WorldWideScience

Sample records for undertaking key comparisons

  1. Comparison is key.

    Science.gov (United States)

    Stone, Mark H; Stenner, A Jackson

    2014-01-01

    Several concepts from Georg Rasch's last papers are discussed. The key one is comparison because Rasch considered the method of comparison fundamental to science. From the role of comparison stems scientific inference made operational by a properly developed frame of reference producing specific objectivity. The exact specifications Rasch outlined for making comparisons are explicated from quotes, and the role of causality derived from making comparisons is also examined. Understanding causality has implications for what can and cannot be produced via Rasch measurement. His simple examples were instructive, but the implications are far reaching upon first establishing the key role of comparison.

  2. Using an undertaker's data to assess changing patterns of mortality ...

    African Journals Online (AJOL)

    Key informant interviews were done to support the undertaker's data and determine how families bear the burden of burying deceased relatives. Despite a disproportionate increase in deaths in certain age categories and evidence of worsening poverty, funerals remain large and elaborate affairs. Keywords: AIDS, burial ...

  3. Public Undertakings and Imputability

    DEFF Research Database (Denmark)

    Ølykke, Grith Skovgaard

    2013-01-01

    In this article, the issue of impuability to the State of public undertakings’ decision-making is analysed and discussed in the context of the DSBFirst case. DSBFirst is owned by the independent public undertaking DSB and the private undertaking FirstGroup plc and won the contracts in the 2008...... Oeresund tender for the provision of passenger transport by railway. From the start, the services were provided at a loss, and in the end a part of DSBFirst was wound up. In order to frame the problems illustrated by this case, the jurisprudence-based imputability requirement in the definition of State aid...... in Article 107(1) TFEU is analysed. It is concluded that where the public undertaking transgresses the control system put in place by the State, conditions for imputability are not fulfilled, and it is argued that in the current state of law, there is no conditional link between the level of control...

  4. [Environmental licensing of major undertakings: possible connection between health and environment].

    Science.gov (United States)

    Silveira, Missifany; Araújo Neto, Mário Diniz de

    2014-09-01

    The prospect of multidisciplinary assessment that considers the environmental impacts on the health of the population during the implementation of potentially polluting projects is incipient in Brazil. Considering the scenario of major undertakings in the country, broadening the outlook on the health and environment relationship based on social and economic development processes striving for environmentally sustainable projects is a key strategy. This article examines the debate on the relationship between the current development model, the risks, the environment and health and discusses the importance of the participation of the health sector in the environmental licensing procedures, which is the instrument of the Environmental Impact Assessment (EIA). Seeking to create more environmentally and socially sustainable territories, the health sector has been looking for opportunities to participate in the licensing processes of major undertakings from the EIA standpoint. Results of research conducted by the Ministry of Health have demonstrated the form of participation in these processes, highlighting the strengths and weaknesses that favor or hinder the increase of preventive actions in public health in the implementation of major undertakings in Brazil.

  5. CCM key comparison CCM.D-K4 'Hydrometer'

    Science.gov (United States)

    Lorefice, S.; Becerra, L. O.; Lenard, E.; Lee, Y. J.; Lee, W. G.; Madec, T.; Meury, P. A.; Caceres, J.; Santos, C.; Vamossy, C.; Man, J.; Fen, K.; Toda, K.; Wright, J.; Bettin, H.; Toth, H.

    2016-01-01

    This report presents the comparison philosophy, methodology, analysis and the results of the designed CCM.D-K4 key comparison that covered the calibration of high resolution hydrometers for liquid and alcoholometers in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20°C. The main purpose of this comparison was not only to evaluate the degree of equivalence in the calibration of high accuracy hydrometers between NMI participants, but also to link, were it is possible, the results of previous comparisons to Key Comparison Reference Values (KCRVs) of CCM.D-K4. Eleven NMI laboratories took part in the CCM.D-K4 divided in two groups (petals). With the CCM.D-K4 purpose, two similar sets consisting of three hydrometers for liquid density determinations and an alcoholometer were circulated to the NMI participants as a travelling standard in the time interval from January 2011 to April 2012. Twelve Key Comparison Reference Values (KCRVs) for each petal have been obtained at the density values related to the tested density marks of the transfer standards by the results of participants. The KCRVs and corresponding uncertainties were calculated by the weighted mean in the case of consistent results, otherwise the median was used. The degree of equivalence (DoE) with respect to the corresponding KCRV was determined for each participant and, in this particular comparison, the Weighted Least Squares (WLS) method was used to link the individual DoE of each participant by a continuous function. Significant drift of the transfer standards was not detected. This report also gives instructions on calculating pair-wise degrees of equivalence, with the addition of any information on correlations that may be necessary to estimate more accurately as well as the procedure for linking international comparisons to the CCM.D-K4. Finally an example of linkage to the CCM.D-K4 is given by dealing with the results of the bilateral comparison between INRiM and NMIA, which was

  6. KEY COMPARISON: Key comparison CCQM-K60: Total selenium and selenomethionine in selenised wheat flour

    Science.gov (United States)

    Goenaga Infante, Heidi; Sargent, Mike

    2010-01-01

    Key comparison CCQM-K60 was performed to assess the analytical capabilities of national metrology institutes (NMIs) to accurately quantitate the mass fraction of selenomethionine (SeMet) and total selenium (at low mg kg-1 levels) in selenised wheat flour. It was organized by the Inorganic Analysis Working Group (IAWG) of the Comité Consultatif pour la Quantité de Matière (CCQM) as a follow-up key comparison to the previous pilot study CCQM-P86 on selenised yeast tablets. LGC Limited (Teddington, UK) and the Institute for National Measurement Standards, National Research Council Canada (NRCC, Ottawa, Canada) acted as the coordinating laboratories. CCQM-K60 was organized in parallel with a pilot study (CCQM-P86.1) involving not only NMIs but also expert laboratories worldwide, thus enabling them to assess their capabilities, discover problems and learn how to modify analytical procedures accordingly. Nine results for total Se and four results for SeMet were reported by the participant NMIs. Methods used for sample preparation were microwave assisted acid digestion for total Se and multiple-step enzymatic hydrolysis and hydrolysis with methanesulfonic acid for SeMet. For total Se, detection techniques included inductively coupled plasma mass spectrometry (ICP-MS) with external calibration, standard additions or isotope dilution analysis (IDMS); instrumental neutron activation analysis (INAA); and graphite furnace atomic absorption spectrometry (GFAAS) with external calibration. For determination of SeMet in the wheat flour sample, the four NMIs relied upon measurements using species-specific IDMS (using 76Se-enriched SeMet) with HPLC-ICP-MS. Eight of the nine participating NMIs reported results for total Se within 3.5% deviation from the key comparison reference value (KCRV). For SeMet, the four participating NMIs reported results within 3.2% deviation from the KCRV. This shows that the performance of the majority of the CCQM-K60 participants was very good

  7. KEY COMPARISON: Final report on APMP.M.P-K6.1 pneumatic key comparison from 20 kPa to 105 kPa in gauge mode

    Science.gov (United States)

    Hung, Chen-Chuan; Jian, Wu; Changpan, Tawat

    2009-01-01

    This report describes the key comparison APMP.M.P-K6.1 among the three national metrology institutes, Center for Measurement Standards-ITRI (CMS-ITRI, Taiwan), SPRING Singapore and National Institute of Metrology (NIMT), in the pressure range from 20 kPa to 105 kPa in gas media and gauge mode executed during the period April 2003 to April 2004. This comparison was conducted by CMS-ITRI and was based on the calibration procedure of APMP pneumatic pressure comparison APMP.M.P-K6. We intended to link to the CCM.P-K6 key comparison through the APMP.M.P-K6 key comparison by using the proposed linkage method in the APMP.M.P-K6 key comparison to determine a linking factor that can transform the quantities measured in the APMP.M.P-K6.1 key comparison. All three participating institutes used pneumatic piston gauges as their pressure standards. The Ruska 2465 gas-operated piston-cylinder assembly TL-1409 used as transfer standard offered by CMS-ITRI was calibrated three times by the pilot institute during the comparison period and showed that it was very stable after evaluation. The comparison was conducted on the basis of cross-float experiments to determine the effective area of transfer standards from the national standards of three institutes. The comparison results (as shown in Table 6) were equivalent to the CCM.P-K6 comparison and the relative bilateral degrees of equivalence between two laboratories were smaller than 39.7 × 10-6 from 20 kPa to 105 kPa. These results showed all participating institutes measuring the same quantity in the whole pressure range lay within their expanded uncertainty with confidence level 95%. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  8. JET Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.

    1987-03-01

    The paper presents the progress report of the Joint European Torus (JET) Joint Undertaking, 1986. The report contains a survey of the scientific and technical achievements on JET during 1986; the more important articles referred to in this survey are reproduced as appendices to this Report. The last section discusses developments which might improve the overall performance of the machine. (U.K.)

  9. Final report on RMO Vickers key comparison COOMET M.H-K1

    Science.gov (United States)

    Aslanyan, E.; Menelao, F.; Herrmann, K.; Aslanyan, A.; Pivovarov, V.; Galat, E.; Dovzhenko, Y.; Zhamanbalin, M.

    2013-01-01

    This report describes a COOMET key comparison on Vickers hardness scales involving five National Metrology Institutes: PTB (Germany), BelGIM (Belarus), NSC IM (Ukraine), KazInMetr (Kazakhstan) and VNIIFTRI (Russia). The pilot laboratory was VNIIFTRI, and PTB acted as the linking institute to key comparisons CCM.H-K1.b and CCM.H-K1.c conducted for the Vickers hardness scales HV1 and HV30, respectively. The comparison was also conducted for the HV5 Vickers hardness scale, since this scale is most frequently used in practice in Russia and CIS countries that work according to GOST standards. In the key comparison, two sets of hardness reference blocks for the Vickers hardness scales HV1, HV5 and HV30 consisting each of three hardness reference blocks with hardness levels of 450 HV and 750 HV were used. The measurement results and uncertainty assessments for HV1 and HV30 hardness scales, as announced by BelGIM, NSC IM, KazInMetr and VNIIFTRI, are in good agreement with the key comparison reference values of CCM.H-K1.b and CCM.H-K1.c. The comparison results for the HV5 hardness scale are viewed as additional information, since up to today no CCM key comparisons on this scale have yet been carried out. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  10. Jet Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.; O'Hara, G.W.; Pollard, I.E.

    1988-07-01

    The paper presents the Jet Joint Undertaking annual report 1987. A description is given of the JET and Euratom and International Fusion Programmes. The technical status of JET is outlined, including the development and improvements made to the system in 1987. The results of JET Operation in 1987 are described within the areas of: density effects, temperature improvements, energy confinement studies and other material effects. The contents also contain a summary of the future programme of JET. (U.K.)

  11. Final report on CCM key comparison CCM.D-K2: Comparison of liquid density standards

    Science.gov (United States)

    Bettin, Horst; Jacques, Claude; Zelenka, Zoltán; Fujii, Ken-ichi; Kuramoto, Naoki; Chang, Kyung-Ho; Lee, Yong Jae; Becerra, Luis Omar; Domostroeva, Natalia

    2013-01-01

    The results are presented of the key comparison CCM.D-K2 that covered the density measurements of four liquids: the density of water at 20 °C, of pentadecane at 15 °C, 20 °C, 40 °C and 60°C, of tetrachloroethlyene at 5 °C and 20 °C and of a viscous oil at 20 °C. Seven national metrology institutes measured the densities at atmospheric pressure by hydrostatic weighing of solid density standards in the time interval from 27 April 2004 to 28 June 2004. Since the participants were asked not to include components for a possible drift or inhomogeneity of the liquid in their uncertainty budget, these uncertainty contributions are investigated for the final evaluation of the data. For this purpose, results of stability and homogeneity measurements of the pilot laboratory are used. The participants decided not to include a possible drift of the liquid's density since no significant drift could be detected, and the influence of the drift and its uncertainty are negligible. Similarly, the inhomogeneity of the water and pentadecane samples is not significant and has no influence on the evaluation. Thus, it was neglected. Only the inhomogeneities of tetrachloroethylene and of the viscous oil were significant. Consequently, they were included in the evaluation. With one or two exceptions, the results show good agreement among the participants. Only in the case of water are the results clearly discrepant. The key comparison reference values were calculated by the weighted mean (taking into account a small correlation between two participants) in the case of consistent results. Otherwise the Procedure B of Cox was used. The expanded uncertainties of all reference densities are below 1 × 10-5 in relative terms. This satisfies the needs of all customers who wish to calibrate or check liquid density measuring instruments such as oscillation-type density meters. The comparison fully supports the calibration measurement capabilities table in the BIPM key comparison database

  12. Price Undertakings, VERs, and Foreign Direct Investment

    OpenAIRE

    Ishikawa, Jota; Miyagiwa, Kaz

    2006-01-01

    We compare the relative effect of a voluntary export restraint (VER) and a price undertaking on foreign firms' incentive to engage in FDI. We emphasize foreign rivalry as a determinant of FDI. We show, in a model that has two foreign firms competing with a home firm in the home country, that a price undertaking induces more FDI than a VER. The home country government, operating under the constraint to protect the home firm, is generally better off settling an antidumping case with a VER than ...

  13. KEY COMPARISON Report to the CCT on key comparison EUROMET.T-K6 (EUROMET Project no. 621): Comparison of the realizations of local dew/frost-point temperature scales in the range -50 °C to +20 °C

    Science.gov (United States)

    Heinonen, Martti

    2010-01-01

    The first humidity CIPM key comparison, CCT-K6, will be completed in 2010. The corresponding European regional key comparison, EUROMET.T-K6, was carried out in 2004 to 2008. National metrology institutes from 24 countries participated in the comparison. The comparison covered the dew-point temperature range from -50 °C to +20 °C. It was organized as three parallel loops with two specially manufactured precision chilled mirror hygrometers as transfer standards in each loop. The comparison scheme was designed to ensure high quality results with evenly spread workload for the participants. MIKES was coordinating the project. This report presents the results of the comparison and provides detailed information on the measurements performed by all participating laboratories and the analysis of the results. Conclusions on the equivalence of the dew-point temperature standards are drawn on the basis of calculated bilateral degrees of equivalence and deviations from EURAMET comparison reference values (ERV). Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  14. KEY COMPARISON: CCQM-K27-Subsequent: Key Comparison (subsequent) for the determination of ethanol in aqueous matrix

    Science.gov (United States)

    Schantz, Michele M.; Duewer, David L.; Parris, Reenie M.; May, Willie E.; Archer, Marcellé; Mussell, Chris; Carter, David; Konopelko, Leonid A.; Kustikov, Yury A.; Krylov, Anatoli I.; Fatina, Olga V.

    2005-01-01

    Ethanol is important both forensically ('drunk driving' or driving while under the influence, 'DWI', regulations) and commercially (alcoholic beverages). Blood- and breath-alcohol testing can be imposed on individuals operating private vehicles such as cars, boats, or snowmobiles, or operators of commercial vehicles like trucks, planes, and ships. The various levels of blood alcohol that determine whether these operators are considered legally impaired vary depending on the circumstances and locality. Accurate calibration and validation of instrumentation is critical in areas of forensic testing where quantitative analysis directly affects the outcome of criminal prosecutions, as is the case with the determination of ethanol in blood and breath. Additionally, the accurate assessment of the alcoholic content of beverages is a commercially important commodity. In 2002, the CCQM conducted a Key Comparison (CCQM-K27) for the determination of ethanol in aqueous matrix with nine participants. A report on this project has been approved by the CCQM and can be found at the BIPM website and in this Technical Supplement. CCQM-K27 comprised three samples, one at low mass fraction of ethanol in water (nominal concentration of 0.8 mg/g), one at high level (nominal concentration of 120 mg/g), and one wine matrix (nominal concentration of 81 mg/g). Overall agreement among eight participants using gas chromatography with flame ionization detection (GC-FID), titrimetry, isotope dilution gas chromatography/mass spectrometry (GC-IDMS), and gas chromatography-combustion-isotope ratio mass spectrometry (ID-GC-C-IRMS) was good. The ninth participant used a headspace GC-FID method that had not been validated in an earlier pilot study (CCQM-P35). A follow-on Key Comparison, CCQM-K27-Subsequent, was initiated in 2003 to accommodate laboratories that had not been ready to benchmark their methods in the original CCQM-K27 study or that wished to benchmark a different method. Four levels of

  15. Final report on the key comparison CCPR-K5: Spectral diffuse reflectance

    Science.gov (United States)

    Nadal, Maria; Eckerle, Kenneth L.; Early, Edward A.; Ohno, Yoshi

    2013-01-01

    The CCPR K5 key comparison on spectral diffuse reflectance was carried out in the framework of the CIPM Mutual Recognition Arrangement, by 13 national metrology institutes (MMIs) as participants. The participants were CSIR-NML (South Africa), HUT (Finland), IFA-CSIC (Spain), KRISS (Republic of Korea), MSL (New Zealand), NIM (China), NIST (United States of America), NMIJ (Japan), NPL (United Kingdom), NRC (Canada), OMH (Hungary), PTB (Germany) and VNIIOFI (Russia Federation). NIST (USA) piloted the comparison. The aim of this comparison was to check the agreement of measurement of the spectral diffuse reflectance among participants, using the measurement geometry of d/0 or 0/d in the wavelength range of 360 nm to 820 nm at 20 nm increment. The comparison was a star type comparison with the samples provided by the pilot laboratory and with the measurement sequence: Pilot-Participant-Pilot. Spectralon and matte white ceramic tiles were used as the transfer standards. Each participant received three of each type of sample and at least one sample of each type was measured three times on three separate days, and the other two samples were measured once. The report presents the description of the measurement facilities, procedures and uncertainties of all the participants as well as the results of the comparison. Measurement results from the participants and their associated uncertainties were analyzed in accordance with the Guidelines for CCPR Key Comparison Report Preparation, using weighted mean with cut-off. For the calculation of the Key Comparison Reference Value (KCRV), as agreed by the participants, the data of both samples were used for the 460 nm to 820 nm region and only the data of the Spectralon samples were used in the spectral region of 360 nm to 440 nm. The unilateral degrees of equivalence (DoE) calculated for each participant are mostly consistent within the uncertainty (k = 2) of the DoE. This international comparison of spectral diffuse reflectance

  16. KEY COMPARISON: Final report on CCQM-K9.2: Subsequent key comparison on pH determination of phosphate buffer by Harned cell measurements

    Science.gov (United States)

    Spitzer, Petra; Giera, Janine; Fraga, Isabel C.; Tønnes Jakobsen, Pia; Jensen, Hans D.; Hyllested, Peter; Karpov, Oleg; Kutovoy, Viatcheslav; Nakamura, Susumu; Vospelova, Alena; Zvezdina, Valentina

    2008-01-01

    CCQM-K9.2 was performed supplementary to the key comparison CCQM-K9 on the pH determination of a phosphate buffer with nominal pH ~ 6.9 (at 25 °C). The sample composition was very similar in both comparisons. Only the source of the starting material used for sample preparation was different. The comparison was restricted to the use of the primary method for pH (Harned cell measurement) as defined in the IUPAC Recommendations [2]. The measurement temperatures were 15 °C, 25 °C, 37 °C. CCQM-K9.2, CCQM-K.9 and the first supplementary comparison CCQM-K9.1 [5] are activities of the Electrochemical Working Group (EAWG) of the CCQM. All three comparisons were coordinated by the PTB, Germany. The Danish Primary Laboratory (DPL) successfully took part in the CCQM-K9. Meanwhile the primary set-up for pH in Denmark moved from DPL affiliated to Radiometer Medical to DFM, Denmark. The subsequent comparison allows assessing the degree of equivalence for the measurement of pH at DFM after the move. Due to the interest of other laboratories in demonstrating their progress in pH measurements on the primary level the CCQM-K9.2 supplementary comparison was extended to other participants than DFM, namely NMIJ, VNIIFTRI, INMETRO and CMI. The reported quantity for CCQM-K9.2 was not the pH of the sample but the acidity function at zero chloride molality (see chapter 12). To calculate the pH value from the acidity function it is necessary to know the ionic strength of the sample buffer solution, which was undisclosed by the coordinator. With the exception of the Czech Metrology Institute, CMI, good agreement in the determined acidity function is found between the participants. The results reported by DFM and by PTB agree within their measurement uncertainty at all measurement temperatures. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report

  17. JET Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.; Lallia, P.; O'Hara, G.W.; Pollard, I.E.

    1987-06-01

    The paper presents the annual report of the Joint European Torus (JET) Joint Undertaking, 1986. The report is divided into two parts: a part on the scientific and technical programme of the project, and a part setting out the administration and organisation of the Project. The first part includes: a summary of the main features of the JET apparatus, the JET experimental programme, the position of the Project in the overall Euratom programme, and how JET relates to other large fusion devices throughout the world. In addition, the technical status of JET is described, as well as the results of the JET operations in 1986. The final section of the first part outlines the proposed future programme of JET. (U.K.)

  18. Organization of multinational undertakings in the nuclear field

    International Nuclear Information System (INIS)

    Yajima, Masayuki

    1982-01-01

    Various proposals have been put forward to establish multinational undertakings for enrichment, fuel fabrication, reprocessing, spent fuel storage and waste management. The purpose of this paper is to investigate the legal, institutional framework aspects of multinational undertakings in the field of nuclear fuel cycle. The selection of the appropriate bodies representing the interest of participating countries would largely depend on the object or role of multinational undertakings. Regarding the principle of formation, URENCO is a much informative model of formation, which distinguishes the equity participation at national level and multinational level. The allocation of service between equity participants and non-equity participants depends on the objective of establishing business. Some priority in service allocation should be given to equity participants, and the participants having non-proliferation objective may require service allocation to avoid proliferation risk. The degree of achieving non-proliferation goal is related to the scope of participation. The experience in the field of nuclear energy seems to suggest that the concept of two-tiered decisionmaking structure is generally accepted. Various legal instruments appropriate to constitute multinational fuel cycle arrangement were examined, referring to the precedents and experience. (Kako, I.)

  19. KEY COMPARISON: Final report of comparison of the calibrations of hydrometers for liquid density determination between SIM laboratories: SIM.M.D-K4

    Science.gov (United States)

    Becerra, Luis Omar

    2009-01-01

    This SIM comparison on the calibration of high accuracy hydrometers was carried out within fourteen laboratories in the density range from 600 kg/m3 to 1300 kg/m3 in order to evaluate the degree of equivalence among participant laboratories. This key comparison anticipates the planned key comparison CCM.D-K4, and is intended to be linked with CCM.D-K4 when results are available. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  20. 31 CFR 248.4 - Undertaking of indemnity.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Undertaking of indemnity. 248.4 Section 248.4 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... in the circumstances set forth below, a corporate surety authorized by the Secretary of the Treasury...

  1. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ... the amount fixed by the Office, or deposit negotiable securities under §§ 703.306 and 703.307 in that... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...

  2. EURAMET.T-K7 Key Comparison of Water Triple-Point Cells

    Science.gov (United States)

    Peruzzi, A.; Bosma, R.; Kerkhof, O.; Rosenkranz, P.; Del Campo Maldonado, M. D.; Strnad, R.; Nielsen, J.; Anagnostou, M.; Veliki, T.; Zvizdic, D.; Grudnewicz, E.; Nedea, M.; Neagu, D. M.; Steur, P.; Filipe, E.; Lobo, I.; Antonsen, I.; Renaot, E.; Heinonen, M.; Weckstrom, T.; Bojkovski, J.; Turzo-Andras, E.; Nemeth, S.; White, M.; Tegeler, E.; Dobre, M.; Duris, S.; Kartal Dogan, A.; Uytun, A.; Augevicius, V.; Pauzha, A.; Pokhodun, A.; Simic, S.

    2011-12-01

    The results of a EURAMET key comparison of water triple-point cells (EURAMET.T-K7) are reported. The equipment used, the measuring conditions applied, and the procedures adopted for the water triple-point measurement at the participating laboratories are synthetically presented. The definitions of the national reference for the water triple-point temperature adopted by each laboratory are disclosed. The multiplicity of degrees of equivalence arising for the linking laboratories with respect to the "mother" comparison CCT-K7 is discussed in detail.

  3. Jet Joint Undertaking. Vol. 2

    International Nuclear Information System (INIS)

    1989-06-01

    The scientific, technical, experimental and theoretical investigations related to JET tokamak are presented. The JET Joint Undertaking, Volume 2, includes papers presented at: the 15th European Conference on controlled fusion and plasma heating, the 15th Symposium on fusion technology, the 12th IAEA Conference on plasma physics and controlled nuclear fusion research, the 8th Topical Meeting on technology of fusion. Moreover, the following topics, concerning JET, are discussed: experience with wall materials, plasma performance, high power ion cyclotron resonance heating, plasma boundary, results and prospects for fusion, preparation for D-T operation, active gas handling system and remote handling equipment

  4. Students Collaborating to Undertake Tracking Efforts for Sturgeon(SCUTES)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Students Collaborating to Undertake Tracking Efforts for Sturgeon (SCUTES) is a collaboration between NOAA Fisheries, sturgeon researchers, and teachers/educators in...

  5. CCQM key comparison CCQM-K75: Determination of toxic metals in algae

    Science.gov (United States)

    Shakhashiro, A.; Toervenyi, A.; Gaudino, S.; Rosamilia, S.; Belli, M.; Turk, G. C.

    2011-01-01

    The determination of mass fraction of toxic elements and especially platinum emitted from automobile catalytic converters in the air is a critical factor in assessing air quality and the potential impact of possible pollutants. Air is in fact one of the main pathways for human exposure to toxic elements. Biomonitors, such as lichen and algae, are examples of environmental samples that have been widely used by the scientific community to assess and monitor the level of environmental pollution. For this purpose, the IAEA-450 algae material containing heavy metals and platinum at low level was prepared by IAEA Seibersdorf Laboratories in collaboration with the Italian National Institute for Environmental Protection—ISPRA (former APAT). During the April meeting in 2009 of the Inorganic Analysis Working Group (IAWG) of the CCQM it was agreed to organize a key comparison K75 for Pt and Ni and a parallel pilot study P118 for As, Cd, Cr, Hg, Ni, Pb and Pt using this algae material. The key comparison CCQM-K75 was successfully organized. The participating NMIs demonstrated a high level of measurement capabilities and technical competence in analysing nickel and platinum at a low level of concentration in environmental samples such as algae. The between-laboratories reproducibility standard deviation for nickel and platinum was 1.9% and 3.6% respectively, which reflects an excellent agreement of between-laboratories measurement results. The ratio between the bias and its expanded uncertainty for nickel and platinum was below 2.0 for all reported results except in one case. This study was a practical demonstration of a CCQM comparison to use the 'core-capabilities' utilized by participants as a mean of providing evidence for Calibration and Measurement Capabilities (CMC) claims for Ni and Pt. Based on this CCQM international key comparison, the measurement capability of the NMIs which participated in the CCQM-K75 has been demonstrated directly for determination of Pt and Ni

  6. KEY COMPARISON: Report on the Regional Comparison COOMET.AUV.A-K3

    Science.gov (United States)

    Barrera-Figueroa, Salvador; Nielsen, Lars; Rasmussen, Knud

    2007-01-01

    COOMET.AUV.A-K3 is a Regional Comparison that supplements the Key Comparison CCAUV.A-K3 organized by the CCAUV. The participating NMIs are GUM (Poland), INM (Romania), VNIIFTRI (Russia) and DP-NDI 'Systema' (Ukraine). The role of Pilot laboratory was undertaken by DPLADFM (Denmark). The measurements took place between May 2005 and February 2006. The time schedule was organized in a single star configuration. Initially, two LS2aP microphones were circulated. However, a sudden change of sensitivity of one of them forced the inclusion of an additional microphone. Nevertheless, the analysis was performed on all microphones involved. This report includes the measurement results from the participants, information about their calibration methods, and the analysis leading to the assignation of degrees of equivalence and the link to the CCAUV.A-K3. Main text. To reach the main text of this paper, click on Final Report. The final report has been peer-reviewed and approved for publication by the CCAUV, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  7. 12 CFR 980.2 - Limitation on Bank authority to undertake new business activities.

    Science.gov (United States)

    2010-01-01

    ... business activities. 980.2 Section 980.2 Banks and Banking FEDERAL HOUSING FINANCE BOARD NEW FEDERAL HOME LOAN BANK ACTIVITIES NEW BUSINESS ACTIVITIES § 980.2 Limitation on Bank authority to undertake new business activities. No Bank shall undertake any new business activity except in accordance with the...

  8. Non-financial reporting, CSR frameworks and groups of undertakings

    DEFF Research Database (Denmark)

    Szabó, Dániel Gergely; Sørensen, Karsten Engsig

    2017-01-01

    The recently adopted Directive on non-financial reporting (Directive 2014/95/EU) and several CSR frameworks are based on the assumption that groups of undertakings adopt, report and implement one group policy. This is a very important but also rather unique approach to groups. This article first...... shows how the Directive as well as a few CSR frameworks intend to be implemented in groups and next it discusses potential barriers to do so. Even though company law does not always facilitate the adoption, communication and implementation of a group CSR policy, it may not in practice be a problem to do...... so. However, it is shown that doing so may have unforeseen consequences for the parent undertaking. To avoid them, it is recommended to make adjustments to the implementation of the group policy....

  9. JET joint undertaking. Annual report 1978

    International Nuclear Information System (INIS)

    1979-02-01

    This document is intended for information only and should not be used as a technical reference. After an introductive part on the controlled nuclear fusion research and an historical survey of the JET project, are presented: the JET joint undertaking (members of council and committee...) with its administration (finance, personnel, external relations), and the scientific and technical department with its divisions for systems (experimental, magnet, plasma, assembly, power supplies, control and data acquisition, and site and building). In appendix is described the Euratom fusion research programme

  10. The exclusion of 'public undertakings' from the re-use of public sector information regime

    NARCIS (Netherlands)

    Ricolfi, M.; Drexl, J.; van Eechoud, M.; Salmeron, M.; Sappa, C.; Tziavos, P.; Valero, J.; Pavoni, F.; Patrito, P.

    2011-01-01

    Should public undertakings be covered by the PSI Directive? The definitions of public sector bodies and bodies governed by public law, to which the PSI Directive applies, are currently taken from the public procurement Directives and public undertakings are not covered by these definitions. Should

  11. Final report on EUROMET key comparison EUROMET.M.D-K2 (EUROMET 627) "Comparison of density determinations of liquid samples"

    Science.gov (United States)

    Bettin, Horst; Heinonen, Martti; Gosset, André; Zelenka, Zoltán; Lorefice, Salvatore; Hellerud, Kristen; Durlik, Hanna; Jordaan, Werner; Field, Ireen

    2016-01-01

    The results of the key comparison EUROMET 627 (EUROMET.M.D-K2) are presented. This project covered the density measurements of three liquids: dodecane, water and an oil of high viscosity measured at 15 °C, 20 °C and 40 °C. Seven European metrology laboratories and the South African laboratory CSIR-NML (now: NMISA) measured the densities at atmospheric pressure by hydrostatic weighing of solid density standards between 04 October 2001 and 18 December 2001. The stability and homogeneity of the liquids were investigated by the pilot laboratory PTB. The results generally show good agreement among the participants. Only for the simple Mohr-Westphal balances do the uncertainties seem to be underestimated by the laboratories. Furthermore, the measurement of high-viscosity oil was difficult for some laboratories. Nevertheless, the five laboratories PTB/DE, BNM/FR (now: LNE/FR), OMH/HU (now: MKEH/HU), IMGC/IT (now: INRIM/IT) and GUM/PL agree with each other for stated uncertainties of 0.05 kg/m3 or less. This satisfies the current needs of customers who wish to calibrate or check liquid density measuring instruments such as oscillation-type density meters. No reference values were calculated since the subsequent CCM key comparison CCM.D-K2 had a different scope and the EUROMET 627 comparison was soon superseded by the EURAMET 1019 (EURAMET.M.D-K2) comparison. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  12. Final report on COOMET Vickers PTB/VNIIFTRI key comparison (COOMET.M.H-K1.b and COOMET.M.H-K1.c)

    Science.gov (United States)

    Aslanyan, E.; Herrmann, K.

    2013-01-01

    This report describes a COOMET key comparison on Vickers hardness scales of two National Metrology Institutes—PTB and VNIIFTRI. The pilot laboratory was PTB, which was the linking institute with the key comparison reference values of CCM.H-K1. In the key comparison two sets of hardness reference blocks for the Vickers hardness scales HV1 and HV30, each consisting of three hardness reference blocks with the hardness levels 240 HV, 540 HV and 840 HV, are used. The same hardness reference blocks were used previously in the key comparison CCM.H-K1. The measurement results and uncertainty assessments, announced by VNIIFTRI, are in good agreement with the key comparison reference values of CCM.H-K1. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  13. CONSIDERATIONS ON THE RULES ON COMPETITION GOVERNING UNDERTAKINGS IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Vlad – Teodor Florea

    2014-11-01

    Full Text Available This study concerns the general rules on competition between undertakings in the EU. The author paid attention primarly to matters on the prohibition of agreements that aim to distort or impair competition on the internal market. Moreover, he examined in detail the matter concerning the regulation and interdiction of the abuse of a dominant position. The work also reviews doctrinal opinions, as well as the jurisprudential solutions in the area. The author’s concern to summarize and develop the conditions for the implementation of each of the two legal mechanisms is worth noting: the prohibition of agreements between undertakings and the abuse of a dominant position. The essential considerations taken into account by the Court of Justice of the European Union in settling a case whose subject consisted of assessing the manner in which an undertaking reflected on competition on the internal market were selected at the end of the work.

