Seguin (1993, volume and open interest are divided into expected and unexpected components. The GARCH (1,1 model is employed using expected and unexpected components of trading activity (volume and open interest as explanatory variables. The results show a positive contemporaneous relationship between expected and unexpected trading volume and volatility, while open interest mitigates volatility. Policy makers can use these findings to suggest to investors that trading activity (volume and open interest is a proxy of market information flowing to exchanges, especially unexpected trading activity. New information flowing to exchanges can mostly be noticed in unexpected trading volumes and open interests.

  13. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2015-01-01

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  14. The Diversity-Multiplexing Tradeoff of Secret-Key Agreement over Multiple-Antenna Channels

    KAUST Repository

    Zorgui, Marwen

    2015-10-26

    We study the problem of secret-key agreement between two legitimate parties, Alice and Bob, in presence an of eavesdropper Eve. There is a public channel with unlimited capacity that is available to the legitimate parties and is also observed by Eve. Our focus is on Rayleigh fading quasi-static channels. The legitimate receiver and the eavesdropper are assumed to have perfect channel knowledge of their channels. We study the system in the high-power regime. First, we define the secret-key diversity gain and the secret-key multiplexing gain. Second, we establish the secret-key diversity multiplexing tradeoff (DMT) under no channel state information (CSI) at the transmitter (CSI-T). The eavesdropper is shown to “steal” only transmit antennas. We show that, likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information at the transmitter. This insensitivity of secret-key DMT toward CSI-T features a fundamental difference between secret-key agreement and the wiretap channel, in which secret DMT depends heavily on CSI-T. Finally, we present several secret-key DMT-achieving schemes in case of full CSI-T. We argue that secret DMT-achieving schemes are also key DMT-achieving. Moreover, we show formally that artificial noise (AN), likewise zero-forcing (ZF), is DMT-achieving. We also show that the public feedback channel improves the outage performance without having any effect on the DMT.

  15. Czech experience with market maker trading system

    Czech Academy of Sciences Publication Activity Database

    Hanousek, Jan; Podpiera, R.

    2004-01-01

    Roč. 28, č. 2 (2004), s. 177-191 ISSN 0939-3625 R&D Projects: GA MŠk ME 595 Institutional research plan: CEZ:AV0Z7085904 Keywords : trading systems * informed trading * emerging markets Subject RIV: AH - Economics

  16. Electric trade in the United States 1990

    International Nuclear Information System (INIS)

    1992-01-01

    Electric Trade in the United States 1990 (ELECTRA) is the third in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data. The second report contained data for 1988. This report provides information on the industry during 1990

  17. EnviroTRADE: A technical perspective on the development of an information system providing data on environmental technologies and needs worldwide

    International Nuclear Information System (INIS)

    Harrington, M.W.; Harlan, C.P.

    1992-01-01

    In support of the US Department of Energy's commitment to the remediation of waste sites throughout its complex, the DOE has recognized that it can accelerate its technology development efforts and leverage the expenditure of available funds through an international cooperation among government entities, private industry, and educational institutions. To support the technology transfer of environmental information, the DOE has sponsored the development of EnviroTRADE - an international information system that will facilitate the exchange of environmental restoration and waste management technologies worldwide. The system will contain profiles on both environmental restoration / waste management needs and foreign / domestic technologies. Users will be able to identify matches between worldwide needs and available or emerging technologies. Where matches between needs and existing technologies are not found, the system will identify the potential for development of new and innovative technologies to address environmental problems. EnviroTRADE will also provide general information on international environmental restoration and waste management organizations, sites, activities, and contacts

  18. Extending freight flow modelling to sub-Saharan Africa to inform infrastructure investments - trade data issues

    Directory of Open Access Journals (Sweden)

    Jan Havenga

    2012-11-01

    Full Text Available This paper highlights the first attempt by researchers at Stellenbosch University to model freight flows between and for 17 countries in sub-Saharan Africa (SSA. The model will be informed by and linked to the South African surface Freight Demand Model (FDM given these dimensions. By analysing and collating available datasets and developing a freight flow model, a better understanding of freight movements between countries can be obtained and then used for long-term planning efforts. A simple methodology is envisaged that will entail a high-level corridor classification that links a major district in the country with a similar district in another country. Existing trade data will be used to corroborate new base-year economic demand and supply volumetric data that will be generated from social accounting matrices for each country. The trade data will also provide initial flow dynamics between countries that will be refined according to the new volumes. The model can then generate commodity-level corridor flows between SSA countries, and between SSA countries and the rest of the world, as well as intra-country rural and metropolitan flows, using a gravity-based modelling approach. This article outlines efforts to harmonise trade data between the 17 countries identified, as well as between these countries and the rest of the world as a first step towards developing a freight demand model for sub-Saharan Africa.

  19. Gendered Nature Of Informal Crossborder Trade In Zimbabwe ...

    African Journals Online (AJOL)

    While earlier migration studies focused on male migrants and tended to characterise migration as a male gender issue, cross-border trade presents a completely different picture, as women tend to dominate in this area. Women are a significant but a footloose group in search of markets and livelihoods not just for survival ...

  20. Novel Threshold Changeable Secret Sharing Schemes Based on Polynomial Interpolation.

    Science.gov (United States)

    Yuan, Lifeng; Li, Mingchu; Guo, Cheng; Choo, Kim-Kwang Raymond; Ren, Yizhi

    2016-01-01

    After any distribution of secret sharing shadows in a threshold changeable secret sharing scheme, the threshold may need to be adjusted to deal with changes in the security policy and adversary structure. For example, when employees leave the organization, it is not realistic to expect departing employees to ensure the security of their secret shadows. Therefore, in 2012, Zhang et al. proposed (t → t', n) and ({t1, t2,⋯, tN}, n) threshold changeable secret sharing schemes. However, their schemes suffer from a number of limitations such as strict limit on the threshold values, large storage space requirement for secret shadows, and significant computation for constructing and recovering polynomials. To address these limitations, we propose two improved dealer-free threshold changeable secret sharing schemes. In our schemes, we construct polynomials to update secret shadows, and use two-variable one-way function to resist collusion attacks and secure the information stored by the combiner. We then demonstrate our schemes can adjust the threshold safely.

  1. Cryptanalysis of quantum secret sharing based on GHZ states

    International Nuclear Information System (INIS)

    Liu Xiaofen; Pan Rijing

    2011-01-01

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  2. Demand-side management project for Tenaga Nasional Berhad. Progress report No. 4. Export trade information

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    This study, conducted by the California Energy Commission, was funded by the U.S. Trade and Development Agency. Progress Report No. 4 is divided into the following contents: April 6, 1994 Training Mission Delegation Itinerary; April 6, 1994 Training Mission Workshop Information Package; Letter to Chairman of Tenaga Nasional Berhad Requesting Demonstration Project Funding; Design/Build Construction Bid Proposal for Energy Efficient Electric Technology Demontration Project; Final Draft of Demand-Side Management Plan for Tenaga Nasional Berhad; Attachments.

  3. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen

    2014-09-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to \\'steal\\' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  4. On the diversity-multiplexing tradeoff of secret-key agreement over multiple-antenna channels

    KAUST Repository

    Zorgui, Marwen; Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to 'steal' only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.

  5. 78 FR 44961 - Agency Information Collection Activities; Customs-Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2013-07-25

    ... Activities; Customs-Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border Protection... accordance with the Paperwork Reduction Act: Customs-Trade Partnership Against Terrorism (C-TPAT). This is a...: Customs-Trade Partnership Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract...

  6. 75 FR 78726 - Agency Information Collection Activities: North American Free Trade Agreement Duty Deferral

    Science.gov (United States)

    2010-12-16

    ... Activities: North American Free Trade Agreement Duty Deferral AGENCY: U.S. Customs and Border Protection (CBP... collection requirement concerning the North American Free Trade Agreement (NAFTA) Duty Deferral. This request...: 1651-0071. Abstract: The provisions of North American Free Trade Agreement (NAFTA) were adopted by the...

  7. The student and the ovum: The lack of autonomy and informed consent in trading genes for tuition

    Directory of Open Access Journals (Sweden)

    Papadimos Alexa T

    2004-07-01

    Full Text Available Abstract Rising tuition costs have forced university students to become creative in finding ways to fund their education. Some female university students have decided that ova donation may be an acceptable alternative in which to pay for their tuition. This alternative presents itself because of the insufficient number of ova available for assisted reproduction and emerging stem cell technologies. Young female university students are encouraged by Internet sources and respectable electronic and print media to donate their ova in the cause of assisted reproduction for monetary compensation. While university students generally exhibit autonomy, the constraining influence of their financial predicament compromises the elements of informed consent (voluntariness, competence, capacity, understanding, and disclosure as to their making an autonomous decision in regard to egg donation. Thus, any moral possibility of giving informed consent is negated. Informed consent can only occur through autonomy. A female university student in need of financial resources to pay for her education cannot make an autonomous choice to trade her genes for tuition. Donated ova are not only needed for assisted reproduction, but for stem cell technologies. While the long-term health of women who donate their ova is of concern (a potential risk of cancer after long term use of ovulation induction, of equal concern is the possibility of a growth in the trade of ova targeting third world and Eastern European women where the precedence for autonomy and informed consent is not well established.

  8. 78 FR 23280 - Agency Information Collection Activities: United States-Caribbean Basin Trade Partnership Act...

    Science.gov (United States)

    2013-04-18

    ..., Attn: Tracey Denning, Regulations and Rulings, Office of International Trade, 90 K Street NE., 10th... and Rulings, Office of International Trade, 90 K Street NE., 10th Floor, Washington, DC 20229-1177, at... trade benefits to countries in the Caribbean Basin. For preferential duty treatment under CBTPA...

  9. A roaring trade? The legal trade in Panthera leo bones from Africa to East-Southeast Asia.

    Science.gov (United States)

    Williams, Vivienne L; Loveridge, Andrew J; Newton, David J; Macdonald, David W

    2017-01-01

    The African lion is the only big cat listed on CITES Appendix II, and the only one for which international commercial trade is legal under CITES. The trade in lion body parts, and especially the contentious trade in bones from South Africa to Asia, has raised concerns spanning continents and cultures. Debates were amplified at the 2016 CITES Conference of the Parties (CoP17) when a proposal to up-list lions to Appendix I was not supported and a compromise to keep them on Appendix II, with a bone trade quota for South Africa, was reached instead. CoP17 underscored a need for further information on the lion bone trade and the consequences for lions across the continent. Legal international trade in bones to Asia, allegedly to supply the substitute 'tiger bone' market, began in South Africa in February 2008 when the first CITES permits were issued. It was initially unclear the degree to which bones were sourced from captive-origin lions, and whether trade was a threat to wild lion populations. Our original assessment of the legal CITES-permitted lion bone trade from South Africa to East-Southeast Asia was for the period 2008-2011 (published 2015). In this paper, we consolidate new information that has become available for 2012-2016, including CITES reports from other African countries, and data on actual exports for three years to 2016 supplied by a freight forwarding company. Thus, we update the figures on the legal trade in lion bones from Africa to East-Southeast Asia in the period 2008-2016. We also contextualise the basis for global concerns by reviewing the history of the trade and its relation to tigers, poaching and wildlife trafficking. CITES permits issued to export bones escalated from ±314y-1 skeletons from 2008-2011, to ±1312y-1 skeletons from 2013-2015. South Africa was the only legal exporter of bones to Asia until 2013 when Namibia issued permits to export skeletons to Vietnam. While CITES permits to export ±5363 skeletons from Africa to Asia from

  10. A roaring trade? The legal trade in Panthera leo bones from Africa to East-Southeast Asia.

    Directory of Open Access Journals (Sweden)

    Vivienne L Williams

    Full Text Available The African lion is the only big cat listed on CITES Appendix II, and the only one for which international commercial trade is legal under CITES. The trade in lion body parts, and especially the contentious trade in bones from South Africa to Asia, has raised concerns spanning continents and cultures. Debates were amplified at the 2016 CITES Conference of the Parties (CoP17 when a proposal to up-list lions to Appendix I was not supported and a compromise to keep them on Appendix II, with a bone trade quota for South Africa, was reached instead. CoP17 underscored a need for further information on the lion bone trade and the consequences for lions across the continent. Legal international trade in bones to Asia, allegedly to supply the substitute 'tiger bone' market, began in South Africa in February 2008 when the first CITES permits were issued. It was initially unclear the degree to which bones were sourced from captive-origin lions, and whether trade was a threat to wild lion populations. Our original assessment of the legal CITES-permitted lion bone trade from South Africa to East-Southeast Asia was for the period 2008-2011 (published 2015. In this paper, we consolidate new information that has become available for 2012-2016, including CITES reports from other African countries, and data on actual exports for three years to 2016 supplied by a freight forwarding company. Thus, we update the figures on the legal trade in lion bones from Africa to East-Southeast Asia in the period 2008-2016. We also contextualise the basis for global concerns by reviewing the history of the trade and its relation to tigers, poaching and wildlife trafficking. CITES permits issued to export bones escalated from ±314y-1 skeletons from 2008-2011, to ±1312y-1 skeletons from 2013-2015. South Africa was the only legal exporter of bones to Asia until 2013 when Namibia issued permits to export skeletons to Vietnam. While CITES permits to export ±5363 skeletons from

  11. A roaring trade? The legal trade in Panthera leo bones from Africa to East-Southeast Asia

    Science.gov (United States)

    Loveridge, Andrew J.; Newton, David J.; Macdonald, David W.

    2017-01-01

    The African lion is the only big cat listed on CITES Appendix II, and the only one for which international commercial trade is legal under CITES. The trade in lion body parts, and especially the contentious trade in bones from South Africa to Asia, has raised concerns spanning continents and cultures. Debates were amplified at the 2016 CITES Conference of the Parties (CoP17) when a proposal to up-list lions to Appendix I was not supported and a compromise to keep them on Appendix II, with a bone trade quota for South Africa, was reached instead. CoP17 underscored a need for further information on the lion bone trade and the consequences for lions across the continent. Legal international trade in bones to Asia, allegedly to supply the substitute ‘tiger bone’ market, began in South Africa in February 2008 when the first CITES permits were issued. It was initially unclear the degree to which bones were sourced from captive-origin lions, and whether trade was a threat to wild lion populations. Our original assessment of the legal CITES-permitted lion bone trade from South Africa to East-Southeast Asia was for the period 2008–2011 (published 2015). In this paper, we consolidate new information that has become available for 2012–2016, including CITES reports from other African countries, and data on actual exports for three years to 2016 supplied by a freight forwarding company. Thus, we update the figures on the legal trade in lion bones from Africa to East-Southeast Asia in the period 2008–2016. We also contextualise the basis for global concerns by reviewing the history of the trade and its relation to tigers, poaching and wildlife trafficking. CITES permits issued to export bones escalated from ±314y-1 skeletons from 2008–2011, to ±1312y-1 skeletons from 2013–2015. South Africa was the only legal exporter of bones to Asia until 2013 when Namibia issued permits to export skeletons to Vietnam. While CITES permits to export ±5363 skeletons from Africa

  12. In silico dissection of Type VII Secretion System components across

    Indian Academy of Sciences (India)

    Type VII Secretion System (T7SS) is one of the factors involved in virulence of Mycobacteriun tuberculosis H37Rv. Numerous research efforts have been made in the last decade towards characterizing the components of this secretion system. An extensive genome-wide analysis through compilation of isolated information ...

  13. Investment in secreted enzymes during nutrient-limited growth is utility dependent.

    Science.gov (United States)

    Cezairliyan, Brent; Ausubel, Frederick M

    2017-09-12

    Pathogenic bacteria secrete toxins and degradative enzymes that facilitate their growth by liberating nutrients from the environment. To understand bacterial growth under nutrient-limited conditions, we studied resource allocation between cellular and secreted components by the pathogenic bacterium Pseudomonas aeruginosa during growth on a protein substrate that requires extracellular digestion by secreted proteases. We identified a quantitative relationship between the rate of increase of cellular biomass under nutrient-limiting growth conditions and the rate of increase in investment in secreted proteases. Production of secreted proteases is stimulated by secreted signals that convey information about the utility of secreted proteins during nutrient-limited growth. Growth modeling using this relationship recapitulated the observed kinetics of bacterial growth on a protein substrate. The proposed regulatory strategy suggests a rationale for quorum-sensing-dependent stimulation of the production of secreted enzymes whereby investment in secreted enzymes occurs in proportion to the utility they confer. Our model provides a framework that can be applied toward understanding bacterial growth in many environments where growth rate is limited by the availability of nutrients.

  14. Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice

    Science.gov (United States)

    2015-01-01

    third party a fee or royalty for the use of technical data pertaining to an item or process devel- oped exclusively at private expense by the...trade secrets, including injunctive relief through the courts, monetary damages, and the potential award of attorney’s fees . Beyond the Trade

  15. 76 FR 15294 - Export Trade Certificate of Review

    Science.gov (United States)

    2011-03-21

    ... information on trade opportunities; marketing; negotiations; joint ventures; shipping; export management; export licensing; advertising; documentation and services related to compliance with customs requirements; insurance and financing; trade show exhibitions; organizational development; management and labor strategies...

  16. 75 FR 44760 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-07-29

    ... information on trade opportunities; marketing; negotiations; joint ventures; shipping; export management; export licensing; advertising; documentation and services related to compliance with customs requirements; insurance and financing; trade show exhibitions; organizational development; management and labor strategies...

  17. Fundamental rate-loss trade-off for the quantum internet.

    Science.gov (United States)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  18. 76 FR 53882 - Proposed Information Collection; Comment Request; Trade Fair Certification Program Application

    Science.gov (United States)

    2011-08-30

    ... companies by introducing them to key international trade fairs where they can achieve their export... trade fair, and to ensure that the fair is a good marketing opportunity for U.S. companies. II. Method...

  19. Cryptanalysis of quantum secret sharing based on GHZ states

    Energy Technology Data Exchange (ETDEWEB)

    Liu Xiaofen; Pan Rijing, E-mail: liuxiaofen23@fjnu.edu.cn [School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007 (China)

    2011-10-15

    In a recent paper (Hwang et al 2011 Phys. Scr. 83 045004), a subtle quantum secret sharing (QSS) protocol was proposed. One major advantage of this protocol is its high efficiency; that is, it is more efficient than other QSS protocols using the Greenberger-Horne-Zeilinger states. However, we analyzed the security of this protocol and found that it is insecure for one agent who may deduce half of the information about the deal's secret directly just by his/her piece of secret. Finally, a feasible improvement of this QSS protocol is put forward.

  20. Transparency and secrets in the nuclear sector: report and recommendations

    International Nuclear Information System (INIS)

    2011-01-01

    Based on several meetings, hearings of many actors involved in matters of transparency and secrets concerning the nuclear activity, and visits of ships carrying nuclear materials, this report aims at examining and analysing means to reconcile the transparency of nuclear information intended for the public with the confidentiality essential to transport security or nuclear activities. The authors also aim at a better understanding of these both notions of transparency and secret with respect to a legal and regulatory framework. In the following part of this report, the authors analyse recommendations which have been made in the past, and their consequences. They discuss possible appeal ways in front of a refusal to issue nuclear information because it is classified as secret. Remaining difficulties are identified as well as ways to overcome them

  1. User Interface Composition with COTS-UI and Trading Approaches: Application for Web-Based Environmental Information Systems

    Science.gov (United States)

    Criado, Javier; Padilla, Nicolás; Iribarne, Luis; Asensio, Jose-Andrés

    Due to the globalization of the information and knowledge society on the Internet, modern Web-based Information Systems (WIS) must be flexible and prepared to be easily accessible and manageable in real-time. In recent times it has received a special interest the globalization of information through a common vocabulary (i.e., ontologies), and the standardized way in which information is retrieved on the Web (i.e., powerful search engines, and intelligent software agents). These same principles of globalization and standardization should also be valid for the user interfaces of the WIS, but they are built on traditional development paradigms. In this paper we present an approach to reduce the gap of globalization/standardization in the generation of WIS user interfaces by using a real-time "bottom-up" composition perspective with COTS-interface components (type interface widgets) and trading services.

  2. Overexpressing key component genes of the secretion pathway for enhanced secretion of an Aspergillus niger glucose oxidase in Trichoderma reesei.

    Science.gov (United States)

    Wu, Yilan; Sun, Xianhua; Xue, Xianli; Luo, Huiying; Yao, Bin; Xie, Xiangming; Su, Xiaoyun

    2017-11-01

    Vast interest exists in developing T. reesei for production of heterologous proteins. Although rich genomic and transcriptomic information has been uncovered for the T. reesei secretion pathway, little is known about whether engineering its key components could enhance expression of a heterologous gene. In this study, snc1, a v-SNARE gene, was first selected for overexpression in T. reesei. In engineered T. reesei with additional copies of snc1, the Aspergillus niger glucose oxidase (AnGOD) was produced to a significantly higher level (2.2-fold of the parental strain). hac1 and bip1, two more component genes in the secretion pathway, were further tested for overexpression and found to be also beneficial for AnGOD secretion. The overexpression of one component gene more or less affected the expression of the other two genes, suggesting a complex regulating mechanism. Our study demonstrates the potential of engineering the secretion pathway for enhancing heterologous gene production in T. reesei. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Threshold secret sharing scheme based on phase-shifting interferometry.

    Science.gov (United States)

    Deng, Xiaopeng; Shi, Zhengang; Wen, Wei

    2016-11-01

    We propose a new method for secret image sharing with the (3,N) threshold scheme based on phase-shifting interferometry. The secret image, which is multiplied with an encryption key in advance, is first encrypted by using Fourier transformation. Then, the encoded image is shared into N shadow images based on the recording principle of phase-shifting interferometry. Based on the reconstruction principle of phase-shifting interferometry, any three or more shadow images can retrieve the secret image, while any two or fewer shadow images cannot obtain any information of the secret image. Thus, a (3,N) threshold secret sharing scheme can be implemented. Compared with our previously reported method, the algorithm of this paper is suited for not only a binary image but also a gray-scale image. Moreover, the proposed algorithm can obtain a larger threshold value t. Simulation results are presented to demonstrate the feasibility of the proposed method.

  4. 75 FR 31423 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-06-03

    ... Analysis (``OCEA'') of the International Trade Administration, Department of Commerce, has received an... FURTHER INFORMATION CONTACT: Joseph Flynn, Director, Office of Competition and Economic Analysis... Analysis, International Trade Administration, U.S. Department of Commerce, Room 7021-X, Washington, DC...

  5. Research on Standardization of Zhejiang Plastics City Online Trade Market

    Institute of Scientific and Technical Information of China (English)

    Cen Guanjun

    2006-01-01

    @@ Since the establishment of the online trading market for Zhejiang Plastics City in Yuyao, by using leading information technology we consolidate the business, logistics, information, and capital with purchasing, transportation,warehousing, forwarding, and distribution into an integrated online trading system in terms of standardization of each process.