  14. KEY COMPARISONS: Final report: SIM regional comparison of ac-dc voltage transfer difference (SIM.EM.K6a, SIM.EM-K9 and SIM.EM-K11)

    Science.gov (United States)

    Campos, Sara; Filipski, Piotr; Izquierdo, Daniel; Afonso, Edson; Landim, Régis P.; Di Lillo, Lucas; Lipe, Thomas

    2009-01-01

    Three comparisons of ac-dc voltage transfer difference held from January to December 2004 are reported. Six NMIs in the SIM region took part: NRC (Canada), NIST (United States of America), CENAM (Mexico), INTI (Argentina), UTE (Uruguay) and INMETRO (Brazil). The comparisons were proposed to assess the measurement capabilities in ac-dc voltage transfer difference of the NMIs in the SIM region. The test points were selected to link the results with the equivalent CCEM Key Comparisons, through three NMIs participating in both SIM and CCEM key comparisons. Additionally, a SIM.EM-Supplementary comparison was proposed, in support of the SIM NMIs' power/energy meter calibration capabilities. One technical protocol and one travelling standard were used, to economize on time and resources. The report shows the degree of equivalence in the SIM region and also the degree of equivalence with the corresponding CCEM reference value. The results of all participants support the values and uncertainties of the applicable CMC entries for ac-dc voltage transfer difference in the Key Comparison Database held at the BIPM. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  15. “THE UNDERTAKING” AND “THE RELEVANT MARKET”: KEY CONCEPTS IN THE ANALYSIS OF ANTICOMPETITIVE PRACTICES

    Directory of Open Access Journals (Sweden)

    CRISTINA CUCU

    2012-05-01

    Full Text Available The desire to maintain themselves on a particular market, at a higher level of profitability or at a reasonable level at least, can lead the undertakings to adopt an anticompetitive behaviour more easily. This may result from either the existence of anticompetitive agreements and concerted practices, or the tendency to abuse its dominant position which the undertaking has on a certain market. “The undertaking” and “the relevant market” are the key concepts in the analysis of anticompetitive practices. The active subject of anticompetitive practices is “the undertaking”. This concept has a particular significance in the competition law, different from the common law. Competition rules apply to the conduct of undertakings and associations of undertakings so that the concept of undertaking makes it possible to determine the categories of actors to which the competition rules apply. However, the term undertaking is nowhere defined in the EU Treaties; as such, the concept has generated a complex body of jurisprudence."The market" is a term with pronounced economic resonances; synthetically, the market is the place where supply meets demand. In the context of the competition law, "the market" means "relevant market". The relevant market is the market of product/service in terms of demand and supply, and then superimposed on the geographic market.The analysis of these key concepts necessarily entails the conceptual delimitation of the notions. On this purpose, the relevant legal provisions will be identified in the Romanian and EU law, together with the decisions of the European Court of Justice in this matter.

  16. “AGREEMENTS”, “DECISIONS” AND “CONCERTED PRACTICES”: KEY CONCEPTS IN THE ANALYSIS OF ANTICOMPETITIVE AGREEMENTS

    Directory of Open Access Journals (Sweden)

    CRISTINA CUCU

    2013-05-01

    Full Text Available In their economic activity, undertakings conclude many agreements between them. But agreements between undertakings which can distort the competition -anticompetitive agreements- are prohibited. The Romanian and EU law prohibit “all agreements between undertakings, decisions by associations of undertakings and concerted practices which have as their object or effect the prevention, restriction or distortion of competition”. However, the terms ”agreements”, ”decisions” or ”concerted practices” are nowhere defined in the EU Treaties or in the Romanian law. These terms are key concepts in the analysis of anticompetitive agreements which can distort the competition. In the lack of a legal definition, these concepts have generated a complex body of jurisprudence, which has to be identified. The analysis of these key concepts necessarily entails the conceptual delimitation of the notions. On this purpose, the relevant legal provisions will be identified in the Romanian and EU law, as well as the decisions of the European Court of Justice in this matter. The present paper intends to present the conceptual evolution of the analysed notions, paying special attention to concerted practices and to parallel behaviour in price fixing on the market.

  17. Bilateral comparison of 1 Ω standards (ongoing BIPM key comparison BIPM.EM-K13.a) between the NSAI-NML (Ireland) and the BIPM

    Science.gov (United States)

    Goebel, R.; Power, O.; Fletcher, N.; Stock, M.

    2012-01-01

    This report describes the results obtained from a NML(Ireland)-BIPM bilateral comparison of 1 Ω resistance standards in 2010. The comparison was carried out in the framework of the BIPM ongoing key comparison BIPM.EM-K13.a. Two BIPM 1 Ω travelling standards of CSIRO type were calibrated first at the BIPM, then at the NMLI and again at the BIPM after their return. The stability of the transfer standard was such that the uncertainty associated with the transfer was significantly smaller than the uncertainty arising from the calibrations. The mean difference between the NMLI and the BIPM calibrations was found to be just within the expanded uncertainty (k = 2) of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  18. THE CCAUV.A-K3 KEY COMPARISON OF PRESSURE RECIPROCITY CALIBRATION OF LS2P MICROPHONES: RESULTS AND ANALYSIS

    DEFF Research Database (Denmark)

    Cutanda Henríquez, Vicente; Rasmussen, Knud; Nielsen, Lars

    2006-01-01

    The CCAUV.A-K3 Key Comparison has involved 15 countries organized in two loops with two common laboratories, CENAM and DPLA. The measurements took place in 2003. This is the first CCAUV key comparison organized with more than one loop, and therefore the analysis of the results required a more ela...

  19. Final report on key comparison COOMET.QM-K36 (Project COOMET 540/UA/11) 'Electrolytic Conductivity 0,5 S/m'

    Science.gov (United States)

    Gavrilkin, V.; Prokopenko, L.; Bakovec, N.; Zolotorevich, E.; Suvorov, V.; Ovchinnikov, Yu; Pilishvili, T.; Buleishvili, M.; Zhasanbaeva, B.; Aytzhatova, G.; Ticona, G.; Vyskocil, L.

    2015-01-01

    The COOMET.QM-K36 key comparison 'Electrolytic conductivity: 0.5 S/m' is a comparison in the field of electrolytic conductivity measurements conducted by COOMET and carried out in 2012. It used a solution of KCl in water and the results are connected to those of the CCQM key comparison CCQM-K36.a through common participation of VNIIFTRI (Russia), SMU (Slovakia) and Ukrmetrteststandart (Ukraine). The purpose of this key comparison was to establish the equivalence of measurements of electrolytic conductivity performed at the National Metrology Institutes of COOMET member states for the value of 0.5 S/m. The results can be used to support the CMCs claims over the range of 0.1 S/m to 1.3 S/m. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  20. Consensus building for interlaboratory studies, key comparisons, and meta-analysis

    Science.gov (United States)

    Koepke, Amanda; Lafarge, Thomas; Possolo, Antonio; Toman, Blaza

    2017-06-01

    Interlaboratory studies in measurement science, including key comparisons, and meta-analyses in several fields, including medicine, serve to intercompare measurement results obtained independently, and typically produce a consensus value for the common measurand that blends the values measured by the participants. Since interlaboratory studies and meta-analyses reveal and quantify differences between measured values, regardless of the underlying causes for such differences, they also provide so-called ‘top-down’ evaluations of measurement uncertainty. Measured values are often substantially over-dispersed by comparison with their individual, stated uncertainties, thus suggesting the existence of yet unrecognized sources of uncertainty (dark uncertainty). We contrast two different approaches to take dark uncertainty into account both in the computation of consensus values and in the evaluation of the associated uncertainty, which have traditionally been preferred by different scientific communities. One inflates the stated uncertainties by a multiplicative factor. The other adds laboratory-specific ‘effects’ to the value of the measurand. After distinguishing what we call recipe-based and model-based approaches to data reductions in interlaboratory studies, we state six guiding principles that should inform such reductions. These principles favor model-based approaches that expose and facilitate the critical assessment of validating assumptions, and give preeminence to substantive criteria to determine which measurement results to include, and which to exclude, as opposed to purely statistical considerations, and also how to weigh them. Following an overview of maximum likelihood methods, three general purpose procedures for data reduction are described in detail, including explanations of how the consensus value and degrees of equivalence are computed, and the associated uncertainty evaluated: the DerSimonian-Laird procedure; a hierarchical Bayesian

  1. KEY COMPARISON Bilateral comparison of 1.018 V and 10 V standards between the NSAI-NML (Ireland) and the BIPM, March to April 2010 (part of the ongoing BIPM key comparison BIPM.EM-K11.a and b)

    Science.gov (United States)

    Power, O.; Solve, S.; Chayramy, R.; Stock, M.

    2010-01-01

    As a part of the ongoing BIPM key comparisons BIPM.EM-K11.a and b, a comparison of the 1.018 V and 10 V voltage reference standards of the BIPM and of the National Standards Authority of Ireland-National Metrology Laboratory (NSAI-NML), Dublin, Ireland, was carried out from March to April 2010. Two BIPM Zener diode-based travelling standards were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage is maintained at the 10 V level by means of a group of characterized Zener diode-based electronic voltage standards. The output EMF of each travelling standard, at the 10 V output terminals, was measured by direct comparison with the group standard. Measurements of the output EMF of the travelling standards at the 1.018 V output terminals were made using a potentiometer, standardized against the local 10 V reference standard. At the BIPM, the travelling standards were calibrated at both voltages before and after the measurements at NSAI-NML, using the BIPM Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages on internal temperature and ambient pressure. The comparison results show that the voltage standards maintained by NSAI-NML and the BIPM were equivalent, within their stated expanded uncertainties, on the mean date of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  2. Bilateral comparison of 10 kΩ standards (ongoing BIPM key comparison BIPM.EM-K13.b) between the NSAI-NML (Ireland) and the BIPM

    Science.gov (United States)

    Goebel, R.; Power, O.; Fletcher, N.; Stock, M.

    2012-01-01

    This report describes the results obtained from a NML(Ireland)-BIPM bilateral comparison of 10 kΩ resistance standards in 2010. The comparison was carried out in the framework of the BIPM ongoing key comparison BIPM.EM-K13.b. Two BIPM 10 kΩ travelling standards of SR104 type were calibrated first at the BIPM, then at the NMLI and again at the BIPM after their return. The stability of the transfer standards was such that the uncertainty associated with the transfer was significantly smaller than the uncertainty arising from the calibrations. The NMLI and the BIPM calibrations were found to be in agreement, with a mean difference smaller than the standard uncertainty of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  3. A Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT and Key Coloumnar Transposition (KCT Method

    Directory of Open Access Journals (Sweden)

    Pryo Utomo

    2017-06-01

    Full Text Available One Time Pad (OTP is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext will be generated more difficult to be known. In the Key and Plaintext Insertion (KPI Method, we modify the OTP algorithm by adding the key insertion in the plaintext that has been splitted. Meanwhile in the Key Coloumnar Transposition (KCT Method, we modify the OTP algorithm by dividing the key into some parts in matrix of rows and coloumns. Implementation of the algorithms using PHP programming language.

  4. KEY COMPARISON: Final report on bilateral comparison CCEM.RF-K9.1: Thermal noise standards at 12.4 GHz, 13.5 GHz, 15 GHz and 17.5 GHz

    Science.gov (United States)

    Allal, Djamel

    2009-01-01

    A bilateral comparison subsequent to key comparison CCEM.RF-K9 was decided between VNIIFTRI and PTB. It was registered into the BIPM KCDB under the identifier CCEM.RF-K9.1. The results of this comparison were gathered by the pilot laboratory of comparison CCEM.RF-K9, the LNE, and a very good agreement was found between the two participants. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  5. Original article Personality determinants of motivation to undertake vocational training

    Directory of Open Access Journals (Sweden)

    Dorota Godlewska-Werner

    2014-05-01

    Full Text Available Background Recently, at a time of frequent changes in the economic and socio-economic circumstances, knowledge acquired in the course of formal education is insufficient. Especially, the education system is still criticized for a lack of flexibility and strong resistance to change. Therefore, regular participation in various forms of training is required. Employee education and training are becoming an optimal answer to complex business challenges. The aim of this study was to determine which personality traits are responsible for the strength of motivation to undertake vocational training and other educational forms. Participants and procedure The study included 104 staff members of Polish companies (60 women and 44 men. The study used Cattell’s 16 PF Questionnaire and the scales of readiness to undertake training and further education as a measure of the strength of motivation (Kawecka, Łaguna & Tabor, 2010. Results The study showed that openness to change and tension (primary traits had the greatest impact on the intention and planning to take vocational training. Additionally, the intention and planning to take vocational training were found to be associated with mindedness, independence, self-control, and anxiety (secondary traits. Such traits as rule-consciousness [G], social-boldness [H], abstractedness [M], and apprehension [O] (primary traits, were important in some aspects, which could constitute a background for further research and discussion of the results. Conclusions The obtained results lead to the conclusion that some of the individual differences in personality determine the motivation to undertake vocational training.

  6. KEY COMPARISON: Comparison of the standards for absorbed dose to water of the VNIIFTRI, Russia and the BIPM in 60Co γ rays

    Science.gov (United States)

    Allisy-Roberts, P. J.; Kessler, C.; Burns, D. T.; Berlyand, V.; Berlyand, A.

    2010-01-01

    A new comparison of the standards for absorbed dose to water of the All-Russian Scientific Research Institute for Physical-Technical and Radiotechnical Measurements (VNIIFTRI), Russia and of the Bureau International des Poids et Mesures (BIPM) has been made in 60Co gamma radiation in 2009. The results show that the VNIIFTRI and the BIPM standards for absorbed dose to water are in agreement, yielding a mean ratio of 0.9976 for the calibration coefficients of the transfer chambers, the difference from unity being within the combined standard uncertainty (0.0043) for this result. This result is consistent with the earlier 2001 comparison result of 0.9967 (43). The updated degrees of equivalence for the VNIIFTRI are compared with those of the other national metrology institutes as presented in the BIPM key comparison database. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCRI Section I, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  7. KEY COMPARISON: Final report on CCEM key comparison CCEM.RF-K10.CL (GT-RF/99-2) 'Power in 50 Ω coaxial lines, frequency: 50 MHz to 26 GHz' measurement techniques and results

    Science.gov (United States)

    Janik, Dieter; Inoue, T.; Michaud, A.

    2006-01-01

    This report summarizes the results and the measuring methods of an international key comparison between twelve national metrology institutes (NMIs) and is concerning the calibration factor of RF power sensors in the coaxial 3.5 mm line for frequencies up to 26 GHz. Two RF power travelling standards fitted with male PC 3.5 mm connectors were measured at seven frequencies. The following NMIs participated: NMIJ (Japan), NRC (Canada), NIST (USA), METAS (Switzerland), CSIR-NML (South Africa), NMIA (Australia), NPL (UK), SiQ (Slovenia), IEN (Italy), VNIIFTRI (Russian Federation), SPRING (Singapore) and PTB (Germany), as the pilot laboratory. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  8. Bilateral comparison of 100 pF standards (ongoing BIPM key comparison BIPM.EM-K14.b) between the NSAI-NML (Ireland) and the BIPM

    Science.gov (United States)

    Gournay, Pierre; Power, Oliver

    2017-01-01

    This report presents the results of a bilateral comparison of capacitance at 100 pF between the NSAI-NML (Ireland) and the BIPM carried out in 2016. This comparison forms part of the ongoing BIPM key comparison BIPM.EM-K14.b in which the BIPM is the pilot laboratory. Two 100 pF travelling standards belonging to the BIPM were used in this comparison carried out with an 'A-B-A' pattern of measurements. The standards were measured first at the BIPM for a period of about one month, then for a similar period at the NSAI-NML, and finally again at the BIPM. The measurand was the two terminal-pair capacitance at a frequency of 1000 Hz, for a measuring rms voltage of 15 V. The results from the NSAI-NML and the BIPM were found to be in relatively good agreement, with a difference smaller than the relative expanded uncertainty (95 % confidence, k = 2) of 0.85 × 10-6. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  9. An investigation of nurse educator's perceptions and experiences of undertaking clinical practice.

    Science.gov (United States)

    Williams, Angela; Taylor, Cathy

    2008-11-01

    Educational policy (DOH, 1999. Making a difference: strengthening the nursing, midwifery and health visiting contribution to health and healthcare. Department of Health, London; UKCC, 1999. Fitness for Practice. United Kingdom Central Council for Nursing, Midwifery and Health Visiting, London; Nursing and Midwifery Council, 2006. Standards to support learning and assessment in practice. Nursing and Midwifery Council, London) and current nursing literature (Griscti, O., Jacono, B., Jacono, J., 2005. The nurse educator's clinical role. Journal of Advanced Nursing 50 (1), 84-92; Owen, S., Ferguson, K., Baguley, I., 2005. The clinical activity of mental health nurse lecturers. Journal of Psychiatric and Mental Health Nursing 12, 310-316), place increasing emphasis on nurse educators undertaking clinical practice to facilitate their clinical confidence and competence. This study investigated nurse educators' perceptions and experiences of undertaking clinical practice. A qualitative design and descriptive, exploratory approach were used. A purposive sample of 11 nurse educators in one nursing department, took part in two focus group interviews, one with 5 and the other with 6 respondents, to identify and discuss their perceptions and experiences of undertaking clinical practice. A process of thematic content analysis revealed three broad themes relating to the meaning and importance of clinical practice, perceived benefits and barriers which are examined and discussed. The paper concludes that despite policy recommendations, barriers highlighted in this study such as insufficient time, heavy workload and a lack of valuing of the clinical role have been raised over the past few decades. The effect of undertaking clinical practice, particularly on the quality of teaching is argued to be valuable armoury in the battle to secure sufficient resources to support engagement in clinical practice. Financial and organisational commitment; valuing of clinical practice and research

  10. The qualitative interview and challenges for clinicians undertaking research: a personal reflection.

    Science.gov (United States)

    Fisher, Karin

    2011-01-01

    Drawing on my doctoral experience the aim of this article is to present my transition from practitioner to novice researcher and the challenges I encountered when undertaking qualitative in-depth interviews. The contents of my research diary were coded for words, sentences and paragraphs and were then grouped into themes and subsequently organised into concepts and categories. The analysis identified one core category: 'changing states: learning to become a researcher'. The related categories included 'guessing responses', 'confusing boundaries' and 'revealing hidden concepts'. These concepts provide a description of how I learnt to become a researcher and became a changed state. The paper provides practitioners with practical examples of my transition from practitioner to novice researcher. I offer some tips for practitioners who wish to undertake research in their clinical role.

  11. KEY COMPARISON: CCT-K2.1: NRC/VNIIFTRI bilateral comparison of capsule-type standard platinum resistance thermometers from 13.8 K to 273.16 K

    Science.gov (United States)

    Hill, K. D.; Steele, A. G.; Dedikov, Y. A.; Shkraba, V. T.

    2005-01-01

    The Consultative Committee for Thermometry Key Comparison 2 (CCT-K2) results were published two years ago (2002 Metrologia 39 551-71). NRC served as the pilot laboratory for CCT-K2 and remains able to provide a scale and measurement system suitable for performing bilateral comparisons linked to the original key comparison results. In March 2003, measurements of two VNIIFTRI 100 Ω capsule-style platinum resistance thermometers (CSPRTs), S/N 356 and 476, were undertaken to relate their local calibration to the results from the CCT-K2 exercise. The NRC Leeds and Northrup (L&N) CSPRT S/N 1872174 provides the link to the CCT-K2 results. The three CSPRTs were compared at the eight defining cryogenic temperatures of the International Temperature Scale of 1990 (ITS-90) in the range from 13.8033 K to 273.16 K. The reader is referred to the full text of the CCT-K2 report for a detailed explanation of the methodology employed for the comparison. Only the details unique to the measurements reported here will be addressed in this article. The NRC/VNIIFTRI bilateral comparison of capsule-style platinum resistance thermometers over the range 13.8 K to 273.16 K has revealed calibrations at VNIIFTRI to be in agreement with the KCRV of CCT-K2 within the expanded uncertainty for all temperatures of the comparison with the exception of the triple point of hydrogen at 13.8033 K. One of the two CSPRTs supplied by VNIIFTRI was found to be discrepant as revealed by differences at the triple point of water and at the lowest temperatures of the comparison, and was therefore excluded from further analysis. The linkage to the CCT-K2 data supports the evaluation of the VNIIFTRI CMCs in Appendix C of the KCDB. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions

  12. A comparison of classroom and online asynchronous problem-based learning for students undertaking statistics training as part of a Public Health Masters degree.

    Science.gov (United States)

    de Jong, N; Verstegen, D M L; Tan, F E S; O'Connor, S J

    2013-05-01

    This case-study compared traditional, face-to-face classroom-based teaching with asynchronous online learning and teaching methods in two sets of students undertaking a problem-based learning module in the multilevel and exploratory factor analysis of longitudinal data as part of a Masters degree in Public Health at Maastricht University. Students were allocated to one of the two study variants on the basis of their enrolment status as full-time or part-time students. Full-time students (n = 11) followed the classroom-based variant and part-time students (n = 12) followed the online asynchronous variant which included video recorded lectures and a series of asynchronous online group or individual SPSS activities with synchronous tutor feedback. A validated student motivation questionnaire was administered to both groups of students at the start of the study and a second questionnaire was administered at the end of the module. This elicited data about student satisfaction with the module content, teaching and learning methods, and tutor feedback. The module coordinator and problem-based learning tutor were also interviewed about their experience of delivering the experimental online variant and asked to evaluate its success in relation to student attainment of the module's learning outcomes. Student examination results were also compared between the two groups. Asynchronous online teaching and learning methods proved to be an acceptable alternative to classroom-based teaching for both students and staff. Educational outcomes were similar for both groups, but importantly, there was no evidence that the asynchronous online delivery of module content disadvantaged part-time students in comparison to their full-time counterparts.

  13. Who should be undertaking population-based surveys in humanitarian emergencies?

    Directory of Open Access Journals (Sweden)

    Spiegel Paul B

    2007-06-01

    Full Text Available Abstract Background Timely and accurate data are necessary to prioritise and effectively respond to humanitarian emergencies. 30-by-30 cluster surveys are commonly used in humanitarian emergencies because of their purported simplicity and reasonable validity and precision. Agencies have increasingly used 30-by-30 cluster surveys to undertake measurements beyond immunisation coverage and nutritional status. Methodological errors in cluster surveys have likely occurred for decades in humanitarian emergencies, often with unknown or unevaluated consequences. Discussion Most surveys in humanitarian emergencies are done by non-governmental organisations (NGOs. Some undertake good quality surveys while others have an already overburdened staff with limited epidemiological skills. Manuals explaining cluster survey methodology are available and in use. However, it is debatable as to whether using standardised, 'cookbook' survey methodologies are appropriate. Coordination of surveys is often lacking. If a coordinating body is established, as recommended, it is questionable whether it should have sole authority to release surveys due to insufficient independence. Donors should provide sufficient funding for personnel, training, and survey implementation, and not solely for direct programme implementation. Summary A dedicated corps of trained epidemiologists needs to be identified and made available to undertake surveys in humanitarian emergencies. NGOs in the field may need to form an alliance with certain specialised agencies or pool technically capable personnel. If NGOs continue to do surveys by themselves, a simple training manual with sample survey questionnaires, methodology, standardised files for data entry and analysis, and manual for interpretation should be developed and modified locally for each situation. At the beginning of an emergency, a central coordinating body should be established that has sufficient authority to set survey standards

  14. KEY COMPARISON: Final report of EUROMET Project 696: pH determination of a phthalate buffer

    Science.gov (United States)

    Spitzer, Petra; Charlet, Philippe; Eberhard, Ralf; Karpov, Oleg V.; Philippe, Rachel; Rivier, Cedric; Maximov, Igor; Sudmeier, Uwe

    2005-01-01

    The EUROMET project 696, a trilateral comparison between PTB, Germany, LNE, France and VNIIFTRI, Russia was performed in order to demonstrate and document the capability of the participants to measure the pH of a phthalate buffer by the primary measurement procedure for pH. Good agreement of the reported results was observed. The sample was very similar to the one used in the comparison CCQM-K17. PTB acts as pilot laboratory in CCQM-K17 and in EUROMET 696. This comparison allows one to link the results obtained by LNE to the CCQM-K17 key comparison through the degree of equivalence of PTB. On the other hand, the discrepancy between measured pH values at the VNIIFTRI and PTB for the same type of buffer solution decreased, as compared with a bilateral comparison in 1997. Main text. To reach the main text of this paper, click on Final Report. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the Mutual Recognition Arrangement (MRA).

  15. KEY COMPARISON: CCEM.RF-K9: International comparison of thermal noise standards between 12.4 GHz and 18 GHz (GT-RF/99-1)

    Science.gov (United States)

    Allal, Djamel; Achkar, Joseph

    2006-01-01

    An international comparison of thermal noise-power measurements has been carried out among five national metrology institutes between 12.4 GHz and 18 GHz. Four transfer standards were measured. The following national institutes participated: BNM-LCIE (France), NPL (United Kingdom), PTB (Germany), NIST (United States of America) and VNIIFTRI (Russia). The Bureau National de Métrologie-Laboratoire Central des Industries Electriques (France) acted as the pilot laboratory for the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  16. Final report on SIM Regional Key Comparison SIM.L-K1.2007: Calibration of gauge blocks by optical interferometry

    Science.gov (United States)

    Colín, C.; Viliesid, M.; Chaudhary, K. P.; Decker, J.; Dvorácek, F.; Franca, R.; Ilieff, S.; Rodríguez, J.; Stoup, J.

    2012-01-01

    This Key Comparison of gauge blocks (GB) calibration by optical interferometry was carried out to support this Calibration and Measurement Capability (CMC) of the National Measurement Institutes (NMI) from the SIM Region for this specific service and for those that rely on this kind of technique as required by the Mutual Recognition Arrangement (MRA). It provides evidence of the participant's technical competence and supports the uncertainties they state in their CMC. It is a Regional Key Comparison and should be linked to the upper level corresponding comparison CCL-K1. The comparison had nine participants, five from the SIM Region—NRC-CNRC, Canada; NIST, USA; CENAM, Mexico; INMETRO, Brazil; and INTI, Argentina— and four from other regions—CMI, Czech Rep.; CEM, Spain; NPLI, India; and NMISA South Africa. It included the circulation of fourteen GB—seven steel GB and seven ceramic GB. The circulation of the artifacts started on 2007-11-01 and ended on 2010-04-25. Some additional time was required to publish the results as the same artifacts were used thereafter for comparison SIM.L-S6, Calibration of GB by mechanical comparison, and the results could not be disclosed until the participants of the second circulation loop had sent their results. The final report of this comparison was sent out for review in May 2012 and the final version was approved in August 2012. The behavior of the artifacts throughout the circulation was good and therefore the results obtained were judged technically valid. The reference value was taken as arithmetic mean of the largest subset of consistent results. Most of participates obtained results in good agreement with the reference values with a few exceptions mentioned in the report. The corresponding NMIs are responsible for identifying the causes and taking corrective action. This makes the present comparison exercise valid to support the CMC claims of the participants in GB calibration by optical interferometry. Main text. To

  17. 20 CFR 703.205 - Filing of Agreement and Undertaking; deposit of security.

    Science.gov (United States)

    2010-04-01

    ...— (1) Deposit with the Branch indemnity bonds or letters of credit in the amount fixed by the Office... and payable from the proceeds of the deposited security; (b) Give security in the amount fixed in the... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Filing of Agreement and Undertaking; deposit...

  18. Report of the key comparison CCQM-K108 determination of arsenic species, total arsenic and cadmium in brown rice flour

    Science.gov (United States)

    Hioki, Akiharu; Narukawa, Tomohiro; Inagaki, Kazumi; Miyashita, Shinichi; Kotzeva, Boriana; Kakoulides, Elias; Sxoina, Vasiliki; Fung, W. H.; Choi, Y. Y.; Yau, H. P.; Tsoi, Y. T.; Lee, C. L.; Kong, M. F.; Shin, Richard; Juan, Wang; Sin Yee, Ng; Uribe, Christian; Marques Rodrigues, Janaína; Caciano de Sena, Rodrigo; Silva Dutra, Emily; Bergamaschi, Luigi; Giordani, Laura; D'Agostino, Giancarlo; Valiente, Liliana; Horvat, Milena; Jacimovic, Radojko; Oduor Okumu, Tom; Kang'Iri, Jacqueline; Owiti Orwa, Tabitha; Chao, Wei; Jingbo, Chao; Taebunpakul, Sutthinun; Yafa, Charun; Kaewkhomdee, Nattikarn; Chailap, Benjamat; Pharat, Yanee; Phukphattanachai, Pranee; Turk, Gregory C.; Long, Stephen; Murphy, K. E.; Davis, Clay; Ellisor, Michael; Merrick, Jeffrey; White, Ian; Saxby, David; Linsky, S. M.; Barzev, A.; Botha, A.

    2015-01-01

    The CCQM-K108 key comparison was organised by the Inorganic Analysis Working Group (IAWG) of CCQM to test the abilities of national metrology institutes (NMIs) or designated institutes (DIs) to measure the mass fractions of arsenic species, total arsenic and cadmium in brown rice flour. The National Metrology Institute of Japan (NMIJ) acted as the coordinating laboratory. The participants used different measurement methods, though most of them used inductively coupled plasma mass spectrometry (ICP-MS) or isotope-dilution inductively coupled plasma mass spectrometry (ID-ICP-MS) for Cd and ICP-MS for total arsenic. Regarding arsenic speciation, all participants used ICP-MS coupled with liquid chromatography (LC). Accounting for relative expanded uncertainty, comparability of measurement results for each of total arsenic and cadmium was successfully demonstrated by the participating NMIs or DIs for the measurement of the measurand at the level of less than 0.5 mg/kg. Regarding arsenic species (inorganic arsenic and dimethylarsinic acid (DMAA)), there was, however, a measurement problem still to be solved and that part of CCQM-K108 will be repeated. It is expected that arsenic, cadmium and other metals at mass fractions greater than approximately 0.1 mg/kg in rice flour can be determined by each participant using the same technique(s) employed for this key comparison to achieve similar uncertainties mentioned in the present report. Furthermore, the results of this key comparison can be utilised along with the IAWG core capability approach. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  19. Bilateral comparison of 100 pF capacitance standards (ongoing BIPM key comparison BIPM.EM-K14.b) between the NSAI-NML, Ireland, and the BIPM, March-August 2011

    Science.gov (United States)

    Power, O.; Moran, A.; Fletcher, N.; Goebel, R.; Stock, M.

    2015-01-01

    This report gives the result of a bilateral comparison of capacitance between the NSAI-NML (Ireland) and the BIPM carried out in 2011. Two 100 pF travelling standards belonging to the BIPM were used. The comparison was carried out with an 'A-B-A' pattern of measurements; the standards were measured first at the BIPM for a period of about one month, then for a similar period at the NSAI-NML, and finally again at the BIPM. The measurand was the two terminal-pair capacitance at a frequency of 1000 Hz, for a measuring voltage of 15 V. The BIPM was the pilot laboratory, and the comparison forms part of the ongoing BIPM key comparison BIPM.EM-K14.b. The results from the NSAI-NML and the BIPM were found to be in good agreement, with a difference smaller than the relative expanded uncertainty (95 % confidence, k = 2) of 0.66 × 10-6. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  20. Bilateral comparison of 10 pF capacitance standards (ongoing BIPM key comparison BIPM.EM-K14.a) between the NSAI-NML, Ireland, and the BIPM, March-August 2011

    Science.gov (United States)

    Power, O.; Moran, A.; Fletcher, N.; Goebel, R.; Stock, M.

    2015-01-01

    This report gives the result of a bilateral comparison of capacitance between the NSAI-NML (Ireland) and the BIPM carried out in 2011. Two 10 pF travelling standards belonging to the BIPM were used. The comparison was carried out with an 'A—B—A' pattern of measurements; the standards were measured first at the BIPM for a period of about one month, then for a similar period at the NSAI-NML, and finally again at the BIPM. The measurand was the two terminal-pair capacitance at a frequency of 1000 Hz for a measuring voltage of 15 V. The BIPM was the pilot laboratory, and the comparison forms part of the ongoing BIPM key comparison BIPM.EM-K14.a. The results from the NSAI-NML and the BIPM were found to be in good agreement, with a difference smaller than the relative expanded uncertainty (95 % confidence, k = 2) of 2.5 × 10-6. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  1. Changes in the functions of undertakings in electricity supply

    International Nuclear Information System (INIS)

    Oberlack, H.W.