  6. Legal insider trading and stock market liquidity

    NARCIS (Netherlands)

    Degryse, Hans; de Jong, Frank; Lefebvre, J.J.G.

    This paper assesses the impact of legal trades by corporate insiders on the liquidity of the firm’s stock. For this purpose, we analyze two liquidity measures and one information asymmetry measure. The analysis allows us to study as well the effect of a change in insider trading regulation, namely

  7. 75 FR 63437 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-10-15

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... Service and reviewed by the TAA for Farmers Program Review Committee, comprised of representatives from... assistance in FY 2011. FOR FURTHER INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Program Staff...

  8. Secrets of Science. Videos 1-13. [Videotape.

    Science.gov (United States)

    Walt Disney Publishing Group, Burbank, CA. Discover Magazine.

    Discoveries in science and technology are being made at such a rapid pace that it is often difficult for many teachers to stay abreast of new and relevant information. To assist teachers in keeping their students well informed of new discoveries in science, Discover Magazine developed a 13-part video series entitled "Secrets of Science." In each…

  9. LcrG secretion is not required for blocking of Yops secretion in Yersinia pestis

    Directory of Open Access Journals (Sweden)

    Matson Jyl S

    2008-02-01

    Full Text Available Abstract Background LcrG, a negative regulator of the Yersinia type III secretion apparatus has been shown to be primarily a cytoplasmic protein, but is secreted at least in Y. pestis. LcrG secretion has not been functionally analyzed and the relevance of LcrG secretion on LcrG function is unknown. Results An LcrG-GAL4AD chimera, originally constructed for two-hybrid analyses to analyze LcrG protein interactions, appeared to be not secreted but the LcrG-GAL4AD chimera retained the ability to regulate Yops secretion. This result led to further investigation to determine the significance of LcrG secretion on LcrG function. Additional analyses including deletion and substitution mutations of amino acids 2–6 in the N-terminus of LcrG were constructed to analyze LcrG secretion and LcrG's ability to control secretion. Some changes to the N-terminus of LcrG were found to not affect LcrG's secretion or LcrG's secretion-controlling activity. However, substitution of poly-isoleucine in the N-terminus of LcrG did eliminate LcrG secretion but did not affect LcrG's secretion controlling activity. Conclusion These results indicate that secretion of LcrG, while observable and T3SS mediated, is not relevant for LcrG's ability to control secretion.

  10. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  11. Department of Trade annual report 1983-84. [Australia

    Energy Technology Data Exchange (ETDEWEB)

    1984-01-01

    The Department of Trade was created on 11 March 1983. It is responsible for the administration of the Government's policies as they relate to international trade, the promotion of Australia's exports and the Australian Trade Commissioner Service. The Department's activities for the financial year 1983/84 are documented in this report. Areas documented are corporate strategy, execution of corporate strategy, management, information services, finance and staffing, Acts administered by the Minister, functions and membership of councils and committees, international trade meetings attended by departmental representatives, departmental publications, and national export award winners.

  12. Cryptanalysis of Multiparty Quantum Secret Sharing of Quantum State Using Entangled States

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Fu-Chen, Zhu

    2008-01-01

    Security of a quantum secret sharing of quantum state protocol proposed by Guo et al. [Chin. Phys. Lett. 25 (2008) 16] is reexamined. It is shown that an eavesdropper can obtain some of the transmitted secret information by monitoring the classical channel or the entire secret by intercepting the quantum states, and moreover, the eavesdropper can even maliciously replace the secret message with an arbitrary message without being detected. Finally, the deep reasons why an eavesdropper can attack this protocol are discussed and the modified protocol is presented to amend the security loopholes

  13. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  14. Derivatives Trading and Negative Voting

    OpenAIRE

    Spamann, Holger

    2012-01-01

    This paper exposits a model of parallel trading of corporate securities (shares, bonds) and derivatives in which a large trader can sometimes profitably acquire securities with their corporate control rights for the sole purpose of reducing the corporations value and gaining on a net short position created through off-setting derivatives. At other times, the large trader profitably takes a net long position. The large trader requires no private information beyond its own trades. The problem i...

  15. DOE contractor trade network: a decade of experience in training resource exchange

    International Nuclear Information System (INIS)

    Croll, P.; Weseman, M.

    1989-01-01

    Training Resources and Data Exchange (TRADE) refers to a series of activities designed to increase communication and exchanges of ideas, information, and resources among US Department of Energy contractor operated facilities in the field of training and human resource development. TRADE activities are planned and implemented by the DOE Contractor TRADE Executive Committee. TRADE objectives are accomplished through conference workshops, publications, and special interest groups. TRADE special interest groups include the following: computer-based training, emergency preparedness, industrial hygiene training, human resource issues, radiation protection training, safeguards and security training. The authors discuss how TRADE has evolved to meet changing contractor needs to improve human performance over the last 10 years. TRADE currently has working agreements to share training information with INPO, the Federal Laboratories Consortium, and the National Registry of Radiation Protection Technologists

  16. 77 FR 35355 - User Fee Schedule for Trade Promotion Services

    Science.gov (United States)

    2012-06-13

    ...-XA17 User Fee Schedule for Trade Promotion Services AGENCY: U.S. & Foreign Commercial Service... promotion services under the current fee structure. ITA provides a wide range of trade promotion information... these more intensive trade promotion services. The fee revenue is expected to continue to contribute to...

  17. 78 FR 68838 - Application for Final Commitment for a Long-Term Loan or Financial Guarantee in Excess of $100...

    Science.gov (United States)

    2013-11-15

    ... proprietary business information; information which, if disclosed, would violate the Trade Secrets Act; or information which would jeopardize jobs in the United States by supplying information that competitors could...

  18. Minimum quality standards and international trade

    DEFF Research Database (Denmark)

    Baltzer, Kenneth Thomas

    2011-01-01

    This paper investigates the impact of a non-discriminating minimum quality standard (MQS) on trade and welfare when the market is characterized by imperfect competition and asymmetric information. A simple partial equilibrium model of an international Cournot duopoly is presented in which a domes...... prefer different levels of regulation. As a result, international trade disputes are likely to arise even when regulation is non-discriminating....

  19. Salmonella-secreted Virulence Factors

    Energy Technology Data Exchange (ETDEWEB)

    Heffron, Fred; Niemann, George; Yoon, Hyunjin; Kidwai, Afshan S.; Brown, Roslyn N.; McDermott, Jason E.; Smith, Richard D.; Adkins, Joshua N.

    2011-05-01

    In this short review we discuss secreted virulence factors of Salmonella, which directly affect Salmonella interaction with its host. Salmonella secretes protein to subvert host defenses but also, as discussed, to reduce virulence thereby permitting the bacteria to persist longer and more successfully disperse. The type III secretion system (TTSS) is the best known and well studied of the mechanisms that enable secretion from the bacterial cytoplasm to the host cell cytoplasm. Other secretion systems include outer membrane vesicles, which are present in all Gram-negative bacteria examined to date, two-partner secretion, and type VI secretion will also be addressed. Excellent reviews of Salmonella secreted effectors have focused on themes such as actin rearrangements, vesicular trafficking, ubiquitination, and the activities of the virulence factors themselves. This short review is based on S. Typhimurium infection of mice because it is a model of typhoid like disease in humans. We have organized effectors in terms of events that happen during the infection cycle and how secreted effectors may be involved.

  20. Emission trading in Europe with an exchange rate

    International Nuclear Information System (INIS)

    Klassen, G.A.J.; Amann, M.; Foersund, F.R.

    1994-01-01

    The analytical and empirical properties of a new method for emission trading according to a fixed exchange rate are explored. The exchange rate is based on the ratios of the marginal costs of abatement in the optimal solution in order to account for the impact of the location of emission sources on the deposition. It is shown that, generally, this system will not achieve the optimal solution and does not guarantee that environmental deposition constraints are not violated, although total abatement costs are always reduced. A routine was developed to mimic trading as a bilateral, sequential process, subject to an exchange rate. Use has been made of an adapted version of the optimization module in the RAINS (REgional Acidification INformation and Simulation) model. In the example used, results for SO 2 emissions in Europe show that, starting from a uniform reduction, exchange-rate trading achieves higher cost savings than one-to-one trading, without achieving the cost minimum. Sulfur deposition targets are not violated since the initial emission allocation overfulfilled targets at many places. The results are sensitive to: pre-trade emission levels, the transaction costs, the availability of information on potential cost savings and assumptions made on the behavior of trading partners. 6 figs., 3 tabs., 28 refs

  1. Trading volume and the number of trades

    OpenAIRE

    Marwan Izzeldin

    2007-01-01

    Trading volume and the number of trades are both used as proxies for market activity, with disagreement as to which is the better proxy for market activity. This paper investigates this issue using high frequency data for Cisco and Intel in 1997. A number of econometric methods are used, including GARCH augmented with lagged trading volume and number of trades, tests based on moment restrictions, regression analysis of volatility on volume and trades, normality of returns when standardized by...

  2. Multiparty Quantum Direct Secret Sharing of Classical Information with Bell States and Bell Measurements

    Science.gov (United States)

    Song, Yun; Li, Yongming; Wang, Wenhua

    2018-02-01

    This paper proposed a new and efficient multiparty quantum direct secret sharing (QDSS) by using swapping quantum entanglement of Bell states. In the proposed scheme, the quantum correlation between the possible measurement results of the members (except dealer) and the original local unitary operation encoded by the dealer was presented. All agents only need to perform Bell measurements to share dealer's secret by recovering dealer's operation without performing any unitary operation. Our scheme has several advantages. The dealer is not required to retain any photons, and can further share a predetermined key instead of a random key to the agents. It has high capacity as two bits of secret messages can be transmitted by an EPR pair and the intrinsic efficiency approaches 100%, because no classical bit needs to be transmitted except those for detection. Without inserting any checking sets for detecting the eavesdropping, the scheme can resist not only the existing attacks, but also the cheating attack from the dishonest agent.

  3. The anatomy of digital trade infrastructures

    NARCIS (Netherlands)

    Rukanova, B.D.; Zinner Henriksen, Helle; Henningsson, Stefan; Tan, Y.

    2017-01-01

    In global supply chains information about transactions resides in fragmented pockets within business and government systems. The introduction of digital trade infrastructures (DTI) that transcend organizational and systems domains is driven by the prospect of reducing this information fragmentation,

  4. Regional Trade Agreement and Agricultural Trade in East African ...

    African Journals Online (AJOL)

    Intra-EAC trade is very low, that is, at 9 per cent of the total regional trade, but it is on upward trend. Agricultural trade accounts for over 40 per cent of the intra-EAC trade. This study investigated the effect of EAC regional trade agreement on the regions agricultural trade by analyzing the degree of trade creation and ...

  5. 75 FR 48931 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-08-12

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... assistance and cash benefits. FOR FURTHER INFORMATION CONTACT: Trade Adjustment Assistance for Farmers....usda.gov ; or visit the TAA for Farmers' Web site: www.fas.usda.gov/itp/taa . Dated: July 30, 2010...

  6. 75 FR 48642 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-08-11

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... benefits. FOR FURTHER INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Program Staff, FAS, USDA... the TAA for Farmers' Web site: http://www.fas.usda.gov/itp/taa . Dated: July 30, 2010. John D. Brewer...

  7. 75 FR 49458 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-08-13

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... and cash benefits. FOR FURTHER INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Program....gov ; or visit the TAA for Farmers' Web site: http://www.fas.usda.gov/itp/taa . Dated: August 3, 2010...

  8. 75 FR 49886 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-08-16

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Program Staff, FAS, USDA by phone: (202) 720-0638... for Farmers' Web site: http://www.fas.usda.gov/itp/taa . Dated: August 3, 2010. Suzanne Hale, Acting...

  9. 75 FR 42375 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-07-21

    ... DEPARTMENT OF AGRICULTURE Foreign Agricultural Service Trade Adjustment Assistance for Farmers... INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Staff, FAS, USDA, by phone: (202) 720-0638, or (202) 690-0633; or by e-mail: [email protected] ; or visit the TAA for Farmers' Web site...

  10. Trade creation and trade diversion in the Canada - United States Free Trade Agreement

    OpenAIRE

    Kimberly A. Clausing

    2001-01-01

    In this paper the changes in trade patterns introduced by the Canada-United States Free Trade Agreement are examined. Variation in the extent of tariff liberalization under the agreement is used to identify the impact of tariff liberalization on the growth of trade both with member countries and non-member countries. Data at the commodity level are used, and the results indicate that the Canada-United States Free Trade Agreement had substantial trade creation effects, with little evidence of ...

  11. Trade Policy

    OpenAIRE

    Murray Gibbs

    2007-01-01

    In an otherwise insightful and thoughtful article, Sebastian Pfotenhauer (Trade Policy Is Science Policy,” Issues, Fall 2013) might better have entitled his contribution “Trade Policy Needs to Be Reconciled with Science Policy.” The North American Free Trade Agreement (NAFTA) and the agreements administered by the World Trade Organization, particularly the General Agreement on Tariffs and Trade (GATT) and the Technical Barriers to Trade (TBT), were adopted to promote international trade and i...

  12. Parameter Analysis of the VPIN (Volume synchronized Probability of Informed Trading) Metric

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jung Heon; Wu, Kesheng; Simon, Horst D.

    2014-03-01

    VPIN (Volume synchronized Probability of Informed trading) is a leading indicator of liquidity-induced volatility. It is best known for having produced a signal more than hours before the Flash Crash of 2010. On that day, the market saw the biggest one-day point decline in the Dow Jones Industrial Average, which culminated to the market value of $1 trillion disappearing, but only to recover those losses twenty minutes later (Lauricella 2010). The computation of VPIN requires the user to set up a handful of free parameters. The values of these parameters significantly affect the effectiveness of VPIN as measured by the false positive rate (FPR). An earlier publication reported that a brute-force search of simple parameter combinations yielded a number of parameter combinations with FPR of 7%. This work is a systematic attempt to find an optimal parameter set using an optimization package, NOMAD (Nonlinear Optimization by Mesh Adaptive Direct Search) by Audet, le digabel, and tribes (2009) and le digabel (2011). We have implemented a number of techniques to reduce the computation time with NOMAD. Tests show that we can reduce the FPR to only 2%. To better understand the parameter choices, we have conducted a series of sensitivity analysis via uncertainty quantification on the parameter spaces using UQTK (Uncertainty Quantification Toolkit). Results have shown dominance of 2 parameters in the computation of FPR. Using the outputs from NOMAD optimization and sensitivity analysis, We recommend A range of values for each of the free parameters that perform well on a large set of futures trading records.

  13. International provision of trade services, trade, and fragmentation

    OpenAIRE

    Deardorff, Alan V.

    2001-01-01

    The author examines the special role that trade liberalization in services industries can play in stimulating trade in both services, and goods. International trade in goods requires inputs from such trade services as transportation, insurance, and finance, for example. Restrictions on services across borders, and within foreign countries add costs, and barriers to international trade. Lib...

  14. 75 FR 43485 - Trade Adjustment Assistance for Farmers

    Science.gov (United States)

    2010-07-26

    ... Service Trade Adjustment Assistance for Farmers AGENCY: Foreign Agricultural Service, USDA. ACTION: Notice... cash benefits. FOR FURTHER INFORMATION CONTACT: Trade Adjustment Assistance for Farmers Staff, FAS... visit the TAA for Farmers' Web site: http://www.fas.usda.gov/itp/taa . Dated: July 14, 2010. John D...

  15. Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Mustafa Ulutas

    2010-01-01

    Full Text Available This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either increasing number of secrets or creating meaningful shares for one secret image. The method outlined in this paper both increases the number of secrets and creates meaningful shares at the same time. While the contrast ratio of shares is equal to that of Extended Visual Cryptography, two secrets are encoded into two shares as opposed to one secret in the Extended Visual Cryptography. Any two natural-looking images can be used as cover unlike the Halftone Visual Cryptography method where one cover should be the negative of the other cover image and can only encode one secret. Effectiveness of the proposed method is verified by an experiment.

  16. Trade Credit and Access to Finance of Retailers in Ethiopia

    NARCIS (Netherlands)

    Beck, T.H.L.; Hoseini, Mohammad; Uras, Burak

    2018-01-01

    Using data on 5,500 Ethiopian retailers, we document that there is lower use of trade credit in areas with more access to bank finance. Among firms within an area, however, receiving a bank loan increases the use of trade credit by informal firms, but has no association with trade credit of formal

  17. THE WORLD TRADE ORGANIZATION (WTO FREE TRADE WITHIN FAIR TRADE CHALLENGES

    Directory of Open Access Journals (Sweden)

    M. Ya’kub Aiyub Kadir

    2014-06-01

    Full Text Available Free trade and fair trade are considered an ambiguous term with relative meanings of identification. Objectively, free and fair trade does not mean completely free and fair, but it means trade under binding rules obeyed by member countries as a consequence of their commitment after signing and ratification of the WTO agreements. Hence, this paper aims at exploring the issue and does an effort to harmonise between free trade and fair trade within the WTO system. Perdagangan bebas dan perdagangan yang adil adalah dua istilah yang ambigu maknanya. Secara obyektif, perdagangan bebas tidak bermakna bebas dan adil seluruhnya, tetapi bermakna sebuah perdagangan di bawah aturan-aturan mengikat setelah negara anggota menandatangani dan meratifikasi kesepakatan WTO. Tetapi dalam realitas kebanyakan Negara, terutama negara berkembang tidak mampu untuk membuka pasar dan menurunkan tarif secara keseluruhan. Persoalan tidak berimbangnya kekuatan, kurang demokrasi, krisis legitimasi dan dobel standar dalam WTO sistem merupakan sebuah tantangan yang masih berlanjut. Paper ini akan mengkaji persoalan ini dan berupaya mengharmonisasikan antara perdagangan bebas dan adil dalam sistem WTO.

  18. THE WORLD TRADE ORGANIZATION (WTO FREE TRADE WITHIN FAIR TRADE CHALLENGES

    Directory of Open Access Journals (Sweden)

    M. Ya’kub Aiyub Kadir

    2014-06-01

    Full Text Available Free trade and fair trade are considered an ambiguous term with relative meanings of identification. Objectively, free and fair trade does not mean completely free and fair, but it means trade under binding rules obeyed by member countries as a consequence of their commitment after signing and ratification of the WTO agreements. Hence, this paper aims at exploring the issue and does an effort to harmonise between free trade and fair trade within the WTO system.   Perdagangan bebas dan perdagangan yang adil adalah dua istilah yang ambigu maknanya. Secara obyektif, perdagangan bebas tidak bermakna bebas dan adil seluruhnya, tetapi bermakna sebuah perdagangan di bawah aturan-aturan mengikat setelah negara anggota menandatangani dan meratifikasi kesepakatan WTO. Tetapi dalam realitas kebanyakan Negara, terutama negara berkembang tidak mampu untuk membuka pasar dan menurunkan tarif secara keseluruhan. Persoalan tidak berimbangnya kekuatan, kurang demokrasi, krisis legitimasi dan dobel standar dalam WTO sistem merupakan sebuah tantangan yang masih berlanjut. Paper ini akan mengkaji persoalan ini dan berupaya mengharmonisasikan antara perdagangan bebas dan adil dalam sistem WTO.

  19. Open Source and Trade Data for Non-Proliferation: Challenges and Opportunities

    International Nuclear Information System (INIS)

    Stewart, I.; Gillard, N.

    2015-01-01

    This paper explores what more systematic exploitation of trade data can contribute to the state evaluation process. The paper begins by setting out a typology of trade data, which groups the data into five categories: · Government Declared Data, which is prepared and submitted by States to an international authority for non-proliferation purposes. · Government Recorded Data, which includes information collected by the state for its own purposes, and which is not routinely submitted to international authorities for non-proliferation purposes. It includes (some) export licencing data, customs data, and business registration information. · Business-held data, which includes information on a company's own products and customers, but also ''market intelligence''. · Intelligence and Enforcement Derived Information, which can include information on specific procurement attempts, networks, or procurement requirements. · Procurement Requirements Information, which can include information released by a programme for the purpose of seeking goods or services. Challenges and opportunities related to further exploitation of trade data sources in each category are then explored, as are factors related to accessibility (both in terms of mandates and more practical considerations), reliability (including presentation of a typology), completeness, and duplication in data. Next, the paper explores how the IAEA can systematically collect, integrate and analyze the various sources of trade data given the considerations outlined above. In particular, this section focuses on how data in variable structures can be integrated into the state evaluation process. In concluding, the paper will describe how the newly formed ''Collaboration on Open Source and Trade Analysis for Non-proliferation'' (COSTA-NP) is seeking to develop each of the categories of trade data. The paper links to research objectives 1.3, 1.4, 2.1, 2.3, and 2.4 of the IAEA

  20. The Impact Of The Introduction of The Automated Trading System ...

    African Journals Online (AJOL)

    The Impact Of The Introduction of The Automated Trading System On The Nigerian Stock Market. ... Journal of Business Research. Journal Home · ABOUT ... strong form. Keywords: Event Studies, Electronic Trading, Information Technology.

  1. Cholecystokinin inhibits gastrin secretion independently of paracrine somatostatin secretion in the pig

    DEFF Research Database (Denmark)

    Schmidt, P T; Hansen, L; Hilsted, L

    2004-01-01

    BACKGROUND: Cholecystokinin inhibits the secretion of gastrin from antral G cells, an effect that is speculated to be mediated by D cells secreting somatostatin. The aim of the study was to test directly whether cholecystokinin inhibition of antral gastrin secretion is mediated by somatostatin....... METHODS: The effects of CCK on gastrin and somatostatin secretion were studied in isolated vascularly perfused preparations of pig antrum before and after immunoneutralization brought about by infusion of large amounts of a high affinity monoclonal antibody against somatostatin. RESULTS: CCK infusion...... at 10(-9) M and 10(-8) M decreased gastrin output to 70.5% +/- 7.6% (n = 8) and 76.3% +/- 3.6% (n = 7) of basal output, respectively. CCK at 10(-10) M had no effect (n = 6). Somatostatin secretion was dose-dependently increased by CCK infusion and increased to 268 +/- 38.2% (n = 7) of basal secretion...

  2. Energy trading

    International Nuclear Information System (INIS)

    Glachant, J.M.; Kimman, R.; Schweickardt, H.E.

    2001-05-01

    This document brings together 18 testimonies of experts about energy trading: 1 - the energy trading experience on European deregulated markets: structure of deregulated energy markets in Europe, case study: a two years experience of a power exchange in western Europe, case study: European energy exchanges (experience of spot and future trading), case study: risk management on energy deregulated markets; 2 - the trading activity environment and realities in France: the French electrical law and the purchase for resale, experience feedback: status after 3 months of trading in France (the first experience of a French producer), the access to the power transportation network, which legal constraints for trading in France, the access of eligible clients to the French power market, conditions of implementation of a power exchange market in France, which real trading possibilities in France for producers and self-producers in the legal frame, case study: the role of trading in the company (main part or link to process), convergence of gas and electricity markets, gas-electricity trading: which pricing models; 3 - risk management and use of new technologies potentiality, the results outside the French borders: case study: what differences between the European and US markets, prices volatility and commodity risk management: towards the on-line trading, role and developments of E-business in energy trading, how to simplify trade in a liberalized market. (J.S.)