    1976-01-01

    For the electricity supply industry also it is necessary, by means of more intensive publicity work, to achieve the general realisation that neither new laws nor intervention of the state are required for dealing in the interests of the consumer with the problems arising, from great changes in all fields of business enterprise. It is more important for the electricity supply undertakings (EVU), by means of executive power and the administration of justice, to be put a position to carry out in the most efficient manner the functions entrusted to them by the Federal Government under the Power Supply Law and the energy programme. (orig.) [de

  2. Inter-RMO Key Comparison EUROMET.L-K5.2004: Calibration of a step gauge

    DEFF Research Database (Denmark)

    Prieto, Emilio; Brown, Nicholas; Lassila, Antti

    2012-01-01

    The results of the inter-RMO key comparison EUROMET.L-K5.2004 on the calibration of a step gauge are reported. Eighteen National Metrology Institutes and one Designated Institute from four different metrological regions all over the world participated in this comparison which lasted three years...... value. Due to the significant instability of the step it was also considered an artefact uncertainty. The reported uncertainties ranged from 0.045 µm to 1.2 µm (k = 1). The uncertainty of the artefact ranged from 0.018 µm (for the 20 mm face) to 0.176 µm (for the 400 mm face). The compatibility of all...... participants for measuring step gauges was demonstrated with the only exception of a participant showing very high systematic (both positive and negative) errors. Five participants communicated higher uncertainties than the corresponding approved CMCs. A set of Recommendations and Actions were agreed therefore...

  3. Bilateral comparison of 10 V standards between the NSAI-NML (Ireland) and the BIPM, March to April 2011 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Power, O.; Solve, S.; Chayramy, R.; Stock, M.

    2011-01-01

    As a part of the ongoing BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland-National Metrology Laboratory (NSAI-NML), Dublin, Ireland, was carried out from March to April 2011. Two BIPM Zener diode-based travelling standards (Fluke 732B) were transported by freight to NSAI-NML. At NSAI-NML, the 10 V output EMF of each travelling standard was measured by direct comparison with a group of characterized Zener diode-based electronic voltage standards. At the BIPM, the travelling standards were calibrated before and after the measurements at NSAI-NML, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages on internal temperature and ambient pressure. The comparison results show that the voltage standards maintained by NSAI-NML and the BIPM were equivalent, within their stated expanded uncertainties, on the mean date of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  4. The Key Lake project

    International Nuclear Information System (INIS)

    1991-01-01

    Key Lake is located in the Athabasca sand stone basin, 640 kilometers north of Saskatoon, Saskatchewan, Canada. The three sources of ore at Key Lake contain 70 100 tonnes of uranium. Features of the Key Lake Project were described under the key headings: work force, mining, mill process, tailings storage, permanent camp, environmental features, worker health and safety, and economic benefits. Appendices covering the historical background, construction projects, comparisons of western world mines, mining statistics, Northern Saskatchewan surface lease, and Key Lake development and regulatory agencies were included

  5. Co-founding ant queens prevent disease by performing prophylactic undertaking behaviour.

    Science.gov (United States)

    Pull, Christopher D; Cremer, Sylvia

    2017-10-13

    Social insects form densely crowded societies in environments with high pathogen loads, but have evolved collective defences that mitigate the impact of disease. However, colony-founding queens lack this protection and suffer high rates of mortality. The impact of pathogens may be exacerbated in species where queens found colonies together, as healthy individuals may contract pathogens from infectious co-founders. Therefore, we tested whether ant queens avoid founding colonies with pathogen-exposed conspecifics and how they might limit disease transmission from infectious individuals. Using Lasius niger queens and a naturally infecting fungal pathogen Metarhizium brunneum, we observed that queens were equally likely to found colonies with another pathogen-exposed or sham-treated queen. However, when one queen died, the surviving individual performed biting, burial and removal of the corpse. These undertaking behaviours were performed prophylactically, i.e. targeted equally towards non-infected and infected corpses, as well as carried out before infected corpses became infectious. Biting and burial reduced the risk of the queens contracting and dying from disease from an infectious corpse of a dead co-foundress. We show that co-founding ant queens express undertaking behaviours that, in mature colonies, are performed exclusively by workers. Such infection avoidance behaviours act before the queens can contract the disease and will therefore improve the overall chance of colony founding success in ant queens.

  6. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar [Institute for Theoretical Physics III, Heinrich-Heine-universitaet Duesseldorf, D-40225 Duesseldorf (Germany)

    2011-09-15

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  7. Quantum key distribution with finite resources: Secret key rates via Renyi entropies

    International Nuclear Information System (INIS)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bruss, Dagmar

    2011-01-01

    A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

  8. Firearm Homicide in Australia, Canada, and New Zealand: What Can We Learn from Long-Term International Comparisons?

    Science.gov (United States)

    McPhedran, Samara; Baker, Jeanine; Singh, Pooja

    2011-01-01

    Although firearm homicide remains a topic of interest within criminological and policy discourse, existing research does not generally undertake longitudinal comparisons between countries. However, cross-country comparisons provide insight into whether "local" trends (e.g., declines in firearm homicide in one particular country) differ…

  9. Report of the key-comparison of spectral diffuse reflectance (EURAMET.PR-K5) (Ref. 619)

    Science.gov (United States)

    Andor, György; Gál, Péter

    2018-01-01

    This report details the final results of the EURAMET comparison on regular spectral transmittance carried out between 2006 and 2016. The aim of this comparison was to check the agreement of measurement of the spectral diffuse reflectance among participants, using the measurement geometry of d/0 or 0/d in the wavelength range of 360 nm to 780 nm at 20 nm increment. We used a star type comparison: first the participants sent their samples to the pilot, than the pilot measured all the samples of the participants and sent them back. The participants measured the samples and sent them to the pilot for control measurement. Six standards were used as reference standards in order to maintain the scale during the comparison. These were three samples of BCR-406 opal glasses (BCR 30506; BCR 30303; BCR 30704), an MC20 Russian opal glass (MC 4777) and two samples made of pressed halon (polytetrafluoroethylene) powder (halon 2007A; halon 2007C). These six samples were designated as the Comparison reference standards. The diffuse reflectance was initially measured on the OMH (BFKH) absolute reflectometer. The link to the CCPR-K5 results was BFKH, and the check on BFKH was the PTB results who also participated in the CCPR-K5 comparison. The participants were GUM, INM, LNE, METAS, BFKH, PTB, SP. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCPR, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  10. Assisted reproductive technologies in Ghana : Transnational undertakings, local practices and ‘more affordable’ IVF

    NARCIS (Netherlands)

    Gerrits, T.

    The article sketches the origins and development of IVF in Ghana as a highly transnational undertaking. Movements are from and to Africa, involving human beings (providers and users), and also refer to other entities such as technologies, skills and knowledge. None of these movements are paid for

  11. Final report on CCQM-K9.2 : subsequent key comparison on pH determination of phosphate buffer by Harned cell measurements

    OpenAIRE

    Spitzer, Petra; Giera, Janine; Fraga, Isabel Cristina Serta; Jakobsen, Pia Tonnes; Jensen, Hans D.; Hyllested, Peter; Karpov, Oleg; Kutovoy, Viatcheslav; Nakamura, Susumu; Vospelova, Alena; Zvezdina, Valentina

    2008-01-01

    CCQM-K9.2 was performed supplementary to the key comparison CCQM-K9 [1] on the pH determination of a phosphate buffer with nominal pH ~ 6.9 (at 25 °C). The sample composition was very similar in both comparisons. Only the source of the starting material used for sample preparation was different. The comparison was restricted to the use of the primary method for pH (Harned cell measurement) as defined in the IUPAC Recommendations [2]. The measurement temperatures were15 °C, 25 °C , 37...

  12. Key comparison BIPM.RI(I)-K1 of the air-kerma standards of the MKEH, Hungary and the BIPM in 60Co gamma radiation

    Science.gov (United States)

    Kessler, C.; Burns, D.; Machula, G.

    2018-01-01

    A comparison of the standards for air kerma of the Hungarian Trade Licensing Office (MKEH), Hungary and of the Bureau International des Poids et Mesures (BIPM) was carried out in the 60Co radiation beam of the BIPM in March 2016. The comparison result, evaluated as a ratio of the MKEH and the BIPM standards for air kerma, is 1.0047 with a combined standard uncertainty of 1.9 × 10-3. The results for an indirect comparison made at the same time are consistent with the direct results at the level of 2.6 parts in 103. The results are analysed and presented in terms of degrees of equivalence, suitable for entry in the BIPM key comparison database. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCRI, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  13. Key comparison BIPM.RI(I)-K5 of the air kerma standards of the ININ, Mexico and the BIPM in 137Cs gamma radiation

    Science.gov (United States)

    Kessler, C.; Burns, D. T.; Alvarez Romero, J. T.; De la Cruz Hernández, D.; Cabrera Vertti, M. R.; Tovar-Muñoz, V. M.

    2015-01-01

    A direct comparison of the standards for air kerma of the Instituto Nacional de Investigaciones Nucleares (ININ), Mexico, and of the Bureau International des Poids et Mesures (BIPM) was carried out in the 137Cs radiation beam of the BIPM in February 2015. The comparison result, evaluated as a ratio of the ININ and the BIPM standards for air kerma, is 1.0048 with a combined standard uncertainty of 2.0 × 10-3. The results are analysed and presented in terms of degrees of equivalence for entry in the BIPM key comparison database. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCRI, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. An undertaking planning game for the electricity supply industry

    International Nuclear Information System (INIS)

    Troescher, H.

    1977-01-01

    Planning games have been found satisfactory in many field in political and economic life. In particular the more convenient access to electronic calculators has made a contrinution to their wider use. It is therefore surprising that the first planning game which has become known for the electricity supply industry was first published in the year 1975. This is the planning game for the Bernischen Kraftwerke AG, which is based on a simplified model of a small electricity supply undertaking (EVU). This planning game was adapted in the RWE to the conditions in larger EVU and a few additional model components were added. Besides the general points of view on planning games for EVU the author deals with the extended planning game which is termed in the article PEW. (orig.) [de

  15. Bilateral comparison of 1 Ω and 10 kΩ standards (ongoing BIPM key comparisons BIPM.EM-K13.a and 13.b) between the NSAI NML (Ireland) and the BIPM

    Science.gov (United States)

    Rolland, B.; Fletcher, N.; Power, O.

    2017-01-01

    This report gives the result of a bilateral comparison of resistance between the NSAI NML (Ireland) and the BIPM carried out in 2014-2015. Two 1 Ω and two 10 kΩ travelling standards belonging to the BIPM were used. The comparison was carried out with an 'A-B-A' pattern of measurements; the standards were measured first at the BIPM for a period of about one month, then for a similar period at the NSAI-NML, and finally again at the BIPM. The measurand was the 4 terminal dc resistance at low power. The BIPM was the pilot laboratory, and the comparison forms part of the ongoing BIPM key comparisons BIPM.EM-K13.a (for 1 Ω) and BIPM.EM-K13b (for 10 kΩ). The results from the NSAI NML and the BIPM were found to be in good agreement, with a difference smaller than the relative expanded uncertainties (95% confidence, k = 2) of 0.16 × 10-6 for 1 Ω and 0.42 × 10-6 for 10 kΩ. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  16. Bilateral comparison of 10 V standards between the NSAI-NML (Ireland) and the BIPM, March 2014 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Solve, S.; Chayramy, R.; Power, O.; Stock, M.

    2014-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland-National Metrology Laboratory (NSAI-NML), Dublin, Ireland, was carried out in February and March 2014. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPM_4 (Z4) and BIPM_5 (Z5), were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage at the 10 V level consists of a group of characterized Zener diode-based electronic voltage standards. The output EMF (Electromotive Force) of each travelling standard was measured by direct comparison with the group standard. At the BIPM the travelling standards were calibrated, before and after the measurements at NSAI-NML, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and ambient atmospheric pressure. The final result of the comparison is presented as the difference between the value assigned to DC voltage standard by NSAI-NML, at the level of 10 V, at NSAI-NML, UNML, and that assigned by the BIPM, at the BIPM, UBIPM, at the reference date of 10 March 2014. UNML - UBIPM = -0.64 µV uc = 1.35 µV, at 10 V where uc is thecombined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML,based on KJ-90, and the uncertainty related to the comparison. The comparison results show that the voltage standards maintained by NSAI-NML and the BIPM were equivalent, within their stated standard uncertainties, on the mean date of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to

  17. Final report on key comparison APMP.M.P-K3: Absolute pressure measurements in gas from 3 × 10-6 Pa to 9 × 10-4 Pa

    Science.gov (United States)

    Yoshida, H.; Arai, K.; Akimichi, H.; Hong, S. S.; Song, H. W.

    2011-01-01

    The results of a key comparison of ultra-high vacuum standards at two national metrology institutes (NMIJ/AIST and KRISS) are reported. This bilateral comparison was carried out from May 2010 to October 2010 within the framework of the Asia-Pacific Metrology Programme (APMP) to determine their degrees of equivalence at pressures in the range from 3 × 10-6 Pa to 9 × 10-4 Pa. The pilot institute was NMIJ/AIST. Two spinning rotor gauges and two hot cathode ionization gauges were used as the transfer standards. NMIJ/AIST used two calibration systems: the dynamic expansion system (NMIJ-DES) and two-stage flow-dividing system (NMIJ-TFS). KRISS used the dynamic expansion system. The transfer standards were sufficiently stable to meet the requirements of the comparison compared with those of previous international comparisons owing to some improvements of the protocol and the transfer standards. The ultra-high vacuum standards of NMIJ/AIST and KRISS were found to be equivalent within their claimed uncertainties in the range from 3 × 10-6 Pa to 9 × 10-5 Pa. The NMIJ-DES results, which have smaller uncertainty than NMIJ-TFS, were transferred to the corresponding CCM key comparison, CCM.P-K3, in the range from 3 × 10-6 Pa to 9 × 10-5 Pa and it is shown that the NMIJ values were equivalent to the CCM key comparison reference value within the claimed uncertainties. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  18. KEY COMPARISON: CCQM-K61: Quantitation of a linearised plasmid DNA, based on a matched standard in a matrix of non-target DNA

    Science.gov (United States)

    Woolford, Alison; Holden, Marcia; Salit, Marc; Burns, Malcolm; Ellison, Stephen L. R.

    2009-01-01

    Key comparison CCQM-K61 was performed to demonstrate and document the capability of interested national metrology institutes in the determination of the quantity of specific DNA target in an aqueous solution. The study provides support for the following measurement claim: "Quantitation of a linearised plasmid DNA, based on a matched standard in a matrix of non-target DNA". The comparison was an activity of the Bioanalysis Working Group (BAWG) of the Comité Consultatif pour la Quantité de Matière and was coordinated by NIST (Gaithersburg, USA) and LGC (Teddington, UK). The following laboratories (in alphabetical order) participated in this key comparison. DMSC (Thailand); IRMM (European Union); KRISS (Republic of Korea); LGC (UK); NIM (China); NIST (USA); NMIA (Australia); NMIJ (Japan); VNIIM (Russian Federation) Good agreement was observed between the reported results of all nine of the participants. Uncertainty estimates did not account fully for the dispersion of results even after allowance for possible inhomogeneity in calibration materials. Preliminary studies suggest that the effects of fluorescence threshold setting might contribute to the excess dispersion, and further study of this topic is suggested Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  19. The capabilities and scope-of-practice requirements of advanced life support practitioners undertaking critical care transfers: A Delphi study

    Directory of Open Access Journals (Sweden)

    Monique Venter

    2016-11-01

    Full Text Available Background. Critical care transfers (CCT refer to the high level of care given during transport (via ambulance, helicopter or fixed-wing aircraft of patients who are of high acuity. In South Africa (SA, advanced life support (ALS paramedics undertake CCTs. The scope of ALS in SA has no extended protocol regarding procedures or medications in terms of dealing with these CCTs. Aim. The aim of this study was to obtain the opinions of several experts in fields pertaining to critical care and transport and to gain consensus on the skills and scope-of-practice requirements of paramedics undertaking CCTs in the SA setting. Methods. A modified Delphi study consisting of three rounds was undertaken using an online survey platform. A heterogeneous sample (n=7, consisting of specialists in the fields of anaesthesiology, emergency medicine, internal medicine, critical care, critical care transport and paediatrics, was asked to indicate whether, in their opinion, selected procedures and medications were needed within the scope of practice of paramedics undertaking CCTs. Results. After three rounds, consensus was obtained in 70% (57/81 of procedures and medications. Many of these items are not currently within the scope of paramedics’ training. The panel felt that paramedics undertaking these transfers should have additional postgraduate training that is specific to critical care. Conclusion. Major discrepancies exist between the current scope of paramedic practice and the suggested required scope of practice for CCTs. An extended scope of practice and additional training should be considered for these practitioners.

  20. Bilateral Comparison of 10 V Standards between the NSAI - NML (Ireland) and the BIPM, March 2015 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Solve, S.; Chayramy, R.; Stock, M.; Power, O.

    2015-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland - National Metrology Laboratory (NSAI - NML), Dublin, Ireland, was carried out in February and March 2015. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPM6 (Z6) and BIPMC (ZC), were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage at the 10 V level consists of a group of characterized Zener diode-based electronic voltage standards. The output EMF (Electromotive Force) of each travelling standard was measured by direct comparison with the group standard. At the BIPM the travelling standards were calibrated, before and after the measurements at NSAI-NML, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and ambient atmospheric pressure. The final resultof the comparison is presented as the difference between the values assigned to DC voltage standards by NSAI - NML, at the level of 10 V,at NSAI - NML, UNML, and those assigned by the BIPM, at the BIPM, UBIPM, at the reference date of 24 February 2015. UNML - UBIPM = - 0.82 mV; uc = 1.35 mV , at 10 V where uc is the combined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML, based on KJ-90, and the uncertainty related to the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  1. Bilateral comparison of 10 V standards between the NSAI - NML (Ireland) and the BIPM, February 2016 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Solve, S.; Chayramy, R.; Power, O.; Stock, M.

    2016-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland - National Metrology Laboratory (NSAI - NML), Dublin, Ireland, was carried out in January and February 2016. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPM7 (Z7) and BIPM9 (Z9), were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage at the 10 V level consists of a group of characterized Zener diode-based electronic voltage standards. The output EMF (Electromotive Force) of each travelling standard was measured by direct comparison with the group standard. At the BIPM the travelling standards were calibrated, before and after the measurements at NSAI-NML, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and ambient atmospheric pressure. The final result of the comparison is presented as the difference between the values assigned to DC voltage standards by NSAI - NML, at the level of 10 V, at NSAI - NML, UNML, and those assigned by the BIPM, at the BIPM, UBIPM, at the reference date of the 31 of January 2016. UNML - UBIPM = + 0.22 μV uc = 1.35 μV , at 10 V where uc is the combined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML, based on KJ-90, and the uncertainty related to the comparison. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  2. Bilateral key comparison SIM.T-K6.1 on humidity standards in the dew/frost-point temperature range from -25 °C to +20 °C

    Science.gov (United States)

    Meyer, C. W.; Hill, K. D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. This paper is the final report of the comparison including analysis of the uncertainty of measurement results. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT WG-KC, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  3. Report to the CCT on COOMET comparison COOMET.T-K3.1 (previously COOMET.T-S1): Key regional comparison of the national standards of temperature in the range from the triple point of water to the freezing point of zinc

    Science.gov (United States)

    Pokhodun, A. I.

    2010-01-01

    In the framework of the CIPM MRA, a first COOMET comparison "Comparison of the ITS-90 realizations in the range from 0.01 °C to 429.7485 °C (from the triple point of water to the freezing point of zinc)", registered in the KCDB under the identifier "COOMET.T-K3", was carried out in 2005-2007. Four national metrology institutes took part in this comparison: VNIIM (Russian Federation), SMU (Slovakia), BelGIM (Republic of Belarus) and NSC IM (Ukraine), and two of them (VNIIM and SMU) ensured the linkage with key comparisons CCT-K3 and CCT-K4, in order to disseminate the metrological equivalence to the measurement standards of NSC IM and BelGIM. NSC IM, however, had to withdraw its results, and at the meeting of Technical Committee T-10 of COOMET it was decided to carry out a supplementary bilateral comparison between VNIIM and the NSC IM for realization of the ITS-90 in the same range of temperature. This was registered in the KCDB under the identifier COOMET.T-S1 and measurements were performed in 2008-2009. From the results presented in this report, it is possible to draw the conclusion that the COOMET supplementary comparison COOMET.T-S1 demonstrates the CMC uncertainties claimed by the NSC IM for the melting point of gallium 0.236 mK (k = 2), and the freezing points of indium 1.040 mK (k = 2), tin 0.858 mK (k = 2) and zinc 0.944 mK (k = 2). In September 2012 the Working Group on key Comparisons (WG 7) of the CCT upgraded this comparison to a COOMET key comparison of the 'CCT-K3' type. It is now identified as COOMET.T-K3.1. In April 2013 this report was superseded by item 03006 in the Technical Supplement of 2013. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  4. Final report of the key comparison CCQM-K106: Pb, As and Hg measurements in cosmetic (cream)

    Science.gov (United States)

    Wang, Jun; Wang, Qian; Yamani, Randa Nasr Ahmed; Shehata, Adel B.; Jacimovic, Radojko; Pavlin, Majda; Horvat, Milena; Tsoi, Y. P.; Tsang, C. K.; Shin, Richard; Chailap, Benjamat; Yafa, Charun; Caciano de Sena, Rodrigo; de Almeida, Marcelo; Yim, Yong-Hyeon; Lee, Kyoung-Seok; Heun Kim, Sook; Konopelko, Leonid; Ari, Betül; Tokman, Nilgün; Rienitz, Olaf; Jaehrling, Reinhard; Pape, Carola

    2015-01-01

    Cosmetics are used in practically all walks of life as a means of improving skin and beautifying complexion. In recent years, more and more attention has been paid to the cosmetic safety. In response to the cosmetic safety issue, the accurate measurement of the heavy metals in cosmetics is, therefore, particularly important. NMIs from different countries should establish their chemical metrology traceability system in this area, which includes both measurement methods research and certain CRMs development. It should be noted that because the matrix of many cosmetics is complex and the contents of the heavy metals are relatively low, it still is a challenging task to measure the analytes with high accuracy and precision. CCQM-K106 followed up CCQM pilot study 'CCQM-P128: Pb, As measurements in cosmetic (cream)' coordinated by the National Institute of Metrology, China (NIM) in 2009. The cream was selected as the testing material, which is widely used as a daily skin care worldwide. This is the first CCQM key comparison regarding the measurement of toxic metal elements with the cosmetic matrix, which includes pure water, liquid paraffin, silicone oil, synthetic squalane, hyaluronic acid, glycerin, propylene glycol, allantoin, preservative and so on. The aim of the CCQM-K106 is to demonstrate the capability of participating NMIs and designated institutes in measuring the contents of poisonous elements, including lead, arsenic and mercury in a cosmetic sample (cream), and support CMC claims relating to inorganic elements in cosmetic materials and similar chemical industry products. The cream matrix sample was prepared under the guidance of professional technicians. The formula of the cream was carefully chosen to match with a real cosmetic. The homogeneity and stability level of Pb, As and Hg in the cream sample were fit for the objective of the comparison. Each participant received two numbered bottles containing about 5g samples in each bottle. The instruction

  5. Farmers Prone to Drought Risk: Why Some Farmers Undertake Farm-Level Risk-Reduction Measures While Others Not?

    Science.gov (United States)

    Gebrehiwot, Tagel; van der Veen, Anne

    2015-03-01

    This research investigates farmers' cognitive perceptions of risk and the behavioral intentions to undertake farm-level risk-reduction measures. It has been observed that people who are susceptible to natural hazards often fail to act, or do very little, to protect their assets or lives. To answer the question of why some people show adaptive behavior while others do not, a socio-psychological model of precautionary adaptation based on protection motivation theory and trans-theoretical stage model has been applied for the first time to areas of drought risk in the developing countries cultural context. The applicability of the integrated model is explored by means of a representative sample survey of smallholder farmers in northern Ethiopia. The result of the study showed that there is a statistically significant association between farmer's behavioral intention to undertake farm-level risk-reduction measures and the main important protection motivation model variables. High perceived vulnerability, severity of consequences, self-efficacy, and response efficacy lead to higher levels of behavioral intentions to undertake farm-level risk-reduction measures. For farmers in the action stage, self-efficacy and response efficacy were the main motivators of behavioral intention. For farmers in the contemplative stage, self-efficacy and cost appear to be the main motivators for them to act upon risk reduction, while perceived severity of consequences and cost of response actions were found to be important for farmers in the pre-contemplative stage.

  6. APMP/TCRI key comparison report of measurement of air kerma for medium-energy x-rays (APMP.RI(I)-K3)

    International Nuclear Information System (INIS)

    Lee, J.H.; Hwang, W.S.; Kotler, L.H.; Webb, D.V.; Buermann, L.; Burns, D.T.; Takeyeddin, M.; Shaha, V.V.; Srimanoroth, S.; Meghzifene, A.; Hah, S.H.; Chun, K.J.; Kadni, T.B.; Takata, N.; Msimang, Z.

    2008-01-01

    The APMP/TCRI Dosimetry Working Group performed the APMP.RI(I)-K3 key comparison of measurement of air kerma for medium-energy x-rays (100 kV to 250 kV) between 2000 and 2003. In total, 11 institutes took part in the comparison, among which 8 were APMP member laboratories. Two commercial cavity ionization chambers were used as transfer instruments and circulated among the participants. All the participants established the 100 kV, 135 kV, 180 kV and 250 kV x-ray beam qualities equivalent to those of the BIPM. The results showed that the maximum difference between the participants and the BIPM in the medium-energy x-ray range, evaluated using the comparison data of the linking laboratories ARPANSA and PTB, is less than 1.4%. The degrees of equivalence between the participants are presented and this comparison confirms the calibration capabilities of the participating laboratories. (authors)

  7. APMP/TCRI key comparison report of measurement of air kerma for medium-energy x-rays (APMP.RI(I)-K3)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J.H.; Hwang, W.S. [Institute of Nuclear Energy Research, Longtan, Taiwan (China); Kotler, L.H.; Webb, D.V. [Australian Radiation Protection and Nuclear Safety Agency, Yallambie (Australia); Buermann, L. [Physikalisch Technische Bundesanstalt, Braunschweig (Germany); Burns, D.T. [Bureau International de Poids et Mesures, 92 - Sevres (France); Takeyeddin, M. [Atomic Energy Commission, Damascus (Syrian Arab Republic); Shaha, V.V. [Bhabha Atomic Research Centre, Mumbai (India); Srimanoroth, S. [Department of Medical Sciences, Nonthaburi (Thailand); Meghzifene, A. [International Atomic Energy Agency, Vienna (Austria); Hah, S.H.; Chun, K.J. [Korea Research Institute of Standards and Science, Yusong (Korea, Republic of); Kadni, T.B. [Malaysian Nuclear Agency, Kajang (Malaysia); Takata, N. [National Metrology Institute of Japan, Tsukuba (Japan); Msimang, Z. [National Metrology Institute of South Africa, Pretoria (South Africa)

    2008-10-15

    The APMP/TCRI Dosimetry Working Group performed the APMP.RI(I)-K3 key comparison of measurement of air kerma for medium-energy x-rays (100 kV to 250 kV) between 2000 and 2003. In total, 11 institutes took part in the comparison, among which 8 were APMP member laboratories. Two commercial cavity ionization chambers were used as transfer instruments and circulated among the participants. All the participants established the 100 kV, 135 kV, 180 kV and 250 kV x-ray beam qualities equivalent to those of the BIPM. The results showed that the maximum difference between the participants and the BIPM in the medium-energy x-ray range, evaluated using the comparison data of the linking laboratories ARPANSA and PTB, is less than 1.4%. The degrees of equivalence between the participants are presented and this comparison confirms the calibration capabilities of the participating laboratories. (authors)

  8. Bilateral key comparison SIM.T-K6.5 on humidity standards in the dew/frost-point temperature range from -30 °C to +20 °C

    Science.gov (United States)

    Meyer, C.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica) between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and LACOMET. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  9. Bilateral key comparison SIM.T-K6.2 on humidity standards in the dew/frost-point temperature range from -20 °c to 20 °c

    Science.gov (United States)

    Huang, P. H.; Meyer, C. W.; Martines-López, E.; Dávila Pacheco, J. A.; Méndez-Lango, E.

    2014-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Centro Nacional de Metrologia (CENAM, Mexico) between July 2008 and December 2008. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and CENAM and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and CENAM. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  10. Reasons why specialist doctors undertake rural outreach services: an Australian cross-sectional study.

    Science.gov (United States)

    O'Sullivan, Belinda G; McGrail, Matthew R; Stoelwinder, Johannes U

    2017-01-07

    The purpose of the study is to explore the reasons why specialist doctors travel to provide regular rural outreach services, and whether reasons relate to (1) salaried or private fee-for-service practice and (2) providing rural outreach services in more remote locations. A national cross-sectional study of specialist doctors from the Medicine in Australia: Balancing Employment and Life (MABEL) survey in 2014 was implemented. Specialists providing rural outreach services self-reported on a 5-point scale their level of agreement with five reasons for participating. Chi-squared analysis tested association between agreement and variables of interest. Of 567 specialists undertaking rural outreach services, reasons for participating include to grow the practice (54%), maintain a regional connection (26%), provide complex healthcare (18%), healthcare for disadvantaged people (12%) and support rural staff (6%). Salaried specialists more commonly participated to grow the practice compared with specialists in fee-for-service practice (68 vs 49%). This reason was also related to travelling further and providing outreach services in outer regional/remote locations. Private fee-for-service specialists more commonly undertook outreach services to provide complex healthcare (22 vs 14%). Specialist doctors undertake rural outreach services for a range of reasons, mainly to complement the growth and diversity of their main practice or maintain a regional connection. Structuring rural outreach around the specialist's main practice is likely to support participation and improve service distribution.

  11. The Costs and Benefits of Undertaking Adult Education Courses from the Perspective of the Individual

    Science.gov (United States)

    AONTAS The National Adult Learning Organisation, 2009

    2009-01-01

    The aim of this study is to examine the costs and benefits of undertaking adult education courses from the perspective of the individual, using three different case studies. This will give a snapshot of the benefits and the types of costs incurred by three adult learners. Three individuals were contacted by Aontas and were asked if they would be…

  12. Bilateral comparison of 10 V standards between the NSAI-NML (Ireland) and the BIPM, January to February 2013 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Power, O.; Chayramy, R.; Solve, S.; Stock, M.

    2014-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland-National Metrology Laboratory (NSAI-NML), Dublin, Ireland, was carried out from January to February 2013. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPM_8 (Z8) and BIPM_9 (Z9), were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage at the 10 V level consists of a group of characterized Zener diode-based electronic voltage standards. The output EMF (electromotive force) of each travelling standard was measured by direct comparison with the group standard. At the BIPM the travelling standards were calibrated, before and after the measurements at NSAI-NML, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and ambient atmospheric pressure. The final result of the comparison is presented as the difference between the value assigned to DC voltage standard by NSAI-NML, at the level of 10 V, at NSAI-NML, UNML, and that assigned by the BIPM, at the BIPM, UBIPM, at the reference date of 5 February 2013. UNML - UBIPM = -0.63 µV uc = 1.31 µV, at 10 V where uc is thecombined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML,based on KJ-90, and the uncertainty related to the comparison. The comparison results show that the voltage standards maintained by NSAI-NML and the BIPM were equivalent, within their stated standard uncertainties, on the mean date of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according

  13. A Phytase Enzyme-Based Biochemistry Practical Particularly Suited to Students Undertaking Courses in Biotechnology and Environmental Science

    Science.gov (United States)

    Boyce, Angela; Casey, Anne; Walsh, Gary

    2004-01-01

    Courses in introductory biochemistry invariably encompass basic principles of enzymology, with reinforcement of lecture-based material in appropriate laboratory practicals. Students undertaking practical classes are more enthusiastic, and generally display improved performance, when the specific experiments undertaken show direct relevance to…

  14. EU program fuel cells in 2012 - FCH JU Fuel Cell and Hydrogen Joint Undertaking; EU-program braensleceller 2012 - FCH JU Fuel Cell and Hydrogen Joint Undertaking

    Energy Technology Data Exchange (ETDEWEB)

    Ridell, Bengt

    2013-03-15

    An EU activity in fuel cell and hydrogen field are gathered since 2008 in a so called JU, Joint Undertaking, or as it is also referred to as JTI Joint Technology Initiative. The program will run 2008 - 2013 and covers in total 940 MEUR of which the EU Commission is funding 470 MEUR. The activities of the FCH JU are governed by a Governing Board which has 12 members, five from the Commission, one of the research group and 5 from the Industrial Group. The current agreement for the FCH JU / JTI is coming to an end, and the sixth and final call was released in January 2013 with the deadline of 22 May 2013. Funding from the Commission is made through the Seventh Framework Programme FP7, which ends in 2013. Next the Eighth Framework Programme called Horizon 2020 shall continue for the years 2014 - 2020. Five of the six calls are completed. From the four first calls there are 61 projects started which 6 have been completed. From the fifth announcement is further 27 projects selected for negotiation with the Commission and they will start soon. It is now working intensively to plan Horizon 2020. There are plans to continue the new FCH JU but nothing is decided either for this or for the budget for Horizon 2020. If the FCH Joint Undertaking shall continue in its present form as a Joint Undertaking it will require clear long-term commitments from the private sector and also from the Member States. Another issue is that the long-term research should also get space it has not been the case in the present FCH JU. There are several Swedish participants in the projects and in the working groups of the program. There are Swedish participants in 11 of the 68 projects launched so far. It is in the areas of Stationary systems, Transportation and Early Markets. Project manager for the project FCGEN is Volvo Technology AB. FCH JU has its own website, www.fch-ju.eu, which opened in 2010 when the organization of the program was taken over from the Commission to permanent organisation

  15. International key comparison of neutron fluence measurements in mono-energetic neutron fields: C.C.R.I.(3)-K10

    Energy Technology Data Exchange (ETDEWEB)

    Chen, J.; Wang, Z.; Rong, C. [China Institute of Atomic Energy (CIAE), Beijing, People' s Republic of China (China); Lovestam, G.; Plompen, A.; Puglisi, N. [EC-JRC-Institute for Reference Materials and Measurements (IRMM), Geel (Belgium); Gilliam, D.M.; Eisenhauer, C.M.; Nico, J.S.; Dewey, M.S. [National Institute of Standards and Technology (NIST), Gaithersburg (United States); Kudo, K.; Uritani, A.; Harano, H.; Takeda, N. [National Metrology Institute of Japan (NMIJ), Tsukuba (Japan); Thomas, D.J.; Roberts, N.J.; Bennett, A.; Kolkowski, P. [National Physical Laboratory (NPL), Teddington (United Kingdom); Moisseev, N.N.; Kharitonov, I.A. [Mendeleyev Institute for Metrology (VNIIM), St Petersburg (Russian Federation); Guldbakke, S.; Klein, H.; Nolte, R.; Schlegel, D. [Physikalisch-Technische Bundesanstalt (PTB), Braunschweig (Germany)

    2007-12-15

    C.C.R.I. Section III (neutron measurements) conducted a unique key comparison of neutron fluence measurements in mono-energetic neutron fields. In contrast to former comparisons, here the fluence measurements were performed with the participants' instruments in the same neutron fields at the P.T.B. accelerator facility. Seven laboratories- the C.I.A.E. (China), I.R.M.M. (E.C.), N.M.I.J. (Japan), N.I.S.T. (USA), N.P.L. (UK), P.T.B. (Germany) and the V.N.I.I.M. (Russia)-employed their primary standard reference methods or transfer instruments carefully calibrated against their primary standards, to determine the fluence of 0.144 MeV, 1.2 MeV, 5.0 MeV and 14.8 MeV neutrons and reported calibration coefficients for a selected neutron monitor and each neutron energy with a detailed uncertainty budget for the measurements. The key comparison reference values (K.C.R.V.) were finally evaluated as the weighted mean values of the neutron fluence at 1 m distance from the target in vacuum per neutron monitor count. The uncertainties of each K.C.R.V. amounted to about 1%. The degree of equivalence (D.o.E.), defined as the deviation of the result reported by the laboratories for each energy from the corresponding K.C.R.V., and the associated expanded uncertainty are also reported. The deviations between the results of two laboratories each with the corresponding expanded uncertainties complete the documentation of the degrees of equivalence. (authors)

  16. Farmers prone to drought risk : why some farmers undertake farm-level risk-reduction measures while others not?

    NARCIS (Netherlands)

    Gidey, T.G.; van der Veen, A.

    2015-01-01

    This research investigates farmers’ cognitive perceptions of risk and the behavioral intentions to undertake farm-level risk-reduction measures. It has been observed that people who are susceptible to natural hazards often fail to act, or do very little, to protect their assets or lives. To answer

  17. Bilateral comparison of 10 V standards between the NSAI-NML (Ireland) and the BIPM, February to March 2012 (part of the ongoing BIPM key comparison BIPM.EM-K11.b)

    Science.gov (United States)

    Power, O.; Solve, S.; Chayramy, R.; Stock, M.

    2012-01-01

    As part of the on-going BIPM key comparison BIPM.EM-K11.b, a comparison of the 10 V voltage reference standards of the BIPM and the National Standards Authority of Ireland-National Metrology Laboratory (NSAI-NML), Dublin, Ireland, was carried out from February to March 2012. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPM_C (ZC) and BIPM_D (ZD), were transported by freight to NSAI-NML. At NSAI-NML, the reference standard for DC voltage at the 10 V level consists of a group of characterized Zener diode-based electronic voltage standards. The output EMF (electromotive force) of each travelling standard was measured by direct comparison with the group standard. At the BIPM the travelling standards were calibrated, before and after the measurements at NSAI-NML, with the Josephson voltage standard. Results of all measurements were corrected for the dependence of the output voltages on internal temperature and ambient atmospheric pressure. The final result of the comparison is presented as the difference between the value assigned to DC voltage standard by NSAI-NML, at the level of 10 V, at NSAI-NML, UNML, and that assigned by the BIPM, at the BIPM, UBIPM, at the reference date of 23 February 2012. UNML - UBIPM = +0.83 µV, uc = 1.35 µV, at 10 V where uc is the combined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML, based on KJ-90, and the uncertainty related to the comparison. The final result is impacted by the anomalous offset between the NSAI-NML results for the two transfer standards. The reason for this offset hasn't been determined. However, the difference remains within the total combined standard uncertainty. Therefore, the comparison result shows that the voltage standards maintained by NSAI-NML and the BIPM were equivalent, within their stated expanded uncertainties, on the mean date of the comparison. Main text. To reach the main text of

  18. Supporting students undertaking the Specialist Practitioner Qualification in District Nursing.

    Science.gov (United States)

    Ginger, Tracey; Ritchie, Georgina

    2017-11-02

    The ever-evolving role of the Specialist Practitioner Qualified District Nurse (SPQDN) presents an increasing number of challenges for Practice Teachers and mentors in preparing SPQDN students for the elevated level clinical and transformational leadership necessary to ensure high-quality patient care. The daily challenges of clinical practice within the community nursing setting in addition to undertaking educational interventions in the clinical arena demand that a structured approach to supervision and mentorship is crucial. Employing learning plans to assess individual students learning needs, prepare plans for educational developments and interventions and evaluate a student's progress can be a helpful tool in aiding the learning journey for both the SPQDN student and Practice Teacher or mentor. This article examines how and why a structured learning plan may be used in supporting learning and competency in achieving the necessary level of practice to meet the requirements of the SPQDN.

  19. Key parameters controlling radiology departments

    International Nuclear Information System (INIS)

    Busch, Hans-Peter

    2011-01-01

    For radiology departments and outstanding practises control and optimization of processes demand an efficient management based on key data. Systems of key data deliver indicators for control of medical quality, service quality and economics. For practices effectiveness (productivity), for hospitals effectiveness and efficiency are in the focus of economical optimization strategies. Task of daily key data is continuous monitoring of activities and workflow, task of weekly/monthly key data is control of data quality, process quality and achievement of objectives, task of yearly key data is determination of long term strategies (marketing) and comparison with competitors (benchmarking). Key parameters have to be defined clearly and have to be available directly. For generation, evaluation and control of key parameters suitable forms of organization and processes are necessary. Strategies for the future will be directed more to the total processes of treatment. To think in total processes and to steer and optimize with suitable parameters is the challenge for participants in the healthcare market of the future. (orig.)

  20. Final report: Bilateral key comparison SIM.T-K6.3 on humidity standards in the dew/frost-point temperature range from -30°C to 20°C

    Science.gov (United States)

    Huang, Peter; Meyer, Christopher; Brionizio, Julio D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the Instituto Nacional de Metrologia, Qualidade e Tecnologia (INMETRO, Brazil) between October 2009 and March 2010. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and INMETRO and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and INMETRO. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  1. Research of user key management mechanisms in the cloud

    Directory of Open Access Journals (Sweden)

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  2. Training staff to empower people with long-term conditions to undertake self care activities.

    Science.gov (United States)

    Bowler, Mandy

    Self care can help people with long-term conditions take control of their lives. However, their interest and ability to engage with it may fluctuate over the course of an illness and many need support to undertake self care activities. A team of community matrons in NHS South of Tyne and Wear helped to develop and pilot an e-learning tool for staff, to remind them of the importance of self care and give advice on ways to support patients. The tool has since been rolled out to all staff groups.

  3. International key comparison of measurements of neutron source emission rate (1999-2005): CCRI(III)-K9.AmBe

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, N.J.; Jones, L.N. [National Physical Laboratory (NPL), Teddington, (United Kingdom); Wang, Z.; Liu, Y.; Wang, Q.; Chen, X.; Luo, H.; Rong, C. [China Institute of Atomic Energy (CIAE), Beijing (China); Kralik, M. [Czech Metrology Institute (CMI), Praha, (Czech Republic); Park, H.; Choi, K.O. [Korea Research Institute of Standards and Science (KRISS), Daejeon, (Korea, Republic of); Pereira, W.W.; Da Fonseca, E.S. [National Laboratory of Metrology of Ionizing Radiation (LNMRI), Rio de Janeiro, (Brazil); Cassette, P. [Laboratoire National Henri Becquerel (LNE-LNHB), Paris, (France); Dewey, M.S. [National Institute of Standards and Technology (NIST), Gaithersburg, MD, (United States); Moiseev, N.N.; Kharitonov, I.A. [D I Mendeleyev Institute for Metrology (VNIIM), St Petersburg, (Russian Federation)

    2011-07-01

    Section III (neutron measurements) of the Comite Consultatif des Rayonnements Ionisants, CCRI, conducted a key comparison of primary measurements of the neutron emission rate of an {sup 241}Am-Be({alpha},n) radionuclide source. A single {sup 241}Am-Be({alpha},n) source was circulated to all the participants between 1999 and 2005. Eight laboratories participated - the CIAE (China), CMI (Czech Republic), KRISS (Republic of Korea), LNMRI (Brazil), LNE-LNHB (France), NIST (USA), NPL (UK) and the VNIIM (Russian Federation) - with the NPL making their measurements at the start and repeating them near the end of the exercise to verify the stability of the source. Each laboratory reported the emission rate into 4{pi} sr together with a detailed uncertainty budget. All participants used the manganese bath technique, with the VNIIM also making measurements using an associated particle technique. The CMI, KRISS, VNIIM, and later the NPL, also measured the anisotropy of the source although this was not a formal part of the comparison. The first draft report was released in May 2006 and having been discussed and modified by the participants and subsequently reviewed by the CCRI(III), the present paper is now the final report of the comparison. (authors)

  4. Undertaking and writing research that is important, targeted, and the best you can do.

    Science.gov (United States)

    McLeod, Sharynne

    2014-04-01

    Conducting and writing research is a privilege. It is a privilege because researchers can change lives through their findings and can influence public knowledge and debate. It is also a privilege because researchers are reliant on the time and goodwill of participants (and colleagues), and research is often underpinned by funding raised by the public, either through taxes or philanthropic donations. This privilege comes with responsibility. Researchers have a responsibility to undertake research that is important, targeted, and of high quality. This editorial aims to inspire, challenge, and bolster the research efforts of individuals and teams.

  5. The development of power generation by electricity supply undertakings and industries in Western Europe

    International Nuclear Information System (INIS)

    Cura, H.

    1998-01-01

    Following the events of recent years - the opening up of the east, efforts to stimulate international competition - the Western European electricity industry is strongly on the move. In spite of the non-uniformity of the electricity supply structures in the individual countries, the trend towards liberalization of the electricity market is characterized by different forms of expression. Against this background, this paper provides a review of the status and prospects of electricity demand developments and of primary energy supply. It considers the consequences which thereby arise for the power plant inventory of electricity supply undertakings and industries. (orig.) [de

  6. KEY COMPARISON: Final report on CCQM-K62: Nutrients in infant/adult formula—Vitamins

    Science.gov (United States)

    Sharpless, Katherine E.; Rimmer, Catherine A.; Phinney, Karen W.; Nelson, Bryant C.; Duewer, David L.; Wise, Stephen A.; Kim, Byungjoo; Liu, Jun; Huang, Ting; Zhang, Wei

    2010-01-01

    Key comparison CCQM-K62 was designed to enable demonstration of the equivalence in capabilities for measurement of vitamins in a food matrix. A milk-based fortified human infant/adult formula was selected as the matrix based upon material availability and relevance. Because vitamins were added to the CCQM-K62 study material in a single form and at levels significantly higher than those that would be naturally occurring in the milk base, the ability of a laboratory to measure the study vitamins is only indicative of a laboratory's ability to measure vitamins in fortified foods. Target analytes were selected for study because of the ready availability of suitable standard materials and the range of their chemical properties: folic acid (vitamin B9) is a single water-soluble molecular entity that typically occurs at low levels and can be unstable, niacin (vitamin B3) is a single stable molecular entity and is typically present at higher concentrations than the other water-soluble vitamins, vitamin A has multiple molecular forms (including retinol and retinyl palmitate), is fat-soluble and typically occurs at relatively high levels. Results for participants measuring only folic acid or niacin are only indicative of their ability to make that measurement; results for participants measuring both folic acid and niacin are indicative of a laboratory's ability to measure folic acid, thiamine, niacin, and riboflavin in fortified foods but not vitamin C or other water-soluble vitamins. The ability to measure vitamin A (reported as retinol equivalents) in this material is also indicative of the participant's ability to measure vitamin E (as alpha-tocopherol and alpha-tocopheryl acetate) but is not indicative of the ability to measure vitamins D and K, which typically occur at much lower concentrations. The relative degrees of equivalence of the reported measurements for all three analytes in CCQM-K62 were within 10%; however, since only two results were submitted for niacin

  7. Final report on EURAMET.QM-K12: EURAMET key comparison on the determination of the mass fraction of creatinine in serum

    Science.gov (United States)

    Bell, David; Hopley, Chris; Ellison, Stephen L. R.; O'Connor, Gavin

    2013-01-01

    Creatinine is a well-known marker for the evaluation of kidney function. Its routine measurement is undertaken by many clinical laboratories and comparable results over distance and time are required for effective diagnosis. To address this need many National Measurement Institutes (or designated institutes) provide services in this area via the provision of higher order standards or reference measurements. The organic analysis working group of the consultative committee for amount of substance have conducted two previous key comparisons to assess the equivalence of institutes who provide such services. The purpose of this study was to enable institutes who missed the previous studies to demonstrate their capability for characterizing serum materials containing 1 µg/g to 100 µg/g of creatinine. The study material consisted of two lyophilized serum samples which were used in an external quality control proficiency testing scheme. No target values were available for these materials and all participants reported results within the one month timeframe given for analysis. Five institutes participated in the key study and a single institute submitted results for the parallel pilot study. All participants in the key study used isotope dilution with either gas or liquid chromatography coupled with mass spectrometry. The pilot study laboratory used a novel isotope dilution surface-enhanced Raman spectroscopy method. The comparison reference value for each material was set as the mean of all results submitted by those participating in the key study. The choice of the reference value estimator was constrained as it was deemed more appropriate to treat the data in a similar manner to CCQM-K12 if the relative degrees of equivalence were to be compared. This resulted in reference values of (54.27 ± 0.72) µg/g and (38.01 ± 0.42) µg/g for the two separate materials. The relative degrees of equivalence were calculated and these were compared with the relative degrees of

  8. KEY COMPARISON: Final report of APMP.T-K6 (original name APMP-IC-1-97): Comparison of humidity measurements using a dew point meter as a transfer standard

    Science.gov (United States)

    Li, Wang; Takahashi, C.; Hussain, F.; Hong, Yi; Nham, H. S.; Chan, K. H.; Lee, L. T.; Chahine, K.

    2007-01-01

    This APMP key comparison of humidity measurements using a dew point meter as a transfer standard was carried out among eight national metrology institutes from February 1999 to January 2001. The NMC/SPRING, Singapore was the pilot laboratory and a chilled mirror dew point meter offered by NMIJ was used as a transfer standard. The transfer standard was calibrated by each participating institute against local humidity standards in terms of frost and dew point temperature. Each institute selected its frost/dew point temperature calibration points within the range from -70 °C to 20 °C frost/dew point with 5 °C step. The majority of participating institutes measured from -60 °C to 20 °C frost/dew point and a simple mean evaluation was performed in this range. The differences between the institute values and the simple means for all participating institutes are within two standard deviations from the mean values. Bilateral equivalence was analysed in terms of pair difference and single parameter Quantified Demonstrated Equivalence. The results are presented in the report. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  9. What factors influence community-dwelling older people’s intent to undertake multifactorial fall prevention programs?

    Directory of Open Access Journals (Sweden)

    Hill KD

    2014-11-01

    Full Text Available Keith D Hill,1,2 Lesley Day,3 Terry P Haines4,5 1School of Physiotherapy and Exercise Science, Faculty of Health Sciences, Curtin University, Perth, WA, Australia; 2National Ageing Research Institute, Royal Melbourne Hospital, Parkville, VIC, Australia; 3Falls Prevention Research Unit, Monash Injury Research Institute, Monash University, VIC, Australia; 4Allied Health Research Unit, Southern Health, Cheltenham, VIC, Australia; 5Physiotherapy Department, Faculty of Medicine, Nursing, and Health Sciences, Monash University, VIC, Australia Purpose: To investigate previous, current, or planned participation in, and perceptions toward, multifactorial fall prevention programs such as those delivered through a falls clinic in the community setting, and to identify factors influencing older people’s intent to undertake these interventions.Design and methods: Community-dwelling people aged >70 years completed a telephone survey. Participants were randomly selected from an electronic residential telephone listing, but purposeful sampling was used to include equal numbers with and without common chronic health conditions associated with fall-related hospitalization. The survey included scenarios for fall prevention interventions, including assessment/multifactorial interventions, such as those delivered through a falls clinic. Participants were asked about previous exposure to, or intent to participate in, the interventions. A path model analysis was used to identify factors associated with intent to participate in assessment/multifactorial interventions.Results: Thirty of 376 participants (8.0% reported exposure to a multifactorial falls clinic-type intervention in the past 5 years, and 16.0% expressed intention to undertake this intervention. Of the 132 participants who reported one or more falls in the past 12 months, over one-third were undecided or disagreed that a falls clinic type of intervention would be of benefit to them. Four elements

  10. ClinicalKey: a point-of-care search engine.

    Science.gov (United States)

    Vardell, Emily

    2013-01-01

    ClinicalKey is a new point-of-care resource for health care professionals. Through controlled vocabulary, ClinicalKey offers a cross section of resources on diseases and procedures, from journals to e-books and practice guidelines to patient education. A sample search was conducted to demonstrate the features of the database, and a comparison with similar tools is presented.

  11. BILATERAL KEY COMPARISON SIM.T-K6.1 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −25 °C TO +20 °C

    Science.gov (United States)

    Meyer, C.W.; Hill, K.D.

    2015-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures was carried out by the National Institute of Standards and Technology (NIST, USA) and the National Research Council (NRC, Canada) between December 2014 and April, 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and NRC and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining degree of equivalence between the dew/frost-point standards of NIST and NRC. PMID:26663952

  12. KEY COMPARISON: CCEM.RF-K18.CL (GT-RF/00-1): Noise in 50 Ω coaxial line at frequencies up to 1 GHz

    Science.gov (United States)

    Eiø, Christopher; Adamson, David; Randa, James; Allal, Djamel; Uzdin, Rinadij

    2006-01-01

    A measurement comparison of noise temperature has been carried out between four national metrology laboratories in coaxial line at 30 MHz, 60 MHz and 1 GHz. The identification of this intercomparison is CCEM.RF-K18.CL. Two noise sources have been measured. The following four national laboratories participated in this intercomparison: NPL (United Kingdom), NIST (United States of America), BNM-LNE (France) and VNIIFTRI (Russia). The National Physical Laboratory (UK) acted as the pilot laboratory for the comparison. It can be seen that there is generally good agreement between the laboratories. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  13. Undertaking qualitative health research in social virtual worlds.

    Science.gov (United States)

    McElhinney, Evelyn; Cheater, Francine M; Kidd, Lisa

    2014-06-01

    This paper discusses the methodological challenges of using the 3D social virtual world Second Life for research and offers some solutions on a range of research issues including research ethics committee approval, gaining consent, recruitment of sample, data collection and engagement with 'in - world culture'. The attraction of social virtual worlds to researchers is their ability to mimic the physical world, as they, are seen as 'places' where people have a feeling of presence (being there) and social presence (being there with others) through the use of a 'customisable' avatar (digital self-representation). Emerging research demonstrating the persuasive nature of avatars on health behaviours through virtual worlds, online games and the 3D web has increased the use of and interest in these areas for delivering health information, advice and support. However, conducting research can be challenging in a 3D world where people are represented as anonymous avatars in an environment unlike any other online media. 25 semi-structured interviews were conducted in Second Life from September 2011-June 2012. Nurses wishing to undertake research in social virtual worlds should spend time in-world to acquire technical skills and gain an understanding of the culture of the world. Our experience of an interview-based study in virtual worlds indicates that researchers require several virtual world technical skills to create innovative tools to recruit, gain consent and collect data and an understanding of in-world culture, language and social norms to increase the chances of successful research. © 2013 John Wiley & Sons Ltd.

  14. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM -30 °C TO +20 °C.

    Science.gov (United States)

    Meyer, C W; Solano, A

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range -30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET.

  15. Subsequent bilateral comparison to CCT-K3, CIPM key comparison CCT-K3.1: Comparison of standard platinum resistance thermometers at the triple point of water (T = 273.16 K) and at the melting point of gallium (T = 302.9146 K)

    Science.gov (United States)

    Picard, S.; Nonis, M.; Solve, S.; Allisy-Roberts, P. J.; Renaot, E.; Martin, C.

    2011-01-01

    A comparison of standard platinum resistance thermometers (SPRTs) has been carried out between the BIPM and the Laboratoire commun de métrologie LNE-CNAM using the melting point of gallium and the triple point of water. The temperature difference at Ga between the BIPM and the LNE-CNAM was determined as 108 µK with an associated combined standard uncertainty of 223 µK. This outcome indicates a present temperature difference of the BIPM of -65 µK with respect to an Average Reference Value from an earlier comparison, with an associated uncertainty of uc = 262 µK. It should be noted that the present BIPM scale is not independent, but traceable to cells used in KC7. The comparison results validate the re-establishment of thermometer calibrations at the BIPM for internal use. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  16. BILATERAL KEY COMPARISON SIM.T-K6.5 ON HUMIDITY STANDARDS IN THE DEW/FROST-POINT TEMPERATURE RANGE FROM −30 °C TO +20 °C

    Science.gov (United States)

    Meyer, C.W.; Solano, A.

    2016-01-01

    A Regional Metrology Organization (RMO) Key Comparison of dew/frost point temperatures over the range −30 °C TO +20 °C was carried out by the National Institute of Standards and Technology (NIST, USA) and the Laboratorio Costarricense de Metrología (LACOMET, Costa Rica), between February 2015 and August 2015. The results of this comparison are reported here, along with descriptions of the humidity laboratory standards for NIST and LACOMET and the uncertainty budget for these standards. This report also describes the protocol for the comparison and presents the data acquired. The results are analyzed, determining the degree of equivalence between the dew/frost-point standards of NIST and LACOMET. PMID:28066029

  17. Building confidence: an exploration of nurses undertaking a postgraduate biological science course.

    Science.gov (United States)

    Van Wissen, Kim; McBride-Henry, Karen

    2010-01-01

    This study aimed to explore the impact of studying biological science at a postgraduate level and how this impacted on nursing practice. The term biological sciences in this research encompasses elements of physiology, genetics, biochemistry and pathophysiology. A qualitative research study was designed, that involved the dissemination of a pre- and post-course semi-structured questionnaire for a biological science course, as part of a Master of Nursing programme at a New Zealand University, thus exploring the impact of undertaking a postgraduate biological sciences course. The responses were analysed into themes, based on interpretive concepts. The primary themes revealed improvement in confidence as: confidence in communication, confidence in linking nursing theoretical knowledge to practice and confidence in clinical nursing knowledge. This study highlights the need to privilege clinically-derived nursing knowledge, and that confidence in this nursing knowledge and clinical practice can be instilled through employing the model of theory-guided practice.

  18. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  19. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Science.gov (United States)

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  20. Bilateral comparison of 1 V and 10 V standards between the DEFNAT (Tunisia) and the BIPM February to March 2016 (part of the ongoing BIPM key comparison BIPM.EM-K11.a and b)

    Science.gov (United States)

    Solve, S.; Chayramy, R.; Ben Salah, B.; Mallat, A.; Abene, L.; Stock, M.

    2016-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.a and b, a comparison of the 1 V and 10 V voltage reference standards of the BIPM and the Laboratoire de Métrologie Electrique, DEFNAT (Tunisia), was carried out from February to March 2016. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPMC (ZC) and BIPM6 (Z6), were transported by freight to DEFNAT and back to BIPM. In order to keep the Zeners powered during their transportation phase, a BIPM in-house voltage stabiliser was connected in parallel to the internal battery. The voltage stabiliser consists of a set of two batteries, electrically protected from surcharge-discharge, easy to recharge and is designed to power two transfer standards for 10 consecutive days. At DEFNAT, the reference standard for DC voltage is a Josephson Voltage Standard. The output EMF (Electromotive Force) of each travelling standard was measured by direct comparison with the primary standard. At the BIPM, the travelling standards were calibrated, before and after the measurements at DEFNAT, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and ambient atmospheric pressure. The final result of the comparison is presented as the difference between the values assigned to DC voltage standards by DEFNAT, at the level of 1.018 V and 10 V, at DEFNAT, UDEFNAT, and those assigned by the BIPM, at the BIPM, UBIPM, at the reference date of the 26th of February 2016. UDEFNAT - UBIPM = + 0.07 μV uc = 0.04 μV, at 1.018 V UDEFNAT - UBIPM = + 0.38 μV uc = 0.10 μV, at 10 V where uc is the combined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NSAI-NML, based on KJ-90, and the uncertainty related to the comparison. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which

  1. Building capacity to use and undertake research in health organisations: a survey of training needs and priorities among staff.

    Science.gov (United States)

    Barratt, Helen; Fulop, Naomi J

    2016-12-07

    Efforts to improve healthcare and population health depend partly on the ability of health organisations to use research knowledge and participate in its production. We report the findings of a survey conducted to prioritise training needs among healthcare and public health staff, in relation to the production and implementation of research, across an applied health research collaboration. A questionnaire survey using a validated tool, the Hennessy-Hicks Training Needs Assessment Questionnaire. Participants rated 25 tasks on a five-point scale with regard to both their confidence in performing the task, and its importance to their role. A questionnaire weblink was distributed to a convenience sample of 35 healthcare and public health organisations in London and South East England, with a request that they cascade the information to relevant staff. 203 individuals responded, from 20 healthcare and public health organisations. None. Training needs were identified by comparing median importance and performance scores for each task. Individuals were also invited to describe up to three priority areas in which they require training. Across the study sample, evaluation; teaching; making do with limited resources; coping with change and managing competing demands were identified as key tasks. Assessing the relevance of research and learning about new developments were the most relevant research-related tasks. Participants' training priorities included evaluation; finding, appraising and applying research evidence; and data analysis. Key barriers to involvement included time and resources, as well as a lack of institutional support for undertaking research. We identify areas in which healthcare and public health professionals may benefit from support to facilitate their involvement in and use of applied health research. We also describe barriers to participation and differing perceptions of research between professional groups. Published by the BMJ Publishing Group Limited

  2. Decree No. 67/77 of 6 May establishing a National Uranium Undertaking as a public body

    International Nuclear Information System (INIS)

    1977-01-01

    This Decree, promulgated on 29 March 1977, sets up a National Uranium Undertaking (ENU). The ENU Statute which is attached to the Decree lays down that its main purpose is to prospect for and inventory uranium deposits, to explore known deposits, to set up facilities for recovery and treatment of uranium ores, and finally, to market the products obtained. The ENU has taken over the work which, until now, had been carried out in that field by the Junta de Energia Nuclear and it is placed under the authority of the Minister of Industry and Technology. (NEA) [fr

  3. Undertaking cause-specific mortality measurement in an unregistered population: an example from Tigray Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Hagos Godefay

    2014-09-01

    Full Text Available Background: The lack of adequate documentation of deaths, and particularly their cause, is often noted in African and Asian settings, but practical solutions for addressing the problem are not always clear. Verbal autopsy methods (interviewing witnesses after a death have developed rapidly, but there remains a lack of clarity as to how these methods can be effectively applied to large unregistered populations. This paper sets out practical details for undertaking a representative survey of cause-specific mortality in a population of several million, taking Tigray Region in Ethiopia as a prototype. Sampling: Sampling was designed around an expected level of maternal mortality ratio of 400 per 100,000 live births, which needed measuring within a 95% confidence interval of approximately ±100. Taking a stratified cluster sample within the region at the district level for logistic reasons, and allowing for a design effect of 2, this required a population of around 900,000 people, equating to six typical districts. Since the region is administered in six geographic zones, one district per zone was randomly selected. Implementation: The survey was implemented as a two-stage process: first, to trace deaths that occurred in the sampled districts within the preceding year, and second to follow them up with verbal autopsy interviews. The field work for both stages was undertaken by health extension workers, working in their normally assigned areas. Most of the work was associated with tracing the deaths, rather than undertaking the verbal autopsy interviews. Discussion: This approach to measuring cause-specific mortality in an unregistered Ethiopian population proved to be feasible and effective. Although it falls short of the ideal situation of continuous civil registration and vital statistics, a survey-based strategy of this kind may prove to be a useful intermediate step on the road towards full civil registration and vital statistics implementation.

  4. KEY COMPARISON: Final report on CCQM-K63.a,b: Non-peptide hormones in serum: cortisol and progesterone

    Science.gov (United States)

    S-C Tai, Susan; Duewer, David L.

    2010-01-01

    Hormones are chemical messengers that regulate many life functions. Deviations from normal hormone levels can have serious health consequences. Accurate measurement of hormone levels in serum can be beneficial in diagnosing, monitoring, and treating a number of diseases. Two steroid hormones, cortisol and progesterone, were selected by the Organic Analysis Working Group (OAWG) to evaluate its member Institutes' measurement capabilities for this important class of measurand. Serum concentrations of cortisol range from 30 ng/mL to 230 ng/mL. Serum concentrations of progesterone in adult females range from 0.15 ng/mL to 25 ng/mL but can rise to approx230 ng/mL during pregnancy. The ability to measure cortisol is indicative of a laboratory's ability to measure steroid hormones at concentration levels similar to cortisol. The ability to measure progesterone is indicative of a laboratory's ability to measure steroid hormones with similar functional groups and concentration levels, such as testosterone. Pilot studies CCQM-P77.a and CCQM-P77.b on the determination of cortisol and progesterone in human serum were completed in 2006. There was good agreement among the results reported by participants who used isotope dilution/mass spectrometry (ID/MS) with either gas chromatography (GC) or liquid chromatography (LC). In 2007 the OAWG decided to proceed with key comparison (KC) CCQM-K63.a, cortisol in human serum, and CCQM-K63.b, progesterone in human serum. Thus, following established OAWG procedure, only results from participants that (1) used an ID/MS-based method, (2) participated in the relevant pilot study, and (3) used a metrologically traceable primary standard were to be eligible for use in calculating the key comparison reference value (KCRV) for each measurand. Six laboratories participated in CCQM-K63.a and eight laboratories participated in CCQM-K63.b. The same pooled frozen female serum material was used in both of the KCs. The mean value for the six ID

  5. Immunoradiometric versus radioimmunoassay: a comparison using alpha-fetoprotein as the model analyte

    International Nuclear Information System (INIS)

    Hunter, W.M.; Budd, P.S.

    1981-01-01

    With alpha-fetoprotein as a model a formal comparison has been made between inhibition type radioimmunoassay with radioiodinated antigen, liquid-phase incubation and double antibody separation (RIA) and variants of the sandwich immunoradiometric assay (IRMA). 125 I-antibody was prepared (expensively) by labelling the IgG fraction and subsequently undertaking immunopurification to yield a reproducibly-high quality reagent, 70-75% being reactive with antigen. The same antiserum was coupled to Sepharose 4B for use in the IRMA and separation was by the sucrose layer procedure (Hunter, 1980) which obviates the need for centrifugation. The principal basis used for the comparison was computer-generated precision profiles (Ekins, 1976), each of which was derived from 10 assays of each kind. (Auth.)

  6. Bilateral comparison of 1 V and 10 V standards between the NMISA (South Africa) and the BIPM April to June 2017 (part of the ongoing BIPM key comparison BIPM.EM-K11.a and b)

    Science.gov (United States)

    Solve, S.; Chayramy, R.; Matlejoane, A. M.; Magagula, L.; Stock, M.