  3. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  4. How did Trade Norms Evolve in Scandinavia?

    DEFF Research Database (Denmark)

    Svendsen, Gunnar Lind Haase; Svendsen, Gert Tinggaard

    2016-01-01

    in the world today, we argue that one possible historical root of social trust may be the long-distance trade practices of the Viking age. To manage the risk of being cheated, trade between strangers in an oral world required a strong informal institution of trust-based trade norms out of necessity to deal...... with the risk of being cheated. In contrast to similar cases like the famous medieval Maghribi traders, who counted on writing (Greif, 1989), the punishment of cheaters could not be supported by written documents such as legal documents and letters, as the large majority of Vikings were non...

  5. 75 FR 55739 - Export Trade Certificate of Review

    Science.gov (United States)

    2010-09-14

    ..., Canada; Broad Reach Engineering Company, Golden, CO; Celestica Corporation, Toronto, Canada; Deloitte... INFORMATION: Title III of the Export Trading Company Act of 1982 (15 U.S.C. 4001-21) authorizes the Secretary... Trading Company Act of 1982 and 15 CFR 325.6(a) requires the Secretary to publish a notice in the Federal...

  6. International trade law perspectives on paperless trade and inclusive digital trade

    OpenAIRE

    Mitchell, Andrew D.; Mishra, Neha

    2017-01-01

    Cross-border paperless trade is increasingly important to generate economic gains in a digitalised economy. Several developing and least developed countries will need to modernise their domestic laws and regulations to facilitate cross-border electronic transmissions, particularly to promote cloud computing and electronic payments. In recent trade agreements, trading partners have committed to deeper and more comprehensive provisions on electronic commerce, including adopting domestic laws on...

  7. 77 FR 1949 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Trade...

    Science.gov (United States)

    2012-01-12

    ... for OMB Review; Comment Request; Trade Adjustment Assistance Community College and Career Training...) proposal entitled ``Trade Adjustment Assistance Community College and Career Training Grant Program Reporting Requirements'' to the Office of Management and Budget (OMB) for review and approval for use in...

  8. Emissions trading: saviour or destroyer?

    International Nuclear Information System (INIS)

    Dougas, P.; Kearney, B.

    2007-01-01

    Australia is almost certain to get a greenhouse gas emissions trading scheme in the next five years. Trading is now embraced by both political parties at the federal level and by all the states, as a key policy to address greenhouse gas emissions. But the story does not end there - there are crucial design and implementation decisions that will affect the efficiency and effectiveness of an emissions trading scheme and it is vital for the Australian economy that we get this right. Addressing greenhouse gas emissions will be a massive and costly effort and we need to make sure this happens, but at the lowest possible cost. Populist solutions and silver bullets abound, but there are no simple solutions and we need to start taking action on a broad front to minimise the cost. Emissions trading will have significant and lasting effects of the broader Australian economy, but is likely to be felt most in the energy sector. We need informed and rational discussion and policy development to get it right

  9. Secrets and disclosure in donor conception.

    Science.gov (United States)

    Frith, Lucy; Blyth, Eric; Crawshaw, Marilyn; van den Akker, Olga

    2018-01-01

    This article considers the disclosure, sharing and exchange of information on being donor conceived within families, drawing on data from a study undertaken with donor-conceived adults registered with UK Donor Link (a voluntary DNA-linking register). This paper considers the narratives of how respondents found out they were donor-conceived and what events triggered disclosure of this information. This paper then goes on to examine the role secrecy played in their family life and uses the concept of 'display' to explore how secrecy affected their relationships with their immediate and extended family. Secrets are notoriously 'leaky' and we found complex patterns of knowing and uncertainty about whom in the family knew that the person was donor-conceived. We argue that what is kept secret and from whom provides insights into the multifaceted web of social relationships that can be created by donor-conception, and how knowledge can be managed and controlled in attempts to display and maintain family narratives of biogenetic connection. © 2017 Foundation for the Sociology of Health & Illness.

  10. Secret Sharing over Fast-Fading MIMO Wiretap Channels

    Directory of Open Access Journals (Sweden)

    Bloch Matthieu

    2009-01-01

    Full Text Available Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of an eavesdropper who also makes channel observations that are different from but correlated to those made by the destination. An interactive, authenticated public channel with unlimited capacity is available to the source and destination for the secret sharing process. This situation is a special case of the "channel model with wiretapper" considered by Ahlswede and Csiszár. An extension of their result to continuous channel alphabets is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and eavesdropper are then investigated.

  11. Capture, Movement, Trade, and Consumption of Mammals in Madagascar

    Science.gov (United States)

    Reuter, Kim E.; Randell, Haley; Wills, Abigail R.; Janvier, Totozafy Eric; Belalahy, Tertius Rodriguez; Sewall, Brent J.

    2016-01-01

    Wild meat trade constitutes a threat to many animal species. Understanding the commodity chain of wild animals (hunting, transportation, trade, consumption) can help target conservation initiatives. Wild meat commodity chain research has focused on the formal trade and less on informal enterprises, although informal enterprises contribute to a large portion of the wild meat trade in sub-Saharan Africa. We aimed to provide a more comprehensive understanding of the formal and informal components of these commodity chains by focusing on the mammalian wild meat trade in Madagascar. Our objectives were to: (1) identify hunting strategies used to capture different wild mammals; (2) analyze patterns of movement of wild meat from the capture location to the final consumer; (3) examine wild meat prices, volumes, and venues of sale; and (4) estimate the volume of wild meat consumption. Data were collected in May-August 2013 using semi-structured interviews with consumers (n = 1343 households, 21 towns), meat-sellers (n = 520 restaurants, open-air markets stalls, and supermarkets, 9 towns), and drivers of inter-city transit vehicles (n = 61, 5 towns). We found that: (1) a wide range of hunting methods were used, though prevalence of use differed by animal group; (2) wild meat was transported distances of up to 166 km to consumers, though some animal groups were hunted locally (Madagascar is also likely more formalized than previously thought. PMID:26926987

  12. Multidisciplinary studies of wildlife trade in primates: Challenges and priorities.

    Science.gov (United States)

    Blair, Mary E; Le, Minh D; Sterling, Eleanor J

    2017-11-01

    Wildlife trade is increasingly recognized as an unsustainable threat to primate populations and informing its management is a growing focus and application of primatological research. However, management policies based on ecological research alone cannot address complex socioeconomic or cultural contexts as drivers of wildlife trade. Multidisciplinary research is required to understand trade complexity and identify sustainable management strategies. Here, we define multidisciplinary research as research that combines more than one academic discipline, and highlight how the articles in this issue combine methods and approaches to fill key gaps and offer a more comprehensive understanding of underlying drivers of wildlife trade including consumer demand, enforcement patterns, source population status, and accessibility of targeted species. These articles also focus on how these drivers interact at different scales, how trade patterns relate to ethics, and the potential effectiveness of different policy interventions in reducing wildlife trade. We propose priorities for future research on primate trade including expanding from multidisciplinary to interdisciplinary research questions and approaches co-created by research teams that integrate across different disciplines such as cultural anthropology, ecology, economics, and public policy. We also discuss challenges that limit the integration of information across disciplines to meet these priorities. © 2017 Wiley Periodicals, Inc.

  13. 77 FR 44224 - Access to Confidential Business Information by Eastern Research Group, Incorporated

    Science.gov (United States)

    2012-07-27

    ... landfilled. The methodology used in this report is a ``top-down'' materials flow approach to estimate the..., may be claimed by industry to contain trade secrets or CBI. In accordance with the provisions of 40...

  14. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  15. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  16. Global Trade Alert | CRDI - Centre de recherches pour le ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Global Trade Alert (GTA) will provide information in real time on national measures taken during the current global economic downturn that are likely to discriminate against foreign commerce. GTA will complement and go beyond World Trade Organization (WTO) and World Bank monitoring initiatives by identifying affected ...

  17. 76 FR 14570 - Federal Acquisition Regulation; Trade Agreements Thresholds

    Science.gov (United States)

    2011-03-16

    ... application of the World Trade Organization Government Procurement Agreement and the Free Trade Agreements, as... Parts 22, 25, and 52 Government procurement. Dated: March 4, 2011. Millisa Gary, Acting Director, Office... INFORMATION CONTACT: Ms. Cecelia L. Davis, Procurement Analyst, at (202) 219-0202, for clarification of...

  18. Policy recommendations for Canadian municipal greenhouse gas trading

    International Nuclear Information System (INIS)

    Seskus, A.

    2002-01-01

    The municipal policies regarding greenhouse gas (GHG) emissions trading from municipalities in developed countries outside of Canada were examined in an effort to help establish a position on municipal carbon trading in Canada. The main uncertainty regarding this new concept of GHG emissions trading is the fate of the Kyoto Protocol, when or if it will be ratified. It is premature for municipalities to have well-established polices about emissions trading because the country in which a municipality is located determines the position towards GHG emissions trading. For this study, an extensive literature search of municipal policies was conducted for both GHG trading and domestic national GHG trading. This was followed by a survey on emissions trading which was distributed to more than 350 member cities (including the United States, Europe and Australia) of the International Council for Environmental Initiatives (ICLEI) Cities for Climate Protection (CCP) Campaign. The literature search revealed that municipalities outside of Canada have not yet formulated policies to address the issue of emissions trading. Only 7 per cent of the cities felt that they were informed about emissions trading, even in Europe and Australia where domestic emissions trading is closer to becoming a reality. This paper demonstrated that it is evident that more training is needed for municipalities regarding this issue. For the very few cities that had developed a GHG trading policy, each municipal policy supported municipal participation in emissions trading under conditions that included an environmental retirement, a do-no-harm clause, or an obligation to meet voluntary commitments before excess emissions can be traded. refs., tabs., figs

  19. Trade networks evolution under the conditions of stock market globalization

    Directory of Open Access Journals (Sweden)

    Kopylova Olga Volodymyrivna

    2016-12-01

    Full Text Available The modern perception of the stock market in terms of information technologies rapid development and under the institutionalists influence has been significantly modified and becomes multifaceted. It was detected that the main function of the market is activated, information asymmetry is minimized and more advanced financial architecture space is formed through trade networks. Formation of the modern trade networks has started on the basis of the old infrastructure, that had the highest tendency to self-organization and adaptation. The proposed architecture of trade networks of the stock market has a very clear vector of subordination – from top to bottom and has a number of positive points.

  20. NPT, export controls and nuclear trade

    International Nuclear Information System (INIS)

    Pande, Savita

    1997-01-01

    Nuclear trade has by and large remained unhampered vis-a-vis both the NPT as well as export control regulations. The NPT rules are regarded as insufficient, the guidelines appear to contravene the spirit of cooperation in trade and development between suppliers and recipients and there is no agreement among leading suppliers themselves on what constitutes the proper conduct of trade. Export control regimes are more or less too informal to be able to be implemented. The supplier states have to invariably depend on national legislations which again vary from country to country. The only common formal basis on which action can be taken is, therefore, the NPT, its loopholes notwithstanding. The idea of transparency, and supplier-recipient dialogue continues to be a myth and will continue to be so long as these regimes remain discriminatory, so long as some nations are more powerful than others by virtue of retaining nuclear weapons and superiority in nuclear technology and trade

  1. Associations Between Secret-Keeping and Quality of Life in Older Adults.

    Science.gov (United States)

    Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M

    2018-01-01

    This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.

  2. 18 CFR 3a.12 - Authority to classify official information.

    Science.gov (United States)

    2010-04-01

    ... efficient administration. (b) The authority to classify information or material originally as Top Secret is... classify information or material originally as Secret is exercised only by: (1) Officials who have Top... information or material originally as Confidential is exercised by officials who have Top Secret or Secret...

  3. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  4. Impacts of the Japan-Mexico EPA on Bilateral Trade

    OpenAIRE

    ANDO Mitsuyo; URATA Shujiro

    2011-01-01

    This paper examines the impacts of the Japan-Mexico EPA on bilateral trade by using two different types of information, trade statistics and the EPA utilization rate. Using trade data, we found that Japan's exports of built-up cars, auto parts, base metals, electrical machinery, precision machinery, and ballpoint pens to Mexico increased sharply. We also found that Japan's imports of live animals and products, leather, and footwear with leather from Mexico increased significantly. These are s...

  5. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-09-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  6. Noncoherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the noncoherent capacity of secret-key agreement with public discussion over independent identically distributed (i.i.d.) Rayleigh fading wireless channels, where neither the sender nor the receivers have access to instantaneous channel state information (CSI). We present two results. At high signal-to-noise ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  7. Additive versus multiplicative trade costs and the gains from trade

    DEFF Research Database (Denmark)

    Sørensen, Allan

    This paper addresses welfare effects from trade liberalization in a heterogeneous-fi…rms trade model including the empirically important per-unit (i.e. additive) trade costs in addition to the conventional iceberg (i.e. multiplicative) and fi…xed trade costs. The novel contribution of the paper...... is the result that the welfare gain for a given increase in trade openness is higher for reductions in per-unit (additive) trade costs than for reductions in iceberg (multiplicative) trade costs. The ranking derives from differences in intra-industry reallocations and in particular from dissimilar impacts...

  8. E-commerce trade in invasive plants.

    Science.gov (United States)

    Humair, Franziska; Humair, Luc; Kuhn, Fabian; Kueffer, Christoph

    2015-12-01

    Biological invasions are a major concern in conservation, especially because global transport of species is still increasing rapidly. Conservationists hope to anticipate and thus prevent future invasions by identifying and regulating potentially invasive species through species risk assessments and international trade regulations. Among many introduction pathways of non-native species, horticulture is a particularly important driver of plant invasions. In recent decades, the horticultural industry expanded globally and changed structurally through the emergence of new distribution channels, including internet trade (e-commerce). Using an automated search algorithm, we surveyed, on a daily basis, e-commerce trade on 10 major online auction sites (including eBay) of approximately three-fifths of the world's spermatophyte flora. Many recognized invasive plant species (>500 species) (i.e., species associated with ecological or socio-economic problems) were traded daily worldwide on the internet. A markedly higher proportion of invasive than non-invasive species were available online. Typically, for a particular plant family, 30-80% of recognized invasive species were detected on an auction site, but only a few percentages of all species in the plant family were detected on a site. Families that were more traded had a higher proportion of invasive species than families that were less traded. For woody species, there was a significant positive relationship between the number of regions where a species was sold and the number of regions where it was invasive. Our results indicate that biosecurity is not effectively regulating online plant trade. In the future, automated monitoring of e-commerce may help prevent the spread of invasive species, provide information on emerging trade connectivity across national borders, and be used in horizon scanning exercises for early detection of new species and their geographic source areas in international trade. © 2015 Society for

  9. Estimating the elasticity of trade: the trade share approach

    OpenAIRE

    Mauro Lanati

    2013-01-01

    Recent theoretical work on international trade emphasizes the importance of trade elasticity as the fundamental statistic needed to conduct welfare analysis. Eaton and Kortum (2002) proposed a two-step method to estimate this parameter, where exporter fixed effects are regressed on proxies for technology and wages. Within the same Ricardian model of trade, the trade share provides an alternative source of identication for the elasticity of trade. Following Santos Silva and Tenreyro (2006) bot...

  10. The relationship between trading volumes, number of transactions, and stock volatility in GARCH models

    Science.gov (United States)

    Takaishi, Tetsuya; Chen, Ting Ting

    2016-08-01

    We examine the relationship between trading volumes, number of transactions, and volatility using daily stock data of the Tokyo Stock Exchange. Following the mixture of distributions hypothesis, we use trading volumes and the number of transactions as proxy for the rate of information arrivals affecting stock volatility. The impact of trading volumes or number of transactions on volatility is measured using the generalized autoregressive conditional heteroscedasticity (GARCH) model. We find that the GARCH effects, that is, persistence of volatility, is not always removed by adding trading volumes or number of transactions, indicating that trading volumes and number of transactions do not adequately represent the rate of information arrivals.

  11. 76 FR 48145 - North American Free-Trade Agreement, Article 1904; Binational Panel Reviews: Notice of...

    Science.gov (United States)

    2011-08-08

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free-Trade Agreement.... SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free-Trade Agreement (``Agreement'') established a..., United States Section, International Trade Administration, Department of Commerce. ACTION: Notice of...

  12. 78 FR 57884 - Recent Trends in U.S. Services Trade, 2014 Annual Report

    Science.gov (United States)

    2013-09-20

    ... affiliate transactions in services, and more specific data and information on trade in electronic services... 2014 report will focus on trade in electronic services (audiovisual, computer, and telecommunication... relating to trade in electronic services (audiovisual, computer, and telecommunication services...

  13. Plurilateral Trade Deals: An Alternative for Multilateral Trade Agreements?

    Directory of Open Access Journals (Sweden)

    Agnes Ghibuțiu

    2016-04-01

    Full Text Available While multilateral trade negotiations under the World Trade Organization (WTO continue to be in impasse, plurilateral trade negotiations – i.e. among a group of WTO members – have intensified in recent years, and also recorded a series of concrete results in liberalizing specific sectors of international trade. Hence, there is a widely shared view that plurilateral trade negotiations could be an alternative for the multilateral ones. This paper aims to answer the following questions: What are plurilateral trade agreements? Which are the reasons behind the surge in plurilateral negotiations in recent years? What are the main achievements in liberalizing trade at the plurilateral level? What are the advantages of plurilateral negotiations relative to multilateral ones, and why are they considered an attractive alternative for negotiations at the multilateral level?

  14. Act locally, trade globally. Emissions trading for climate policy

    Energy Technology Data Exchange (ETDEWEB)

    none

    2005-07-01

    Climate policy raises a number of challenges for the energy sector, the most significant being the transition from a high to a low-CO2 energy path in a few decades. Emissions trading has become the instrument of choice to help manage the cost of this transition, whether used at international or at domestic level. Act Locally, Trade Globally, offers an overview of existing trading systems, their mechanisms, and looks into the future of the instrument for limiting greenhouse gas emissions. Are current markets likely to be as efficient as the theory predicts? What is, if any, the role of governments in these markets? Can domestic emissions trading systems be broadened to activities other than large stationary energy uses? Can international emissions trading accommodate potentially diverse types of emissions targets and widely different energy realities across countries? Are there hurdles to linking emissions trading systems based on various design features? Can emissions trading carry the entire burden of climate policy, or will other policy instruments remain necessary? In answering these questions, Act Locally, Trade Globally seeks to provide a complete picture of the future role of emissions trading in climate policy and the energy sector.

  15. The Position of Suitcase Trading in Turkey’s Foreign Trade and Growth-Suitcase Trading Connection

    Directory of Open Access Journals (Sweden)

    Sinem YAPAR SAÇIK

    2013-12-01

    Full Text Available Suitcase trading which is defined as a purchasing process of merchandises in a country that is implemented by travelers (nonresidents to sell those merchandises in their own country; it has started to take place in balance of payments of Turkey since 1996. After the collapse of USSR in 1991 Turkey became a net exporter in suitcase trading so the country reached significant figures occasionally. In this paper the position of suitcase trading in Turkey’s foreign trade is analyzed in consideration of statistical indicators. According to the findings acquired from the study, suitcase trading is a significant variable for Turkey to have currency and to close foreign deficits. Suitcase trading and growth connection is also analyzed by econometric method which is co-integration test and the result is affirmative. And also it is found that this connection is unilateral causation from growth towards suitcase trading according to the findings of Granger causality test

  16. Analysis of Ukraine’s foreign trade turnover in context of free trade zone with European Union

    Directory of Open Access Journals (Sweden)

    К.Shymanska

    2016-06-01

    Full Text Available The implementation of the free trade zone between Ukraine and the European Union has many advantages and disadvantages for our country. The changes in Ukraine’s economic integration vector cause much dispute about its prospects and profitability. Nevertheless, the strengthening of economic and political crisis leads to the reduction in foreign trade of Ukraine with the EU. Although in recent years, many institutional limitations for the Ukrainian producers’ entrance to European markets have been removed. The analysis of Ukraine's foreign trade turnover with EU countries showed the indicators of exports and imports structure in the partner countries and allowed to reveal decreasing of intensity of these operations. This can be a negative indicator of activities for the implementation of the Association Agreement with the EU. The study has formulated the perspective directions of foreign trade policy of Ukraine, in particular with respect to the modernization of informational and technical support of the customs clearance of the goods movement, increasing control over the quality of Ukrainian goods and opportunities for the small and mediumsized entities entrance to the European markets.

  17. Trade, trust and the rule of law

    NARCIS (Netherlands)

    Yu, Shu; Beugelsdijk, Sjoerd; de Haan, Jakob

    Well-functioning institutions, both formal (i.e. rule of law) and informal (i.e. trust), facilitate economic exchange. To investigate the nature of the relationship between formal and informal institutions, we analyze bilateral trade patterns in a sample of 16 European countries between 1996-2009.

  18. Protection of business and industrial secrets under the Atomic Energy Act and the relevant ordinances governing licensing and supervisory procedures

    International Nuclear Information System (INIS)

    Steinberg, R.

    1988-01-01

    The article deals with problems concerning the protection of secret information in licensing and supervisory procedures under the Atomic Energy Act and the relevant ordinances. The extent of the secret protection of business and industrial secrets is regulated differently for both procedures. These legal provisions have to be interpreted with due consideration for third party interests in information. (WG) [de

  19. 40 CFR 790.7 - Confidentiality.

    Science.gov (United States)

    2010-07-01

    ... words “confidential business information,” “trade secret,” or another appropriate phrase indicating its... competitor use such information? How substantial would the harmful effects be? What is the causal...

  20. Characterising Wildlife Trade Market Supply-Demand Dynamics

    Science.gov (United States)

    Rowcliffe, M.; Cowlishaw, G.; Alexander, J. S.; Ntiamoa-Baidu, Y.; Brenya, A.; Milner-Gulland, E. J.

    2016-01-01

    The trade in wildlife products can represent an important source of income for poor people, but also threaten wildlife locally, regionally and internationally. Bushmeat provides livelihoods for hunters, traders and sellers, protein to rural and urban consumers, and has depleted the populations of many tropical forest species. Management interventions can be targeted towards the consumers or suppliers of wildlife products. There has been a general assumption in the bushmeat literature that the urban trade is driven by consumer demand with hunters simply fulfilling this demand. Using the urban bushmeat trade in the city of Kumasi, Ghana, as a case study, we use a range of datasets to explore the processes driving the urban bushmeat trade. We characterise the nature of supply and demand by explicitly considering three market attributes: resource condition, hunter behaviour, and consumer behaviour. Our results suggest that bushmeat resources around Kumasi are becoming increasingly depleted and are unable to meet demand, that hunters move in and out of the trade independently of price signals generated by the market, and that, for the Kumasi bushmeat system, consumption levels are driven not by consumer choice but by shortfalls in supply and consequent price responses. Together, these results indicate that supply-side processes dominate the urban bushmeat trade in Kumasi. This suggests that future management interventions should focus on changing hunter behaviour, although complementary interventions targeting consumer demand are also likely to be necessary in the long term. Our approach represents a structured and repeatable method to assessing market dynamics in information-poor systems. The findings serve as a caution against assuming that wildlife markets are demand driven, and highlight the value of characterising market dynamics to inform appropriate management. PMID:27632169

  1. Evolving trade policy and the Trans-Pacific Partnership Agreement: does it threaten Vietnam's access to medicine and its progress towards scaling up HIV prevention, treatment and care?

    Science.gov (United States)

    Linh, Nguyen Nhat; Huong, Nguyen Thanh; Thuy, Hua Thanh

    2015-01-01

    The Trans-Pacific Partnership Agreement (TPP) has undergone 18 rounds of secretive negotiation between the USA and 11 Asia-Pacific countries. Aiming at a free trade area, this multilateral trade proposal covers all aspects of commercial relations among the countries involved. Despite some anticipated positive impacts in trade, specific articles in this proposal's intellectual property and transparency chapters might negatively impact access to medicine, in general, and to antiretroviral (ARV) drugs, in particular, in Vietnam. Drawing on a desk review and qualitative in-depth interviews with 20 key informants from government, academia, hospitals and civil society, we analyse various provisions of the proposal being negotiated leaked after the 14th round of negotiations in September 2012. Findings suggest that the TPP could lead to increased monopoly protection and could limit technological advancements within the local pharmaceutical manufacturing industry, resulting in higher medicine prices in Vietnam. This outcome would have a significant impact on Vietnam's ability to achieve goals for HIV prevention, treatment and care, and create barriers to universal health-care coverage. This research provides unique evidence for Vietnam to advocate for more equitable pharmaceutical provisions in and to raise awareness of the implications of the TPP among the pharmaceutical stakeholder community in Vietnam.

  2. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  3. 15 CFR 60.1 - Public information.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Public information. 60.1 Section 60.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade BUREAU OF THE CENSUS, DEPARTMENT OF COMMERCE PUBLIC INFORMATION § 60.1 Public information. The rules and procedures regarding...

  4. Intransparent Markets and Intra-Industry Trade

    DEFF Research Database (Denmark)

    Schmidt, Christian Gormsen

    Buyers are typically unaware of the full set of offers when making a purchase. This paper examines how international trade interacts with this problem of market intransparency. Sellers must communicate their offers through costly advertising, but cannot reach all buyers. Consequently, no market...... clearing price exists, and sellers randomize over an equilibrium price distribution. Letting sellers advertise their offers abroad leads to international trade, which would not take place under complete information. Buyers then receive more offers, leading to lower prices and welfare gains. Sellers...... in the model are identical, but appear heterogeneous due to their price randomization. In larger and more open economies, prices and markups will be lower, and exports are primarily realized by sellers who charge low prices. These predictions are similar to those of trade models where firm heterogeneity...

  5. The ASEAN Free Trade Agreement: impact on trade flows and external trade barriers

    OpenAIRE

    Hector Calvo-Pardo; Caroline Freund; Emanuel Ornelas

    2009-01-01

    Using detailed data on trade and tariffs from 1992-2007, the authors examine how the ASEAN Free Trade Agreement has affected trade with nonmembers and external tariffs facing nonmembers. First, the paper examines the effect of preferential and external tariff reduction on import growth from ASEAN insiders and outsiders across HS 6-digit industries. The analysis finds no evidence that prefe...

  6. 45 CFR 2505.4 - On what grounds may the Board close a meeting or withhold information?

    Science.gov (United States)

    2010-10-01

    ... foreign court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by... withholding or refers to particular types of matters to be withheld; (d) Disclose trade secrets and commercial...

  7. Security Price Informativeness with Delegated Traders

    OpenAIRE

    Gary Gorton; Ping He; Lixin Huang

    2010-01-01

    Trade in securities markets is conducted by agents acting for principals, using "mark-to-market" contracts whereby performance is assessed using security market prices. We endogenize contract choices, information production, informed trading, and security price informativeness. But there is a contract externality. Prices are informative only because other principals induce their agents to trade based on privately produced information. The agent-traders then have an incentive to coordinate and...

  8. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag

    2011-06-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  9. Non-coherent capacity of secret-key agreement with public discussion

    KAUST Repository

    Agrawal, Anurag; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    We study the Rayleigh fading non-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have access to instantaneous channel state information (CSI) of any channel. We present two results. At high Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number of antennas at each terminal. Second, for a system with a single antenna at both the legitimate and the eavesdropper terminals and an arbitrary number of transmit antennas, the secret-key capacity-achieving input distribution is discrete, with a finite number of mass points. Numerically we observe that at low-SNR, the capacity achieving distribution has two mass points with one of them at the origin. © 2011 IEEE.

  10. Markets and Networks in International Trade

    DEFF Research Database (Denmark)

    Håkanson, Lars; Dow, Douglas

    2012-01-01

    is associated with a shift in the composition of trade towards goods requiring more extensive information exchange and personal interaction between buyers and sellers. An alternative explanation—‘the market view’—contends that improved availability of information and increasing transparency of markets have...... facilitated the matching of geographically more proximate buyers and sellers, and that the observed decline in average transportation distances is a reflection of increasingly efficient markets. This paper examines empirically the merits of these two arguments based on a longitudinal analysis of bilateral...... in support of the ‘market-view’, showing that the sensitivity of trade to psychic distance has declined dramatically for all categories of goods. The impact of geographic distance has increased markedly for homogenous goods, whereas for more differentiated goods it has decreased mildly....

  11. Trade Facilitation Provisions in Regional Trade Agreements: Discriminatory or Non-discriminatory?

    Directory of Open Access Journals (Sweden)

    Innwon Park

    2016-12-01

    Full Text Available The RTAs with trade facilitation provisions have been expected to generate a larger net trade-creating effect and complement the discriminatory feature of RTAs but have yet to be empirically proven. Recognizing the limitations of existing studies, we conducted a quantitative analysis on the effects of RTAs with and without trade facilitation provisions on both intra- and extra-bloc trade by using a modified gravity equation. We applied the Poisson Pseudo-Maximum Likelihood (PPML estimation with time varying exporter and importer fixed effect method to panel data consisting of 45,770 country pairs covering 170 countries for 2000-2010. We found that the trade facilitation provisions in existing RTAs are non-discriminatory by generating more intra- and extra-bloc trade in general. In particular, we found that the trade effects of RTAs in the APEC region are much stronger than the general case covering all RTAs in the world. In addition, as we control the trade effect of a country's trade facilitation, which is ranked by the World Bank's logistic performance index, RTAs consisting of trade facilitation provisions are discriminatory for trade in final goods and non-discriminatory for trade in intermediate goods. Overall, we endeavor to "explain," instead of "hypothesizing," why most of the recent RTAs contain trade facilitation provisions, especially in light of the deepening regional interdependence through trade in parts and components under global value chains and support the necessity of multilateralizing RTAs by implementing non-discriminatory trade facilitation provisions.

  12. 77 FR 23260 - Agency Information Collection Activities: Proposed Collection; Comment Request

    Science.gov (United States)

    2012-04-18

    .... 6. Scientific soundness of the measure: Explanation of methods to determine the scientific soundness..., 2015. Method of Collection To achieve the goals of this project, AHRQ intends to solicit submission of... proprietary rights (e.g., patent or data rights), any confidentiality or trade secret protections, National...

  13. Employment Growth and International Trade

    DEFF Research Database (Denmark)

    Ibsen, Rikke; Warzynski, Frederic; Westergård-Nielsen, Niels Chr.

    In this paper, we use a detailed dataset containing information about all international trade transactions of the population of Danish ?rms over more than a decade to analyze the relationship between export and import decisions and employment growth. We further distinguish between imports of ?nal...

  14. Legal market abuse regulations of WpHG (law on stock trading) and the REMIT-VO in the electricity spot trading; Marktmissbrauchsrechtliche Regelungen des WpHG und der REMIT-VO im Stromspothandel

    Energy Technology Data Exchange (ETDEWEB)

    Retsch, Alexander T.

    2014-07-01

    The thesis on legal market abuse regulations of WpHG (law on stock trading) and the REMIT-VO in the electricity spot trading include the discussion of the following issues: market abuse, its forms of appearance (market manipulation, insider trade, insider information), electricity spot trading, relevant legislative frame, market abuse regulations (WpHG), interdiction of market manipulation and related regulations.

  15. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Je Min, E-mail: jemin@knu.ac.kr [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of); Department of Horticultural Science, Kyungpook National University, Daegu (Korea, Republic of); Lee, Sang-Jik [Biotechnology Institute, Nongwoo Bio Co, Ltd, Yeoju (Korea, Republic of); Department of Plant Biology, Cornell University, Ithaca, NY (United States); Rose, Jocelyn K.C. [Department of Plant Biology, Cornell University, Ithaca, NY (United States); Yeam, Inhwa [Department of Horticulture and Breeding, Andong National University, Andong (Korea, Republic of); Kim, Byung-Dong [Department of Plant Science, College of Agriculture and Life Sciences, Seoul National University, Seoul (Korea, Republic of)

    2014-04-18

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening.

  16. Mining secreted proteins that function in pepper fruit development and ripening using a yeast secretion trap (YST)

    International Nuclear Information System (INIS)

    Lee, Je Min; Lee, Sang-Jik; Rose, Jocelyn K.C.; Yeam, Inhwa; Kim, Byung-Dong

    2014-01-01

    Highlights: • Yeast secretion trap (YST) is a valuable tool for mining secretome. • A total of 80 secreted proteins are newly identified via YST in pepper fruits. • The secreted proteins are differentially regulated during pepper development and ripening. • Transient GFP-fusion assay and in planta secretion trap can effectively validate the secretion of proteins. - Abstract: Plant cells secrete diverse sets of constitutively- and conditionally-expressed proteins under various environmental and developmental states. Secreted protein populations, or secretomes have multiple functions, including defense responses, signaling, metabolic processes, and developmental regulation. To identify genes encoding secreted proteins that function in fruit development and ripening, a yeast secretion trap (YST) screen was employed using pepper (Capsicum annuum) fruit cDNAs. The YST screen revealed 80 pepper fruit-related genes (CaPFRs) encoding secreted proteins including cell wall proteins, several of which have not been previously described. Transient GFP-fusion assay and an in planta secretion trap were used to validate the secretion of proteins encoded by selected YST clones. In addition, RNA gel blot analyses provided further insights into their expression and regulation during fruit development and ripening. Integrating our data, we conclude that the YST provides a valuable functional genomics tool for the identification of substantial numbers of novel secreted plant proteins that are associated with biological processes, including fruit development and ripening

  17. Immunoglobins in mammary secretions

    DEFF Research Database (Denmark)

    Hurley, W L; Theil, Peter Kappel

    2013-01-01

    Immunoglobulins secreted in colostrum and milk by the lactating mammal are major factors providing immune protection to the newborn. Immunoglobulins in mammary secretions represent the cumulative immune response of the lactating animal to exposure to antigenic stimulation that occurs through...... the immunoglobulins found in mammary secretions in the context of their diversity of structure, origin, mechanisms of transfer, and function....

  18. The Supply of Trade Credit by Brazilian Publicly Traded Firms

    Directory of Open Access Journals (Sweden)

    Rafael Felipe Schiozer

    2011-12-01

    Full Text Available This paper investigates the determinants of trade credit supply by Brazilian publicly traded companies between the years of 2005 and 2008. International literature (both theoretical and empirical documents that the main determinants of trade credit supply are the size of the firm and the size of its debt. Both indicate that the availability of resources to the firm is an important factor for the supply of trade credit. In addition, the literature confirms strategic uses of trade credit such as those for price discrimination purposes. The results obtained using a sample of 157 Brazilian companies do not support that size and indebtedness are relevant determinants for trade credit supply, but they confirm the supply of trade credit as a strategic tool for the firms. Additionally we observed a significant decrease in trade credit supply in 2008, the year in which a severe international financial crisis took place.

  19. ACTIVITY-BASED COST ALLOCATION AND FUNCTION ANALYZES IN TRADE

    Directory of Open Access Journals (Sweden)

    TÜNDE VERES

    2011-01-01

    Full Text Available In this paper the author is thinking about the efficiency analyzes of trading. The most important evaluation factors of trade are the sales value, volume and the margin. Of course the easiest and fastest way is to follow the market situation by the turnover but for long term thinking the sales companies need to concentrate also for efficiency. Trading activity has some functions which can deeply effect for the final result and this is the reason to calculate their clear and reliable costs is an important condition of the decision making. The author reviews the cost categories and the basic functions in trading activity to find possible ways getting reliable information.

  20. 77 FR 49428 - Agency Information Collection Activities; Proposed Collection, Comment Request: Further...

    Science.gov (United States)

    2012-08-16

    ... solicits comments on the recordkeeping requirement that is embedded in the final interpretation's reporting... of the Federal Reserve System (``Board''), jointly adopted new rules and interpretations under the... market positions of any person and trade secrets or names of customers.'' \\4\\ The Commission is also...

  1. 78 FR 45181 - North American Free Trade Agreement (NAFTA), Article 1904 Binational Panel Reviews: Notice of...

    Science.gov (United States)

    2013-07-26

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement..., (202) 482-5438. SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free Trade Agreement... Secretariat, United States Section, International Trade Administration, Department of Commerce. ACTION: On...

  2. Extracellular secretion of recombinant proteins

    Science.gov (United States)

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  3. Framework for conducting environmental assessments of trade negotiations

    International Nuclear Information System (INIS)

    2001-02-01

    This document described the complex task of assessing the environmental impacts of trade negotiations with particular emphasis on the framework of the Strategic Environmental Assessment which the Government of Canada will conduct through a systematic process which can identify and evaluate possible and significant environmental impacts of an initiative. The objective of the assessment is to integrate environmental considerations into decision-making processes at the earliest possible stage. The first part of the framework identifies the importance of recognizing environmental considerations of trade and explains how the framework will contribute to environmental policy. The second part of the framework outlines the process and analytical requirements for conducting an environmental assessment of a trade negotiation. Environmental Assessment Committees will be formed by the Department of Foreign Affairs and International Trade, and will include representatives from federal government departments and agencies. All analyses will be conducted in four stages which will include identifying the economic effect of the negotiation, identifying the likely environmental impact of such changes, assessing the significance of the likely environmental impacts, and identifying enhancement/mitigation options to inform the negotiations. The framework is designed to be flexible enough to be used at current and future trade negotiations in the World Trade Organization, the Free Trade Area of the Americas and in bilateral Free Trade Agreements. An environmental assessment of trade negotiations is considered to be an important decision-making tool for promoting sustainable development. 16 refs., 1 tab

  4. 32 CFR 2800.4 - General information.

    Science.gov (United States)

    2010-07-01

    ... STATES SECURITY PROCEDURES § 2800.4 General information. (a) Staff Security Officer/Top Secret Control... Staff Security Officer will serve as Top Secret Control Officer and Assistant Top Secret Control Officer... responsible for the overall supervision of the Top Secret Control program. They will maintain positive control...

  5. Free Trade Agreements and Firm-Product Markups in Chilean Manufacturing

    DEFF Research Database (Denmark)

    Lamorgese, A.R.; Linarello, A.; Warzynski, Frederic Michel Patrick

    In this paper, we use detailed information about firms' product portfolio to study how trade liberalization affects prices, markups and productivity. We document these effects using firm product level data in Chilean manufacturing following two major trade agreements with the EU and the US....... The dataset provides information about the value and quantity of each good produced by the firm, as well as the amount of exports. One additional and unique characteristic of our dataset is that it provides a firm-product level measure of the unit average cost. We use this information to compute a firm...

  6. 10 CFR 1004.10 - Exemptions.

    Science.gov (United States)

    2010-01-01

    ... by other statutes; confidential, commercial, and financial information; and matters involving....) are covered by this exemption; (4) Trade secrets and commercial or financial information obtained from... lawful national security intelligence investigation, information furnished by a confidential source, (v...

  7. Sweet secrets

    DEFF Research Database (Denmark)

    Rasmussen, Jacob

    This Working Paper presents a case study of sugar smuggling along the trade corridor between Kismayu in Somalia and Nairobi in Kenya. The trading and smuggling of sugar in the Kenya – Somalia borderlands is a dangerous, lucrative, and highly political business. The paper explores the involvement ...

  8. Quantum secret sharing via local operations and classical communication.

    Science.gov (United States)

    Yang, Ying-Hui; Gao, Fei; Wu, Xia; Qin, Su-Juan; Zuo, Hui-Juan; Wen, Qiao-Yan

    2015-11-20

    We investigate the distinguishability of orthogonal multipartite entangled states in d-qudit system by restricted local operations and classical communication. According to these properties, we propose a standard (2, n)-threshold quantum secret sharing scheme (called LOCC-QSS scheme), which solves the open question in [Rahaman et al., Phys. Rev. A, 91, 022330 (2015)]. On the other hand, we find that all the existing (k, n)-threshold LOCC-QSS schemes are imperfect (or "ramp"), i.e., unauthorized groups can obtain some information about the shared secret. Furthermore, we present a (3, 4)-threshold LOCC-QSS scheme which is close to perfect.

  9. A trade-off between local and distributed information processing associated with remote episodic versus semantic memory.

    Science.gov (United States)

    Heisz, Jennifer J; Vakorin, Vasily; Ross, Bernhard; Levine, Brian; McIntosh, Anthony R

    2014-01-01

    Episodic memory and semantic memory produce very different subjective experiences yet rely on overlapping networks of brain regions for processing. Traditional approaches for characterizing functional brain networks emphasize static states of function and thus are blind to the dynamic information processing within and across brain regions. This study used information theoretic measures of entropy to quantify changes in the complexity of the brain's response as measured by magnetoencephalography while participants listened to audio recordings describing past personal episodic and general semantic events. Personal episodic recordings evoked richer subjective mnemonic experiences and more complex brain responses than general semantic recordings. Critically, we observed a trade-off between the relative contribution of local versus distributed entropy, such that personal episodic recordings produced relatively more local entropy whereas general semantic recordings produced relatively more distributed entropy. Changes in the relative contributions of local and distributed entropy to the total complexity of the system provides a potential mechanism that allows the same network of brain regions to represent cognitive information as either specific episodes or more general semantic knowledge.

  10. Additive versus Multiplicative Trade Costs and the Gains from Trade Liberalizations

    DEFF Research Database (Denmark)

    Sørensen, Allan

    2014-01-01

    This paper addresses welfare e¤ects from trade liberalization in a Melitz (2003) heterogeneous-…rms trade model including the empirically important per-unit (i.e. additive) trade costs in addition to the conventional iceberg (i.e. multiplicative) and …xed trade costs. The novel contribution...... of the pa- per is the result that the welfare gain for a given increase in trade openness is higher for reductions in per-unit (additive) trade costs than for reductions in iceberg (multiplicative) trade costs. The ranking derives from di¤erences in intra-industry reallocations and in particular from...

  11. 75 FR 6678 - Agency Information Collection Activities: Customs and Trade Partnership Against Terrorism (C-TPAT)

    Science.gov (United States)

    2010-02-10

    ... Activities: Customs and Trade Partnership Against Terrorism (C-TPAT) AGENCY: U.S. Customs and Border... Terrorism (C-TPAT). This request for comment is being made pursuant to the Paperwork Reduction Act of 1995... Against Terrorism (C-TPAT). OMB Number: 1651-0077. Form Number: None. Abstract: The Customs and Trade...

  12. Pituitary-hormone secretion by thyrotropinomas.

    Science.gov (United States)

    Roelfsema, Ferdinand; Kok, Simon; Kok, Petra; Pereira, Alberto M; Biermasz, Nienke R; Smit, Jan W; Frolich, Marijke; Keenan, Daniel M; Veldhuis, Johannes D; Romijn, Johannes A

    2009-01-01

    Hormone secretion by somatotropinomas, corticotropinomas and prolactinomas exhibits increased pulse frequency, basal and pulsatile secretion, accompanied by greater disorderliness. Increased concentrations of growth hormone (GH) or prolactin (PRL) are observed in about 30% of thyrotropinomas leading to acromegaly or disturbed sexual functions beyond thyrotropin (TSH)-induced hyperthyroidism. Regulation of non-TSH pituitary hormones in this context is not well understood. We there therefore evaluated TSH, GH and PRL secretion in 6 patients with up-to-date analytical and mathematical tools by 24-h blood sampling at 10-min intervals in a clinical research laboratory. The profiles were analyzed with a new deconvolution method, approximate entropy, cross-approximate entropy, cross-correlation and cosinor regression. TSH burst frequency and basal and pulsatile secretion were increased in patients compared with controls. TSH secretion patterns in patients were more irregular, but the diurnal rhythm was preserved at a higher mean with a 2.5 h phase delay. Although only one patient had clinical acromegaly, GH secretion and IGF-I levels were increased in two other patients and all three had a significant cross-correlation between the GH and TSH. PRL secretion was increased in one patient, but all patients had a significant cross-correlation with TSH and showed decreased PRL regularity. Cross-ApEn synchrony between TSH and GH did not differ between patients and controls, but TSH and PRL synchrony was reduced in patients. We conclude that TSH secretion by thyrotropinomas shares many characteristics of other pituitary hormone-secreting adenomas. In addition, abnormalities in GH and PRL secretion exist ranging from decreased (joint) regularity to overt hypersecretion, although not always clinically obvious, suggesting tumoral transformation of thyrotrope lineage cells.

  13. Trade Policy Preferences and the Factor Content of Trade

    DEFF Research Database (Denmark)

    Jäkel, Ina Charlotte; Smolka, Marcel

    demonstrate that the factor price changes induced by trade policy are negatively correlated with the factor content of free trade (and therefore factor abundance). Using large-scale international survey data, we test whether these predicted distributional effects are reflected in the trade policy preferences...... of workers with different labor market skills. In order to isolate the effects of factor abundance from other skill-related confounding factors, we employ a within-skill-group estimator that exploits the cross-country variation in the factor content of free trade. In line with theory, the data show......This paper provides a theoretical and empirical analysis of public opinion towards free trade, investigating cleavages both between and within countries. We study the distributional effects of trade policy in a neoclassical economy with not just two, but many input factors in production. We...

  14. Free trade or just trade? The world trade organisation, human rights ...

    African Journals Online (AJOL)

    The author critically examines the role of the World Trade Organisation (WTO). In recent years, it is noted, the organisation's agenda of trade liberalisation, its perceived lack of accountability and insensitivity to human rights have attracted intense criticism. It has been asserted that provisions of WTO agreements concerning ...