    2018-01-01

    As part of the ongoing BIPM key comparison BIPM.EM-K11.a and b, a comparison of the 1.018 V and 10 V voltage reference standards of the BIPM and the National Metrology Institute of South Africa, NMISA (South Africa), was carried out from April to June 2017. Two BIPM Zener diode-based travelling standards (Fluke 732B), BIPMA (ZA) and BIPMB (ZB), were transported by freight to NMISA and back to BIPM. In order to keep the Zeners powered during their transportation phase, a voltage stabilizer developed by BIPM was connected in parallel to the internal battery. It consists of a set of two batteries, electrically protected from surcharge-discharge, easy to recharge and is designed to power two transfer standards for ten consecutive days. At NMISA, the reference standard for DC voltage is a Josephson Voltage Standard. The output EMF (Electromotive Force) of each travelling standard was measured by direct comparison with the primary standard. At the BIPM, the travelling standards were calibrated, before and after the measurements at NMISA, with the Josephson Voltage Standard. Results of all measurements were corrected for the dependence of the output voltages of the Zener standards on internal temperature and atmospheric pressure. The final result of the comparison is presented as the difference between the values assigned to DC voltage standards by NMISA, at the level of 1.018 V and 10 V, at NMISA, UNMISA, and those assigned by the BIPM, at the BIPM, UBIPM, at the reference dates of the 19th and 18th of May 2017, respectively. UNMISA - UBIPM = + 0.07 μV uc = 0.02 μV, at 1.018 V UNMISA - UBIPM = + 0.001 μV uc = 0.34 μV, at 10 V where uc is the combined standard uncertainty associated with the measured difference, including the uncertainty of the representation of the volt at the BIPM and at NMISA, based on KJ-90, and the uncertainty related to the comparison. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which

  7. Verification of pharmacogenetics-based warfarin dosing algorithms in Han-Chinese patients undertaking mechanic heart valve replacement.

    Science.gov (United States)

    Zhao, Li; Chen, Chunxia; Li, Bei; Dong, Li; Guo, Yingqiang; Xiao, Xijun; Zhang, Eryong; Qin, Li

    2014-01-01

    To study the performance of pharmacogenetics-based warfarin dosing algorithms in the initial and the stable warfarin treatment phases in a cohort of Han-Chinese patients undertaking mechanic heart valve replacement. We searched PubMed, Chinese National Knowledge Infrastructure and Wanfang databases for selecting pharmacogenetics-based warfarin dosing models. Patients with mechanic heart valve replacement were consecutively recruited between March 2012 and July 2012. The predicted warfarin dose of each patient was calculated and compared with the observed initial and stable warfarin doses. The percentage of patients whose predicted dose fell within 20% of their actual therapeutic dose (percentage within 20%), and the mean absolute error (MAE) were utilized to evaluate the predictive accuracy of all the selected algorithms. A total of 8 algorithms including Du, Huang, Miao, Wei, Zhang, Lou, Gage, and International Warfarin Pharmacogenetics Consortium (IWPC) model, were tested in 181 patients. The MAE of the Gage, IWPC and 6 Han-Chinese pharmacogenetics-based warfarin dosing algorithms was less than 0.6 mg/day in accuracy and the percentage within 20% exceeded 45% in all of the selected models in both the initial and the stable treatment stages. When patients were stratified according to the warfarin dose range, all of the equations demonstrated better performance in the ideal-dose range (1.88-4.38 mg/day) than the low-dose range (pharmacogenetics-based warfarin dosing regimens performed similarly in our cohort. However, the algorithms of Wei, Huang, and Miao showed a better potential for warfarin prediction in the initial and the stable treatment phases in Han-Chinese patients undertaking mechanic heart valve replacement.

  8. Quantum key distribution without alternative measurements

    CERN Document Server

    Cabello, A

    2000-01-01

    Entanglement swapping between Einstein-Podolsky-Rosen (EPR) pairs can be used to generate the same sequence of random bits in two remote places. A quantum key distribution protocol based on this idea is described. The scheme exhibits the following features. (a) It does not require that Alice and Bob choose between alternative measurements, therefore improving the rate of generated bits by transmitted qubit. (b) It allows Alice and Bob to generate a key of arbitrary length using a single quantum system (three EPR pairs), instead of a long sequence of them. (c) Detecting Eve requires the comparison of fewer bits. (d) Entanglement is an essential ingredient. The scheme assumes reliable measurements of the Bell operator. (20 refs).

  9. The HST Key Project on the Extragalactic Distance Scale

    Science.gov (United States)

    Freedman, W. L.

    1994-12-01

    One of the major unresolved problems in observational cosmology is the determination of the Hubble Constant, (H_0). The Hubble Space Telescope (HST) Key Project on the Extragalactic Distance Scale aims to provide a measure of H_0 to an accuracy of 10%. Historically the route to H_0 has been plagued by systematic errors; hence there is no quick and easy route to a believeable value of H_0. Achieving plausible error limits of 10% requires careful attention to eliminating potential sources of systematic error. The strategy adopted by the Key Project team is threefold: First, to discover Cepheids in spiral galaxies located in the field and in small groups that are suitable for the calibration of several independent secondary methods. Second, to make direct Cepheid measurements of 3 spiral galaxies in the Virgo cluster and 2 members of the Fornax cluster. Third, to provide a check on the the Cepheid distance scale via independent distance estimates to nearby galaxies, and in addition, to undertake an empirical test of the sensitivity of the zero point of the Cepheid PL relation to heavy-element abundances. First results from the HST Key Project will be presented. We have now determined Cepheid distances to 4 galaxies using the HST: these are the nearby galaxies M81 and M101, the edge-on galaxy NGC 925, and the face-on spiral galaxy M100 in the Virgo cluster. Recently we have measured a Cepheid distance for M100 of 17 +/- 2 Mpc, which yields a value of H_0 = 80 +/- 17 km/sec/Mpc. This work was carried out in collaboration with the other members of the HST Key Project team, R. Kennicutt, J. Mould, F. Bresolin, S. Faber, L. Ferrarese, H. Ford, J. Graham, J. Gunn, M. Han, P. Harding, J. Hoessel, R. Hill, J. Huchra, S. Hughes, G. Illingworth, D. Kelson, B. Madore, R. Phelps, A. Saha, N. Silbermann, P. Stetson, and A. Turner.

  10. Verification of Pharmacogenetics-Based Warfarin Dosing Algorithms in Han-Chinese Patients Undertaking Mechanic Heart Valve Replacement

    Science.gov (United States)

    Zhao, Li; Chen, Chunxia; Li, Bei; Dong, Li; Guo, Yingqiang; Xiao, Xijun; Zhang, Eryong; Qin, Li

    2014-01-01

    Objective To study the performance of pharmacogenetics-based warfarin dosing algorithms in the initial and the stable warfarin treatment phases in a cohort of Han-Chinese patients undertaking mechanic heart valve replacement. Methods We searched PubMed, Chinese National Knowledge Infrastructure and Wanfang databases for selecting pharmacogenetics-based warfarin dosing models. Patients with mechanic heart valve replacement were consecutively recruited between March 2012 and July 2012. The predicted warfarin dose of each patient was calculated and compared with the observed initial and stable warfarin doses. The percentage of patients whose predicted dose fell within 20% of their actual therapeutic dose (percentage within 20%), and the mean absolute error (MAE) were utilized to evaluate the predictive accuracy of all the selected algorithms. Results A total of 8 algorithms including Du, Huang, Miao, Wei, Zhang, Lou, Gage, and International Warfarin Pharmacogenetics Consortium (IWPC) model, were tested in 181 patients. The MAE of the Gage, IWPC and 6 Han-Chinese pharmacogenetics-based warfarin dosing algorithms was less than 0.6 mg/day in accuracy and the percentage within 20% exceeded 45% in all of the selected models in both the initial and the stable treatment stages. When patients were stratified according to the warfarin dose range, all of the equations demonstrated better performance in the ideal-dose range (1.88–4.38 mg/day) than the low-dose range (warfarin dose prediction and in the low-dose and the ideal-dose ranges. Conclusions All of the selected pharmacogenetics-based warfarin dosing regimens performed similarly in our cohort. However, the algorithms of Wei, Huang, and Miao showed a better potential for warfarin prediction in the initial and the stable treatment phases in Han-Chinese patients undertaking mechanic heart valve replacement. PMID:24728385

  11. Nuclear energy: a key role despite problems

    International Nuclear Information System (INIS)

    Anderson, E.V.

    1977-01-01

    Nuclear energy is projected to be the fastest growing power source and a key to meeting power demands in spite of the many problems facing the nuclear industry in the form of delays, protests, and cancellations. Pressures for a nuclear moratorium will slow the industry, Mr. Anderson feels, but in the long run nuclear reactors will make up an increasing share of the power generating capacity. The Arthur D. Little Co. projects a fourfold increase between 1975 and 1985 on the basis of 10-year lead times for construction of nuclear power plants. Half the new generating capacity after 1985 will be nuclear. Problems besetting every stage of the nuclear fuel cycle result from debates over proliferation, waste disposal, reactor safety, and environmental damage and lead to controversy over regulations and licensing. U.S. utilities are not ordering reactors, but manufacturers are finding markets in other countries. Financial difficulties have kept domestic utilities from undertaking large investment programs until they can resolve problems of fuel costs and rate structures. New construction is inevitable, however, to meet future electrical requirements. Nuclear companies, which number nearly 1300 manufacturers and service providers, need to develop a better public image by working together to demonstrate their ability to manage the risks and uncertainties

  12. Key Success Factors and Guidance for International Collaborative Design Projects

    Directory of Open Access Journals (Sweden)

    Robby Soetanto

    2015-11-01

    Full Text Available In the built environment (BE sector, the co-creation process of design demands understanding of requirements (as viewed by parties involved, mobilisation of tacit knowledge, negotiation, and complex exchange of information. The need to collaborate over distance has further exacerbated the complexity of the process, and, in itself, represents a significant challenge for BE professionals who are increasingly expected to undertake this process within globally distributed virtual teams. The research aims to identify key success factors and develop guidance for international collaborative design projects, via the implementation of collaborative design courses in UK and Canadian universities over three academic years. Questionnaire surveys, focus groups, observation of online meetings, personal reflections provided data for the analysis. The findings reveal the significance of the perceived risk of collaboration and a difference in preferred communication mode between architects and civil/structural engineers. These findings suggest the impact of training in the subject discipline, and that the opportunity for co-located working has helped the development of trust. The guidance is aimed at BE educators who wish to implement this activity in their courses.

  13. A Comparison between the Brand Personality Construct of KFC and Marrybrown: Their Restaurant Concept and Brand Preference

    OpenAIRE

    Lim, Kuang Long

    2005-01-01

    This dissertation undertakes the research project from a deductive position based on Aaker’s (1997) brand personality to shape the result by adopting the quantitative research process. Brand personality scale measures important aspects of the personalities that consumers attribute to brands of all kinds. Marketers and researchers have embraced brand personality as an important facet of brand management and a key source of brand differentiation (Siguaw et. al., 1999). This paper attempts to me...

  14. Qualitative content analysis for international comparison of data usage agreements

    Directory of Open Access Journals (Sweden)

    Christian Haux

    2017-04-01

    Undertaking an overview of privacy conditions can be a valuable step in comparing privacy and security requirements in different national regulations. The qualitative content analysis was found a suitable approach for this purpose because it enables the detection of fine characteristics. By using an incremental design, it is possible to adapt the coding system to include additional partners. However, the current coding system has the limitation that heterogeneity between the agreements leads to a fine granularity of categories that hamper the comparability between partners. Despite these problems, the approach allows the comparison of data privacy and supports the development of a data integration process for international harmonisation.

  15. Comparing Diagnostic Accuracy of Cognitive Screening Instruments: A Weighted Comparison Approach

    Directory of Open Access Journals (Sweden)

    A.J. Larner

    2013-03-01

    Full Text Available Background/Aims: There are many cognitive screening instruments available to clinicians when assessing patients' cognitive function, but the best way to compare the diagnostic utility of these tests is uncertain. One method is to undertake a weighted comparison which takes into account the difference in sensitivity and specificity of two tests, the relative clinical misclassification costs of true- and false-positive diagnosis, and also disease prevalence. Methods: Data were examined from four pragmatic diagnostic accuracy studies from one clinic which compared the Mini-Mental State Examination (MMSE with the Addenbrooke's Cognitive Examination-Revised (ACE-R, the Montreal Cognitive Assessment (MoCA, the Test Your Memory (TYM test, and the Mini-Mental Parkinson (MMP, respectively. Results: Weighted comparison calculations suggested a net benefit for ACE-R, MoCA, and MMP compared to MMSE, but a net loss for TYM test compared to MMSE. Conclusion: Routine incorporation of weighted comparison or other similar net benefit measures into diagnostic accuracy studies merits consideration to better inform clinicians of the relative value of cognitive screening instruments.

  16. DecreaseKeys are Expensive for External Memory Priority Queues

    OpenAIRE

    Eenberg, Kasper; Larsen, Kasper Green; Yu, Huacheng

    2016-01-01

    One of the biggest open problems in external memory data structures is the priority queue problem with DecreaseKey operations. If only Insert and ExtractMin operations need to be supported, one can design a comparison-based priority queue performing $O((N/B)\\lg_{M/B} N)$ I/Os over a sequence of $N$ operations, where $B$ is the disk block size in number of words and $M$ is the main memory size in number of words. This matches the lower bound for comparison-based sorting and is hence optimal fo...

  17. SUPPLEMENTARY COMPARISON: Final report on APMP.PR-S1.1: Bilateral comparison of irradiance responsivity of UVA detectors

    Science.gov (United States)

    Huang, Xuebo

    2009-01-01

    In order to assess the performance of the standards and techniques used for calibration and measurement of UVA irradiance responsivity of photodetectors in NMISA, South Africa, a new comparison was decided as a follow-up to comparison APMP.PR-S1. It is registered in the Key Comparison Data Base (KCDB) of BIPM as a bilateral supplementary comparison, with the identifier APMP.PR-S1.1. The comparison was carried out following the same technical protocol as that of supplementary comparison APMP PR-S1. The principle, organization and method of the comparison, as well as the preliminary measurements at the pilot laboratory NMC-A*STAR Singapore, were described in the Final Report of the APMP.PR-S1 comparison. The results of this bilateral comparison show that the NMISA's results lie within ±2% against the comparison reference values of APMP.PR-S1, which is a great improvement. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the APMP, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  18. THE EFFECT OF TEACHING WITHIN-TEXT KEY WORDS ON STUDENTS’ PERFORMANCE IN READING COMPREHENSION

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Khodasenas

    2013-07-01

    Full Text Available Abstract: The present study was conducted to investigate the effects of teaching within-text key word synonyms, opposites and related words on students’ performance on reading comprehension of TOEFL among Iranian EFL learners. To carry out the research, 60 Iranian EFL learners, who participated in a TOEFL preparation course, were selected as the participants of the study. Afterward they were randomly assigned into experimental and comparison groups. The experimental group was given a treatment including within-text key word synonyms, opposites and their translations, while the comparison group was given a placebo. To collect the required data, two instruments (a pre-test, and a post-test were administered to both groups during the experimentation. Subsequently, students’ scores were collected through the administration of different tests and the results were statistically analyzed. The results of these analyses revealed that the experimental group outperformed the comparison group and thus, it was concluded that teaching within-text key word synonyms, opposites and related words can improve the reading comprehension ability and general proficiency of EFL language learners.

  19. Use of gas chromatography-olfactometry to identify key odorant compounds in dark chocolate. Comparison of samples before and after conching.

    Science.gov (United States)

    Counet, Christine; Callemien, Delphine; Ouwerx, Caroline; Collin, Sonia

    2002-04-10

    After vacuum distillation and liquid-liquid extraction, the volatile fractions of dark chocolates were analyzed by gas chromatography-olfactometry and gas chromatography-mass spectrometry. Aroma extract dilution analysis revealed the presence of 33 potent odorants in the neutral/basic fraction. Three of these had a strong chocolate flavor: 2-methylpropanal, 2-methylbutanal, and 3-methylbutanal. Many others were characterized by cocoa/praline-flavored/nutty/coffee notes: 2,3-dimethylpyrazine, trimethylpyrazine, tetramethylpyrazine, 3(or 2),5-dimethyl-2(or 3)-ethylpyrazine, 3,5(or 6)-diethyl-2-methylpyrazine, and furfurylpyrrole. Comparisons carried out before and after conching indicate that although no new key odorant is synthesized during the heating process, levels of 2-phenyl-5-methyl-2-hexenal, Furaneol, and branched pyrazines are significantly increased while most Strecker aldehydes are lost by evaporation.

  20. Dynamic test of the ITER blanket key and ceramic insulated pad

    International Nuclear Information System (INIS)

    Khomyakov, S.; Sysoev, G.; Strebkov, Yu.; Kucherov, A.; Ioki, K.

    2010-01-01

    The dynamic testing of the blanket module's key integrated into ITER vacuum vessel portion has been performed in 2008 to investigate its capability to react the electro-magnetic (EM) loads. The preliminary analysis showed the large dynamic amplification factor (DAF) of the reactions because of technological gaps between the blanket module and key. Shock load may yield the bronze pads, which protect the blanket electrical insulation from damage. However the dynamic analysis of such particularly non-linear system needs an experimental ground and confirmation. Toward this end, as well as demonstration of the key reliability, the special test facility has been made, and the full-scale mock-up of the inboard intermodular key was tested. So as not to scale non-linear dynamic parameters, 1-ton mass was built on the single flexible support. The key was welded in a 60-mm thick steel plate modeled with a fragment of the VV. The different gaps were set in between the bronze pad of the key and the mass shock worker. This system (supplemented with some additional constraints) has natural oscillations like as the 4-ton module built on four flexible supports. Thus the most critical radial torque might be modeled with a straight force. The objectives of the test were as follows: dynamic response, DAF and damping factor determination; measurement of the strain oscillations in the key's base and in the weld seam; comparison of the measured data with computation results. The paper will present the analytical grounds of the testing conditions, test facility description, analytical adaptation of the facility, experimental results, its comparison with analysis and discussion, and guidelines for the next experimental phase.

  1. Analysis of the Portuguese legal framework concerning the safeguarding of employees' rights in the event of the transfer of an undertaking or an establishment compliance with the directive 2001/23/CE of 12 march 2001

    Directory of Open Access Journals (Sweden)

    Sónia de Carvalho

    2015-12-01

    Full Text Available The undertaking, business, or part of an undertaking or business can be transferred to another person or corporation as a result of a merger or a legal transfer, transitory or definitive. As a consequence of the transfer, there is subrogation ex lege of the transferee in the rights and obligations arising from the employment relationship existing on the date of a transfer. This issue is of the utmost importance to accomplish the freedom of the employer negotiate the undertaking and the protection of employees' rights as well. The Portuguese legal framework has been shaped by Directive 77/187/ CEE and subsequently by Directive 2001/23/CE. In this paper, in order to assess the compliance of the legal framework concerning the enshrined in Labor Code with the Directive 2001/23/CE, it will be performed a comparative analysis between both regulations, which will be coordinated with the case law from the Court of Justice and Portuguese Courts. We will conclude that, apart from some issues, the Portuguese labour law regarding the safeguarding of employees' rights in the event of the transfer of an undertaking complies with the Directive 2001/23 /CE and the case law from the Court of Justice.

  2. Treatment of Adults With Treatment-Resistant Depression: Electroconvulsive Therapy Plus Antidepressant or Electroconvulsive Therapy Alone? Evidence From an Indirect Comparison Meta-Analysis

    OpenAIRE

    Song, Guo-Min; Tian, Xu; Shuai, Ting; Yi, Li-Juan; Zeng, Zi; Liu, Shuang; Zhou, Jian-Guo; Wang, Yan

    2015-01-01

    Abstract Electroconvulsive therapy (ECT) and antidepressant are the effective treatment alternatives for patients with treatment-resistant depression (TRD); however, the effects and safety of the ECT plus antidepressant relative to ECT alone remain controversial. We decide to assess the potential of ECT plus antidepressant compared with ECT alone by undertaking an indirect comparison meta-analysis. Databases from PubMed, ISI Web of Science, CENTRAL, Clinicaltrials.gov, EMBASE, CBM (China Biom...

  3. Improved two-way six-state protocol for quantum key distribution

    International Nuclear Information System (INIS)

    Shaari, J.S.; Bahari, Asma' Ahmad

    2012-01-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  4. Improved two-way six-state protocol for quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Shaari, J.S., E-mail: jesni_shamsul@yahoo.com [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia); Bahari, Asma' Ahmad [Faculty of Science, International Islamic University Malaysia (IIUM), Jalan Sultan Ahmad Shah, Bandar Indera Mahkota, 25200 Kuantan, Pahang (Malaysia)

    2012-10-01

    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels. -- Highlights: ► Modification for efficient generalized two-way QKD is proposed. ► Calculations include secure key rates in noisy and lossy channels for selected attack scenario. ► Resulting proposal provides for higher secure key rate in selected attack scheme.

  5. COOMET.RI(I)-K1 comparison of national measurement standards of air kerma for 60Co γ radiation

    International Nuclear Information System (INIS)

    Buermann, L.; Oborin, A.V.; Dobrovosky, J.; Milevsky, V.S.; Walwyn Salas, G.; Lapenas, A.

    2009-01-01

    Results are presented of the COOMET key comparison of the national measurement standards of air kerma for 60 Co γ radiation. Participants of the comparison were PTB (Germany, pilot institute), VNIIM (Russia), SMU (Slovakia), BelGIM (Belarus), CPHR (Cuba) and RMTC (Latvia). PTB, VNIIM and SMU had previously taken part in a key comparison with the Bureau International de Poids et Mesures (BIPM) and operated as link laboratories in order to evaluate the degree of equivalence of the participants' results with the key comparison reference value. These data form the basis of the results entered into the BIPM key comparison database for comparison COOMET.RI(I)-K1. (authors)

  6. Poisonings in the Nordic countries in 2007

    DEFF Research Database (Denmark)

    Andrew, Erik; Tellerup, Markus; Termälä, Anna-Mariia

    2012-01-01

    To map mortality and morbidity of poisonings in Denmark, Finland, Iceland, Norway and Sweden in 2007 and undertake a comparison with a corresponding study in 2002.......To map mortality and morbidity of poisonings in Denmark, Finland, Iceland, Norway and Sweden in 2007 and undertake a comparison with a corresponding study in 2002....

  7. Means to form key competencies by teaching „Chemistry and environmental protection” in grade 8

    International Nuclear Information System (INIS)

    Manev, Stefan; Dimitrova, Velichka; Gushterova, Pavlina

    2011-01-01

    Abstract: A comparison was made of expected results set in grade 8 „Chemistry and environment preservation” curriculum and requirements to form one of eight key competencies „Mathematical literacy and basic knowledge in science and technologies”. The results obtained allow to make some recommendations towards improvement of teaching through a more effective use of science content to form key competencies. Keywords: teaching, science, chemistry, key competencies, curriculum

  8. International comparison of AC-DC current transfer standards

    Science.gov (United States)

    Heine, G.; Garcocz, M.; Waldmann, W.

    2017-01-01

    The measurements of the international comparison of ac-dc current transfer standards identified as EURAMET.EM-K12 started in June 2012 and were completed in December 2014. Twenty NMIs in the EURAMET region and one NMI in the AFRIMET region took part: BEV (Austria), CMI (Czech Republic), PTB (Germany), METAS (Switzerland), JV (Norway), UME (Turkey), GUM (Poland), IPQ (Portugal), CEM (Spain), INRIM (Italy), SP (Sweden), DANIAmet-MI-Trescal (Denmark), BIM (Bulgaria), MKEH (Hungary), SIQ (Slovenia), LNE (France), NSAI NML (Ireland), VSL (The Netherlands), NPL (United Kingdom), Metrosert (Estonia), NIS (Egypt). The comparison was proposed to link the National Metrology Institutes organised in EURAMET to the key comparison CCEM-K12. The ac-dc current transfer difference of each travelling standard had been measured at its nominal current 10 mA and 5 A at the following frequencies: 10 Hz, 55 Hz, 1 kHz, 10 kHz, 20 kHz, 50 kHz, 100 kHz. The test points were selected to link the results with the equivalent CCEM Key Comparison (CCEM-K12), through five NMIs participating in both EURAMET and CCEM key comparisons (PTB, JV, NPL, SP and BEV). The report shows the degree of equivalence in the EURAMET region and also the degree of equivalence with the corresponding CCEM reference value. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCEM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  9. The mutual recognition arrangement and primary standard dosimetry laboratory comparisons

    International Nuclear Information System (INIS)

    Allisy-Roberts, P.J.; Burns, D.T.

    2002-01-01

    Full text: The majority of the Member States of the Metre Convention have signed an arrangement for the mutual recognition (MRA) of national measurement standards and calibration and measurement capabilities (CMCs). Part of the MRA involves an open access database of CMCs that in turn need to be supported by key and supplementary comparisons of national standards. This paper outlines the MRA, describing the comparisons of national primary standards in the field of dosimetry that support the claims of the CMCs in the key comparison database (KCDB). The MRA was drawn up by the International Committee for Weights and Measures (Comite International des Poids et Mesures CIPM) and was signed at a meeting held in Paris on 14 October 1999 by the directors of the national metrology institutes (NMIs) of thirty-eight Member States of the Metre Convention and representatives of two international organizations. Since that date, the directors of the NMIs of several other Member States and nine Associates of the General Conference (Conference Generale des Poids et Mesures CGPM) have also signed the MRA. The metrological objectives of the MRA are to establish the degree of equivalence of national measurement standards maintained by NMIs and thus provide the basis for the mutual recognition of calibration and measurement certificates issued by NMIs. The NMIs provide the traceability to the international system of units (SI) required for these services and thus mutual recognition of the capabilities of the NMIs is a prerequisite for the mutual recognition of the metrology services of countries in general. The objectives of the MRA are achieved through a process of: (a) international comparisons of measurements, known as key comparisons (b) supplementary international comparisons of measurements, and (c) quality systems and demonstrations of competence by the NMIs. The outcome of the MRA is a determination of the degrees of equivalence of national standards and a set of statements of

  10. Does undertaking an intercalated BSc influence first clinical year exam results at a London medical school?

    Directory of Open Access Journals (Sweden)

    Jones Melvyn

    2011-02-01

    Full Text Available Abstract Background Intercalated BScs (iBScs are an optional part of the medical school curriculum in many Universities. Does undertaking an iBSc influence subsequent student performance? Previous studies addressing this question have been flawed by iBSc students being highly selected. This study looks at data from medical students where there is a compulsory iBSc for non-graduates. Our aim was to see whether there was any difference in performance between students who took an iBSc before or after their third year (first clinical year exams. Methods A multivariable analysis was performed to compare the third year results of students at one London medical school who had or had not completed their iBSc by the start of this year (n = 276. A general linear model was applied to adjust for differences between the two groups in terms of potential confounders (age, sex, nationality and baseline performance. Results The results of third year summative exams for 276 students were analysed (184 students with an iBSc and 92 without. Unadjusted analysis showed students who took an iBSc before their third year achieved significantly higher end of year marks than those who did not with a mean score difference of 4.4 (0.9 to 7.9 95% CI, p = 0.01. (overall mean score 238.4 "completed iBSc" students versus 234.0 "not completed", range 145.2 - 272.3 out of 300. There was however a significant difference between the two groups in their prior second year exam marks with those choosing to intercalate before their third year having higher marks. Adjusting for this, the difference in overall exam scores was no longer significant with a mean score difference of 1.4 (-4.9 to +7.7 95% CI, p = 0.66. (overall mean score 238.0 " completed iBSc" students versus 236.5 "not completed". Conclusions Once possible confounders are controlled for (age, sex, previous academic performance undertaking an iBSc does not influence third year exam results. One explanation for this

  11. Key Elements of a Good Mathematics Lesson as Seen by Japanese Junior High School Teachers

    Science.gov (United States)

    Ebaeguin, Marlon; Stephens, Max

    2016-01-01

    This study makes a comparison between what literature on Japanese Lesson Study suggests are key elements of a good mathematics lesson and what junior high school mathematics teachers in Japan value in planning their lessons. The teachers' strong consensus in their endorsements of these key elements explains why Japanese teachers strongly support…

  12. Application of the Value Optimization Model of Key Factors Based on DSEM

    Directory of Open Access Journals (Sweden)

    Chao Su

    2016-01-01

    Full Text Available The key factors of the damping solvent extraction method (DSEM for the analysis of the unbounded medium are the size of bounded domain, the artificial damping ratio, and the finite element mesh density. To control the simulation accuracy and computational efficiency of the soil-structure interaction, this study establishes a value optimization model of key factors that is composed of the design variables, the objective function, and the constraint function system. Then the optimum solutions of key factors are obtained by the optimization model. According to some comparisons of the results provided by the different initial conditions, the value optimization model of key factors is feasible to govern the simulation accuracy and computational efficiency and to analyze the practical unbounded medium-structure interaction.

  13. Report on NIM-NMC bilateral comparison: SPRT calibration comparison from -190°C to 420°C

    Science.gov (United States)

    Sun, Jianping; Ye, Shaochun; Wang, Li; Zhang, Jintao; Kho, Haoyuan

    2016-01-01

    A bilateral comparison of local realization of the International temperature scale of 1990 (ITS-90) between National Institute of Metrology (NIM) and National Metrology Centre (NMC) was carried out over the temperature range from -190°C to 420°C. It involved six fixed points including the argon triple point, the mercury triple point, the triple point of water, the melting point of gallium, the freezing point of tin and the freezing point of zinc. In 2009, NMC asked NIM to participate in a bilateral comparison to link the NMC results to the Consultative Committee for Thermometry Key comparison 3 (CCT-K3) and facilitate the NMC's Calibration and measurement capabilities (CMCs) submission. This comparison was agreed by NIM and Asia Pacific Metrology Programme (APMP) in 2009, and registered in the Key Comparison Database (KCDB) in 2010 as CCT-K3.2. NMC supplied two 25 Ω fused silica sheath standard platinum resistance thermometers (SPRTs) as traveling standards. One of them was used at the Ga, Sn and Zn fixed points, while the other one was used at the Ar and Hg fixed point. NMC measured them before and after NIM measurement. During the comparison, a criterion for the SPRT was set as the stability at the triple point of water to be less than 0.3 mK. The results for both laboratories are summarized. A proposal for linking the NMC's comparison results to CCT-K3 is presented. The difference between NMC and NIM and the difference between NMC and the CCT-K3 Average Reference Value (ARV) using NIM as a link are reported with expanded uncertainties at each measured fixed point. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. Ministerial Decree of 15 February 1974 establishing the inventory of qualified experts and physicians authorized to undertake the health physics and medical supervision of protection against ionizing radiations

    International Nuclear Information System (INIS)

    1974-01-01

    This Decree was made in implementation of DPR No. 185 of 13 February 1964 and provides for the legal and administrative acknowledgment of experts and physicians who are required to undertake supervision of protection against the hazards of ionizing radiations. (NEA) [fr

  15. Case studies, cross-site comparisons, and the challenge of generalization: comparing agent-based models of land-use change in frontier regions.

    Science.gov (United States)

    Parker, Dawn C; Entwisle, Barbara; Rindfuss, Ronald R; Vanwey, Leah K; Manson, Steven M; Moran, Emilio; An, Li; Deadman, Peter; Evans, Tom P; Linderman, Marc; Rizi, S Mohammad Mussavi; Malanson, George

    2008-01-01

    Cross-site comparisons of case studies have been identified as an important priority by the land-use science community. From an empirical perspective, such comparisons potentially allow generalizations that may contribute to production of global-scale land-use and land-cover change projections. From a theoretical perspective, such comparisons can inform development of a theory of land-use science by identifying potential hypotheses and supporting or refuting evidence. This paper undertakes a structured comparison of four case studies of land-use change in frontier regions that follow an agent-based modeling approach. Our hypothesis is that each case study represents a particular manifestation of a common process. Given differences in initial conditions among sites and the time at which the process is observed, actual mechanisms and outcomes are anticipated to differ substantially between sites. Our goal is to reveal both commonalities and differences among research sites, model implementations, and ultimately, conclusions derived from the modeling process.

  16. Factors associated with quality of life in elderly undertaking literacy programs

    Directory of Open Access Journals (Sweden)

    Bruna Rodrigues dos Santos

    Full Text Available ABSTRACT Increased life expectancy has led to a significant number of elderly enrolling on Youth and Adult Education programs (YAE. These individuals leave inactivity and negative aspects of aging in search of opportunities for social inclusion. Objective: To evaluate the influence of sociodemographic factors and depressive and cognitive symptoms on quality of life (QL of elderly attending the YAE of São Carlos city in São Paulo state. Methods: A descriptive and quantitative study approved by the Research Ethics Committee of São Carlos Federal University was conducted. The sample comprised all elderly undertaking the YAE literacy program in 2012. The instruments used were the Mini-Mental State Examination (MMSE, Geriatric Depression Scale (GDS, WHOQOL-bref and WHOQOL-old, and a sociodemographic instrument. Results: We interviewed 23 elderly, predominantly females (91.3% in the early stages of old age (69.6%. The number of years of YAE study showed no correlation with cognition scores obtained on the MMSE or with QL domains. However, scores on the GDS had a moderate inverse relationship with total scores for the Physical (p<0.01, Sensory Functioning (p<0.05, Independence (p<0.01, Past, Present and Future Activities (p<0.05, Social Participation (p<0.01, and Intimacy (p<0.05 QV domains, and a strong inversely proportional relationship with the Social Relationships QV domain (p<0.01. Scores attained on the MMSE showed a moderate and direct relationship with total scores on the Independence QL domain (p=0.001. Conclusion: Elderly on literacy programs have average quality of life scores. Several QL domains are influenced by depression and cognitive symptoms.

  17. Engaging Afghans KLE Keys to Success

    OpenAIRE

    Moss, Don

    2009-01-01

    This article was published in Culture and Conflict Review (Fall 2009), v.3 no.3 "A pillar of Coalition Force/United States Government (USG) efforts in Afghanistan is to separate the people of the Islamic Republic of Afghanistan from insurgent groups such as the Taliban, Haqqani Network and Hezb-e-Islami Gulbuddin (HiG) and unite the same populace with their fledgling government. In order to do this, the men and women undertaking this effort have access to the latest in information, trainin...