  15. Trade structure, trade mode and the urban-rural income gap in China

    Directory of Open Access Journals (Sweden)

    Hao Wei

    2013-05-01

    Full Text Available This paper analyses the effect of foreign trade in China on the urban-rural income gap from certain angles including trade scale, trade structure and trade mode at the national and provincial levels. The empirical results indicate that, from the perspective of trade scale, the export and import in the eastern and national regions have an expansion effect on the urban-rural income gap, and, in the central regions, they have a reduction effect. Furthermore, export in the western regions has a reduction effect while import in these regions did not have a significant effect. From the perspective of trade structure, the trade of high-tech products and labour-intensive products in the national and eastern regions has an expansion effect, and the trade of the above-mentioned products in the central regions has a reduction effect. The trade of labour-intensive products in the western regions has a reduction effect, and that of high-tech products an expansion effect. From the perspective of trade mode, processing trade and general trade in the national and eastern regions have an expansion effect, while in the central regions they have a reduction effect. General trade in the western regions would expand the urban-rural income gap, and processing trade does not have a significant effect. Consequently, when the South African Government is working out trade multiplicative and corresponding policy, they should consider the development of foreign trade and should pay attention to the labour market structure.

  16. Semiquantum secret sharing using entangled states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2010-01-01

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  17. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  18. Secreted HSP Vaccine for Malaria Prophylaxis

    Science.gov (United States)

    2017-10-01

    burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing...thereby stimulating an avid, antigen specific, cytotoxic CD8 T cell response. Here we developed malaria vaccine that relies on secreted gp96-Ig... stimulating multi-epitope specific cytotoxic T cells. In the proposed studies, we will adapt this vaccine approach to stimulate cytotoxic T cells

  19. Modeling Multi-commodity Trade Information Exchange Methods

    CERN Document Server

    Traczyk, Tomasz

    2012-01-01

    Market mechanisms are entering into new fields of economy, in which some constraints of physical world, e.g. Kirchoffs Law in power grid, must be taken into account during trading. On such markets, some of commodities, like telecommunication bandwidth or electrical energy, appear to be non-storable, and must be exchanged in real-time. On the other hand, the markets tend to react at shortest possible time, so an idea to delegate some competency to autonomous software agents is very attractive. Multi-commodity mechanism addresses the aforementioned requirements. Modeling the relationships between the commodities allows to formulate new, more sophisticated models and mechanisms, which reflect decision situations in a better manner. Application of multi-commodity approach requires solving several issues related to data modeling, communication, semantics aspects of communication, reliability, etc. This book answers some of the questions and points out promising paths for implementation and development. Presented s...

  20. The trade in sharks and their products in the United Arab Emirates

    KAUST Repository

    Jabado, Rima W.; Al Ghais, Saif M Al; Hamza, Waleed; Henderson, Aaron C.; Spaet, Julia L.Y.; Shivji, Mahmood S.; Hanner, Robert Harland

    2015-01-01

    The rapid growth in the demand for shark products, particularly fins, has led to the worldwide overexploitation of many elasmobranch species. Although there are growing concerns about this largely unregulated and unmonitored trade, little information still exists about its dynamics, the species involved and the impact of this pressure on stocks in various regions. Our study provides the first attempt at characterizing the trade in shark products from the United Arab Emirates (UAE), the fourth largest exporter in the world of raw dried shark fins to Hong Kong. A review of trade records and informal interviews with local traders confirmed that the UAE is being used as hub in the broader North Indian Ocean region for the trade in shark products with the Emirati fishery minimally contributing to this trade. Results based on morphological identification of sharks (n= 12,069) and DNA barcoding of tissue samples (n= 655) indicated that the trade was made up of at least 37 species. The most abundant families represented at the Dubai study site were the Sphyrnidae (9.3%), Lamnidae (9%) and Alopiidae (5.9%). While information was mostly limited to shark products originating from the UAE and Oman, results indicated that 45.3% of species traded were considered to be at high risk of global extinction based on the IUCN Red List Global Assessments. Since many of the species found during this survey are likely part of stocks shared with other countries, regional cooperation and management will be crucial to ensure their long term survival.

  1. 78 FR 67927 - Foreign Trade Regulations (FTR): Mandatory Automated Export System Filing for All Shipments...

    Science.gov (United States)

    2013-11-13

    ... Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Nick Orsini, Chief, Foreign Trade Division... 0607-AA50 Foreign Trade Regulations (FTR): Mandatory Automated Export System Filing for All Shipments... approval of new information collection requirements. [[Page 67928

  2. A Cross-Cultural Multi-agent Model of Opportunism in Trade

    Science.gov (United States)

    Hofstede, Gert Jan; Jonker, Catholijn M.; Verwaart, Tim

    According to transaction cost economics, contracts are always incomplete and offer opportunities to defect. Some level of trust is a sine qua non for trade. If the seller is better informed about product quality than the buyer, the buyer has to rely on information the seller provides or has to check the information by testing the product or tracing the supply chain processes, thus incurring extra transaction cost. An opportunistic seller who assumes the buyer to trust, may deliver a lower quality product than agreed upon. In human decisions to deceive and to show trust or distrust, issues like mutual expectations, shame, self-esteem, personality, and reputation are involved. These factors depend in part on traders' cultural background. This paper proposes an agent model of deceit and trust and describes a multi-agent simulation where trading agents are differentiated according to Hofstede's dimensions of national culture. Simulations of USA and Dutch trading situations are compared.

  3. Romania’s foreign trade with the European Union in 2008

    Directory of Open Access Journals (Sweden)

    Ancuta Stangaciu

    2010-12-01

    Full Text Available In this study, I proposed to analyze the spatial concentration of international trade flows between Romania and the European Union both overall and by the sections of the Combined Nomenclature. Using statistical analysis methods such as square and Gini’s index or Onicescu informational energy, I concluded that Romania’s main trade partners are Italy, Germany and France and trade relations with these 3 countries are characterized by exchanges of good to cover, generally a wide range of products.

  4. Diversity and subcellular distribution of archaeal secreted proteins

    Directory of Open Access Journals (Sweden)

    Mechthild ePohlschroder

    2012-07-01

    Full Text Available Secreted proteins make up a significant percentage of a prokaryotic proteome and play critical roles in important cellular processes such as polymer degradation, nutrient uptake, signal transduction, cell wall biosynthesis and motility. The majority of archaeal proteins are believed to be secreted either in an unfolded conformation via the universally conserved Sec pathway or in a folded conformation via the Twin arginine transport (Tat pathway. Extensive in vivo and in silico analyses of N-terminal signal peptides that target proteins to these pathways have led to the development of computational tools that not only predict Sec and Tat substrates with high accuracy but also provide information about signal peptide processing and targeting. Predictions therefore include indications as to whether a substrate is a soluble secreted protein, a membrane or cell-wall anchored protein, or a surface structure subunit, and whether it is targeted for post-translational modification such as glycosylation or the addition of a lipid. The use of these in silico tools, in combination with biochemical and genetic analyses of transport pathways and their substrates, has resulted in improved predictions of the subcellular localization of archaeal secreted proteins, allowing for a more accurate annotation of archaeal proteomes, and has led to the identification of potential adaptations to extreme environments, as well as archaeal kingdom-specific pathways. A more comprehensive understanding of the transport pathways and post-translational modifications of secreted archaeal proteins will also generate invaluable insights that will facilitate the identification of commercially valuable archaeal enzymes and the development of heterologous systems in which to efficiently express them.

  5. Diversity and subcellular distribution of archaeal secreted proteins.

    Science.gov (United States)

    Szabo, Zalan; Pohlschroder, Mechthild

    2012-01-01

    Secreted proteins make up a significant percentage of a prokaryotic proteome and play critical roles in important cellular processes such as polymer degradation, nutrient uptake, signal transduction, cell wall biosynthesis, and motility. The majority of archaeal proteins are believed to be secreted either in an unfolded conformation via the universally conserved Sec pathway or in a folded conformation via the Twin arginine transport (Tat) pathway. Extensive in vivo and in silico analyses of N-terminal signal peptides that target proteins to these pathways have led to the development of computational tools that not only predict Sec and Tat substrates with high accuracy but also provide information about signal peptide processing and targeting. Predictions therefore include indications as to whether a substrate is a soluble secreted protein, a membrane or cell wall anchored protein, or a surface structure subunit, and whether it is targeted for post-translational modification such as glycosylation or the addition of a lipid. The use of these in silico tools, in combination with biochemical and genetic analyses of transport pathways and their substrates, has resulted in improved predictions of the subcellular localization of archaeal secreted proteins, allowing for a more accurate annotation of archaeal proteomes, and has led to the identification of potential adaptations to extreme environments, as well as phyla-specific pathways among the archaea. A more comprehensive understanding of the transport pathways used and post-translational modifications of secreted archaeal proteins will also facilitate the identification and heterologous expression of commercially valuable archaeal enzymes.

  6. Equity Trading under Heterogeneity in Ambiguity

    DEFF Research Database (Denmark)

    Alonso, Irasema; Prado, Mauricio

    -relevant, but hard-to-interpret information: a situation like that during the onset of the recent crisis in financial markets. During this episode, market participants appeared unsure of the values of a variety of assets, trading all but stopped. Ambiguity aversion, it appears to us, offers a tractable way......-participation - a drastic form of trading less - in the ambiguity-ridden market by certain agents (here we have in mind those with higher levels of ambiguity). This endogenous limited participation on the market also has implications for the relative wealth of agents in an economy. The dynamics of the wealth distribution...

  7. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  8. 78 FR 64260 - Overseas Security Advisory Council (OSAC) Meeting Notice

    Science.gov (United States)

    2013-10-28

    ... corporate security policies and procedures and will involve extensive discussion of trade secrets and proprietary commercial information that is privileged and confidential, and will discuss law enforcement... protection of U.S. business information overseas. For more information, contact Marsha Thurman, Overseas...

  9. 78 FR 15031 - Agency Information Collection Activities: Andean Trade Preferences Act

    Science.gov (United States)

    2013-03-08

    ... Management and Budget (OMB) approval. All comments will become a matter of public record. In this document..., Andean Trade Promotion and Drug Eradication Act (ATPDEA) Certificate of Origin. This form can be used... 17. Type of Review: Extension (without change). Affected Public: Businesses. ATPA Certificate of...

  10. RSA-Based Secret Handshakes

    OpenAIRE

    Vergnaud , Damien

    2006-01-01

    A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong and, so far, all the schemes proposed are based on discrete log systems. This paper proposes three new secret handshake protocols secure against active impersonator and detector adversaries. Inspired by two RSA-based key agreement protocols introduced by Okamoto and Tanaka in 1989 and Gira...

  11. Unified criterion for security of secret sharing in terms of violation of Bell inequalities

    International Nuclear Information System (INIS)

    Sen, Aditi; Sen, Ujjwal; Zukowski, Marek

    2003-01-01

    In secret sharing protocols, a secret is to be distributed among several partners such that leaving out any number of them, the rest do not have the complete information. Strong multiqubit correlations in the state by which secret sharing is carried out had been proposed as a criterion for security of such protocols against individual attacks by an eavesdropper. However we show that states with weak multiqubit correlations can also be used for secure secret sharing. That our state has weak multiqubit correlations is shown from the perspective of violation of local realism, and also by showing that its higher-order correlations are described by lower ones. We then present a unified criterion for security of secret sharing in terms of violation of local realism, which works when the secret sharing state is the Greenberger-Horne-Zeilinger state (with strong multiqubit correlations), as well as states of a different class (with weak multiqubit correlations)

  12. Bid-Ask Spreads, Trading Volume and Return Volatility: Intraday Evidence from Indian Stock Market

    Directory of Open Access Journals (Sweden)

    Rashmi Ranjan Paital

    2016-01-01

    Full Text Available This paper empirically examines the relationship between stock return volatility, trading volume and bid-ask spread within the scope of mixture of distribution hypothesis (MDH and sequential information arrival hypothesis (SIAH in the Indian stock market using high frequency 5-minute data set over the period of 2 July 2012 to 31 December 2012. This is the first kind of study in India using bid-ask spread as an additional information variable along with trading volume to investigate the relationship with stock return volatility. Our empirical findings provide evidence of a positive contemporaneous relationship between return volatility and trading volume, and also between return volatility and bid-ask spread. Moreover, the results of Granger causality test show that the information content of trading volume and bid-ask spread are useful for predicting stock return volatility. Our results indicate that information arrival to investors tends to follow a sequential rather than a simultaneous process. This finding is consistent with the sequential information arrival hypothesis and contradicts the mixture of distribution hypothesis.

  13. Trading Agents

    CERN Document Server

    Wellman, Michael

    2011-01-01

    Automated trading in electronic markets is one of the most common and consequential applications of autonomous software agents. Design of effective trading strategies requires thorough understanding of how market mechanisms operate, and appreciation of strategic issues that commonly manifest in trading scenarios. Drawing on research in auction theory and artificial intelligence, this book presents core principles of strategic reasoning that apply to market situations. The author illustrates trading strategy choices through examples of concrete market environments, such as eBay, as well as abst

  14. Modern trends of electronic trading by negotiable financial instruments

    Directory of Open Access Journals (Sweden)

    I.Kravchuk

    2018-03-01

    Full Text Available International negotiable financial instrument markets have a high level of electronic trading. It is displayed using the consolidated limit order book, the widening the range of trading orders, smart order routing, high speed access to the market on the basis of latency minimizing. The result of electronic trading is the development of high-frequency trading, the positive features of which are the increase of trading activity and market liquidity, and the reducing of transaction costs. The main drawback of high-frequency trading is the potential negative impact on market stability (software failures, the manipulative incentives of algorithmic strategies, in particular, technical arbitrage, the use of homogeneous strategies, cyber risks. The current system of high-frequency trading requires particular actions from the regulators to overcome information gaps and enhanced monitoring to create a regulatory environment that could take into account both the aspects of supporting market development and its stability through appropriate macroprudential instruments, especially the implementation of the stress testing of the high-frequency algorithms in response to the shocks of various origin, taking into account the aggregate market effect of the mutual influence of different algorithmic strategies.

  15. Multilayer quantum secret sharing based on GHZ state and generalized Bell basis measurement in multiparty agents

    Science.gov (United States)

    Wang, Xiao-Jun; An, Long-Xi; Yu, Xu-Tao; Zhang, Zai-Chen

    2017-10-01

    A multilayer quantum secret sharing protocol based on GHZ state is proposed. Alice has the secret carried by quantum state and wants to distribute this secret to multiple agent nodes in the network. In this protocol, the secret is transmitted and shared layer by layer from root Alice to layered agents. The number of agents in each layer is a geometric sequence with a specific common ratio. By sharing GHZ maximally entangled states and making generalized Bell basis measurement, one qubit state can be distributed to multiparty agents and the secret is shared. Only when all agents at the last layer cooperate together, the secret can be recovered. Compared with other protocols based on the entangled state, this protocol adopts layered construction so that secret can be distributed to more agents with fewer particles GHZ state. This quantum secret sharing protocol can be used in wireless network to ensure the security of information delivery.

  16. Trading volume in financial markets: An introductory review

    International Nuclear Information System (INIS)

    Duarte Queirós, Sílvio M.

    2016-01-01

    In this article, I introduce a short review on the statistical and dynamical properties of the high-frequency trading volume and its relation to other financial quantities such as the price fluctuations and trading value. In addition, I compare these results — which were obtained within the framework of applications of Physics to quantitative financial analysis —with the mainstream financial hypotheses of mixture of distributions (MDH) and sequential arrival of information (SIAH).

  17. Integrated model of multiple kernel learning and differential evolution for EUR/USD trading.

    Science.gov (United States)

    Deng, Shangkun; Sakurai, Akito

    2014-01-01

    Currency trading is an important area for individual investors, government policy decisions, and organization investments. In this study, we propose a hybrid approach referred to as MKL-DE, which combines multiple kernel learning (MKL) with differential evolution (DE) for trading a currency pair. MKL is used to learn a model that predicts changes in the target currency pair, whereas DE is used to generate the buy and sell signals for the target currency pair based on the relative strength index (RSI), while it is also combined with MKL as a trading signal. The new hybrid implementation is applied to EUR/USD trading, which is the most traded foreign exchange (FX) currency pair. MKL is essential for utilizing information from multiple information sources and DE is essential for formulating a trading rule based on a mixture of discrete structures and continuous parameters. Initially, the prediction model optimized by MKL predicts the returns based on a technical indicator called the moving average convergence and divergence. Next, a combined trading signal is optimized by DE using the inputs from the prediction model and technical indicator RSI obtained from multiple timeframes. The experimental results showed that trading using the prediction learned by MKL yielded consistent profits.

  18. Integrated Model of Multiple Kernel Learning and Differential Evolution for EUR/USD Trading

    Directory of Open Access Journals (Sweden)

    Shangkun Deng

    2014-01-01

    Full Text Available Currency trading is an important area for individual investors, government policy decisions, and organization investments. In this study, we propose a hybrid approach referred to as MKL-DE, which combines multiple kernel learning (MKL with differential evolution (DE for trading a currency pair. MKL is used to learn a model that predicts changes in the target currency pair, whereas DE is used to generate the buy and sell signals for the target currency pair based on the relative strength index (RSI, while it is also combined with MKL as a trading signal. The new hybrid implementation is applied to EUR/USD trading, which is the most traded foreign exchange (FX currency pair. MKL is essential for utilizing information from multiple information sources and DE is essential for formulating a trading rule based on a mixture of discrete structures and continuous parameters. Initially, the prediction model optimized by MKL predicts the returns based on a technical indicator called the moving average convergence and divergence. Next, a combined trading signal is optimized by DE using the inputs from the prediction model and technical indicator RSI obtained from multiple timeframes. The experimental results showed that trading using the prediction learned by MKL yielded consistent profits.

  19. Screening reservoir systems by considering the efficient trade-offs—informing infrastructure investment decisions on the Blue Nile

    Science.gov (United States)

    Geressu, Robel T.; Harou, Julien J.

    2015-12-01

    Multi-reservoir system planners should consider how new dams impact downstream reservoirs and the potential contribution of each component to coordinated management. We propose an optimized multi-criteria screening approach to identify best performing designs, i.e., the selection, size and operating rules of new reservoirs within multi-reservoir systems. Reservoir release operating rules and storage sizes are optimized concurrently for each separate infrastructure design under consideration. Outputs reveal system trade-offs using multi-dimensional scatter plots where each point represents an approximately Pareto-optimal design. The method is applied to proposed Blue Nile River reservoirs in Ethiopia, where trade-offs between total and firm energy output, aggregate storage and downstream irrigation and energy provision for the best performing designs are evaluated. This proof-of concept study shows that recommended Blue Nile system designs would depend on whether monthly firm energy or annual energy is prioritized. 39 TWh/yr of energy potential is available from the proposed Blue Nile reservoirs. The results show that depending on the amount of energy deemed sufficient, the current maximum capacities of the planned reservoirs could be larger than they need to be. The method can also be used to inform which of the proposed reservoir type and their storage sizes would allow for the highest downstream benefits to Sudan in different objectives of upstream operating objectives (i.e., operated to maximize either average annual energy or firm energy). The proposed approach identifies the most promising system designs, reveals how they imply different trade-offs between metrics of system performance, and helps system planners asses the sensitivity of overall performance to the design parameters of component reservoirs.

  20. Redirecting International Trade

    DEFF Research Database (Denmark)

    Kokko, Ari; Söderlund, Bengt; Tingvall, Patrik Gustavsson

    2014-01-01

    The global financial crisis has contributed to the redirection of trade towards new markets outside the OECD area, where both demand patterns and the institutional environment differ from those in the OECD. This study provides an empirical examination of the consequences of this shift, based......-specific investments are particularly difficult to redirect towards markets with weak institutions....... on Swedish firm-level trade data. Results suggest that weak institutions hamper trade and reduce the length of trade relations, especially for small firms. Trade in industries that are characterized by a high frequency of trade conflicts and where transactions require extensive relationship...

  1. Redirecting International Trade

    DEFF Research Database (Denmark)

    Kokko, Ari; Söderlund, Bengt; Tingvall, Patrik Gustavsson

    The global financial crisis has accelerated the redirection of trade towards new markets, outside the OECD area, where both demand patterns and the institutional environment differ from those in the OECD. This study provides an empirical examination of the consequences of this shift. Results...... difficult to redirect towards markets with weak institutions....... suggest that weak institutions hamper trade and reduces the length of trade relations, especially for small firms. Furthermore, trade in industries that are characterized by a high degree of trade conflicts and that requires extensive relationship specific investments for trade to occur are comparatively...

  2. Sur les usages publics du secret : les archives du Service Secret Communiste Roumain

    Directory of Open Access Journals (Sweden)

    Andi Mihalache

    2009-10-01

    Full Text Available L’étude s’occupe des dossiers de l’ancienne police politique du régime communiste de Roumanie, la Securitate. Il a comme point de départ le fait que la mémoire sociale, le contexte politique et les débats publics actuels influencent la recherche historique, modifiant les perceptions sur le document d’archive. Ce dernier n’est plus vu seulement comme source principale de la recherche historique, devenant outil redoutable dans les disputes électorales, car, en base des informations extraites d’un dossier de la Securitate, l’on peut évincer un adversaire incommode. Se montrant utile à dénoncer la collaboration de quelqu’un sous le régime communiste, le document d’archive a acquis des mises symboliques imprévues, étant caché, protégé, volé, racheté, truqué, perdu et redécouvert à commande. Toutes ces pratiques compromettent de plus en plus les chances des historiens de reconstituer de manière crédible l’histoire récente des Roumains. On obtient difficilement l’accès aux dossiers de la Securitate, la patrimonialisation excessive des documents - en vérité leur trésorisation - étant conséquence directe du prestige idéologique et social que le secret détenait au temps communiste.This article focuses on the Securitate files as a political stake, but also as first rank sources for academic research, not from the current perspective of recent history, but from that of cultural history. In post-communist Romania, silence is the secret’s poor relative and confidentiality its respectable form. Ironically or not, we could state that in our country the secrets of communist repression are literally protected by law. The secret is an unbidden, illegitimate competence. In its ethics it does not matter what is good and what is bad, what is true and what is false. The main interest is what is said and what isn’t. The secret being a convention, a pact, the gesture of not saying seems to be more important than

  3. The effects of competing trade regimes on bilateral trade flows: case of Serbia

    Directory of Open Access Journals (Sweden)

    Predrag Bjelić

    2012-12-01

    Full Text Available The aim of this paper is to investigate the effects of competing trade regimes on Serbian trade with its most significant (traditional partners, like European Union and CEFTA 2006 signatories, and other untraditional trade partners with favourable trade regime, like the USA. To this end, gravity model with bilateral and time effects is estimated by Hausman-Taylor AR(1 instrumental variable estimator, using panel data on bilateral trade between Serbia and its main trade partners during the period 2001-2010. The results indicate that overall level of development and difference in factor endowments stimulate Serbia’s exports, which is in accordance with theoretical foundation that inter-industry trade is predominant in exports of less developed countries. Moreover, competing trade regimes appear as important determinant of Serbia’s trade relations, whereas additional liberalization of trade regime with the USA as untraditional trade partner, even asymmetrical to Serbia’s favour, cannot divert trade flows from traditional partners in the long-run. This could mean that distance plays more prominent role in bilateral trade than the degree of liberalization of trade regimes in case of Serbia. The result could be due to the contemporaneous effects of trade preferences granted to Serbia by the EU and other CEFTA 2006 signatories, main trading partners of Serbia.

  4. Trade and health in Samoa: views from the insiders.

    Science.gov (United States)

    Fa'alili-Fidow, Jacinta; McCool, Judith; Percival, Teuila

    2014-04-04

    The purpose of this paper is to portray the views of key stakeholders on the potential impacts of Samoa's free trade negotiations and agreements, on health and wellbeing in Samoa. A series of key informant interviews were undertaken with identified stakeholders during June and July, 2011. Interviews were conducted using a semi-structured interview protocol. They were conducted in-person, in New Zealand and in Samoa. Despite potential health and wellbeing gains arising from trade activities (employment, increase in income, health innovations and empowerment of women), key stakeholders expressed a growing concern about the effect of trade on the population's health, nutrition and the rates of non-communicable diseases. Unease about compromising the national policies due to international regulations was also conveyed. Business and trade representatives however, believed that trade benefits outweighed any health and wellbeing risks to the population of Samoa. Further investigation, using new methodologies are required to determine both the opportunities and threats for trade as a mechanism to improve the health of Samoa's population.

  5. International trade in services: A scoping study of services trade and estimates of benefits from services trade liberalisation

    OpenAIRE

    Ballingall, John; Stephenson, John

    2005-01-01

    This is a scoping study. It summarises the dynamics of services trade in the world economy and discusses some of the benefits of services trade liberalisation from a qualitative and quantitative view point. We place particular emphasis on the role and interests of developing and least developed countries in world services trade. The study also provides an overview of services trade in the New Zealand economy, and, in places, highlights aspects of services trade where New Zealand’s interests m...

  6. The Role of Psychic Distance in International Trade

    DEFF Research Database (Denmark)

    Håkanson, Lars

    2014-01-01

    Purpose – The purpose of this paper is to explore the importance to international trade of impediments related to, first, geographic distance, such as freight and other costs related to the movement of physical goods, and second, “psychic distance”, such as the costs and difficulties of transferr......Purpose – The purpose of this paper is to explore the importance to international trade of impediments related to, first, geographic distance, such as freight and other costs related to the movement of physical goods, and second, “psychic distance”, such as the costs and difficulties...... of transferring and interpreting the information necessary to effect international transactions. Design/methodology/approach – The paper highlights that psychic distance perceptions between countries are not symmetric and that both exporters’ and importers’ perceptions are important. The empirical analysis covers...... international trade in three categories of goods among 25 major trading nations for the period 1962-2008, employing structural equation modeling, incorporating the mutual interdependence of the distance measures. Findings – Exporters’ perceptions are more important for trade in differentiated products than...

  7. Stock-market efficiency in thin-trading markets : the case of the Vietnamese stock market

    NARCIS (Netherlands)

    Truong Dong Loc, [No Value; Lanjouw, Ger; Lensink, Robert

    2010-01-01

    This article reviews developments in the Stock Trading Centre (STC) in Ho Chi Minh City, Vietnam, the main stock market in the country, since its start in 2000. It presents information about developments in the number of stocks traded, trading activity and stock-price developments. This article

  8. Stock Market Efficiency in Thin Trading Markets: The Case of the Vietnamese Stock Market

    NARCIS (Netherlands)

    Dong Loc, T.; Lanjouw, G.; Lensink, B.W.

    2010-01-01

    This article reviews developments in the Stock Trading Centre (STC) in Ho Chi Minh City, Vietnam, the main stock market in the country, since its start in 2000. It presents information about developments in the number of stocks traded, trading activity and stock-price developments. This article

  9. DIAGNOSIS OF PIRARUCU FISH TRADE IN MARKETS AND FAIRS OF SANTARÉM, PARÁ

    Directory of Open Access Journals (Sweden)

    Nayane de Macêdo Nicácio Silva

    2016-12-01

    Full Text Available This study accomplished adiagnos is of the pirarucu fish (Arapaima gigas trading in sale points of Santarém-Pará.  The data were collected weekly through interviews with the trades people at the sale points, in a period from November/2012 to November/2014.The information were scanned in relational databases on Access Platform and analyzed through descriptive statistics. They were applied 354 questionnaires to the trades people who presented the pirarucu fish for sale. It was verified that the payment to the providers is made in cash by the most part of the trades people (93%, which are mostly fishermen of the region (84%. The sliced fish products (50% and fresh piece (33% were the most available forms on the selling stalls. It was verified that the defense period causes changes in the pirarucu fish trading process. Some trades people denied giving information, but the obtained results shows important data to the management of this resource in the region. Keywords: Lower Amazonas; commercialization; Arapaimatidae.

  10. The role of innovation in the trade industry

    Directory of Open Access Journals (Sweden)

    Gheorghe EPURAN

    2015-12-01

    Full Text Available This paper researches the attitudes of managers of small and medium companies from Brasov concerning the importance of the innovation process for their business. The objective of this paper is to determine the present level of innovation in trade industry and the future innovation strategies. The conclusions of this research are based on the results of a marketing research among managers from Brasov city. From our point of view the future of the trade industry will be configured by the mix of information and communication technologies with the social, economic and legislative issues, context in which trade companies will become more competitive and will generate more value for the consumer.

  11. Digital Surveillance: A Novel Approach to Monitoring the Illegal Wildlife Trade

    Science.gov (United States)

    Joly, Damien; Mekaru, Sumiko; Brownstein, John S.

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide. PMID:23236444

  12. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Science.gov (United States)

    Sonricker Hansen, Amy L; Li, Annie; Joly, Damien; Mekaru, Sumiko; Brownstein, John S

    2012-01-01

    A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%), the United States (n = 143, 15.3%), South Africa (n = 75, 8.0%), China (n = 41, 4.4%), and Vietnam (n = 37, 4.0%). Species reported as traded or poached included elephants (n = 107, 12.5%), rhinoceros (n = 103, 12.0%), tigers (n = 68, 7.9%), leopards (n = 54, 6.3%), and pangolins (n = 45, 5.2%). The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  13. Digital surveillance: a novel approach to monitoring the illegal wildlife trade.

    Directory of Open Access Journals (Sweden)

    Amy L Sonricker Hansen

    Full Text Available A dearth of information obscures the true scale of the global illegal trade in wildlife. Herein, we introduce an automated web crawling surveillance system developed to monitor reports on illegally traded wildlife. A resource for enforcement officials as well as the general public, the freely available website, http://www.healthmap.org/wildlifetrade, provides a customizable visualization of worldwide reports on interceptions of illegally traded wildlife and wildlife products. From August 1, 2010 to July 31, 2011, publicly available English language illegal wildlife trade reports from official and unofficial sources were collected and categorized by location and species involved. During this interval, 858 illegal wildlife trade reports were collected from 89 countries. Countries with the highest number of reports included India (n = 146, 15.6%, the United States (n = 143, 15.3%, South Africa (n = 75, 8.0%, China (n = 41, 4.4%, and Vietnam (n = 37, 4.0%. Species reported as traded or poached included elephants (n = 107, 12.5%, rhinoceros (n = 103, 12.0%, tigers (n = 68, 7.9%, leopards (n = 54, 6.3%, and pangolins (n = 45, 5.2%. The use of unofficial data sources, such as online news sites and social networks, to collect information on international wildlife trade augments traditional approaches drawing on official reporting and presents a novel source of intelligence with which to monitor and collect news in support of enforcement against this threat to wildlife conservation worldwide.

  14. Quantum secret sharing based on quantum error-correcting codes

    International Nuclear Information System (INIS)

    Zhang Zu-Rong; Liu Wei-Tao; Li Cheng-Zu

    2011-01-01

    Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k − 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k − 1) threshold scheme. It also takes advantage of classical enhancement of the [2k − 1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. (general)

  15. 76 FR 10005 - North American Free Trade Agreement, Article 1904 NAFTA Panel Reviews; Request for Panel Review

    Science.gov (United States)

    2011-02-23

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement... Secretariat pursuant to Article 1904 of the North American Free Trade Agreement. Panel Review was requested of...-5438. SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free Trade Agreement (``Agreement...

  16. 77 FR 66798 - North American Free-Trade Agreement, Article 1904; NAFTA Panel Reviews; Request for Panel Review

    Science.gov (United States)

    2012-11-07

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free-Trade Agreement... Trade Agreement. Panel Review was requested of the Final Results of the Antidumping Administrative... INFORMATION: Chapter 19 of the North American Free-Trade Agreement (``Agreement'') established a mechanism to...

  17. 77 FR 66441 - North American Free Trade Agreement, Article 1904 NAFTA Panel Reviews; First Request for Panel...

    Science.gov (United States)

    2012-11-05

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement... North American Free Trade Agreement. Panel Review was requested of the U.S. Department of Commerce's..., (202) 482-5438. SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free Trade Agreement...

  18. 76 FR 72677 - North American Free-Trade Agreement, Article 1904 NAFTA Panel Reviews; Request for Panel Review

    Science.gov (United States)

    2011-11-25

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free-Trade Agreement... Trade Agreement. Panel review was requested of the final determination of the effective examination and... 20230, (202) 482-5438. SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free-Trade Agreement...

  19. Attachment A – General Terms and Conditions of the Contract

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    patent, copyright, trade secret, and proprietary information, techniques, sketches, drawings, models, inventions ..... Quality of Work ... visual material, software, documents, books, pamphlets, memoranda or reports, including translations).

  20. Species protection, the changing informal economy, and the politics of access to the bushmeat trade in the Democratic Republic of Congo.

    Science.gov (United States)

    De Merode, Emmanuel; Cowlishaw, Guy

    2006-08-01

    Our understanding of the linkages between the bushmeat trade and the wider informal economy is limited. This lack of knowledge is particularly problematic for conservation under conditions of political instability, when the informal economy can be highly dynamic and impacts on wildlife populations can be severe. To explore these interlinked processes, we conducted a study of the bushmeat trade in Garamba National Park, Democratic Republic of Congo, through a combination of market surveys, semistructured interviews, and direct observation. We focused on the sale of protected and unprotected species in urban and rural markets, and the bushmeat commodity chains that supplied these markets, under conditions of political stability and armed conflict. During peacetime, protected species from the park (predominantly elephant and buffalo) rarely appeared in the rural markets, but they comprised more than half of all bushmeat sales in the urban markets. This pattern reflected differences in the rural and urban commodity chains. Automatic weapons were urban trade. The use of such weapons was discouraged by the traditional chiefs, who administered the village markets. During wartime, the sales of protected species in the urban markets increased fivefold because the military officers fled, leaving behind an open-access system that led to a massive increase in the exploitation of protected species. In contrast, the rural markets remained relatively stable because of the continued authority of the village chiefs. Our results indicate that sociopolitical factors can be an important determinant of species offtake and, therefore, that knowledge of the bushmeat commodity chain can be vital to controlling theprocesses that drive species extraction. In addition, our findings suggest that traditional authorities can be potentially valuable partners for bushmeat management.

  1. Africa-Asia trade versus Africa's trade with the North: Trends and ...

    African Journals Online (AJOL)

    Abstract. This study shows that Europe continues to be Africa's major trading partner given the historical relations and long standing trading arrangements between the two. However, evidence also shows that despite maintaining strong trade linkages with Europe, Africa's trade with Asia has been growing at a much faster ...

  2. Entropy of international trades

    Science.gov (United States)

    Oh, Chang-Young; Lee, D.-S.

    2017-05-01

    The organization of international trades is highly complex under the collective efforts towards economic profits of participating countries given inhomogeneous resources for production. Considering the trade flux as the probability of exporting a product from a country to another, we evaluate the entropy of the world trades in the period 1950-2000. The trade entropy has increased with time, and we show that it is mainly due to the extension of trade partnership. For a given number of trade partners, the mean trade entropy is about 60% of the maximum possible entropy, independent of time, which can be regarded as a characteristic of the trade fluxes' heterogeneity and is shown to be derived from the scaling and functional behaviors of the universal trade-flux distribution. The correlation and time evolution of the individual countries' gross-domestic products and the number of trade partners show that most countries achieved their economic growth partly by extending their trade relationship.

  3. International bioenergy trade in the Netherlands

    NARCIS (Netherlands)

    Junginger, H.M.; de Wit, M.P.; Sikkema, R.; Faaij, A.P.C.

    2008-01-01

    The international biomass trade in the Netherlands has been growing strongly over the last few years, but information on the corresponding volumes, origins and prices is barely available. The objectives of this paper are to quantify imported and exported biomass volumes and origins, and identify

  4. INTERACTION OF TRADE AND FINANCIAL LINKAGES IN THE FREE TRADE ZONES

    Directory of Open Access Journals (Sweden)

    V. Shevchenko

    2014-09-01

    Full Text Available Different models of free trade agreements (FTA and free trade zones (FTZ are considered in the article, argued the complex approach to their structures and results under unstable global economic environment. The typology of the free trade zones models and financial linkages types between countries have been developed. Approaches to the results of the free trade zones have been argued. It has been discovered that for the free trade zones of transitional countries the prevailing are tarde flows concentration whereas financial and investment linkages are acting with developed countries. The main directions of increasing of the financial linkages results in the free trade zones have been discovered.

  5. 77 FR 26252 - North American Free Trade Agreement, Article 1904 NAFTA Panel Reviews; First Request for Panel...

    Science.gov (United States)

    2012-05-03

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement... the North American Free Trade Agreement. On April 25, 2012, an additional Request was filed on behalf... INFORMATION: Chapter 19 of the North American Free Trade Agreement (``Agreement'') established a mechanism to...

  6. 76 FR 16728 - North American Free Trade Agreement, Article 1904; NAFTA Panel Reviews; Request for Panel Review

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free Trade Agreement... American Free Trade Agreement. Panel Review was requested of the U.S. Department of Commerce's final... INFORMATION: Chapter 19 of the North American Free Trade Agreement (``Agreement'') established a mechanism to...

  7. 76 FR 42115 - North American Free-Trade Agreement, Article 1904 NAFTA Panel Reviews; Request for Panel Review

    Science.gov (United States)

    2011-07-18

    ... DEPARTMENT OF COMMERCE International Trade Administration North American Free-Trade Agreement... Free Trade Agreement. Panel Review was requested of the Final Results of the 2008- 2009 and 2009-2010.... SUPPLEMENTARY INFORMATION: Chapter 19 of the North American Free Trade Agreement (``Agreement'') established a...

  8. Comparative study on current trading system and online trading: the ...

    African Journals Online (AJOL)

    Comparative study on current trading system and online trading: the case of ... of online trading and factors affecting its feasibility of implementation in ECX. ... The study found that there is significant capacity problem with major skills gap with ...

  9. THE TRANSATLANTIC TRADE AND INVESTMENT PARTNERSHIP

    Directory of Open Access Journals (Sweden)

    MOT Anca

    2014-06-01

    Full Text Available The Transatlantic Trade and Investment Partnership is a project of exceptional importance which opens a new stage in the globalization process. Given its historical significance, this construction causes numerous debates and controversies. This article attempts to draft a few reflections regarding the main elements, dimensions, orientations, the basis values, objectives and the relevant actors (economic, political, formal and informal of this greatest bilateral trade agreement. We will attempt a decrypting, on the basis of press articles, of political discourse, and of different analyses and comments, what are the social and economic effects, what are the consequences on democracy of this market project.

  10. Secret sharing via quantum entanglement

    International Nuclear Information System (INIS)

    Hillery, M.; Buzek, V.

    1999-01-01

    Secret sharing is a procedure for splitting a message into several parts so that no single part is sufficient to read the message, but the entire set is. This procedure can be implemented using either GHZ states or two-particle entangled states. In the quantum case the presence of an eavesdropper will introduce errors so that her presence can be detected. We also discuss how quantum information can be split into parts so that the message can be reconstructed from a sufficiently large subset of the parts. (Authors)

  11. Secretion management in the mechanically ventilated patient.

    Science.gov (United States)

    Branson, Richard D

    2007-10-01

    Secretion management in the mechanically ventilated patient includes routine methods for maintaining mucociliary function, as well as techniques for secretion removal. Humidification, mobilization of the patient, and airway suctioning are all routine procedures for managing secretions in the ventilated patient. Early ambulation of the post-surgical patient and routine turning of the ventilated patient are common secretion-management techniques that have little supporting evidence of efficacy. Humidification is a standard of care and a requisite for secretion management. Both active and passive humidification can be used. The humidifier selected and the level of humidification required depend on the patient's condition and the expected duration of intubation. In patients with thick, copious secretions, heated humidification is superior to a heat and moisture exchanger. Airway suctioning is the most important secretion removal technique. Open-circuit and closed-circuit suctioning have similar efficacy. Instilling saline prior to suctioning, to thin the secretions or stimulate a cough, is not supported by the literature. Adequate humidification and as-needed suctioning are the foundation of secretion management in the mechanically ventilated patient. Intermittent therapy for secretion removal includes techniques either to simulate a cough, to mechanically loosen secretions, or both. Patient positioning for secretion drainage is also widely used. Percussion and postural drainage have been widely employed for mechanically ventilated patients but have not been shown to reduce ventilator-associated pneumonia or atelectasis. Manual hyperinflation and insufflation-exsufflation, which attempt to improve secretion removal by simulating a cough, have been described in mechanically ventilated patients, but neither has been studied sufficiently to support routine use. Continuous lateral rotation with a specialized bed reduces atelectasis in some patients, but has not been shown

  12. Forecasting stock market averages to enhance profitable trading strategies

    OpenAIRE

    Haefke, Christian; Helmenstein, Christian

    1995-01-01

    In this paper we design a simple trading strategy to exploit the hypothesized distinct informational content of the arithmetic and geometric mean. The rejection of cointegration between the two stock market indicators supports this conjecture. The profits generated by this cheaply replicable trading scheme cannot be expected to persist. Therefore we forecast the averages using autoregressive linear and neural network models to gain a competitive advantage relative to other investors. Refining...

  13. Mining Tacitus: secrets of empire, nature and art in the reason of state.

    Science.gov (United States)

    Keller, Vera

    2012-06-01

    A new political practice, the 'reason of state', informed the ends and practices of natural study in the late sixteenth century. Informed by the study of the Roman historian Tacitus, political writers gathered 'secrets of empire' from both history and travel. Following the economic reorientation of 'reason of state' by Giovanni Botero (1544-1617), such secrets came to include bodies of useful particulars concerning nature and art collected by an expanding personnel of intelligencers. A comparison between various writers describing wide-scale collections, such as Botero, Francis Bacon (1561-1626), Jakob Bornitz (1560-1625) and Matthias Bernegger (1582-1640), reveals that seventeenth-century natural intelligencers across Europe not only were analogous to political intelligencers, but also were sometimes one and the same. Those seeking political prudence cast themselves as miners, prying precious particulars from the recesses of history, experience and disparate disciplines, including mathematics, alchemy and natural philosophy. The seventeenth-century practice of combining searches for secrets of empire, nature and art contests a frequent historiographical divide between empirical science and Tacitism or reason of state. It also points to the ways political cunning shaped the management of information for both politics and the study of nature and art.

  14. determinants of intra-industry trade between zambia and it's trading

    African Journals Online (AJOL)

    Eyerusalem

    countries which are relatively similar and produce relatively similar products. IIT arises from the .... trade based on economies of scale, imperfect competition and product differentiation ... with liberalisation, such as the collapse of the manufacturing industries, the country's trade ... Zambia: Diagnostic Trade Integration. Study.

  15. Trade, development and sustainability

    DEFF Research Database (Denmark)

    Røpke, Inge

    1994-01-01

    Mainstream economic theory argues that trade, and especially free trade, is beneficial to everyone involved. This fundamental idea ? which has the character of a dogma ? still plays an important role in international discussions on trade issues, notably in relation to development and environment...... be defended in all cases. Especially, the developing countries' benefits from trade have been very dubious. Furthermore, the trading system has contributed to environmental problems in several ways, e.g. generating undervaluation of natural resources, stimulating economic growth with environmental....... The purpose of this article is to critically assess the "free trade dogma" and to investigate the validity of widely used arguments concerning the relations between trade and development and between trade and environment. It is argued that the trading system is not something inherently good, which should...

  16. Incretin secretion: direct mechanisms

    DEFF Research Database (Denmark)

    Balk-Møller, Emilie; Holst, Jens Juul; Kuhre, Rune Ehrenreich

    2014-01-01

    The incretin hormones glucose-dependent insulinotropic polypeptide (GIP) and glucagon-like peptide 1 (GLP-1) are secreted from gastro-intestinal K- and L-cells, respectively, and play an important role in post-prandial blood glucose regulation. They do this by direct stimulation of the pancreatic β...... enzyme responsible for incretin degradation (dipeptidyl peptidase-4) is inhibited (drugs are already on the market) while the secretion of endogenous GLP-1 secretion is stimulated at the same time may prove particularly rewarding. In this section we review current knowledge on the mechanisms for direct...

  17. 75 FR 80834 - Proposed Information Collection

    Science.gov (United States)

    2010-12-23

    .... Abstract: Respondents are all Secret Service applicants who, if approved for hire, will require a Top... Service to determine an applicant's eligibility for a Top Secret Clearance, and ensure that the applicant... DEPARTMENT OF HOMELAND SECURITY Secret Service Proposed Information Collection ACTION: 30-day...

  18. Confluence of climate change policies and international trade

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, R.E. Jr.

    1997-12-31

    The paper summarizes market information on energy conservation and renewable energy industries in the U.S., and highlights activities of the International Trade Administration. International treaties agreements on environmental issues are examined with respect to their influence on U.S. trade promotion and job creation. A sectoral analysis of the economic impact of greenhouse gas emissions reductions on industries is very briefly summarized. Finally, the need for a climate change treaty in spite of possible adverse impacts is discussed. 1 tab.

  19. Urn model for products’ shares in international trade

    Science.gov (United States)

    Barbier, Matthieu; Lee, D.-S.

    2017-12-01

    International trade fluxes evolve as countries revise their portfolios of trade products towards economic development. Accordingly products’ shares in international trade vary with time, reflecting the transfer of capital between distinct industrial sectors. Here we analyze the share of hundreds of product categories in world trade for four decades and find a scaling law obeyed by the annual variation of product share, which informs us of how capital flows and interacts over the product space. A model of stochastic transfer of capital between products based on the observed scaling relation is proposed and shown to reproduce exactly the empirical share distribution. The model allows analytic solutions as well as numerical simulations, which predict a pseudo-condensation of capital onto few product categories and when it will occur. At the individual level, our model finds certain products unpredictable, the excess or deficient growth of which with respect to the model prediction is shown to be correlated with the nature of goods.

  20. 28 CFR 802.4 - Definitions.