  18. Obstacles to researching the researchers: a case study of the ethical challenges of undertaking methodological research investigating the reporting of randomised controlled trials.

    Science.gov (United States)

    McKenzie, Joanne E; Herbison, G Peter; Roth, Paul; Paul, Charlotte

    2010-03-21

    Recent cohort studies of randomised controlled trials have provided evidence of within-study selective reporting bias; where statistically significant outcomes are more likely to be more completely reported compared to non-significant outcomes. Bias resulting from selective reporting can impact on meta-analyses, influencing the conclusions of systematic reviews, and in turn, evidence based clinical practice guidelines.In 2006 we received funding to investigate if there was evidence of within-study selective reporting in a cohort of RCTs submitted to New Zealand Regional Ethics Committees in 1998/99. This research involved accessing ethics applications, their amendments and annual reports, and comparing these with corresponding publications. We did not plan to obtain informed consent from trialists to view their ethics applications for practical and scientific reasons. In November 2006 we sought ethical approval to undertake the research from our institutional ethics committee. The Committee declined our application on the grounds that we were not obtaining informed consent from the trialists to view their ethics application. This initiated a seventeen month process to obtain ethical approval. This publication outlines what we planned to do, the issues we encountered, discusses the legal and ethical issues, and presents some potential solutions. Methodological research such as this has the potential for public benefit and there is little or no harm for the participants (trialists) in undertaking it. Further, in New Zealand, there is freedom of information legislation, which in this circumstance, unambiguously provided rights of access and use of the information in the ethics applications. The decision of our institutional ethics committee defeated this right and did not recognise the nature of this observational research. Methodological research, such as this, can be used to develop processes to improve quality in research reporting. Recognition of the potential

  19. Escaping History: Benjamin Fondane's 'Mal des fantômes' and Interiority

    OpenAIRE

    Dickow, A

    2017-01-01

    AbstractThis article undertakes a detailed comparison of the work of Emmanuel Levinas and the poet-philosopher Benjamin Fondane. Fondane’s most iconic poem, quoted at the entrance to the Hall of Names in Jerusalem’s Holocaust museum, resembles a poetic illustration of Levinas’s key themes, such as the ‘face’ and the concept of ‘ethical speech.’ Likewise, Fondane’s long poem ‘Le Mal des fantômes’ illustrates Levinas and Fondane’s shared conception of the subject’s interiority and day-to-day ex...

  20. Cultural Intelligence as a Key Construct for Global Talent Management

    NARCIS (Netherlands)

    Bücker, J.J.L.E.; Al Ariss, A.

    2014-01-01

    This chapter focuses on the competencies needed to undertake global talent management (GTM), according to the concept of cultural intelligence (CQ) and its four main dimensions. Using real-world examples and excerpts from interviews with relevant actors in this field, this chapter outlines the CQ

  1. Peer influence on students' estimates of performance: social comparison in clinical rotations.

    Science.gov (United States)

    Raat, A N Janet; Kuks, Jan B M; van Hell, E Ally; Cohen-Schotanus, Janke

    2013-02-01

    During clinical rotations, students move from one clinical situation to another. Questions exist about students' strategies for coping with these transitions. These strategies may include a process of social comparison because in this context it offers the student an opportunity to estimate his or her abilities to master a novel rotation. These estimates are relevant for learning and performance because they are related to self-efficacy. We investigated whether student estimates of their own future performance are influenced by the performance level and gender of the peer with whom the student compares him- or herself. We designed an experimental study in which participating students (n = 321) were divided into groups assigned to 12 different conditions. Each condition entailed a written comparison situation in which a peer student had completed the rotation the participant was required to undertake next. Differences between conditions were determined by the performance level (worse, similar or better) and gender of the comparison peer. The overall grade achieved by the comparison peer remained the same in all conditions. We asked participants to estimate their own future performance in that novel rotation. Differences between their estimates were analysed using analysis of variance (ANOVA). Students' estimates of their future performance were highest when the comparison peer was presented as performing less well and lowest when the comparison peer was presented as performing better (p influences students' estimates of their future performance in a novel rotation. The effect depends on the performance level and gender of the comparison peer. This indicates that comparisons against particular peers may strengthen or diminish a student's self-efficacy, which, in turn, may ease or hamper the student's learning during clinical rotations. The study is limited by its experimental design. Future research should focus on students' comparison behaviour in real transitions

  2. Tomographic Approach in Three-Orthogonal-Basis Quantum Key Distribution

    International Nuclear Information System (INIS)

    Liang Wen-Ye; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zheng-Fu; Wen Hao

    2015-01-01

    At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations. (paper)

  3. Key-value store with internal key-value storage interface

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Ting, Dennis P. J.; Tzelnic, Percy; Gupta, Uday; Grider, Gary; Bonnie, David J.

    2018-01-16

    A key-value store is provided having one or more key-value storage interfaces. A key-value store on at least one compute node comprises a memory for storing a plurality of key-value pairs; and an abstract storage interface comprising a software interface module that communicates with at least one persistent storage device providing a key-value interface for persistent storage of one or more of the plurality of key-value pairs, wherein the software interface module provides the one or more key-value pairs to the at least one persistent storage device in a key-value format. The abstract storage interface optionally processes one or more batch operations on the plurality of key-value pairs. A distributed embodiment for a partitioned key-value store is also provided.

  4. The lived experiences of flemish midwifery students undertaking an internship in Suriname: A phenomenological study.

    Science.gov (United States)

    Hilde, Curinckx; Marion, Welsh; Marianne, Nieuwenhuijze

    2018-05-01

    The aim of this study is to explore the lived experience of Flemish midwifery students undertaking an internship in Suriname. Hermeneutic phenomenological method as described by van Manen. Seven midwifery students from one University College were selected purposefully for an in-depth interview during their internship abroad within the period October-November 2014. All interviews were audio-taped, transcribed verbatim and analysed thematically. The study revealed five overarching themes: (1) A time to reconsider the time, (2) a time of connection and disconnection, (3) spatiality for thought and rethinking, (4) a body to undergo or a body to respond and (5) the other(s) among the others. The experience of an internship in Suriname presents itself in each individual as: 'A process of awareness from the self with a main focus on the professional'. Meaning that it was a process of 'disconnection' from their own culture towards 'connection' with another culture. Both, the 'rethinking' of their role as a midwife, as well as, balancing between guarding one's own authenticity by 'responding' or being the friendly stranger through 'undergoing', was noticeably striking. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Bio-based Industries Joint Undertaking: The catalyst for sustainable bio-based economic growth in Europe.

    Science.gov (United States)

    Mengal, Philippe; Wubbolts, Marcel; Zika, Eleni; Ruiz, Ana; Brigitta, Dieter; Pieniadz, Agata; Black, Sarah

    2018-01-25

    This article discusses the preparation, structure and objectives of the Bio-based Industries Joint Undertaking (BBI JU). BBI JU is a public-private partnership (PPP) between the European Commission (EC) and the Bio-based Industries Consortium (BIC), the industry-led private not-for-profit organisation representing the private sectors across the bio-based industries. The model of the public-private partnership has been successful as a new approach to supporting research and innovation and de-risking investment in Europe. The BBI JU became a reality in 2014 and represents the largest industrial and economic cooperation endeavour financially ever undertaken in Europe in the area of industrial biotechnologies. It is considered to be one of the most forward-looking initiatives under Horizon 2020 and demonstrates the circular economy in action. The BBI JU will be the catalyst for this strategy to mobilise actors across Europe including large industry, small and medium-sized enterprises (SMEs), all types of research organisations, networks and universities. It will support regions and in doing so, the European Union Member States and associated countries in the implementation of their bioeconomy strategies. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Ministerial Decree of 12 May 1980 authorising Agip Nucleare S.p.a. in Rome to undertake health physics and medical supervision of protection against ionizing radiation

    International Nuclear Information System (INIS)

    1980-01-01

    Section 83 of Decree No. 185 of 13 February 1964 on protection against ionizing radiation provides that institutions previously authorised by the Minister of Labour and Social Security may, on condition that they are adequately equipped for such services, be authorised to undertake health physics and medical supervision of personnel. This Decree accordingly authorises the Agip Nucleare Company to carry out this work. (NEA) [fr

  7. Social and environmental assessment: a preliminary data base on population and territory in the undertakings pipelines: a natural gas pipeline GASBEL II; Avaliacao socioambiental - base de dados preliminar sobre populacao e territorio em empreendimentos de dutos - estudo de caso: avaliacao socioambiental GASBEL II

    Energy Technology Data Exchange (ETDEWEB)

    Bartolini, Marcia; Bach, Vanessa [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil); Ismerio, Marcia [Pallos Consultorias, Rio de Janeiro, RJ (Brazil); Leal, Edna Mara [Camargo Correa Engenharia (Brazil)

    2008-07-01

    The social environmental assessment consists in an instrument of planning which principal objective is to know the social ambient that will be changed by the PETROBRAS' pipe undertakings, that are planning to be implemented and will be analyzed by the licensers environmental organs. When pipeline projects are planned, their route cross some regions and ecological sensitive areas, therefore, the attitude of consider the social environmental aspects at the planning stage through the use of valuation instruments, anticipating, the potential social and environmental impacts, assumes more importance in integrating management of these undertakings. This presentation has the main objective to stand out the relevance of the social environmental assessment realization as preliminary knowledge base to the undertakings, since the research results developed represents a support of information about the regions where the undertakings install themselves in distinct stages: environmental permits, assembly and construction and operating. The social environmental assessment of the project named GASBEL II is presented as a case study once it allow to observe a gas pipeline transport project to be implemented at different regions and areas. The Pipeline will cross two different federal states, where the local research boarded many communities with different ways and conditions of life, territory use, cultural expressions and other aspects. (author)

  8. Final report on COOMET.AUV.A-S1: Technical report on supplementary comparison 'Comparison of national standards of the sound pressure unit in air through calibration of working reference microphones'

    Science.gov (United States)

    Pozdeeva, Valentina; Chalyy, Vladimir

    2014-01-01

    The supplementary comparison COOMET.AUV.A-S1 for secondary calibration methods using WS1 and WS2 measurement microphones was carried out from 2009 to 2010. The results were submitted to and approved by CCAUV in April 2014. Four National Metrology Institutes took part in this comparison and are as follows: BelGIM (Belarus), VNIIFTRI (Russia), SMU (Slovakia) and DP NDI 'Sistema' (Ukraine). Three of the above NMIs (VNIIFTRI, SMU and DP NDI 'Sistema') had earlier participated in COOMET key comparisons and one NMI (VNIIFTRI) had also participated in CCAUV key comparisons. The Comparison Reference Values were calculated as the weighted mean values from results obtained by three institutes. The comparison results show agreement for all participants in the frequency range from 20 Hz to 12.5 kHz for WS1 microphones, and in the frequency range from 20 Hz to 16 kHz for WS2 microphones. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCAUV, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  9. Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm

    Directory of Open Access Journals (Sweden)

    Tieyu Zhao

    2015-01-01

    Full Text Available The optical image encryption has attracted more and more researchers’ attention, and the various encryption schemes have been proposed. In existing optical cryptosystem, the phase functions or images are usually used as the encryption keys, and it is difficult that the traditional public-key algorithm (such as RSA, ECC, etc. is used to complete large numerical key transfer. In this paper, we propose a key distribution scheme based on the phase retrieval algorithm and the RSA public-key algorithm, which solves the problem for the key distribution in optical image encryption system. Furthermore, we also propose a novel image encryption system based on the key distribution principle. In the system, the different keys can be used in every encryption process, which greatly improves the security of the system.

  10. Unraveling the key to the resistance of canids to prion diseases.

    Directory of Open Access Journals (Sweden)

    Natalia Fernández-Borges

    2017-11-01

    Full Text Available One of the characteristics of prions is their ability to infect some species but not others and prion resistant species have been of special interest because of their potential in deciphering the determinants for susceptibility. Previously, we developed different in vitro and in vivo models to assess the susceptibility of species that were erroneously considered resistant to prion infection, such as members of the Leporidae and Equidae families. Here we undertake in vitro and in vivo approaches to understand the unresolved low prion susceptibility of canids. Studies based on the amino acid sequence of the canine prion protein (PrP, together with a structural analysis in silico, identified unique key amino acids whose characteristics could orchestrate its high resistance to prion disease. Cell- and brain-based PMCA studies were performed highlighting the relevance of the D163 amino acid in proneness to protein misfolding. This was also investigated by the generation of a novel transgenic mouse model carrying this substitution and these mice showed complete resistance to disease despite intracerebral challenge with three different mouse prion strains (RML, 22L and 301C known to cause disease in wild-type mice. These findings suggest that dog D163 amino acid is primarily, if not totally, responsible for the prion resistance of canids.

  11. Critical evaluation of the Laboratory of Radionuclide Metrology results of the Institute of Radiation Protection and Dosimetry - IRD in the international key comparisons of activity measurement of radioactive solutions

    International Nuclear Information System (INIS)

    Iwahara, A.; Tauhata, L.; Silva, C.J. da

    2014-01-01

    The Radionuclide Metrology Laboratory (LMR) of LNMRI/IRD has been participating since 1984, in international key-comparisons of activity measurement of radioactive sources organized by BIPM and the Regional Metrology Organizations as EURAMET and APMP. The measured quantity is the activity of a radioactive solution, in becquerel (Bq), containing the radionuclide involved and the of measurement methods used are 4αβ-γ coincidence/anticoincidence, coincidence sum-peak and liquid scintillation. In this paper a summary of the methods used and a performance analysis of the results obtained are presented. (author)

  12. RECLAIM V2.0: comparison of calculated doses with other assessment tools when emulating contaminated land scenarios

    International Nuclear Information System (INIS)

    Willans, Mark; Galais, Nathalie; Lennon, Chris; Trivedil, Divyesh

    2007-01-01

    ReCLAIM v2.0 is a software tool designed to calculate doses to exposure groups from radioactively contaminated land including UK Nuclear Licensed Sites. When using tools to undertake contaminated land assessments, it is important to understand the functionality of the tool and how the tool should be best used to undertake an assessment. This work describes the results from inter-comparison of ReCLAIM v2.0 with two other radioactively contaminated land tools (Conland and RCLEA). For the majority of cases there was little difference between ReCLAIM v2.0 and the other tools. In all cases where there were significant differences, the cause of the variation could be explained and quantified. In the majority of these cases the main exposure pathway was external irradiation. In these cases, variations in the calculated doses were due to the differing ways in which underpinning shielding calculations were undertaken to calculate external radiation dose coefficients. The effect was most noticeable for radionuclides emitting high energy penetrating radiation such as Co-60, Cs-134 and Cs-137. For these cases, there was a greater difference of up to around 60% in the dose comparisons between ReCLAIM v2.0 and the alternative tools, with ReCLAIM v2.0 being more conservative. These results demonstrate that where the algorithms and parameter values are similar, different tools will produce similar results. The user of such tools should be aware of cases where different results may be produced in order that an appropriate level of confidence can be assigned when making decisions based upon the results. (authors)

  13. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  14. Key figures. Year 2006

    International Nuclear Information System (INIS)

    2006-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  15. Key figures. Year 2005

    International Nuclear Information System (INIS)

    2005-01-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  16. Simple Web-based interactive key development software (WEBiKEY) and an example key for Kuruna (Poaceae: Bambusoideae).

    Science.gov (United States)

    Attigala, Lakshmi; De Silva, Nuwan I; Clark, Lynn G

    2016-04-01

    Programs that are user-friendly and freely available for developing Web-based interactive keys are scarce and most of the well-structured applications are relatively expensive. WEBiKEY was developed to enable researchers to easily develop their own Web-based interactive keys with fewer resources. A Web-based multiaccess identification tool (WEBiKEY) was developed that uses freely available Microsoft ASP.NET technologies and an SQL Server database for Windows-based hosting environments. WEBiKEY was tested for its usability with a sample data set, the temperate woody bamboo genus Kuruna (Poaceae). WEBiKEY is freely available to the public and can be used to develop Web-based interactive keys for any group of species. The interactive key we developed for Kuruna using WEBiKEY enables users to visually inspect characteristics of Kuruna and identify an unknown specimen as one of seven possible species in the genus.

  17. Decision Trajectories in Dementia Care Networks: Decisions and Related Key Events.

    Science.gov (United States)

    Groen-van de Ven, Leontine; Smits, Carolien; Oldewarris, Karen; Span, Marijke; Jukema, Jan; Eefsting, Jan; Vernooij-Dassen, Myrra

    2017-10-01

    This prospective multiperspective study provides insight into the decision trajectories of people with dementia by studying the decisions made and related key events. This study includes three waves of interviews, conducted between July 2010 and July 2012, with 113 purposefully selected respondents (people with beginning to advanced stages of dementia and their informal and professional caregivers) completed in 12 months (285 interviews). Our multilayered qualitative analysis consists of content analysis, timeline methods, and constant comparison. Four decision themes emerged-managing daily life, arranging support, community living, and preparing for the future. Eight key events delineate the decision trajectories of people with dementia. Decisions and key events differ between people with dementia living alone and living with a caregiver. Our study clarifies that decisions relate not only to the disease but to living with the dementia. Individual differences in decision content and sequence may effect shared decision-making and advance care planning.

  18. Manet key management via Mobile Ficlke Key protocol (MFK ...

    African Journals Online (AJOL)

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  19. Why self-care is key to providing high-quality care to others.

    Science.gov (United States)

    McCormick, Jo; Hayes, Sally

    2017-06-22

    Jo McCormick, Consultant Nurse and Associate Director of Nursing, Belfast Health and Social Care Trust, Joanna.McCormick@belfasttrust.hscni.net , and Sally Hayes, Director of Strategy, Planning and Resources at the Open University, share their insights from undertaking a Florence Nightingale Leadership Scholarship.

  20. Identification of Preferred Sources of Information for Undertaking Studies in the Faculty of Engineering Management at Poznan University of Technology

    Directory of Open Access Journals (Sweden)

    Magdalena Wyrwicka

    2015-06-01

    Full Text Available Since 2010 a survey has been conducted among first-year students about sources of information which influence the decision of undertaking field studies in Safety Engineering, Management Engineering and Logistics in the Faculty of Engineering Management at Poznan University of Technology. The goal of these analyses is both to assess the effectiveness of promotion and also show trends in the use of diverse channels of information transfer of studies. The results of the investigation show that internet promotion via university and faculty website plays the dominant role but also direct promotion, such as opinion of older friends, is crucial. Furthermore, from year to year the analyses indicate the significant increase of official media and reveal that the prospective students rely on a few sources of information simultaneously.

  1. Security of a practical semi-device-independent quantum key distribution protocol against collective attacks

    International Nuclear Information System (INIS)

    Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan

    2014-01-01

    Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. (general)

  2. The Commission on Employment Conditions, an ambitious undertaking !

    CERN Multimedia

    Staff Association

    2010-01-01

    Since the beginning of the year, the Commission on Employment Conditions has had much success in the number and ability of its participants. It has mostly worked on salaries, the only compulsory subject of the 2010 five-yearly review. In the framework of this review, the Commission has analysed the results of the comparison carried out by the OECD (see Echo 104 and 105). Through its research and analysis, the Commission has clearly shown that our salaries are lower than those of the comparators. It is there necessary to adjust the salary grid with a salary catch-up and not an increase. In 20 years, no five-yearly review has ended with a significant catch-up. Today it is essential to inform our colleagues that this subject needs to be dealt with and that measures must be taken to finance it, as is the case for restoring the equilibrium of the Pension Fund and Health Insurance schemes. The Commission has established an argumentation to help our fellow delegates talk about the delicate subject of salary catch-...

  3. The Language of Comparisons: Communicating about Percentages

    Directory of Open Access Journals (Sweden)

    Jessica Polito

    2014-01-01

    Full Text Available While comparisons between percentages or rates appear frequently in journalism and advertising, and are an essential component of quantitative writing, many students fail to understand precisely what percentages mean, and lack fluency with the language used for comparisons. After reviewing evidence demonstrating this weakness, this experience-based perspective lays out a framework for teaching the language of comparisons in a structured way, and illustrates it with several authentic examples that exemplify mistaken or misleading uses of such numbers. The framework includes three common types of erroneous or misleading quantitative writing: the missing comparison, where a key number is omitted; the apples-to-pineapples comparison, where two subtly incomparable rates are presented; and the implied fallacy, where an invalid quantitative conclusion is left to the reader to infer.

  4. Comparison between FEBio and Abaqus for biphasic contact problems.

    Science.gov (United States)

    Meng, Qingen; Jin, Zhongmin; Fisher, John; Wilcox, Ruth

    2013-09-01

    Articular cartilage plays an important role in the function of diarthrodial joints. Computational methods have been used to study the biphasic mechanics of cartilage, and Abaqus has been one of the most widely used commercial software packages for this purpose. A newly developed open-source finite element solver, FEBio, has been developed specifically for biomechanical applications. The aim of this study was to undertake a direct comparison between FEBio and Abaqus for some practical contact problems involving cartilage. Three model types, representing a porous flat-ended indentation test, a spherical-ended indentation test, and a conceptual natural joint contact model, were compared. In addition, a parameter sensitivity study was also performed for the spherical-ended indentation test to investigate the effects of changes in the input material properties on the model outputs, using both FEBio and Abaqus. Excellent agreement was found between FEBio and Abaqus for all of the model types and across the range of material properties that were investigated.

  5. Regional scale prioritisation for key ecosystem services, renewable energy production and urban development.

    Science.gov (United States)

    Casalegno, Stefano; Bennie, Jonathan J; Inger, Richard; Gaston, Kevin J

    2014-01-01

    Although the importance of addressing ecosystem service benefits in regional land use planning and decision-making is evident, substantial practical challenges remain. In particular, methods to identify priority areas for the provision of key ecosystem services and other environmental services (benefits from the environment not directly linked to the function of ecosystems) need to be developed. Priority areas are locations which provide disproportionally high benefits from one or more service. Here we map a set of ecosystem and environmental services and delineate priority areas according to different scenarios. Each scenario is produced by a set of weightings allocated to different services and corresponds to different landscape management strategies which decision makers could undertake. Using the county of Cornwall, U.K., as a case study, we processed gridded maps of key ecosystem services and environmental services, including renewable energy production and urban development. We explored their spatial distribution patterns and their spatial covariance and spatial stationarity within the region. Finally we applied a complementarity-based priority ranking algorithm (zonation) using different weighting schemes. Our conclusions are that (i) there are two main patterns of service distribution in this region, clustered services (including agriculture, carbon stocks, urban development and plant production) and dispersed services (including cultural services, energy production and floods mitigation); (ii) more than half of the services are spatially correlated and there is high non-stationarity in the spatial covariance between services; and (iii) it is important to consider both ecosystem services and other environmental services in identifying priority areas. Different weighting schemes provoke drastic changes in the delineation of priority areas and therefore decision making processes need to carefully consider the relative values attributed to different services.

  6. Quantum key management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  7. Using Social Cognitive Theory to Explain the Intention of Final-year Pharmacy Students to Undertake a Higher Degree in Pharmacy Practice Research.

    Science.gov (United States)

    Carter, Stephen R; Moles, Rebekah J; Krass, Ines; Kritikos, Vicki S

    2016-08-25

    Objective. To develop and test a conceptual model that hypothesized student intention to undertake a higher degree in pharmacy practice research (PPR) would be increased by self-efficacy, outcome expectancy, and the social influence of faculty members. Methods. Cross-sectional surveys were completed by 387 final-year pharmacy undergraduates enrolled in 2012 and 2013. Structural equation modeling was used to explore relationships between variables and intention. Results. Fit indices were good. The model explained 55% of the variation in intention. As hypothesized, faculty social influence increased self-efficacy and indirectly increased outcome expectancy and intention. Conclusion. To increase pharmacy students' orientation towards a career in PPR, faculty members could use their social influence by highlighting PPR in their teaching.

  8. Comparison as a Universal Learning Action

    Science.gov (United States)

    Merkulova, T. V.

    2016-01-01

    This article explores "comparison" as a universal metasubject learning action, a key curricular element envisaged by the Russian Federal State Educational Standards. Representing the modern learner's fundamental pragmatic skill embedding such core capacities as information processing, critical thinking, robust decision-making, and…

  9. Supplement to CCM.D-K4 'Hydrometer' report: linkage of EURAMET.M.D-K4 comparison, SIM.M.D-K4 comparison and the supplementary SIM.M.D-S2 to CCM.D-K4 'Hydrometer'

    Science.gov (United States)

    Lorefice, S.; Becerra, L. O.

    2017-01-01

    Evaluation of different types of comparisons to a common set of reference values of a CIPM key comparison is essential to satisfy the concept of the CIPM Mutual Recognition Arrangement (CIPM MRA), where the DoEs of any participant who took part in comparisons should be within the Calibration and Measurement Capability (CMC) section of the CIPM MRA Key Comparison Data Base. The subject of this supplementary report is therefore to present the equivalence of each National Metrological Institute (NMI) participant in the CCM.D-K4 'Hydrometer' key comparison, which was performed in the density range 600 kg/m3 to 2000 kg/m3 at the temperature of 20 °C, and the linkage of the European and Inter-American NMI results performed in the RMO.M.D-K4 comparisons as well as those of the supplementary SIM.M.D-S2 to the common set of KCRVs of the CCM.D-K4 'Hydrometer'. The linking procedure has been obtained by numerical simulation, based on the Monte Carlo method, in which the differences in the results of the different comparison between the intended laboratory and one or more linking laboratory/ies, which took part in both comparisons, are correlated with a continuous function describing the DoEs of the linking laboratory/ies with respect to the common set of KCRVs of the CCM.D-K4. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  10. La progettazione di nuovi spazi educativi per l’infanzia: da Ellen Key a Maria Montessori

    Directory of Open Access Journals (Sweden)

    Tiziana Pironi

    2011-11-01

    Full Text Available The essay presents a comparison between the thought of Ellen Key and that of Maria Montessori. Changes that involved the role of women, caught in its interdependence with the development of new educational practices, were the center of the theoretical contribution of Ellen Key. Maria Montessori believed that only women work outside the home would guarantee the economic independence necessary to form a union on sentiment rather than on utilitarian calculations and therefore she did not seem to share the concerns of the Key on an increasingly massive female entry into the world of work. The paper offers an updated reflection on the work of two scholars of education.

  11. Five Key Leadership Actions Needed to Redesign Family Medicine Residencies.

    Science.gov (United States)

    Kozakowski, Stanley M; Eiff, M Patrice; Green, Larry A; Pugno, Perry A; Waller, Elaine; Jones, Samuel M; Fetter, Gerald; Carney, Patricia A

    2015-06-01

    New skills are needed to properly prepare the next generation of physicians and health professionals to practice in medical homes. Transforming residency training to address these new skills requires strong leadership. We sought to increase the understanding of leadership skills useful in residency programs that plan to undertake meaningful change. The Preparing the Personal Physician for Practice (P4) project (2007-2014) was a comparative case study of 14 family medicine residencies that engaged in innovative training redesign, including altering the scope, content, sequence, length, and location of training to align resident education with requirements of the patient-centered medical home. In 2012, each P4 residency team submitted a final summary report of innovations implemented, overall insights, and dissemination activities during the study. Six investigators conducted independent narrative analyses of these reports. A consensus meeting held in September 2012 was used to identify key leadership actions associated with successful educational redesign. Five leadership actions were associated with successful implementation of innovations and residency transformation: (1) manage change; (2) develop financial acumen; (3) adapt best evidence educational strategies to the local environment; (4) create and sustain a vision that engages stakeholders; and (5) demonstrate courage and resilience. Residency programs are expected to change to better prepare their graduates for a changing delivery system. Insights about effective leadership skills can provide guidance for faculty to develop the skills needed to face practical realities while guiding transformation.

  12. Alternative sources of financing entrepreneurial undertakings in agriculture

    Directory of Open Access Journals (Sweden)

    Njegomir Vladimir

    2017-01-01

    Full Text Available Insufficiency of internal financial resources and limited access to external sources of capital, as one of the key problems, local agricultural producers - entrepreneurs usualy describe with high cost of capital, complicated procedures, lack of transparency in regard to the settlement of credit requests and problems with security of loans. The aim of this study is to analyze the possibilities of facilitating access to increased volume of capital for domestic entrepreneurs in agriculture by using funding sources that are applied in developed economies for financing entrepreneurs. In order to achieve the stated aim, the subject of investigation in this paper is the analysis of alternative sources of financing, which use or increased adoption in Serbia would provide greater availability of capital for agricultural producers and others across the chain of agrobusiness complex and thus the promotion of entrepreneurial activity, and consequently, greater competitiveness and greater income of domestic agricultural producers and others across the chain of agrbusiness indirectly leading to increased economic growth and improvement of the welfare.

  13. Designing key-dependent chaotic S-box with larger key space

    International Nuclear Information System (INIS)

    Yin Ruming; Yuan Jian; Wang Jian; Shan Xiuming; Wang Xiqin

    2009-01-01

    The construction of cryptographically strong substitution boxes (S-boxes) is an important concern in designing secure cryptosystems. The key-dependent S-boxes designed using chaotic maps have received increasing attention in recent years. However, the key space of such S-boxes does not seem to be sufficiently large due to the limited parameter range of discretized chaotic maps. In this paper, we propose a new key-dependent S-box based on the iteration of continuous chaotic maps. We explore the continuous-valued state space of chaotic systems, and devise the discrete mapping between the input and the output of the S-box. A key-dependent S-box is constructed with the logistic map in this paper. We show that its key space could be much larger than the current key-dependent chaotic S-boxes.

  14. The home as an appropriate setting for women undertaking cervical ripening before the induction of labour.

    Science.gov (United States)

    Reid, Margaret; Lorimer, Karen; Norman, Jane E; Bollapragada, Shrikant S; Norrie, John

    2011-02-01

    to explore women's experiences of cervical ripening using isosorbide mononitrate (IMN) in the home as part of the main randomised controlled trial. qualitative study with semi-structured interviews carried out at three weeks post partum. Interview transcripts were analysed to identify recurrent themes, focusing on why women became involved in the study, their views about both the self-medication and the home setting, and whether they would repeat the experience. the home. twenty women enrolled in the main randomised controlled trial. the study is part of a double-blind randomised controlled trial with 350 patients investigating whether a nitric oxide donor (IMN) used in cervical ripening improves the process of induction of labour. women liked the opportunity to remain at home during the cervical ripening process. Timing and setting were central issues; women hoped that it would hasten labour, while the home was seen as a setting offering freedom, security and reassurance, as opposed to the hospital, seen as constraining. Two women reported problems with IMN but the remainder reported that they would repeat the experience. women were very positive about the opportunity to undertake cervical ripening at home. It is important to explore this setting further for appropriate interventions. Copyright © 2009 Elsevier Ltd. All rights reserved.

  15. Chinese Anti-Cancer Association as a non-governmental organization undertakes systematic cancer prevention work in China

    Science.gov (United States)

    2015-01-01

    Cancer has become the first leading cause of death in the world, particularly in low- and middle-income countries. Facing the increasing trend of cancer incidence and mortality, China issued and implemented “three-early (early prevention, early diagnosis and early treatment)” national cancer prevention plan. As the main body and dependence of social governance, non-governmental organizations (NGOs) take over the role of government in the field of cancer prevention and treatment. American Cancer Society (ACS) made a research on cancer NGOs and civil society in cancer control and found that cancer NGOs in developing countries mobilize civil society to work together and advocate governments in their countries to develop policies to address the growing cancer burden. Union for International Cancer Control (UICC), Cancer Council Australia (CCA), and Malaysian cancer NGOs are the representatives of cancer NGOs in promoting cancer control. Selecting Chinese Anti-Cancer Association (CACA) as an example in China, this article is to investigate how NGOs undertake systematic cancer prevention work in China. By conducting real case study, we found that, as a NGO, CACA plays a significant role in intensifying the leading role of government in cancer control, optimizing cancer outcomes, decreasing cancer incidence and mortality rates and improving public health. PMID:26361412

  16. Assisted reproductive technologies in Ghana: transnational undertakings, local practices and ‘more affordable’ IVF

    Directory of Open Access Journals (Sweden)

    Trudie Gerrits

    2016-06-01

    Full Text Available The article sketches the origins and development of IVF in Ghana as a highly transnational undertaking. Movements are from and to Africa, involving human beings (providers and users, and also refer to other entities such as technologies, skills and knowledge. None of these movements are paid for using public money, neither are they subsidized by international health organizations. Currently, ‘more affordable’ IVF is being introduced into Ghana, on initiative of the first Association of Childless Couples of Ghana (ACCOG, in collaboration with the Belgium based non-profit organization the Walking Egg (tWE, representing another form of transnational networking. The article underlines the scarcity of well-trained embryologists in Ghana, which turns the embryologists’ expertise and skills into a scarce and precious commodity and guarantees this expertise becomes a major challenge for the directors of the private clinics. Next to local Ghanaian couples, the clinics also attend to transnational reproductive travellers, including women and men from neighbouring countries and Ghanaians in the diaspora returning to their country of origin. Their manifold motivations to cross borders and visit the IVF clinics in Ghana provide insight into the structural conditions impeding or facilitating the use of assisted reproductive technologies at different local sites. Transnational movements also include the flow of new procreation practices (such as surrogacy and the use of donor material, which (re-shape existing cultural and societal notions regarding kinship and the importance of blood/genetic ties. Finally, the article lists a number of thematic and theoretical issues which require further exploration and studies.