    Science.gov (United States)

    2010-07-01

    ... Administration COURT SERVICES AND OFFENDER SUPERVISION AGENCY FOR THE DISTRICT OF COLUMBIA DISCLOSURE OF RECORDS... records. (c) Business information means trade secrets or other commercial or financial information. (d...) software is not an agency record. (f) Confidential commercial information means records provided to the...

  1. 7 CFR 1425.5 - Confidentiality.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS COOPERATIVE MARKETING ASSOCIATIONS § 1425.5 Confidentiality. Information submitted to CCC related to trade secrets, financial or commercial operations, or the financial...

  2. Report to Congress on Foreign Economic Collection and Industrial Espionage: 2002

    National Research Council Canada - National Science Library

    2003-01-01

    .... It seeks to assess efforts by foreign entities government and private to unlawfully target or acquire critical US technologies, trade secrets, and sensitive financial or proprietary economic information...

  3. Annual Report to Congress on Foreign Economic Collection and Industrial Espionage-2002

    National Research Council Canada - National Science Library

    2003-01-01

    .... It seeks to assess efforts by foreign entities government and private to unlawfully target or acquire critical US technologies, trade secrets, and sensitive financial or proprietary economic information...

  4. 18 CFR 3a.11 - Classification of official information.

    Science.gov (United States)

    2010-04-01

    ... classified Top Secret, Secret or Confidential, depending upon the degree of its significance to national... classification categories are defined as follows: (1) Top Secret. Top Secret refers to national security information or material which requires the highest degree of protection. The test for assigning Top Secret...

  5. The effect of asymmetric information risk on returns of stocks traded on the BM&FBOVESPA

    Directory of Open Access Journals (Sweden)

    Leonardo Souza Siqueira

    Full Text Available ABSTRACT This study sought to analyze information asymmetry in the Brazilian stock market and its relation with the returns required from portfolios through the metrics volume-synchronized probability of informed trading. To do this, the study used actual data from the transactions of 142 stocks on the Brazilian Securities, Commodities and Futures Exchange (BM&FBOVESPA, within the period from May 1, 2014, to May 31, 2016. The results point out a high flow toxicity level in the orders of these stocks. In segment analyses of the stock market listing, data suggest there is no clue that stocks from the theoretically more overt segments have a lower toxicity level of order flows. The justification for this finding lies on the negative correlation observed between the market value of stocks and the toxicity level of orders. To test the effect of asymmetric information risk on stock returns, a factor related to the toxicity level of orders was added to the three-, four-, and five-factor models. Through the GRS test, we observed that the combination of factors that optimize the explanation of returns of the portfolios created was the one taking advantage of the factors market, size, profitability, investment, and information risk. To test the robustness of these results, the Average F-test was used in data simulated by the bootstrap method, and similar estimates were obtained. It was observed that the factor related to the book-to-market index becomes redundant in the national scenario for the models tested. Also, it was found that the factor related to information risk works as a complement to the factor size and that its inclusion leads to an improved performance of the models, indicating a possible explanatory power of information risk on portfolio returns. Therefore, data suggest that information risk is priced in the Brazilian stock market.

  6. Emissions Trading: The Ugly Duckling in European Climate Policy?

    Energy Technology Data Exchange (ETDEWEB)

    Wraake, Markus

    2009-07-15

    The initial years of the European Union's Emissions Trading System (EU ETS) have provided a large-scale testing ground for trading of a new environmental commodity, carbon dioxide. This paper provides an overview of the origins and characteristics of the EU ETS. It then goes on to analyse the most contentious issues that have been discussed in the economics literature and in the public debate surrounding the trading system. The lessons learned are diverse and not all experiences are positive. Nevertheless, invaluable information has been gained from the EU ETS and policy makers in Europe and elsewhere would be wise to make use of it, be they supporters of emissions trading or sceptics to such policies. The paper concludes with a look toward the future, highlighting some upcoming revisions of the EU ETS and at what issues remain unresolved

  7. Trade Finance during the 2008–9 Trade Collapse : Key Takeaways

    OpenAIRE

    Chauffour, Jean-Pierre; Malouche, Mariem

    2011-01-01

    Trade finance matters for trade, and when financial markets and world trade collapsed three years ago, a shortage in trade finance was hailed as a possible culprit. Because of the potential for global repercussions, world leaders called on the international community to act swiftly to avoid a depression. Governments and international institutions intervened to mitigate the impacts of the c...

  8. Trade-offs in osmoregulation and parallel shifts in molecular function follow ecological transitions to freshwater in the Alewife

    Science.gov (United States)

    Velotta, Jonathan P.; McCormick, Stephen; Schultz, Eric T.

    2015-01-01

    Adaptation to freshwater may be expected to reduce performance in seawater because these environments represent opposing selective regimes. We tested for such a trade-off in populations of the Alewife (Alosa pseudoharengus). Alewives are ancestrally anadromous, and multiple populations have been independently restricted to freshwater (landlocked). We conducted salinity challenge experiments, whereby juvenile Alewives from one anadromous and multiple landlocked populations were exposed to freshwater and seawater on acute and acclimation timescales. In response to acute salinity challenge trials, independently derived landlocked populations varied in the degree to which seawater tolerance has been lost. In laboratory-acclimation experiments, landlocked Alewives exhibited improved freshwater tolerance, which was correlated with reductions in seawater tolerance and hypo-osmotic balance, suggesting that trade-offs in osmoregulation may be associated with local adaptation to freshwater. We detected differentiation between life-history forms in the expression of an ion-uptake gene (NHE3), and in gill Na+/K+-ATPase activity. Trade-offs in osmoregulation, therefore, may be mediated by differentiation in ion-uptake and salt-secreting pathways.

  9. Worlds Apart Trading Together

    DEFF Research Database (Denmark)

    Evers, Kasper Grønlund

    This study sets out to replace the out-dated notion of ‘Indo-Roman trade’ with a more informed perspective integrating the new findings of the last 30 years.In order to accomplish this, a perspective focusing on concrete demand from the ground up is adopted, also shedding light on the role...... of the market in long-distance exchange. Accordingly, the analysis conducted demonstrates that an economically highly substantial trade took place between the Mediterranean and the Indian Ocean in the 1st–6th century CE, altering patterns of consumption and modes of production in India andSouth Arabia as well...... as the Roman Empire.Significantly, it can be documented that this trade was organised at the centres of demand and supply, in Rome and India, respectively, by comparable urban associations, the transport in-between being handled by equally well-organised groups of seagoing merchants.Consequently, this study...

  10. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  11. A new generation of trade policy: potential risks to diet-related health from the trans pacific partnership agreement

    Science.gov (United States)

    2013-01-01

    Trade poses risks and opportunities to public health nutrition. This paper discusses the potential food-related public health risks of a radical new kind of trade agreement: the Trans Pacific Partnership agreement (TPP). Under negotiation since 2010, the TPP involves Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, the USA, and Vietnam. Here, we review the international evidence on the relationships between trade agreements and diet-related health and, where available, documents and leaked text from the TPP negotiations. Similar to other recent bilateral or regional trade agreements, we find that the TPP would propose tariffs reductions, foreign investment liberalisation and intellectual property protection that extend beyond provisions in the multilateral World Trade Organization agreements. The TPP is also likely to include strong investor protections, introducing major changes to domestic regulatory regimes to enable greater industry involvement in policy making and new avenues for appeal. Transnational food corporations would be able to sue governments if they try to introduce health policies that food companies claim violate their privileges in the TPP; even the potential threat of litigation could greatly curb governments’ ability to protect public health. Hence, we find that the TPP, emblematic of a new generation of 21st century trade policy, could potentially yield greater risks to health than prior trade agreements. Because the text of the TPP is secret until the countries involved commit to the agreement, it is essential for public health concerns to be articulated during the negotiation process. Unless the potential health consequences of each part of the text are fully examined and taken into account, and binding language is incorporated in the TPP to safeguard regulatory policy space for health, the TPP could be detrimental to public health nutrition. Health advocates and health-related policymakers must be

  12. A new generation of trade policy: potential risks to diet-related health from the trans pacific partnership agreement.

    Science.gov (United States)

    Friel, Sharon; Gleeson, Deborah; Thow, Anne-Marie; Labonte, Ronald; Stuckler, David; Kay, Adrian; Snowdon, Wendy

    2013-10-16

    Trade poses risks and opportunities to public health nutrition. This paper discusses the potential food-related public health risks of a radical new kind of trade agreement: the Trans Pacific Partnership agreement (TPP). Under negotiation since 2010, the TPP involves Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New Zealand, Peru, Singapore, the USA, and Vietnam. Here, we review the international evidence on the relationships between trade agreements and diet-related health and, where available, documents and leaked text from the TPP negotiations. Similar to other recent bilateral or regional trade agreements, we find that the TPP would propose tariffs reductions, foreign investment liberalisation and intellectual property protection that extend beyond provisions in the multilateral World Trade Organization agreements. The TPP is also likely to include strong investor protections, introducing major changes to domestic regulatory regimes to enable greater industry involvement in policy making and new avenues for appeal. Transnational food corporations would be able to sue governments if they try to introduce health policies that food companies claim violate their privileges in the TPP; even the potential threat of litigation could greatly curb governments' ability to protect public health. Hence, we find that the TPP, emblematic of a new generation of 21st century trade policy, could potentially yield greater risks to health than prior trade agreements. Because the text of the TPP is secret until the countries involved commit to the agreement, it is essential for public health concerns to be articulated during the negotiation process. Unless the potential health consequences of each part of the text are fully examined and taken into account, and binding language is incorporated in the TPP to safeguard regulatory policy space for health, the TPP could be detrimental to public health nutrition. Health advocates and health-related policymakers must be

  13. Acute effects of irradiation on exocrine pancreatic secretion in the pig

    International Nuclear Information System (INIS)

    Monti, P.; Scanff, P.; Joubert, C.; Vergnet, M.; Grison, S.

    1997-01-01

    Several reports on irradiation damages to the pancreas deal essentially with long-term morphologic changes but give few informations on pancreatic exocrine function. Therefore, the aim of the present work was to study the effects of a whole body gamma irradiation on the volume and enzyme activities of the pancreatic juice. The volume of pancreatic juice daily secreted decreased one day after irradiation (-40%, p < 0.01) and remained lower that the control value all over the experimental period (-65%, p < 0.01). Same response was observed for the total proteins secreted in the pancreatic juice but significant decrease was observed only the fourth and the fifth days after irradiation. Therefore, concentration of total protein secreted in the pancreatic juice was not altered all over the experimental period. Total activities of proteolytic enzymes, lipase and amylase led to decrease on day after irradiation and except for trypsin, the attenuated activity became significant from the third day after exposure. On the other hand, specific activities of the proteolytic enzymes and amylase did not show marked modifications after irradiation, whereas lipase specific activity was decreased. In conclusion, a whole body gamma irradiation resulted in a rapid and marked decrease of exocrine pancreatic secretion, in terms of volume as well as secreted enzymes. These modifications may, in part, contribute to the malabsorption of nutrients and these acute effects may be due to some modifications in the regulation of the exocrine pancreatic secretion

  14. Acute effects of irradiation on exocrine pancreatic secretion in the pig

    Energy Technology Data Exchange (ETDEWEB)

    Monti, P; Scanff, P; Joubert, C; Vergnet, M; Grison, S [CEA Fontenay-aux-Roses, 92 (France). Inst. de Protection et de Surete Nucleaire

    1997-03-01

    Several reports on irradiation damages to the pancreas deal essentially with long-term morphologic changes but give few informations on pancreatic exocrine function. Therefore, the aim of the present work was to study the effects of a whole body gamma irradiation on the volume and enzyme activities of the pancreatic juice. The volume of pancreatic juice daily secreted decreased one day after irradiation (-40%, p < 0.01) and remained lower that the control value all over the experimental period (-65%, p < 0.01). Same response was observed for the total proteins secreted in the pancreatic juice but significant decrease was observed only the fourth and the fifth days after irradiation. Therefore, concentration of total protein secreted in the pancreatic juice was not altered all over the experimental period. Total activities of proteolytic enzymes, lipase and amylase led to decrease on day after irradiation and except for trypsin, the attenuated activity became significant from the third day after exposure. On the other hand, specific activities of the proteolytic enzymes and amylase did not show marked modifications after irradiation, whereas lipase specific activity was decreased. In conclusion, a whole body gamma irradiation resulted in a rapid and marked decrease of exocrine pancreatic secretion, in terms of volume as well as secreted enzymes. These modifications may, in part, contribute to the malabsorption of nutrients and these acute effects may be due to some modifications in the regulation of the exocrine pancreatic secretion

  15. Trends in International Security and Trade (Trade Experts’ Roundtable, 2017

    Directory of Open Access Journals (Sweden)

    Elinor Sloan

    2017-08-01

    Full Text Available With so many trouble spots in the world, it can be difficult for Canadian businesses to know where to trade successfully and with some assurance of security. Canadian government organizations affiliated with Global Affairs Canada (GAC need to take a broader view of international security, rather than assessing states in isolation, if businesses are to have the vital information they need. Multinational firms typically have their own risk-management strategies, but smaller enterprises need outside help to get information on the safety and viability of potential export markets. However, none of these GAC-affiliated organizations examines the security risks inherent in the interactions between countries. While GAC focuses mainly on economics, tariffs, language barriers and other factors, the Crown corporation Export Development Canada (EDC does risk assessments of various countries to determine what level of political risk insurance it should offer to Canadian companies. The Business Development Bank, best known for its domestic work with Canadian businesses, has branched out into the foreign realm too, but only in terms of industry and market research on export assessments. Based on long-term GDP projections, some interesting forecasts have been made that will affect how and where Canadian businesses trade internationally. They will need accurate information on risk and security in order to do so. By 2030, the four largest world economies will be those of the U.S., China, India and Japan. For now, the best bets for Canadian businesses in the short to medium term include China, India and some Southeast Asian countries, although there are some accompanying dangers in these areas. Pakistan, Nigeria and Egypt have the potential to be good markets for Canadian exports, but the current risk from terrorist activity precludes foreign commercial interests. The unstable relationships between countries in the world’s hotspots need continuing assessment and

  16. Shared Secrets versus Secrets Kept Private Are Linked to Better Adolescent Adjustment

    Science.gov (United States)

    Frijns, Tom; Finkenauer, Catrin; Keijsers, Loes

    2013-01-01

    It is a household notion that secrecy is bad while sharing is good. But what about shared secrets? The present research adopts a functional analysis of sharing secrets, arguing that it should negate harmful consequences generally associated with secrecy and serves important interpersonal functions in adolescence. A survey study among 790 Dutch…

  17. 46 CFR 503.86 - Public access to records.

    Science.gov (United States)

    2010-10-01

    ... in a foreign court or international tribunal, or an arbitration, or the initiation, conduct, or...) Trade secrets and commercial or financial information obtained from a person and privileged or...

  18. 45 CFR 503.24 - Grounds for closing a meeting.

    Science.gov (United States)

    2010-10-01

    ... court or international tribunal, or an arbitration, or the initiation, conduct, or disposition by the... trade secrets and commercial or financial information obtained from a person and privileged or...

  19. 78 FR 76178 - Submission for OMB Review; Comment Request

    Science.gov (United States)

    2013-12-16

    ... provide investors, and the subject issuer with information about accumulations of equity securities that... national security, trade secrets, or privileged commercial or financial information. An agency may not... Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy...

  20. 41 CFR 51-8.2 - Scope.

    Science.gov (United States)

    2010-07-01

    ... from disclosure by statute; (4) Trade secrets and commercial or financial information obtained from a... lawful national security intelligence investigation, information furnished by a confidential source, (v... intelligence or counterintelligence, or international terrorism, and the existence of the records is classified...

  1. Implications of the New Regional Trade Agreements for the World Trading System

    Directory of Open Access Journals (Sweden)

    Agnes Ghibuțiu

    2017-04-01

    Full Text Available The year 2013 witnessed an outstanding rise in the pace and scale of negotiations on regional trade agreements (RTAs. While RTAs are not a new phenomenon, current negotiations involve multiple parties and/or major trading countries that have a significant combined economic weight, i.e. mega-RTAs. This paper looks at the recent surge in trade regionalism and addresses some of the key issues related to the potential impact of mega-RTAs upon the world trading system and global trade patterns. It examines the peculiarities of the new mega-RTAs and the factors underlying their proliferation, and discusses the main concerns raised by their foreseeable impact on excluded countries and the wider trading system. The paper finds that, if successfully concluded, mega-RTAs are likely to have far-reaching implications for the world trading regime, affecting its transparency and coherence. Nevertheless, the adverse effects could be cushioned through a revival of trading nations’ interest in the multilateral Doha Round talks.

  2. DLP system and the secret of personal correspondence

    Directory of Open Access Journals (Sweden)

    Mavrinskaya T.V.

    2017-04-01

    Full Text Available according to the authors, every day a number of threats to information security increases, and this requires an increase in resources (systems of information protection of organizations and enterprises. There are many information security tools with different functionality, but the main mean of preventing information leakage is the Date Loss Prevention (DLP system. If you need to establish control over the leak of confidential information there appear a number of questions of conformity of decisions with the legislation and regulations. This article describes the issue of compliance functionality of a DLP system the provisions and requirements of the legislation in the sphere of protection of family and personal secrets, as well as compliance with the Constitutional right of citizens to privacy of correspondence.

  3. Trade Integration and Trade Imbalances in the European Union: A Network Perspective

    Science.gov (United States)

    Krings, Gautier M.; Carpantier, Jean-François; Delvenne, Jean-Charles

    2014-01-01

    We study the ever more integrated and ever more unbalanced trade relationships between European countries. To better capture the complexity of economic networks, we propose two global measures that assess the trade integration and the trade imbalances of the European countries. These measures are the network (or indirect) counterparts to traditional (or direct) measures such as the trade-to-GDP (Gross Domestic Product) and trade deficit-to-GDP ratios. Our indirect tools account for the European inter-country trade structure and follow (i) a decomposition of the global trade flow into elementary flows that highlight the long-range dependencies between exporting and importing economies and (ii) the commute-time distance for trade integration, which measures the impact of a perturbation in the economy of a country on another country, possibly through intermediate partners by domino effect. Our application addresses the impact of the launch of the Euro. We find that the indirect imbalance measures better identify the countries ultimately bearing deficits and surpluses, by neutralizing the impact of trade transit countries, such as the Netherlands. Among others, we find that ultimate surpluses of Germany are quite concentrated in only three partners. We also show that for some countries, the direct and indirect measures of trade integration diverge, thereby revealing that these countries (e.g. Greece and Portugal) trade to a smaller extent with countries considered as central in the European Union network. PMID:24465381

  4. Trade integration and trade imbalances in the European Union: a network perspective.

    Science.gov (United States)

    Krings, Gautier M; Carpantier, Jean-François; Delvenne, Jean-Charles

    2014-01-01

    We study the ever more integrated and ever more unbalanced trade relationships between European countries. To better capture the complexity of economic networks, we propose two global measures that assess the trade integration and the trade imbalances of the European countries. These measures are the network (or indirect) counterparts to traditional (or direct) measures such as the trade-to-GDP (Gross Domestic Product) and trade deficit-to-GDP ratios. Our indirect tools account for the European inter-country trade structure and follow (i) a decomposition of the global trade flow into elementary flows that highlight the long-range dependencies between exporting and importing economies and (ii) the commute-time distance for trade integration, which measures the impact of a perturbation in the economy of a country on another country, possibly through intermediate partners by domino effect. Our application addresses the impact of the launch of the Euro. We find that the indirect imbalance measures better identify the countries ultimately bearing deficits and surpluses, by neutralizing the impact of trade transit countries, such as the Netherlands. Among others, we find that ultimate surpluses of Germany are quite concentrated in only three partners. We also show that for some countries, the direct and indirect measures of trade integration diverge, thereby revealing that these countries (e.g. Greece and Portugal) trade to a smaller extent with countries considered as central in the European Union network.

  5. Energy trading

    International Nuclear Information System (INIS)

    Beckmann, K.; Schroeter, S.

    2009-01-01

    Two brief articles and two interviews deal with the subject of energy trading. Power and gas exchanges in Europe multiply, but, experts say, we are nowhere near a mature, integrated European energy market as yet. Trading regulations need to be improved and harmonised and interconnections expanded. European Energy Review assesses the state of energy trading in Europe and interviews the ceo's of NordPool (the Nordic power exchange) and APX (Amsterdam Power Exchange)

  6. Sodium arsenite impairs insulin secretion and transcription in pancreatic β-cells

    International Nuclear Information System (INIS)

    Diaz-Villasenor, Andrea; Sanchez-Soto, M. Carmen; Cebrian, Mariano E.; Ostrosky-Wegman, Patricia; Hiriart, Marcia

    2006-01-01

    Human studies have shown that chronic inorganic arsenic (iAs) exposure is associated with a high prevalence and incidence of type 2 diabetes. However, the mechanism(s) underlying this effect are not well understood, and practically, there is no information available on the effects of arsenic on pancreatic β-cells functions. Thus, since insulin secreted by the pancreas plays a crucial role in maintaining glucose homeostasis, our aim was to determine if sodium arsenite impairs insulin secretion and mRNA expression in single adult rat pancreatic β-cells. Cells were treated with 0.5, 1, 2, 5 and 10 μM sodium arsenite and incubated for 72 and 144 h. The highest dose tested (10 μM) decreased β-cell viability, by 33% and 83%, respectively. Insulin secretion and mRNA expression were evaluated in the presence of 1 and 5 μM sodium arsenite. Basal insulin secretion, in 5.6 mM glucose, was not significantly affected by 1 or 5 μM treatment for 72 h, but basal secretion was reduced when cells were exposed to 5 μM sodium arsenite for 144 h. On the other hand, insulin secretion in response to 15.6 mM glucose decreased with sodium arsenite in a dose-dependent manner in such a way that cells were no longer able to distinguish between different glucose concentrations. We also showed a significant decrease in insulin mRNA expression of cells exposed to 5 μM sodium arsenite during 72 h. Our data suggest that arsenic may contribute to the development of diabetes mellitus by impairing pancreatic β-cell functions, particularly insulin synthesis and secretion

  7. On alternative approach for verifiable secret sharing

    OpenAIRE

    Kulesza, Kamil; Kotulski, Zbigniew; Pieprzyk, Joseph

    2002-01-01

    Secret sharing allows split/distributed control over the secret (e.g. master key). Verifiable secret sharing (VSS) is the secret sharing extended by verification capacity. Usually verification comes at the price. We propose "free lunch", the approach that allows to overcome this inconvenience.

  8. George's secret key to the universe

    CERN Document Server

    Hawking, Lucy; Galfard, Christophe; Parsons, Gary

    2007-01-01

    In their bestselling book for young readers, noted physicist Stephen Hawking and his daughter, Lucy, provide a grand and funny adventure that explains fascinating information about our universe, including Dr. Hawking's latest ideas about black holes. It's the story of George, who's taken through the vastness of space by a scientist, his daughter, and their super-computer named Cosmos. George's Secret Key to the Universe was a New York Times bestseller and a selection of Al's Book Club on the Today show.