  17. Group key management

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  18. MoKey: A versatile exergame creator for everyday usage.

    Science.gov (United States)

    Eckert, Martina; López, Marcos; Lázaro, Carlos; Meneses, Juan

    2017-11-27

    Currently, virtual applications for physical exercises are highly appreciated as rehabilitation instruments. This article presents a middleware called "MoKey" (Motion Keyboard), which converts standard off-the-shelf software into exergames (exercise games). A configurable set of gestures, captured by a motion capture camera, is translated into the key strokes required by the chosen software. The present study assesses the tool regarding usability and viability on a heterogeneous group of 11 participants, aged 5 to 51, with moderate to severe disabilities, and mostly bound to a wheelchair. In comparison with FAAST (The Flexible Action and Articulated Skeleton Toolkit), MoKey achieved better results in terms of ease of use and computational load. The viability as an exergame creator tool was proven with help of four applications (PowerPoint®, e-book reader, Skype®, and Tetris). Success rates of up to 91% have been achieved, subjective perception was rated with 4.5 points (from 0-5). The middleware provides increased motivation due to the use of favorite software and the advantage of exploiting it for exercise. Used together with communication software or online games, social inclusion can be stimulated. The therapists can employ the tool to monitor the correctness and progress of the exercises.

  19. Barriers for domestic surrogacy and challenges of transnational surrogacy in the context of Australians undertaking surrogacy in India.

    Science.gov (United States)

    Johnson, Louise; Blyth, Eric; Hammarberg, Karin

    2014-09-01

    The ethical, social, psychological, legal and financial complexities associated with cross-border travel for reproductive services are gaining attention internationally. Travel abroad for surrogacy, and the transfer of gametes or embryos between countries for use in a surrogacy arrangement, can create conflict in relation to the rights of the parties involved: commissioning parents, surrogates and their families, gamete and embryo donors, and children born as a result of the arrangement. Australian surrogacy laws are restrictive and limit access to domestic surrogacy. Despite the introduction of laws in some Australian jurisdictions that penalise residents entering into international commercial surrogacy arrangements, hundreds of Australians resort to surrogacy arrangements in India and other countries each year. This article discusses legislation, policy and practice as they relate to Australians' use of surrogacy in India. It reviews current surrogacy-related legislation and regulation in Australia and India and existing evidence about the challenges posed by transnational surrogacy, and considers how restrictive Australian legislation may contribute to the number of Australians undertaking surrogacy in India.

  20. Exploring the role of social interactions and supports in overcoming accessibility barriers while undertaking health tours in India.

    Science.gov (United States)

    Jana, Arnab; Harata, Noboru; Kiyoshi, Takami; Ohmori, Nobuaki

    2014-01-01

    This article explores the phenomenon of companionship as an adaptation strategy to counter the existing barriers to health care access in developing nations. Companionship is argued to be an outcome of "inter" and "intra" household collaboration to offer diverse supports in addition to altruism. The analysis of the household survey conducted in West Bengal, India, exhibited different patterns of health care tours and the associated dependencies. In addition to support in terms of mobility while traveling and companionship while waiting for the opportunity, support in terms of refuge is also found to be essential, especially for the poor while they undertake regional tours. Causal models focusing on aggregated general health tours and specific regional tours were estimated separately to comprehend the implicit social interactions and their effects on the patient as well as the companions. The research demonstrated that accessibility barriers affect not only the ill, but also those associated with them and at times adversely. Segregation of regional tours illustrated the gaps, which instigated such tours and also might aid in health infrastructure planning as a whole.

  1. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    Science.gov (United States)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  2. Conceptualizing childhood health problems using survey data: a comparison of key indicators

    Directory of Open Access Journals (Sweden)

    Miller Anton R

    2007-12-01

    Full Text Available Abstract Background Many definitions are being used to conceptualize child health problems. With survey data, commonly used indicators for identifying children with health problems have included chronic condition checklists, measures of activity limitations, elevated service use, and health utility thresholds. This study compares these different indicators in terms of the prevalence rates elicited, and in terms of how the subgroups identified differ. Methods Secondary data analyses used data from the National Longitudinal Survey of Children and Youth, which surveyed a nationally representative sample of Canadian children (n = 13,790. Descriptive analyses compared healthy children to those with health problems, as classified by any of the key indicators. Additional analyses examined differences between subgroups of children captured by a single indicator and those described as having health problems by multiple indicators. Results This study demonstrates that children captured by any of the indicators had poorer health than healthy children, despite the fact that over half the sample (52.2% was characterized as having a health problem by at least one indicator. Rates of child ill health differed by indicator; 5.6% had an activity limitation, 9.2% exhibited a severe health difficulty, 31.7% reported a chronic condition, and 36.6% had elevated service use. Further, the four key indicators captured different types of children. Indicator groupings differed on child and socio-demographic factors. Compared to children identified by more than one indicator, those identified only by the severe health difficulty indicator displayed more cognitive problems (p Conclusion We provide information useful to researchers when selecting indicators from survey data to identify children with health problems. Researchers and policy makers need to be aware of the impact of such definitions on prevalence rates as well as on the composition of children classified as

  3. The process of undertaking a quantitative dissertation for a taught M.Sc: Personal insights gained from supporting and examining students in the UK and Ireland

    International Nuclear Information System (INIS)

    Marshall, Gill; Brennan, Patrick

    2008-01-01

    Purpose: This article discusses the roles of the student and the supervisor in the process of undertaking and writing a dissertation, a potentially daunting process. Results: The authors have supervised and examined students within 20 institutions and the personal insights gained result in the guidance provided within this article. Conclusion: The authors conclude that much can be done by students working with their supervisors, to improve progress in both performing and writing up the dissertation. Taking account of these factors will ease the dissertation process and move students progressively towards the production of a well-written dissertation

  4. Final report on RMO key comparison EURAMET.L-K6: CMM 2-D artifact: ball plate

    DEFF Research Database (Denmark)

    Jusko, O.; Banreti, E.; Bergmans, R.

    2013-01-01

    An industrial standard steel ball plate of dimension 420 mm with 25 ceramic balls in a 5 × 5 arrangement was circulated among 12 European NMIs. The measurement task was the calibration of the centres of the 25 balls. The measurements were conducted between 2004 and 2006. One NMI withdrew from...... the comparison. The other 11 NMIs measured the ball plate and delivered data. The artifact was found to be stable during the duration of the comparison. For the analysis both the deviations from the KCRV and the En numbers were calculated. Most results agreed very well within the claimed uncertainty. A few...... for publication by the CCL, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA)....

  5. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  6. Regional scale prioritisation for key ecosystem services, renewable energy production and urban development.

    Directory of Open Access Journals (Sweden)

    Stefano Casalegno

    Full Text Available Although the importance of addressing ecosystem service benefits in regional land use planning and decision-making is evident, substantial practical challenges remain. In particular, methods to identify priority areas for the provision of key ecosystem services and other environmental services (benefits from the environment not directly linked to the function of ecosystems need to be developed. Priority areas are locations which provide disproportionally high benefits from one or more service. Here we map a set of ecosystem and environmental services and delineate priority areas according to different scenarios. Each scenario is produced by a set of weightings allocated to different services and corresponds to different landscape management strategies which decision makers could undertake. Using the county of Cornwall, U.K., as a case study, we processed gridded maps of key ecosystem services and environmental services, including renewable energy production and urban development. We explored their spatial distribution patterns and their spatial covariance and spatial stationarity within the region. Finally we applied a complementarity-based priority ranking algorithm (zonation using different weighting schemes. Our conclusions are that (i there are two main patterns of service distribution in this region, clustered services (including agriculture, carbon stocks, urban development and plant production and dispersed services (including cultural services, energy production and floods mitigation; (ii more than half of the services are spatially correlated and there is high non-stationarity in the spatial covariance between services; and (iii it is important to consider both ecosystem services and other environmental services in identifying priority areas. Different weighting schemes provoke drastic changes in the delineation of priority areas and therefore decision making processes need to carefully consider the relative values attributed to

  7. Key indicators for organizational performance measurement

    Directory of Open Access Journals (Sweden)

    Firoozeh Haddadi

    2014-09-01

    Full Text Available Each organization for assessing the amount of utility and desirability of their activities, especially in complex and dynamic environments, requires determining and ranking the vital performance indicators. Indicators provide essential links among strategy, execution and ultimate value creation. The aim of this paper is to develop a framework, which identifies and prioritizes Key Performance Indicators (KPIs that a company should focus on them to define and measure progress towards organizational objectives. For this purpose, an applied research was conducted in 2013 in an Iranian telecommunication company. We first determined the objectives of the company with respect to four perspectives of BSC (Balanced Scorecard framework. Next, performance indicators were listed and paired wise comparisons were accomplished by company's high-ranked employees through standard Analytic Hierarchy Process (AHP questionnaires. This helped us establish the weight of each indicator and to rank them, accordingly.

  8. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Directory of Open Access Journals (Sweden)

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  9. Key management of the double random-phase-encoding method using public-key encryption

    Science.gov (United States)

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  10. Security of Color Image Data Designed by Public-Key Cryptosystem Associated with 2D-DWT

    Science.gov (United States)

    Mishra, D. C.; Sharma, R. K.; Kumar, Manish; Kumar, Kuldeep

    2014-08-01

    In present times the security of image data is a major issue. So, we have proposed a novel technique for security of color image data by public-key cryptosystem or asymmetric cryptosystem. In this technique, we have developed security of color image data using RSA (Rivest-Shamir-Adleman) cryptosystem with two-dimensional discrete wavelet transform (2D-DWT). Earlier proposed schemes for security of color images designed on the basis of keys, but this approach provides security of color images with the help of keys and correct arrangement of RSA parameters. If the attacker knows about exact keys, but has no information of exact arrangement of RSA parameters, then the original information cannot be recovered from the encrypted data. Computer simulation based on standard example is critically examining the behavior of the proposed technique. Security analysis and a detailed comparison between earlier developed schemes for security of color images and proposed technique are also mentioned for the robustness of the cryptosystem.

  11. DETERMINATION OF THE URGENCY OF UNDERTAKING LAND CONSOLIDATION WORKS IN THE VILLAGES OF THE SŁAWNO MUNICIPALITY

    Directory of Open Access Journals (Sweden)

    Przemysław Leń

    2016-09-01

    Full Text Available The object of the paper is to analyze the spatial structure of land and identification of the needs of consolidation works and exchange of land in the villages of the Sławno municipality, lying in the district of Opoczno, in the Łódzkie Voivodship. The authors use the method of zero unitarisation for the purposes of determining the order of undertaking consolidation works and exchange of land in the area of research. The basis for calculation is the database of 19 factors (x1–x19 characteristic for the listed five groups of issues, describing each of the following villages. The obtained results, in a form of synthetic meter for each village, allowed creating the hierarchy of the urgency of carrying out consolidation works. The problem of excessive fragmentation of farms, constituting the collections of a certain number of parcels, in a broader sense, is one of the elements that prevent the acceleration of reforms by conversion of the Land and Buildings Register (EGiB in a full valuable real estate cadastre in Poland. The importance of the problem is highlighted by the fact that there are ecological grounds in the study area, significant from the point of view of environmental protection.

  12. Antennae hold a key to Varroa-sensitive hygiene behaviour in honey bees

    OpenAIRE

    Mondet, Fanny; Alaux, C?dric; Severac, Dany; Rohmer, Marine; Mercer, Alison R.; Le Conte, Yves

    2015-01-01

    In honey bees, Varroa sensitive hygiene (VSH) behaviour, which involves the detection and removal of brood parasitised by the mite Varroa destructor, can actively participate in the survival of colonies facing Varroa outbreaks. This study investigated the mechanisms of VSH behaviour, by comparing the antennal transcriptomes of bees that do and do not perform VSH behaviour. Results indicate that antennae likely play a key role in the expression of VSH behaviour. Comparisons with the antennal t...

  13. Undertaking the Assessment of the Work Completed--Comments on Responses to Financial Reduction.

    Science.gov (United States)

    Ahgren-Lange, Ulla

    1986-01-01

    It is proposed that educators may learn more about the experiences of other countries in responding to retrenchment by making direct comparisons between governments, institutions, or departments rather than between broad national situations. This approach is illustrated by a government-level comparative analysis. (MSE)

  14. Comparison of measurement capability with 100 μmol/mol of carbon monoxide in nitrogen

    Science.gov (United States)

    Lee, Jeongsoon; Lee, JinBok; Lim, Jeongsik; Tarhan, Tanıl; Liu, Hsin-Wang; Aggarwal, Shankar G.

    2018-01-01

    Carbon monoxide (CO) in nitrogen was one of the first types of gas mixtures used in an international key comparison. The comparison dates back to 1998 (CCQMK1a) [1]. Since then, many National Metrology Institutes (NMIs) have developed calibration and measurement capabilities (CMCs) for these mixtures. Recently, NMIs in the APMP region have actively participated in international comparisons to provide domestic services. At the 2013 APMP meeting, several NMIs requested a CO comparison to establish CO/N2 certification for industrial applications, which was to be coordinated by KRISS. Consequently, this comparison provides an opportunity for APMP regional NMIs to develop CO/N2 CMC claims. The goal of this supplementary comparison is to support CMC claim for carbon monoxide in the N2 range of 50–2000 μmol/mol. An extended range may be supported as described in the GAWG strategy for comparisons and CMC claims. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  15. Breaking chaotic shift key communication via adaptive key identification

    International Nuclear Information System (INIS)

    Ren Haipeng; Han Chongzhao; Liu Ding

    2008-01-01

    This paper proposes an adaptive parameter identification method for breaking chaotic shift key communication from the transmitted signal in public channel. The sensitive dependence property of chaos on parameter mismatch is used for chaos adaptive synchronization and parameter identification. An index function about the synchronization error is defined and conjugate gradient method is used to minimize the index function and to search the transmitter's parameter (key). By using proposed method, secure key is recovered from transmitted signal generated by low dimensional chaos and hyper chaos switching communication. Multi-parameters can also be identified from the transmitted signal with noise

  16. Modular Connector Keying Concept

    Science.gov (United States)

    Ishman, Scott; Dukes, Scott; Warnica, Gary; Conrad, Guy; Senigla, Steven

    2013-01-01

    For panel-mount-type connectors, keying is usually "built-in" to the connector body, necessitating different part numbers for each key arrangement. This is costly for jobs that require small quantities. This invention was driven to provide a cost savings and to reduce documentation of individual parts. The keys are removable and configurable in up to 16 combinations. Since the key parts are separate from the connector body, a common design can be used for the plug, receptacle, and key parts. The keying can then be set at the next higher assembly.

  17. Achieving organizational alignment - key to survival

    International Nuclear Information System (INIS)

    Allison, J.T.

    1997-01-01

    The restructuring of the gas and electric industry and the impact of the restructuring on organizational survival was discussed. The forces driving the trend to restructuring are commoditization of energy, demanding, fragmented customer needs, diverse, transforming technologies, and intense competition. Realigning a company to the changing marketplace is the key to survival with customers, financial markets, and with competition. This paper presented a reality-based, results oriented approach to strategy consulting. Four case studies - Telco, Natural gas holding company, Combined utility, and Duke/Louis Dreyfus - were used for illustrating different problems and different approaches to restructuring. In each case a comparison was made between the company's old organization in the early 1990's, the driving forces responsible for the change and the company's new organization in the mid 1990's. In all cases the predominance of the customer focus is quite apparent, as is the clear lines of demarcation between regulated and unregulated activities. The underlying theme in all restructuring is agility and striving for flexibility

  18. Fuels planning: science synthesis and integration; social issues fact sheet 12: Keys to successful collaboration

    Science.gov (United States)

    Christine Esposito

    2006-01-01

    Collaborating on fire and fuels management with a host of public and private partners may seem like an impossible undertaking, and presents many challenges. This fact sheet reviews tips for what to focus on as you embark on a collaborative fuels management project.Other...

  19. Flow hydrodynamics near inlet key of Piano Key Weir (PKW)

    Indian Academy of Sciences (India)

    Department of Water Resources Development and Management, Indian Institute ... on the hydrodynamic performance near inlet key of Piano Key Weir (PKW). ... nature of flows is clearly understood with the help of advanced instrumentation.

  20. Key to good fit: body measurement problems specific to key ...

    African Journals Online (AJOL)

    Key to good fit: body measurement problems specific to key dimensions. ... to explore and describe the problems that the South African Clothing Industry currently ... A postal survey was conducted among South African apparel and footwear ...

  1. Operating Reserves and Wind Power Integration: An International Comparison; Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Milligan, M.; Donohoo, P.; Lew, D.; Ela, E.; Kirby, B.; Holttinen, H.; Lannoye, E.; Flynn, D.; O' Malley, M.; Miller, N.; Eriksen, P. B.; Gottig, A.; Rawn, B.; Gibescu, M.; Lazaro, E. G.; Robitaille, A.; Kamwa, I.

    2010-10-01

    This paper provides a high-level international comparison of methods and key results from both operating practice and integration analysis, based on an informal International Energy Agency Task 25: Large-scale Wind Integration.

  2. SUPPLEMENTARY COMPARISON: COOMET.RI(II)-S1.Rn-222 (169/UA/98): Rn-222 volume activity comparison

    Science.gov (United States)

    Skliarov, V.; Röttger, A.; Honig, A.; Korostin, S.; Kuznetsov, S.; Lapenas, A.; Milevsky, V.; Ivaniukovich, A.; Kharitonov, I.; Sepman, S.

    2009-01-01

    According to a first program, a supplementary comparison of Rn-222 volume activity was drawn up as a bilateral supplementary comparison between NSC 'Institute of Metrology', Ukraine, and VNIIFTRI, Russia. It took place in March 2005. In April 2005, at the 5th meeting of COOMET held in Braunschweig (Germany), representatives of these institutes exchanged data which showed the comparability of the national standards of Ukraine and Russia for the check points. During the discussion of the procedure some other institutes decided to join the comparison program, which was extended to BelGIM (Belarus), PTB (Germany), VNIIM (Russia) and RMTC (Latvia). The national standards of volume activity of radon-222 were thus calibrated using one standard radon radiometer as the transfer standard. Results are shown in the Final Report of the comparison. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by COOMET, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  3. Designing and Undertaking a Health Economics Study of Digital Health Interventions.

    Science.gov (United States)

    McNamee, Paul; Murray, Elizabeth; Kelly, Michael P; Bojke, Laura; Chilcott, Jim; Fischer, Alastair; West, Robert; Yardley, Lucy

    2016-11-01

    This paper introduces and discusses key issues in the economic evaluation of digital health interventions. The purpose is to stimulate debate so that existing economic techniques may be refined or new methods developed. The paper does not seek to provide definitive guidance on appropriate methods of economic analysis for digital health interventions. This paper describes existing guides and analytic frameworks that have been suggested for the economic evaluation of healthcare interventions. Using selected examples of digital health interventions, it assesses how well existing guides and frameworks align to digital health interventions. It shows that digital health interventions may be best characterized as complex interventions in complex systems. Key features of complexity relate to intervention complexity, outcome complexity, and causal pathway complexity, with much of this driven by iterative intervention development over time and uncertainty regarding likely reach of the interventions among the relevant population. These characteristics imply that more-complex methods of economic evaluation are likely to be better able to capture fully the impact of the intervention on costs and benefits over the appropriate time horizon. This complexity includes wider measurement of costs and benefits, and a modeling framework that is able to capture dynamic interactions among the intervention, the population of interest, and the environment. The authors recommend that future research should develop and apply more-flexible modeling techniques to allow better prediction of the interdependency between interventions and important environmental influences. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  4. Final report on international comparison CCQM-K83: Halocarbons in dry whole air

    Science.gov (United States)

    Rhoderick, George; Guenther, Franklin; Duewer, David; Lee, Jeongsoon; Moon, Dongmin; Lee, Jinbok; Lim, Jeongsik; Seog Kim, Jin

    2014-01-01

    The growing awareness of climate change/global warming and continuing concerns regarding stratospheric ozone depletion will require future measurements and standards for many compounds, in particular halocarbons that are linked to these issues. In order to track and control the emissions of these species globally in the atmosphere, it is necessary to demonstrate measurement equivalence at the highest levels of accuracy for assigned values of standards. This report describes the results of a key comparison for several of the more important halocarbons at atmospheric concentration levels. The comparison includes the chlorofluorocarbons (CFCs) dichlorodifluoromethane (CFC 12), trichlorofluoromethane (CFC 11), and 1,1,2 trichlorotrifluoroethane (CFC 113); the hydrochlorofluorocarbons (HCFCs) chlorodifluoromethane (HCFC 22) and 1-chloro-1,1-difluoroethane (HCFC 142b); and the hydrofluorocarbon (HFC) 1,1,1,2 tetrafluoroethane (HFC 134a), all in a dried whole air sample. The objective of this key comparison is to compare the measurement capabilities of the participants for these halocarbons at trace atmospheric levels. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  5. AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Smita Paira

    2016-09-01

    Full Text Available In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.

  6. Experimental investigation of quantum key distribution with position and momentum of photon pairs

    International Nuclear Information System (INIS)

    Almeida, M.P.; Walborn, S.P.; Souto Ribeiro, P.H.

    2005-01-01

    We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol. We show that security is guaranteed by the entanglement between down-converted pairs, and can be checked by either direct comparison of Alice and Bob's measurement results or evaluation of an inequality of the sort proposed by Mancini et al. [Phys. Rev. Lett. 88, 120401 (2002)

  7. Key Management Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  8. LOCKS AND KEYS SERVICE

    CERN Multimedia

    Locks and Keys Service

    2002-01-01

    The Locks and Keys service (ST/FM) will move from building 55 to building 570 from the 2nd August to the 9th August 2002 included. During this period the service will be closed. Only in case of extreme urgency please call the 164550. Starting from Monday, 12th August, the Locks and Keys Service will continue to follow the activities related to office keys (keys and locks) and will provide the keys for furniture. The service is open from 8h30 to 12h00 and from 13h00 to 17h30. We remind you that your divisional correspondents can help you in the execution of the procedures. We thank you for your comprehension and we remain at your service to help you in solving all the matters related to keys for offices and furniture. Locks and Keys Service - ST Division - FM Group

  9. Intake of Key Chronic Disease–Related Nutrients among Baby Boomers

    Science.gov (United States)

    King, Dana E.; Xiang, Jun; Brown, Alexander

    2014-01-01

    Objectives The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease–related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease–related nutrients of the baby boomer generation with the previous generation of middle-aged adults. Methods National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988–1994) and the NHANES for 2007–2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. Results The baby boomers’ average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P generation (P baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group. PMID:24945165

  10. Intake of key chronic disease-related nutrients among baby boomers.

    Science.gov (United States)

    King, Dana E; Xiang, Jun; Brown, Alexander

    2014-06-01

    The dietary habits of baby boomers (people born between 1946 and 1964) undoubtedly will have a substantial impact on their future health; however, dietary information regarding the intake of key chronic disease-related nutrients is lacking for this generation. The objective of this study was to compare the dietary intake of key chronic disease-related nutrients of the baby boomer generation with the previous generation of middle-aged adults. National cross-sectional study comparison analyzing data from the National Health and Nutrition Examination Survey (NHANES) including NHANES III (1988-1994) and the NHANES for 2007-2010, focused on adult respondents ages 46 to 64 years who were not institutionalized at the time of each survey. The two cohorts were compared with regard to dietary intake of key nutritional components. The main outcome measures were intake of total calories, sodium, cholesterol, fat, fruits, vegetables, vitamin C, water, and fiber. The baby boomers' average daily intake of nutrients exceeded that of the previous generation of middle-aged adults for total calories (2118/1999), total fat (82/76 g), sodium (3513/3291 mg), and cholesterol (294/262 g; all P generation (P baby boomers compared with the previous generation of middle-aged adults. These findings are indicative of a diet that may contribute to increased rates of chronic disease among individuals in this age group.

  11. Comparison of strategies for model predictive control for home heating in future energy systems

    DEFF Research Database (Denmark)

    Vogler-Finck, Pierre Jacques Camille; Popovski, Petar; Wisniewski, Rafal

    2017-01-01

    Model predictive control is seen as one of the key future enabler in increasing energy efficiency in buildings. This paper presents a comparison of the performance of the control for different formulations of the objective function. This comparison is made in a simulation study on a single buildi...

  12. Performance of various quantum-key-distribution systems using 1.55-μm up-conversion single-photon detectors

    International Nuclear Information System (INIS)

    Diamanti, Eleni; Takesue, Hiroki; Honjo, Toshimori; Inoue, Kyo; Yamamoto, Yoshihisa

    2005-01-01

    We compare the performance of various quantum-key-distribution (QKD) systems using a single-photon detector, which combines frequency up-conversion in a periodically poled lithium niobate waveguide and a silicon avalanche photodiode (APD). The comparison is based on the secure communication rate as a function of distance for three QKD protocols: the Bennett-Brassard 1984, the Bennett-Brassard-Mermin 1992, and the coherent differential-phase-shift keying protocols. We show that the up-conversion detector allows for higher communication rates and longer communication distances than the commonly used InGaAs/InP APD for all three QKD protocols

  13. Angle comparison using an autocollimator

    Science.gov (United States)

    Geckeler, Ralf D.; Just, Andreas; Vasilev, Valentin; Prieto, Emilio; Dvorácek, František; Zelenika, Slobodan; Przybylska, Joanna; Duta, Alexandru; Victorov, Ilya; Pisani, Marco; Saraiva, Fernanda; Salgado, Jose-Antonio; Gao, Sitian; Anusorn, Tonmueanwai; Leng Tan, Siew; Cox, Peter; Watanabe, Tsukasa; Lewis, Andrew; Chaudhary, K. P.; Thalmann, Ruedi; Banreti, Edit; Nurul, Alfiyati; Fira, Roman; Yandayan, Tanfer; Chekirda, Konstantin; Bergmans, Rob; Lassila, Antti

    2018-01-01

    Autocollimators are versatile optical devices for the contactless measurement of the tilt angles of reflecting surfaces. An international key comparison (KC) on autocollimator calibration, EURAMET.L-K3.2009, was initiated by the European Association of National Metrology Institutes (EURAMET) to provide information on the capabilities in this field. The Physikalisch-Technische Bundesanstalt (PTB) acted as the pilot laboratory, with a total of 25 international participants from EURAMET and from the Asia Pacific Metrology Programme (APMP) providing measurements. This KC was the first one to utilise a high-resolution electronic autocollimator as a standard. In contrast to KCs in angle metrology which usually involve the full plane angle, it focused on relatively small angular ranges (+/-10 arcsec and +/-1000 arcsec) and step sizes (10 arcsec and 0.1 arcsec, respectively). This document represents the approved final report on the results of the KC. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCL, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. Key technologies book

    International Nuclear Information System (INIS)

    1997-01-01

    In this book can be found all the useful information on the French industry key technologies of the years 2000-2005. 136 technologies at the junction of the science advances and of the markets expectations are divided into 9 sectors. Among them, only 4 are interesting here: the environment, the transports, the materials and the energy. In 1995, the secretary's office of State for industry has published a first synthesis book on these key technologies. This 1997 new key technologies book extends and completes the initial study. For each key technology, an encyclopedic sheet is given. Each sheet combines thus some exact and practical information on: advance state of the technology, market characteristics, development forecasts, occupation and involved sectors, technology acquisition cost, research programs but also contacts of the main concerned efficiency poles. (O.M.)

  15. Morphological Comparison of U3O8 Ore Concentrates from Canada Key Lake and Namibia Sources

    Energy Technology Data Exchange (ETDEWEB)

    Schwartz, Daniel S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Tandon, Lav [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Martinez, Patrick Thomas [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-03-11

    Uranium ore concentrates from two different sources were examined using scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS). The ore powders are referred to as Namibia (id. no. 90036, LIMS id. no. 18775) and Canada Key Lake (id. no. 90019, LIMS id. no. 18774). Earlier work identified the ores as the U₃O₈ phase of uranium oxide using x-ray diffraction. Both sets of powders were in the form of dark brown to black powder fines. However, the Canada Key Lake concentrates contained larger chunks of material on the millimeter scale that were easily visible to the unaided eye. The powders were mounted for SEM examination by hand dispersing a small amount onto conductive sticky tape. Two types of applicators were used and compared: a fine-tipped spatula and a foam-tipped applicator. The sticky tape was on a standard SEM “tee” mount, which was tapped to remove loose contamination before being inserted into the SEM.

  16. A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks.

    Science.gov (United States)

    Yuan, Qi; Ma, Chunguang; Yu, Haitao; Bian, Xuefen

    2018-05-12

    Many key pre-distribution (KPD) schemes based on combinatorial design were proposed for secure communication of wireless sensor networks (WSNs). Due to complexity of constructing the combinatorial design, it is infeasible to generate key rings using the corresponding combinatorial design in large scale deployment of WSNs. In this paper, we present a definition of new combinatorial design, termed “µ-partially balanced incomplete block design (µ-PBIBD)”, which is a refinement of partially balanced incomplete block design (PBIBD), and then describe a 2-D construction of µ-PBIBD which is mapped to KPD in WSNs. Our approach is of simple construction which provides a strong key connectivity and a poor network resilience. To improve the network resilience of KPD based on 2-D µ-PBIBD, we propose a KPD scheme based on 3-D Ex-µ-PBIBD which is a construction of µ-PBIBD from 2-D space to 3-D space. Ex-µ-PBIBD KPD scheme improves network scalability and resilience while has better key connectivity. Theoretical analysis and comparison with the related schemes show that key pre-distribution scheme based on Ex-µ-PBIBD provides high network resilience and better key scalability, while it achieves a trade-off between network resilience and network connectivity.

  17. Public Key Cryptography.

    Science.gov (United States)

    Tapson, Frank

    1996-01-01

    Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)

  18. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  19. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    Science.gov (United States)

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  20. Financial Key Ratios

    OpenAIRE

    Tănase Alin-Eliodor

    2014-01-01

    This article focuses on computing techniques starting from trial balance data regarding financial key ratios. There are presented activity, liquidity, solvency and profitability financial key ratios. It is presented a computing methodology in three steps based on a trial balance.

  1. Emergency medical services key performance measurement in Asian cities.

    Science.gov (United States)

    Rahman, Nik Hisamuddin; Tanaka, Hideharu; Shin, Sang Do; Ng, Yih Yng; Piyasuwankul, Thammapad; Lin, Chih-Hao; Ong, Marcus Eng Hock

    2015-01-01

    One of the key principles in the recommended standards is that emergency medical service (EMS) providers should continuously monitor the quality and safety of their services. This requires service providers to implement performance monitoring using appropriate and relevant measures including key performance indicators. In Asia, EMS systems are at different developmental phases and maturity. This will create difficultly in benchmarking or assessing the quality of EMS performance across the region. An attempt was made to compare the EMS performance index based on the structure, process, and outcome analysis. The data was collected from the Pan-Asian Resuscitation Outcome Study (PAROS) data among few Asian cities, namely, Tokyo, Osaka, Singapore, Bangkok, Kuala Lumpur, Taipei, and Seoul. The parameters of inclusions were broadly divided into structure, process, and outcome measurements. The data was collected by the site investigators from each city and keyed into the electronic web-based data form which is secured strictly by username and passwords. Generally, there seems to be a more uniformity for EMS performance parameters among the more developed EMS systems. The major problem with the EMS agencies in the cities of developing countries like Bangkok and Kuala Lumpur is inadequate or unavailable data pertaining to EMS performance. There is non-uniformity in the EMS performance measurement across the Asian cities. This creates difficulty for EMS performance index comparison and benchmarking. Hopefully, in the future, collaborative efforts such as the PAROS networking group will further enhance the standardization in EMS performance reporting across the region.

  2. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  3. DEVELOPMENT AND APPLICATION OF THE KEY TECHNOLOGIES FOR THE QUALITY CONTROL AND INSPECTION OF NATIONAL GEOGRAPHICAL CONDITIONS SURVEY PRODUCTS

    Directory of Open Access Journals (Sweden)

    Y. Zhao

    2018-04-01

    Full Text Available The First National Geographical Condition Survey is a predecessor task to dynamically master basic situations of the nature, ecology and human activities on the earth’s surface and it is the brand-new mapping geographic information engineering. In order to ensure comprehensive, real and accurate survey results and achieve the quality management target which the qualified rate is 100 % and the yield is more than 80 %, it is necessary to carry out the quality control and result inspection for national geographical conditions survey on a national scale. To ensure that achievement quality meets quality target requirements, this paper develops the key technology method of “five-in-one” quality control that is constituted by “quality control system of national geographical condition survey, quality inspection technology system, quality evaluation system, quality inspection information management system and national linked quality control institutions” by aiming at large scale, wide coverage range, more undertaking units, more management levels, technical updating, more production process and obvious regional differences in the national geographical condition survey and combining with novel achievement manifestation, complicated dependency, more special reference data, and large data size. This project fully considering the domestic and foreign related research results and production practice experience, combined with the technology development and the needs of the production, it stipulates the inspection methods and technical requirements of each stage in the quality inspection of the geographical condition survey results, and extends the traditional inspection and acceptance technology, and solves the key technologies that are badly needed in the first national geographic survey.