  9. 76 FR 71378 - Labor Advisory Committee for Trade Negotiations and Trade Policy

    Science.gov (United States)

    2011-11-17

    ... DEPARTMENT OF LABOR Office of the Secretary Labor Advisory Committee for Trade Negotiations and Trade Policy ACTION: Meeting notice. SUMMARY: Pursuant to the provisions of the Federal Advisory... Committee for Trade Negotiation and Trade Policy. Date, Time, Place: November 30, 2011; 2-4:30 p.m.; U.S...

  10. 77 FR 65581 - Labor Advisory Committee for Trade Negotiations and Trade Policy

    Science.gov (United States)

    2012-10-29

    ... DEPARTMENT OF LABOR Office of the Secretary Labor Advisory Committee for Trade Negotiations and Trade Policy ACTION: Meeting notice. SUMMARY: Pursuant to the provisions of the Federal Advisory... Committee for Trade Negotiation and Trade Policy. Date, Time, Place: November 13, 2012; 10:00 a.m.-12:00 p.m...

  11. Improving the availability of trade finance in developing countries: An assessment of remaining gaps

    OpenAIRE

    Auboin, Marc

    2015-01-01

    While conditions in trade finance markets returned to normality in the main routes of trade, the structural difficulties of poor countries in accessing trade finance have not disappeared – and might have been worsened during and after the global financial crisis. In fact, there is a consistent flow of information indicating that trade finance markets have remained characterized by a greater selectivity in risk-taking and flight to “quality” customers. In that environment, the lower end of the...

  12. Coordinated Border Management Through Digital Trade Infrastructures and Trans-National Government Cooperation : The FloraHolland Case

    NARCIS (Netherlands)

    Rukanova, B.D.; Huiden, Roel; Tan, Y.

    2017-01-01

    Digital infrastructures (DI) that support information exchange related to international trade processes (here referred to as Digital Trade Infrastructures (DTI)) have been seen as an instrument to help address the trade facilitation and security challenges. Data pipelines can be seen as an example

  13. Expanding our understanding of the trade in marine aquarium animals

    Directory of Open Access Journals (Sweden)

    Andrew L. Rhyne

    2017-01-01

    Full Text Available The trade of live marine animals for home and public aquaria has grown into a major global industry. Millions of marine fishes and invertebrates are removed from coral reefs and associated habitats each year. The majority are imported into the United States, with the remainder sent to Europe, Japan, and a handful of other countries. Despite the recent growth and diversification of the aquarium trade, to date, data collection is not mandatory, and hence comprehensive information on species volume and diversity is lacking. This lack of information makes it impossible to study trade pathways. Without species-specific volume and diversity data, it is unclear how importing and exporting governments can oversee this industry effectively or how sustainability should be encouraged. To expand our knowledge and understanding of the trade, and to effectively communicate this new understanding, we introduce the publically-available Marine Aquarium Biodiversity and Trade Flow online database (https://www.aquariumtradedata.org/. This tool was created to communicate the volume and diversity of marine fishes and/or invertebrates imported into the US over three complete years (2008, 2009, and 2011 and three partial years (2000, 2004, 2005. To create this tool, invoices pertaining to shipments of live marine fishes and invertebrates were scanned and analyzed for species name, species quantities, country of origin, port of entry, and city of import destination. Here we focus on the analysis of the later three years of data and also produce an estimate for the entirety of 2000, 2004, and 2005. The three-year aggregate totals (2008, 2009, 2011 indicate that just under 2,300 fish and 725 invertebrate species were imported into the US cumulatively, although just under 1,800 fish and 550 invertebrate species were traded annually. Overall, the total number of live marine animals decreased between 2008 and 2011. In 2008, 2009, and 2011, the total number of individual

  14. Boldness predicts an individual's position along an exploration-exploitation foraging trade-off.

    Science.gov (United States)

    Patrick, Samantha C; Pinaud, David; Weimerskirch, Henri

    2017-09-01

    Individuals do not have complete information about the environment and therefore they face a trade-off between gathering information (exploration) and gathering resources (exploitation). Studies have shown individual differences in components of this trade-off but how stable these strategies are in a population and the intrinsic drivers of these differences is not well understood. Top marine predators are expected to experience a particularly strong trade-off as many species have large foraging ranges and their prey often have a patchy distribution. This environment leads these species to exhibit pronounced exploration and exploitation phases but differences between individuals are poorly resolved. Personality differences are known to be important in foraging behaviour but also in the trade-off between exploration and exploitation. Here we test whether personality predicts an individual exploration-exploitation strategy using wide ranging wandering albatrosses (Diomedea exulans) as a model system. Using GPS tracking data from 276 wandering albatrosses, we extract foraging parameters indicative of exploration (searching) and exploitation (foraging) and show that foraging effort, time in patch and size of patch are strongly correlated, demonstrating these are indicative of an exploration-exploitation (EE) strategy. Furthermore, we show these are consistent within individuals and appear stable in the population, with no reproductive advantage. The searching and foraging behaviour of bolder birds placed them towards the exploration end of the trade-off, whereas shy birds showed greater exploitation. This result provides a mechanism through which individual foraging strategies may emerge. Age and sex affected components of the trade-off, but not the trade-off itself, suggesting these factors may drive behavioural compensation to maintain resource acquisition and this was supported by the evidence that there were no fitness consequence of any EE trait nor the trade

  15. Information and Heterogeneous Beliefs

    DEFF Research Database (Denmark)

    Christensen, Peter Ove; Qin, Zhenjiang

    2014-01-01

    In an incomplete market with heterogeneous prior beliefs, we show public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. The Pareto effcient public information system is the system enjoying the maximum ex ante cost of capital...... and the maximum expected abnormal trading volume. Imperfect public information increases the gains-to-trade based on heterogeneously updated posterior beliefs. In an exchange economy, this leads to higher growth in the investors' certainty equivalents and, thus, a higher equilibrium interest rate, whereas the ex...... ante risk premium is unaffected by the informativeness of the public information system. Similar results are obtained in a production economy, but the impact on the ex ante cost of capital is dampened compared to the exchange economy due to welfare improving reductions in real investments to smooth...

  16. Simulating cloud environment for HIS backup using secret sharing.

    Science.gov (United States)

    Kuroda, Tomohiro; Kimura, Eizen; Matsumura, Yasushi; Yamashita, Yoshinori; Hiramatsu, Haruhiko; Kume, Naoto

    2013-01-01

    In the face of a disaster hospitals are expected to be able to continue providing efficient and high-quality care to patients. It is therefore crucial for hospitals to develop business continuity plans (BCPs) that identify their vulnerabilities, and prepare procedures to overcome them. A key aspect of most hospitals' BCPs is creating the backup of the hospital information system (HIS) data at multiple remote sites. However, the need to keep the data confidential dramatically increases the costs of making such backups. Secret sharing is a method to split an original secret message so that individual pieces are meaningless, but putting sufficient number of pieces together reveals the original message. It allows creation of pseudo-redundant arrays of independent disks for privacy-sensitive data over the Internet. We developed a secret sharing environment for StarBED, a large-scale network experiment environment, and evaluated its potential and performance during disaster recovery. Simulation results showed that the entire main HIS database of Kyoto University Hospital could be retrieved within three days even if one of the distributed storage systems crashed during a disaster.

  17. Trade credit and the supply chain

    NARCIS (Netherlands)

    Fabbri, D.; Klapper, L.F.

    2009-01-01

    This paper studies supply chain financing. We investigate why a firm extends trade credit to its customers and how this decision relates to its own financing. We use a novel firm-level database with unique information on market power in both output and input markets and on the amount, terms, and

  18. A Comparative Analysis of Trade Facilitation in Selected Regional and Bilateral Trade Agreement

    OpenAIRE

    Institute for International Trade

    2006-01-01

    This study compared the treatment of trade facilitation in four selected regional trade agreements, AFTA, APEC, SAFRA and PACER, and in one bilateral free trade agreement being the Australia-Singapore Free Trade Agreement (ASFTA), with a view to determining model trade facilitation principles and measures which may be instructive for developing country negotiations and policy makers.

  19. REGIONALIZATION AND INTRA-INDUSTRY TRADE. AN ANALYSIS OF AUTOMOBILE INDUSTRY TRADE IN NAFTA

    OpenAIRE

    Sylvie MONTOUT; Jean-Louis MUCCHIELLI; Soledad ZIGNAGO

    2002-01-01

    As was shown in some previous studies, the creation of the North American Free Trade American (NAFTA) has significantly increased trade and investment flows between member countries. Consequently, it seems appropriate to analyze the incidences of the free trade agreement on the nature of trade. In this paper, we study the intra-industry trade in the automobile industry within the NAFTA area. Our results highlight an increase in intra-industry trade since the beginning of the 1990s. The import...

  20. Greenhouse gas trading

    Energy Technology Data Exchange (ETDEWEB)

    Drazilov, P. [Natsource-Tullett Emissions Brokerage, Toronto, ON (Canada)

    2001-07-01

    Natsource-Tullett Emissions Brokerage is a market leader in natural gas, electricity, coal, and weather, emissions with a total of more than $2 billion by volume in emissions transactions in the United States, Canada, Australia, Japan, and Europe. This power point presentation addressed issues dealing with global warming, the Kyoto Protocol, and explained where we are in terms of reaching commitments for the first compliance period between 2008-2012. The paper focused on international emissions trading (IET), joint implementation (JI) and the clean development mechanism (CDM) and explained how greenhouse gases are traded. Emissions trading refers to the trade of carbon dioxide, methane, nitrous oxides, perfluoro-carbons, hydrofluorocarbons, and sulphur hexafluorides. The motivational drivers for trading were outlined in terms of liability for buyers and assets for sellers. To date, trading activity is nearly 120 transactions with nearly 70 million tons of carbon dioxide equivalent. tabs., figs.

  1. Reconfiguring trade mark law

    DEFF Research Database (Denmark)

    Elsmore, Matthew James

    2013-01-01

    -border setting, with a particular focus on small business and consumers. The article's overall message is to call for a rethink of received wisdom suggesting that trade marks are effective trade-enabling devices. The case is made for reassessing how we think about European trade mark law.......First, this article argues that trade mark law should be approached in a supplementary way, called reconfiguration. Second, the article investigates such a reconfiguration of trade mark law by exploring the interplay of trade marks and service transactions in the Single Market, in the cross...

  2. 5 CFR 2413.4 - Closing of meetings; reasons therefor.

    Science.gov (United States)

    2010-01-01

    ... otherwise involving a determination on the record after opportunity for a hearing, or any court proceedings... confidential trade secrets and commercial or financial information); (c)(5) (matters of alleged criminal...

  3. INDONESIAN TRADE UNDER CHINA FREE TRADE AREA

    Directory of Open Access Journals (Sweden)

    Tavi Supriana

    2011-09-01

    Full Text Available This paper investigates the implementation of CAFTA (China-Asean Free Trade Area on the international trade flows across Indonesia, China and the rest of ASEAN using a gravitation model. It finds the evidence that the influence of diversion and creation effects on China are significant, while the influence of both effects on Indonesia are not significant. It also finds that the diversion effect, which leads to a decrease in society’s wealth, is greater than that of the creation effect. As a consequence, the gap across countries involved in the trade agreement is wider. Keywords: CAFTA, gravitation model, diversion effect, creation effectJEL classification numbers: F13, F14, F15

  4. Modeling the live-pig trade network in Georgia: Implications for disease prevention and control.

    Directory of Open Access Journals (Sweden)

    Esther Andrea Kukielka

    Full Text Available Live pig trade patterns, drivers and characteristics, particularly in backyard predominant systems, remain largely unexplored despite their important contribution to the spread of infectious diseases in the swine industry. A better understanding of the pig trade dynamics can inform the implementation of risk-based and more cost-effective prevention and control programs for swine diseases. In this study, a semi-structured questionnaire elaborated by FAO and implemented to 487 farmers was used to collect data regarding basic characteristics about pig demographics and live-pig trade among villages in the country of Georgia, where very scarce information is available. Social network analysis and exponential random graph models were used to better understand the structure, contact patterns and main drivers for pig trade in the country. Results indicate relatively infrequent (a total of 599 shipments in one year and geographically localized (median Euclidean distance between shipments = 6.08 km; IQR = 0-13.88 km pig movements in the studied regions. The main factors contributing to live-pig trade movements among villages were being from the same region (i.e., local trade, usage of a middleman or a live animal market to trade live pigs by at least one farmer in the village, and having a large number of pig farmers in the village. The identified villages' characteristics and structural network properties could be used to inform the design of more cost-effective surveillance systems in a country which pig industry was recently devastated by African swine fever epidemics and where backyard production systems are predominant.

  5. The effects of cognitive style and emotional trade-off difficulty on information processing in decision-making.

    Science.gov (United States)

    Wang, Dawei; Hao, Leilei; Maguire, Phil; Hu, Yixin

    2016-12-01

    This study investigated the effects of cognitive style and emotional trade-off difficulty (ETOD) on information processing in decision-making. Eighty undergraduates (73.75% female, M = 21.90), grouped according to their cognitive style (field-dependent or field-independent), conducted an Information Display Board (IDB) task, through which search time, search depth and search pattern were measured. Participants' emotional states were assessed both before and after the IDB task. The results showed that participants experienced significantly more negative emotion under high ETOD compared to those under low ETOD. While both cognitive style and ETOD had significant effects on search time and search depth, only ETOD significantly influenced search pattern; individuals in both cognitive style groups tended to use attribute-based processing under high ETOD and to use alternative-based processing under low ETOD. There was also a significant interaction between cognitive style and ETOD for search time and search depth. We propose that these results are best accounted for by the coping behaviour framework under high ETOD, and by the negative emotion hypothesis under low ETOD. © 2016 International Union of Psychological Science.

  6. New Trends of E-commerce Development Brought by Chinese International Trade

    Institute of Scientific and Technical Information of China (English)

    Wen Xu

    2015-01-01

    e-commerce as a new trade, in the form of the current globalization of information and economic globalization, is with its strong competitive advantage and vitality, which can quickly spread to all areas of international business, and it changes in the international economic landscape had a profound impact. E-commerce is based on the rapid development of computer technology and the wide application is on the use of the Internet and advanced communications technology. It changes the the past, traditional physical trading and cash transactions, in a virtualization market, merchandise presentation via the web. With the online payment, the use of advanced materials and distribution logistics systems are for tangible and intangible commodities trading of a new trade. This new types of transactions overturn the traditional transaction methods, so that the whole business process, whether it is in the application of domestic and foreign trade, and has achieved the goal of online shopping and trading. E-commerce international trade transaction cost savings improve the efficiency of transactions; it changes in the foreign trade transaction process, the development of third-party trading platform is increasing the competitiveness of enterprises and the creation of employment opportunities in all aspects of a country' s foreign trade and the overall economy have had a significant impact. E-commerce is to establish a new economic and trade order, the already mature in the world trading system and the order is being re-shuffling of the emerging e-commerce trade. China is the world' s top-ranked in the world' s total import and export trade power, is under the wave of e-commerce, the difficulties, we should seize opportunities, and meet challenges.

  7. Trusted intermediating agents in electronic trade networks

    NARCIS (Netherlands)

    T.B. Klos (Tomas); F. Alkemade (Floortje)

    2005-01-01

    htmlabstract Electronic commerce and trading of information goods significantly impact the role of intermediaries: consumers can bypass intermediating agents by forming direct links to producers. One reason that traditional intermediaries can still make a profit, is that they have more knowledge of

  8. 78 FR 16611 - Freedom of Information Act; Correction

    Science.gov (United States)

    2013-03-18

    ... FEDERAL TRADE COMMISSION 16 CFR Part 4 Freedom of Information Act; Correction AGENCY: Federal Trade Commission. ACTION: Final rule; correction. SUMMARY: The Federal Trade Commission published a... instruction in our final rule entitled ``Freedom of Information Act'' published February 28, 2013 (78 FR 13472...

  9. Trade, Labor, Legitimacy

    OpenAIRE

    Guzman, Andrew

    2003-01-01

    The relationship between international trade and labor standards is one of several controversial issues facing the WTO. Proponents of a trade-labor link argue that labor is a human rights issue and that trade sanctions represent a critical tool in the effort to improve international working conditions. Opponents argue that a link between trade and labor would open the door to protectionist measures that would target low wage countries and harm the very workers the policy is intended to help. ...

  10. TRADING ACTIVITY AND PRICES IN ENERGY FUTURES MARKET

    Directory of Open Access Journals (Sweden)

    Aysegul Ates

    2016-04-01

    Full Text Available This paper aims to examine trading activity and the relationship between futures trading activity by trader type and energy price movements in three energy futures markets –natural gas, crude oil and heating oil. We find that the level of net positions of speculators are positively related to future returns and in contrast net positions of hedgers are negatively related to futures price changes in all three markets. The changes in net positions are relatively more informative compare to the level of net positions in predicting price changes in related markets.

  11. 19 CFR 213.6 - Information concerning assistance.

    Science.gov (United States)

    2010-04-01

    ... 213.6 Customs Duties UNITED STATES INTERNATIONAL TRADE COMMISSION INVESTIGATIONS OF UNFAIR PRACTICES IN IMPORT TRADE TRADE REMEDY ASSISTANCE § 213.6 Information concerning assistance. Any person may.... International Trade Commission, 500 E Street SW., Washington, DC 20436. ...

  12. Secret Shopping is an Effective Tool for Identifyings in Library User Experience Local Pattern

    Directory of Open Access Journals (Sweden)

    Kelley Wadson

    2016-12-01

    Full Text Available A Review of: Boyce, C. M. (2015. Secret shopping as user experience assessment tool. Public Services Quarterly, 11(4, 237-253. doi:10.1080/15228959.2015.1084903 Objective – To assess library user experience (UX at two entry-level service desks to determine the need for, and inform the aspects in which to improve, services and staff training. Design – Observational study using secret shopping. Setting – A small, private university in Illinois, United States of America. Subjects – Library employees, comprised primarily of student assistants; and 11 secret shoppers, comprised of 5 faculty members, 4 staff members, and 2 first-year students from the university.

  13. Effect of adrenal hormones on thyroid secretion and thyroid hormones on adrenal secretion in the sheep.

    Science.gov (United States)

    Falconer, I R; Jacks, F

    1975-01-01

    1. Previous work has shown that after stressful stimuli, sheep initially secrete increased amounts of thyroid hormone, at a time when adrenal secretion is also elevated. 2. This study was designed to evaluate (a) any short-term activation or inhibition of thyroid secretion by exogenous cortisol or ACTH administered in quantities comparable to those secreted after stress in sheep and (b) any short-term effect that exogenous thyroxine or triiodothyronine may have on the concentration of plasma cortisol in the sheep. 3. Thyroid activity was measured by determination of plasma protein bound 125I (PB125I) and total 125I in thyroid vein and mixed venous (jugular) blood. Plasma cortisol and thyroxine concentrations were measured by a competitive protein-binding assay at intervals for up to 5 hr after commencement of the experiment. 4. No evidence of an activation of thyroid secretion was found during cortisol or ACTH infusion, as monitored by thyroid vein PB125I. Similarly there was no evidence of any inhibition of thyroid function, as measured by continued secretion of thyroid hormones into thyroid vein blood. 5. No effect on plasma cortisol concentration due to thyroid hormone treatment was observed. 6. It was concluded that (a) elevated circulating corticosteroids in physiological concentrations have no short-term effects on thyroid activity in the sheep and (b) the short-term alterations in thyroid and adrenal cortical secretion observed during stress in the sheep could not be attributed to direct interaction of elevated thyroid hormone concentrations with adrenal cortical secretion. PMID:170400

  14. The Algerian Foreign Trade between the Multilateral Trading System and the Regionalism

    Directory of Open Access Journals (Sweden)

    Khayreddine Belaaze

    2014-04-01

    Full Text Available This contribution aims at highlighting a major challenge facing global trade and trade in developing countries. Indeed, regional and preferential trade agreements are now more than ever inconsistent and incoherent and one of the principles of the World Trade Organization, the clause of the most favored nation requiring eliminated all forms of discrimination between trading parties, but what we see in regional trade agreements that the preferential tariffs based on a principle of discrimination. All regional trade agreements granting preferential tariffs between member countries, these preferences do not include the remains of non-member countries (rest of world. On the other hand, preferential tariffs are lower than MFN rates. Meanwhile, the number of regional agreements has doubled since 1995 date creation of the WTO, and Algeria like other developing countries considered one of countries which have not benefit a lot from this situation.

  15. 21 CFR 806.40 - Public availability of reports.

    Science.gov (United States)

    2010-04-01

    ... report: (1) Any information that constitutes trade secret or confidential commercial or financial... report all the information in the report concerning that patient. ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Public availability of reports. 806.40 Section 806...

  16. 75 FR 48686 - Tops Markets LLC; Analysis of Agreement Containing Consent Orders to Aid Public Comment

    Science.gov (United States)

    2010-08-11

    ... competition between Tops and Penn Traffic, by increasing the likelihood that Tops will unilaterally exercise... not include any sensitive health information, such as medical records or other individually identifiable health information. In addition, comments should not include any ``[t]rade secret or any...

  17. 41 CFR 105-60.501 - Categories of records exempt from disclosure under the FOIA.

    Science.gov (United States)

    2010-07-01

    ... to be withheld; (4) Trade secrets and commercial or financial information obtained from a person and... intelligence investigation, information furnished by a confidential source; (v) Would disclose techniques and... foreign intelligence or counterintelligence, or international terrorism, and the existence of the records...

  18. Secretion Trap Tagging of Secreted and Membrane-Spanning Proteins Using Arabidopsis Gene Traps

    Science.gov (United States)

    Andrew T. Groover; Joseph R. Fontana; Juana M. Arroyo; Cristina Yordan; W. Richard McCombie; Robert A. Martienssen

    2003-01-01

    Secreted and membrane-spanning proteins play fundamental roles in plant development but pose challenges for genetic identification and characterization. We describe a "secretion trap" screen for gene trap insertions in genes encoding proteins routed through the secretory pathway. The gene trap transposon encodes a ß-glucuronidase reporter enzyme...

  19. 15 CFR 930.157 - Mediation and informal negotiations.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Mediation and informal negotiations. 930.157 Section 930.157 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade... Activities Having Interstate Coastal Effects § 930.157 Mediation and informal negotiations. The relevant...

  20. Organising Learning: Informal Workplace Learning in a Trade Union Child-Care Campaign

    Science.gov (United States)

    Brown, Tony

    2008-01-01

    Purpose: Trade unions, like many other membership-based social movement organisations, are confronted by the challenge of growth and revitalisation. Declining membership numbers, an increasingly restrictive legislative framework, and dramatic changes in modes of employment have combined to challenge many unions to rethink the way they work. In…