  4. Development and Application of the Key Technologies for the Quality Control and Inspection of National Geographical Conditions Survey Products

    Science.gov (United States)

    Zhao, Y.; Zhang, L.; Ma, W.; Zhang, P.; Zhao, T.

    2018-04-01

    The First National Geographical Condition Survey is a predecessor task to dynamically master basic situations of the nature, ecology and human activities on the earth's surface and it is the brand-new mapping geographic information engineering. In order to ensure comprehensive, real and accurate survey results and achieve the quality management target which the qualified rate is 100 % and the yield is more than 80 %, it is necessary to carry out the quality control and result inspection for national geographical conditions survey on a national scale. To ensure that achievement quality meets quality target requirements, this paper develops the key technology method of "five-in-one" quality control that is constituted by "quality control system of national geographical condition survey, quality inspection technology system, quality evaluation system, quality inspection information management system and national linked quality control institutions" by aiming at large scale, wide coverage range, more undertaking units, more management levels, technical updating, more production process and obvious regional differences in the national geographical condition survey and combining with novel achievement manifestation, complicated dependency, more special reference data, and large data size. This project fully considering the domestic and foreign related research results and production practice experience, combined with the technology development and the needs of the production, it stipulates the inspection methods and technical requirements of each stage in the quality inspection of the geographical condition survey results, and extends the traditional inspection and acceptance technology, and solves the key technologies that are badly needed in the first national geographic survey.

  5. Nonmarket economic user values of the Florida Keys/Key West

    Science.gov (United States)

    Vernon R. Leeworthy; J. Michael Bowker

    1997-01-01

    This report provides estimates of the nonmarket economic user values for recreating visitors to the Florida Keys/Key West that participated in natural resource-based activities. Results from estimated travel cost models are presented, including visitor’s responses to prices and estimated per person-trip user values. Annual user values are also calculated and presented...

  6. 75 FR 17463 - Key West Bank, Key West, Florida; Notice of Appointment of Receiver

    Science.gov (United States)

    2010-04-06

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Key West Bank, Key West, Florida; Notice... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Key West Bank, Key West, Florida, (OTS No...

  7. Fundamental study on the size and inter-key spacing of numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1996-12-01

    The purpose of this study was to reveal the optimum size and inter-key spacing of numeric square keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) volunteered as subjects for this experiment. Each subject took part in data entry tasks using numeric square keys of touch devices. The sizes of keys were 6, 12, 21, 30 and 39 mm and each the inter-key spacing was 0, 3, 6, 12 and 21 mm. Response times with key sizes of 6 and 12 mm were significantly slower than with key sizes of 21 and 30 mm (p touch screens should be more than 21 mm and optimum inter-key spacing should be from 3 to 6 mm. Optimum key size, however, must be selected with regard to the limitation of screen size.

  8. The Level of Anxiety and Depression in Dialysis Patients Undertaking Regular Physical Exercise Training--a Preliminary Study.

    Science.gov (United States)

    Dziubek, Wioletta; Kowalska, Joanna; Kusztal, Mariusz; Rogowski, Łukasz; Gołębiowski, Tomasz; Nikifur, Małgorzata; Szczepańska-Gieracha, Joanna; Zembroń-Łacny, Agnieszka; Klinger, Marian; Woźniewski, Marek

    2016-01-01

    The aim of the study was to evaluate the effects of a six-month physical training undertaken by haemodialysis (HD) patients, on the depression and anxiety. Patients with end stage renal disease (ESRD) were recruited from the dialysis station at the Department of Nephrology and Transplantation Medicine in Wroclaw. Physical training took place at the beginning of the first 4-hours of dialysis, three times a week for six months. A personal questionnaire, Beck Depression Inventory (BDI) and State-Trait Anxiety Inventory (STAI) were used in the study. A total of 28 patients completed the study: 20 were randomised to endurance training and 8 were randomised to resistance training. Statistical analysis of depression and anxiety at the initial (t1) and final examination (t2) indicated a significant reduction in depression and anxiety, particularly anxiety as a trait (X2) in the whole study group. The change in anxiety as a state correlated with the disease duration, duration of dialysis and the initial level of anxiety as a state (t1X1). The change in anxiety as a trait significantly correlated with age and the initial level of anxiety (t1X2). Undertaking physical training during dialysis by patients with ESRD is beneficial in reducing their levels of anxiety and depression. Both resistance and endurance training improves mood, but only endurance training additionally results in anxiety reduction. © 2016 S. Karger AG, Basel.

  9. The Level of Anxiety and Depression in Dialysis Patients Undertaking Regular Physical Exercise Training - a Preliminary Study

    Directory of Open Access Journals (Sweden)

    Wioletta Dziubek

    2016-02-01

    Full Text Available Background/Aims: The aim of the study was to evaluate the effects of a six-month physical training undertaken by haemodialysis (HD patients, on the depression and anxiety. Methods: Patients with end stage renal disease (ESRD were recruited from the dialysis station at the Department of Nephrology and Transplantation Medicine in Wroclaw. Physical training took place at the beginning of the first 4-hours of dialysis, three times a week for six months. A personal questionnaire, Beck Depression Inventory (BDI and State-Trait Anxiety Inventory (STAI were used in the study. Results: A total of 28 patients completed the study: 20 were randomised to endurance training and 8 were randomised to resistance training. Statistical analysis of depression and anxiety at the initial (t1 and final examination (t2 indicated a significant reduction in depression and anxiety, particularly anxiety as a trait (X2 in the whole study group. The change in anxiety as a state correlated with the disease duration, duration of dialysis and the initial level of anxiety as a state (t1X1. The change in anxiety as a trait significantly correlated with age and the initial level of anxiety (t1X2. Conclusions: Undertaking physical training during dialysis by patients with ESRD is beneficial in reducing their levels of anxiety and depression. Both resistance and endurance training improves mood, but only endurance training additionally results in anxiety reduction.

  10. A New Quantum Key Distribution Scheme Based on Frequency and Time Coding

    International Nuclear Information System (INIS)

    Chang-Hua, Zhu; Chang-Xing, Pei; Dong-Xiao, Quan; Jing-Liang, Gao; Nan, Chen; Yun-Hui, Yi

    2010-01-01

    A new scheme of quantum key distribution (QKD) using frequency and time coding is proposed, in which the security is based on the frequency-time uncertainty relation. In this scheme, the binary information sequence is encoded randomly on either the central frequency or the time delay of the optical pulse at the sender. The central frequency of the single photon pulse is set as ω 1 for bit 0 and set as ω 2 for bit 1 when frequency coding is selected. However, the single photon pulse is not delayed for bit 0 and is delayed in τ for 1 when time coding is selected. At the receiver, either the frequency or the time delay of the pulse is measured randomly, and the final key is obtained after basis comparison, data reconciliation and privacy amplification. With the proposed method, the effect of the noise in the fiber channel and environment on the QKD system can be reduced effectively

  11. JET Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.; Kupschus, P.

    1984-09-01

    The report is in sections, as follows. (1) Introduction and summary. (2) A brief description of the origins of the JET Project within the EURATOM fusion programme and the objectives and aims of the device. The basic JET design and the overall philosophy of operation are explained and the first six months of operation of the machine are summarised. The Project Team Structure adopted for the Operation Phase is set out. Finally, in order to set JET's progress in context, other large tokamaks throughout the world and their achievements are briefly described. (3) The activities and progress within the Operation and Development Department are set out; particularly relating to its responsibilities for the operation and maintenance of the tokamak and for developing the necessary engineering equipment to enhance the machine to full performance. (4) The activities and progress within the Scientific Department are described; particularly relating to the specification, procurement and operation of diagnostic equipment; definition and execution of the programme; and the interpretation of experimental results. (5) JET's programme plans for the immediate future and a broad outline of the JET Development Plan to 1990 are given. (author)

  12. JET joint undertaking

    International Nuclear Information System (INIS)

    1984-06-01

    JET began operations on 25 June 1983. This annual report contains administrative information and a general review of scientific and technical developments. Among them are vacuum systems, toroidal and poloidal field systems, power supplies, neutral beam heating, radiofrequency heating, remote handling, tritium handling, control and data acquisition systems and diagnostic systems

  13. JET Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.

    1986-03-01

    This is an overview summary of the scientific and technical advances at JET during the year 1985, supplemented by appendices of detailed contributions (in preprint form) of eight of the more important JET articles produced during that year. It is aimed not only at specialists and experts but also at a more general scientific community. Thus there is a brief summary of the background to the project, a description of the basic objectives of JET and the principle design features of the machine. The new structure of the Project Team is also explained. Developments and future plans are included. Improvements considered are those which are designed to overcome certain limitations encountered generally on Tokamaks, particularly those concerned with density limits, with plasma MHD behaviour, with impurities and with plasma transport. There is also a complete list of articles, reports and conference papers published in 1985 - there are 167 such items listed. (UK)

  14. JET Joint Undertaking

    International Nuclear Information System (INIS)

    Keen, B.E.

    1988-03-01

    The paper is a JET progress report 1987, and covers the fourth full year of JET's operation. The report contains an overview summary of the scientific and technical advances during the year, and is supplemented by appendices of detailed contributions of the more important JET articles published during 1987. The document is aimed at specialists and experts engaged in nuclear fusion and plasma physics, as well as the general scientific community. (U.K.)

  15. The Impact of The Intellectual Charm of Physicians on the Healthcare Organizations

    Directory of Open Access Journals (Sweden)

    Marulc Elena

    2013-01-01

    Full Text Available The recession has greatly affected the business operations of every undertaking, including healthcare organizations. Change is required. This also concerns the relationship towards employees in terms of their influence on the successful business operations of an organization. Among employees, physicians possess a special, now already traditional status; therefore, their influence needs to be taken advantage of. In the empiric part of the study, we have identified twelve key physician competencies, based on the rankings of physicians, which, in their mind, influence successful business operations of their respective healthcare organizations during an economic recession. The comparison of the collected results to the findings on intellectual charm of managers has indicated that the collected key competencies, that are creativity, quality, education and personal development, attitude towards others, team work and cooperation, communication skills, problem management, business integrity, motivation and stimulation, multidisciplinary thinking, attitude towards culture and ethics, and acceptance of differences, form a whole which is named the intellectual charm of physicians.

  16. Three state quantum key distribution for small keys

    International Nuclear Information System (INIS)

    Batuwantudawe, J.; Boileau, J.-C.

    2005-01-01

    Full text: Quantum key distribution (QKD) protocols allow two parties, Alice and Bob, to establish secure keys. The most well-known protocol is BB84, using four distinct states. Recently, Phoenix et al. proposed a three state protocol. We explain the protocol and discuss its security proof. The three state protocol also has an interesting structure that allows for errors estimation from the inconclusive results (i.e.. where Alice and Bob choose different bases). This eliminates the need for sampling, potentially useful when qubits are limited. We discuss the effectiveness of this approach compared to BB84 for the case where a good error estimate is required. (author)

  17. Enabling interspecies epigenomic comparison with CEpBrowser.

    Science.gov (United States)

    Cao, Xiaoyi; Zhong, Sheng

    2013-05-01

    We developed the Comparative Epigenome Browser (CEpBrowser) to allow the public to perform multi-species epigenomic analysis. The web-based CEpBrowser integrates, manages and visualizes sequencing-based epigenomic datasets. Five key features were developed to maximize the efficiency of interspecies epigenomic comparisons. CEpBrowser is a web application implemented with PHP, MySQL, C and Apache. URL: http://www.cepbrowser.org/.

  18. Energy use and carbon dioxide emissions in the steel sector in key developing countries

    Energy Technology Data Exchange (ETDEWEB)

    Price, L.K.; Phylipsen, G.J.M.; Worrell, E.

    2001-04-01

    Iron and steel production consumes enormous quantities of energy, especially in developing countries where outdated, inefficient technologies are still used to produce iron and steel. Carbon dioxide emissions from steel production, which range between 5 and 15% of total country emissions in key developing countries (Brazil, China, India, Mexico, and South Africa), will continue to grow as these countries develop and as demand for steel products such as materials, automobiles, and appliances increases. In this report, we describe the key steel processes, discuss typical energy-intensity values for these processes, review historical trends in iron and steel production by process in five key developing countries, describe the steel industry in each of the five key developing countries, present international comparisons of energy use and carbon dioxide emissions among these countries, and provide our assessment of the technical potential to reduce these emissions based on best-practice benchmarking. Using a best practice benchmark, we find that significant savings, in the range of 33% to 49% of total primary energy used to produce steel, are technically possible in these countries. Similarly, we find that the technical potential for reducing intensities of carbon dioxide emissions ranges between 26% and 49% of total carbon dioxide emissions from steel production in these countries.

  19. Life cycle assessment in green chemistry: overview of key parameters and methodological concerns

    DEFF Research Database (Denmark)

    Tufvesson, Linda M.; Tufvesson, Pär; Woodley, John

    2013-01-01

    assessment (LCA) is a valuable methodology. However, on the planning stage, a full-scale LCA is considered to be too time consuming and complicated. Two reasons for this have been recognised, the method is too comprehensive and it is hard to find inventory data. In this review, key parameters are presented...... with the purpose to reduce the time-consuming steps in LCA.In this review, several LCAs of so-called ‘green chemicals’ are analysed and key parameters and methodological concerns are identified. Further, some conclusions on the environmental performance of chemicals were drawn.For fossil-based platform chemicals...... chemicals was identified. The environmental performance of bulk chemicals are closely connected to the production of the raw material and thereby different land use aspects. Here, a lot can be learnt from biofuel LCAs. In many of the reviewed articles focusing on bulk chemicals a comparison regarding fossil...

  20. Comparison of Modeling and Simulation Results Management Microclimate of the Greenhouse by Fuzzy Logic Between a Wetland and Arid Region

    Directory of Open Access Journals (Sweden)

    Didi Faouzi

    2016-05-01

    Full Text Available Currently the climate computer offers many benefits and solves problems related to the regulation, monitoring and controls. Greenhouse growers remain vigilant and attentive, facing this technological development. They ensure competitiveness and optimize their investments / production cost which continues to grow. The application of artificial intelligence in the industry known for considerable growth, which is not the case in the field of agricultural greenhouses, where enforcement remains timid. It is from this fact, we undertake research work in this area and conduct a simulation based on meteorological data through MATLAB Simulink to finally analyze the thermal behavior -greenhouse microclimate energy. In this paper, we present comparison of modelling and simulation management of the greenhouse microclimate by fuzzy logic between a wetland (Dar El Beida Algeria and the other arid (Biskra Algeria.

  1. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    Directory of Open Access Journals (Sweden)

    Tsung-Hung Lin

    2017-12-01

    Full Text Available The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA. PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  2. Quantum dense key distribution

    International Nuclear Information System (INIS)

    Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.; Rastello, M.L.; Bovino, F.A.; Colla, A.M.; Castagnoli, G.

    2004-01-01

    This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility

  3. A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing

    International Nuclear Information System (INIS)

    Walenta, N; Gisin, N; Guinnard, O; Houlmann, R; Korzh, B; Lim, C W; Lunghi, T; Portmann, C; Thew, R T; Burg, A; Constantin, J; Caselunghe, D; Kulesza, N; Legré, M; Monat, L; Soucarros, M; Trinkler, P; Junod, P; Trolliet, G; Vannel, F

    2014-01-01

    We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-key-size effects, authentication costs and system errors for a security parameter of ε QKD  = 4 × 10 −9 . (paper)

  4. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  5. User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela Dinca

    2017-02-01

    Full Text Available Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructure. One biometric characteristic can be easily spoofed, so it was believed that multi-modal biometrics would offer more security, because spoofing two or more biometrics would be very hard. This notion, of increased security of multi-modal biometric systems, was disproved for authentication and matching, studies showing that not only multi-modal biometric systems are not more secure, but they introduce additional vulnerabilities. This paper is a study on the implications of spoofing biometric data for retrieving the derived key. We demonstrate that spoofed biometrics can yield the same key, which in turn will lead an attacker to obtain the private key. A practical implementation is proposed using fingerprint and iris as biometrics and the fuzzy extractor for biometric key extraction. Our experiments show what happens when the biometric data is spoofed for both uni-modal systems and multi-modal. In case of multi-modal system tests were performed when spoofing one biometric or both. We provide detailed analysis of every scenario in regard to successful tests and overall key entropy. Our paper defines a biometric PKI scenario and an in depth security analysis for it. The analysis can be viewed as a blueprint for implementations of future similar systems, because it highlights the main security vulnerabilities for bioPKI. The analysis is not constrained to the biometric part of the system, but covers CA security, sensor security, communication interception, RSA encryption vulnerabilities regarding key entropy, and much more.

  6. Identifying tier one key suppliers.

    Science.gov (United States)

    Wicks, Steve

    2013-01-01

    In today's global marketplace, businesses are becoming increasingly reliant on suppliers for the provision of key processes, activities, products and services in support of their strategic business goals. The result is that now, more than ever, the failure of a key supplier has potential to damage reputation, productivity, compliance and financial performance seriously. Yet despite this, there is no recognised standard or guidance for identifying a tier one key supplier base and, up to now, there has been little or no research on how to do so effectively. This paper outlines the key findings of a BCI-sponsored research project to investigate good practice in identifying tier one key suppliers, and suggests a scalable framework process model and risk matrix tool to help businesses effectively identify their tier one key supplier base.

  7. Comparison of measurement standards of the acoustic pressure in air in the low frequency range: COOMET.AUV.A-K2

    Science.gov (United States)

    Chalyy, V.

    2011-01-01

    A bilateral regional comparison of national microphone standards from 2 Hz to 250 Hz was carried out between the DP NDI 'Systema' (Ukraine) and the VNIIFTRI (Russia) from July to September 2009. The comparison, COOMET.AUV.A-K2, was based on the pressure calibration of laboratory standard microphones type LSIP. The comparison results have been linked to the established key comparison reference value (KCRV) of CCAUV.A-K2. The degrees of equivalence, expressed as the deviation from the established KCRV and its expanded uncertainty (k = 2), have been determined, and the comparison result is in agreement with the KCRV within the estimated uncertainties at all employed frequencies. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCAUV, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  8. ECTA/DaSy Framework Self-Assessment Comparison Tool

    Science.gov (United States)

    Center for IDEA Early Childhood Data Systems (DaSy), 2016

    2016-01-01

    The Self-Assessment Comparison (SAC) Tool is for state Part C and Section 619/Preschool programs to use to assess changes in the implementation of one or more components of the ECTA System Framework and/or subcomponenets of the DaSy Data System Framework. It is a companion to the ECTA/DaSy Framework Self-Assessment. Key features of the SAC are…

  9. Identification of the Key Fields and Their Key Technical Points of Oncology by Patent Analysis.

    Science.gov (United States)

    Zhang, Ting; Chen, Juan; Jia, Xiaofeng

    2015-01-01

    This paper aims to identify the key fields and their key technical points of oncology by patent analysis. Patents of oncology applied from 2006 to 2012 were searched in the Thomson Innovation database. The key fields and their key technical points were determined by analyzing the Derwent Classification (DC) and the International Patent Classification (IPC), respectively. Patent applications in the top ten DC occupied 80% of all the patent applications of oncology, which were the ten fields of oncology to be analyzed. The number of patent applications in these ten fields of oncology was standardized based on patent applications of oncology from 2006 to 2012. For each field, standardization was conducted separately for each of the seven years (2006-2012) and the mean of the seven standardized values was calculated to reflect the relative amount of patent applications in that field; meanwhile, regression analysis using time (year) and the standardized values of patent applications in seven years (2006-2012) was conducted so as to evaluate the trend of patent applications in each field. Two-dimensional quadrant analysis, together with the professional knowledge of oncology, was taken into consideration in determining the key fields of oncology. The fields located in the quadrant with high relative amount or increasing trend of patent applications are identified as key ones. By using the same method, the key technical points in each key field were identified. Altogether 116,820 patents of oncology applied from 2006 to 2012 were retrieved, and four key fields with twenty-nine key technical points were identified, including "natural products and polymers" with nine key technical points, "fermentation industry" with twelve ones, "electrical medical equipment" with four ones, and "diagnosis, surgery" with four ones. The results of this study could provide guidance on the development direction of oncology, and also help researchers broaden innovative ideas and discover new

  10. Public Key Infrastructure Study

    National Research Council Canada - National Science Library

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  11. Comparison of two culture media for breaking seed dormancy and ...

    African Journals Online (AJOL)

    ... the percentage germination and days to germination in each of the four species were higher and faster in water with agar medium in comparison to MS growth medium. These results suggest that the Linum seeds have exogenous and endogenous dormancy. Key words: Dormancy, germination, MS media, Linum species, ...

  12. Key Performance Indicators in the Evaluation of the Quality of Radiation Safety Programs.

    Science.gov (United States)

    Schultz, Cheryl Culver; Shaffer, Sheila; Fink-Bennett, Darlene; Winokur, Kay

    2016-08-01

    Beaumont is a multiple hospital health care system with a centralized radiation safety department. The health system operates under a broad scope Nuclear Regulatory Commission license but also maintains several other limited use NRC licenses in off-site facilities and clinics. The hospital-based program is expansive including diagnostic radiology and nuclear medicine (molecular imaging), interventional radiology, a comprehensive cardiovascular program, multiple forms of radiation therapy (low dose rate brachytherapy, high dose rate brachytherapy, external beam radiotherapy, and gamma knife), and the Research Institute (including basic bench top, human and animal). Each year, in the annual report, data is analyzed and then tracked and trended. While any summary report will, by nature, include items such as the number of pieces of equipment, inspections performed, staff monitored and educated and other similar parameters, not all include an objective review of the quality and effectiveness of the program. Through objective numerical data Beaumont adopted seven key performance indicators. The assertion made is that key performance indicators can be used to establish benchmarks for evaluation and comparison of the effectiveness and quality of radiation safety programs. Based on over a decade of data collection, and adoption of key performance indicators, this paper demonstrates one way to establish objective benchmarking for radiation safety programs in the health care environment.

  13. Key figures. Year 2006; Chiffres cles. Annee 2006

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2006. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  14. Key figures. Year 2005; Chiffres cles. Annee 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document summarizes in a series of tables the key data of the petroleum industry and of the other energies for the year 2005. Data of the two previous years are given for comparison: 1 - petroleum, France: exploration, reserves, production, transports (tankers, pipelines, crude and refined products), storage capacities, status of resources and uses, foreign trade (imports, prices, exports), refining (capacities, facilities), evolution of supplies, automotive fuels consumption; 2 - energies, France: production, consumption and trade data for coal, natural gas, electricity; total production and consumption of primary energy; consumption per sector of use; 3 - petroleum, world: crude production and reserves per geographical area, OPEC production, imports/exports and refining/consumption per geographical area, international quotation for crudes and refined products; 4 - energies, world: reserves, production and consumption data for coal, natural gas and electricity; uranium production and resources; total primary energy production and consumption per energy source and geographical area. (J.S.)

  15. A Philosophical Comparison of the Educational Thoughts of ...

    African Journals Online (AJOL)

    Nigerian educational thinkers, with a view to undertaking a comparative appraisal ... Holding that the human person is a social being by nature, Awolowo ... achieving the political aims of individual well-being through the application of the principles ..... Solarin recommends an activity-based and learner-centered approach.

  16. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  17. How to identify the key factors that affect driver perception of accident risk. A comparison between Italian and Spanish driver behavior.

    Science.gov (United States)

    de Oña, Juan; de Oña, Rocio; Eboli, Laura; Forciniti, Carmen; Mazzulla, Gabriella

    2014-12-01

    Road crashes can be caused by different factors, including infrastructure, vehicles, and human variables. Many research studies have focused solely on identifying the key factors that cause road crashes. From these studies, it emerged that human factors have the most relevant impact on accident severity. More specifically, accident severity depends on several factors related directly to the driver, i.e., driving experience, driver's socio-economic characteristics, and driving behavior and attitudes. In this paper, we investigate driver behaviors and attitudes while driving and specifically focus on different methods for identifying the factors that most affect the driver's perception of accident risk. To this end, we designed and conducted a survey in two different European contexts: the city of Cosenza, which is located in the south of Italy, and the city of Granada, which is located in the south of Spain. Samples of drivers were contacted for their opinions on certain aspects of driving rules and attitudes while driving, and different types of questions were addressed to the drivers to assess their judgments of these aspects. Consequently, different methods of data analysis were applied to determine the aspects that heavily influence driver perception of accident risk. An experiment based on the stated preferences (SP) was carried out with the drivers, and the SP data were analyzed using an ordered probit (OP) model. Interesting findings emerged from different analyses of the data and from the comparisons among the data collected in the two different territorial contexts. We found that both Italian and Spanish drivers consider driving in an altered psychophysical state and violating the overtaking rules to be the most risky behaviors. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Director's Report on the Activity and Management of the International Bureau of Weights and Measures (BIPM) - (1 January 2013 - 31 December 2013) - Supplement: Ionizing Radiation Department

    International Nuclear Information System (INIS)

    Milton, M.; Los Arcos, J.M.; Burns, D.T.; Kessler, C.; Picard, S.; Roger, P.; Courte, S.; Michotte, C.; Nonis, M.; Ratel, G.

    2014-03-01

    This BIPM Director's Report describes the activity of the BIPM. In order to carry out its mission of ensuring and promoting the global comparability of measurements, the BIPM operates laboratories in the fields of mass, time, electricity, ionizing radiation and chemistry. All of the laboratory work addresses one or more of the agreed objectives for the BIPM, which are: - To establish and maintain appropriate reference standards for use as the basis of a limited number of key international comparisons at the highest level. - To coordinate international comparisons of national measurement standards through the Consultative Committees of the CIPM; taking the role of coordinating laboratory for selected comparisons of the highest priority and undertaking the scientific work necessary to enable this to be done. - To provide selected calibrations for Member States. In this document some highlights of the work carried out during 2013 are presented. Extended reports of the work of each department are available at http://www.bipm.org/en/publications/directors_report/. This document comprises the Director's report with its supplement describing the work of the Ionizing Radiation Department (X- and γ-rays, Radionuclides, Thermometry)

  19. Secret key rates in quantum key distribution using Renyi entropies

    Energy Technology Data Exchange (ETDEWEB)

    Abruzzo, Silvestre; Kampermann, Hermann; Mertz, Markus; Bratzik, Sylvia; Bruss, Dagmar [Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf (Germany)

    2010-07-01

    The secret key rate r of a quantum key distribution protocol depends on the involved number of signals and the accepted ''failure probability''. We reconsider a method to calculate r focusing on the analysis of the privacy amplification given by R. Renner and R. Koenig (2005). This approach involves an optimization problem with an objective function depending on the Renyi entropy of the density operator describing the classical outcomes and the eavesdropper system. This problem is analyzed for a generic class of QKD protocols and the current research status is presented.

  20. Key Issues in Global Technological Innovation Projects

    Directory of Open Access Journals (Sweden)

    Roberto Sbragia

    2012-04-01

    Full Text Available This article aimed to identify those issues that were present in global technological innovation projects carried out by Brazilian multinational companies and which performance criterions these undertakings met. We investigated 36 global technological innovation projects from Brazilian multinational enterprises through a web-survey. Findings show that these companies went beyond the traditional iron triangle to evaluate their technological efforts and considered additional performance dimensions such as customer satisfaction, business results, and preparation for the future. Results also show high degree of presence for issues emerging from the industry, moderate degree of presence for issues emerging from both the project and R&D activities, and low degree of presence for issues emerging from the headquarters, the subsidiaries, and the external environment. Further research is needed to find out if and how these issues influenced the performance of the global technological innovation projects studied.DOI:10.5585/gep.v3i1.72

  1. Improved Anonymity for Key-trees

    NARCIS (Netherlands)

    Veugen, P.J.M.; Beye, M.

    2013-01-01

    Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags.

  2. Smooth Phase Interpolated Keying

    Science.gov (United States)

    Borah, Deva K.

    2007-01-01

    Smooth phase interpolated keying (SPIK) is an improved method of computing smooth phase-modulation waveforms for radio communication systems that convey digital information. SPIK is applicable to a variety of phase-shift-keying (PSK) modulation schemes, including quaternary PSK (QPSK), octonary PSK (8PSK), and 16PSK. In comparison with a related prior method, SPIK offers advantages of better performance and less complexity of implementation. In a PSK scheme, the underlying information waveform that one seeks to convey consists of discrete rectangular steps, but the spectral width of such a waveform is excessive for practical radio communication. Therefore, the problem is to smooth the step phase waveform in such a manner as to maintain power and bandwidth efficiency without incurring an unacceptably large error rate and without introducing undesired variations in the amplitude of the affected radio signal. Although the ideal constellation of PSK phasor points does not cause amplitude variations, filtering of the modulation waveform (in which, typically, a rectangular pulse is converted to a square-root raised cosine pulse) causes amplitude fluctuations. If a power-efficient nonlinear amplifier is used in the radio communication system, the fluctuating-amplitude signal can undergo significant spectral regrowth, thus compromising the bandwidth efficiency of the system. In the related prior method, one seeks to solve the problem in a procedure that comprises two major steps: phase-value generation and phase interpolation. SPIK follows the two-step approach of the related prior method, but the details of the steps are different. In the phase-value-generation step, the phase values of symbols in the PSK constellation are determined by a phase function that is said to be maximally smooth and that is chosen to minimize the spectral spread of the modulated signal. In this step, the constellation is divided into two groups by assigning, to information symbols, phase values

  3. Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B.

    2016-03-01

    As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.

  4. Activity measurements of the radionuclide {sup 111}In for the LNE-LNHB, France in the ongoing comparison BIPM.RI(II)-K1.In-111

    Energy Technology Data Exchange (ETDEWEB)

    Michotte, C.; Ratel, G.; Courte, S. [Bureau International des Poids et Mesures (BIPM), Pavillon de Breteuil, 92 - Sevres (France); Verdeau, E.; Amiot, M.N. [Laboratoire national de metrologie et d' essais-Laboratoire National Henri Becquerel (LNE-LNHB), 91 - Gif-sur-Yvette (France)

    2010-10-15

    In 2006, the Laboratoire national de metrologie et d'essais - Laboratoire national Henri Becquerel (LNE-LNHB) submitted a sample of known activity of {sup 111}In to the International Reference System (SIR). The value of the activity submitted was about 14 MBq. This provides a new result for France in the matrix of degrees of equivalence in the key comparison database that enables them to maintain their degrees of equivalence for this radionuclide. The key comparison reference value has been re-evaluated and the comparison, identifier BIPM.RI(II)-K1.In-111, now contains five valid results. (authors)

  5. The emotional importance of key: do Beatles songs written in different keys convey different emotional tones?

    Science.gov (United States)

    Whissel, R; Whissel, C

    2000-12-01

    Lyrics from 155 songs written by the Lennon-McCartney team were scored using the Dictionary of Affect in Language. Resultant scores (pleasantness, activation, and imagery of words) were compared across key signatures using one way analyses of variance. Words from songs written in minor keys were less pleasant and less active than those from songs written in major keys. Words from songs written in the key of F scored extremely low on all three measures. Lyrics from the keys of C, D, and G were relatively active in tone. Results from Dictionary scoring were compared with assignments of character to keys made more than one century ago and with current musicians' opinions.

  6. Activity measurements of the radionuclide {sup 57}Co for the NMIJ, Japan and the LNE-LNHB, France in the ongoing comparison BIPM.RI(II)-K1.Co-57

    Energy Technology Data Exchange (ETDEWEB)

    Michotte, C.; Ratel, G.; Courte, S. [Bureau International des Poids et Mesures (BIPM), 92 - Sevres (France); Hino, Y.; Yunoki, A. [National Metrology Institute of Japan (NMIJ), National Institute of Advanced Industrial Science and Technology (AIST), Tsukuba, Ibaraki (Japan); Bobin, C.; Moune, M. [CEA Saclay, Laboratoire National de Metrologie et d' Essais, Laboratoire National Henri Becquerel (LNE-LNHB), 91 - Gif-sur-Yvette (France)

    2009-04-15

    In 2006 and 2007, the National Metrology Institute of Japan (NMIJ) and the Laboratoire national de metrologie et d'essais-Laboratoire national Henri Becquerel (LNE-LNHB) submitted samples of known activity of {sup 57}Co to the International Reference System (SIR). The values of the activity submitted were about 1.7 MBq and 3.7 MBq respectively. The new key comparison results have replaced the previous results for Japan and France. These new results have enabled a re-evaluation of the key comparison reference value. The matrix of degrees of equivalence in the key comparison database that now contains twelve results, identifier BIPM.RI(II)-K1.Co-57, has been updated with the new results. (authors)

  7. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD).

    Science.gov (United States)

    Cao, Yuan; Zhao, Yongli; Colman-Meixner, Carlos; Yu, Xiaosong; Zhang, Jie

    2017-10-30

    Software-defined optical networking (SDON) will become the next generation optical network architecture. However, the optical layer and control layer of SDON are vulnerable to cyberattacks. While, data encryption is an effective method to minimize the negative effects of cyberattacks, secure key interchange is its major challenge which can be addressed by the quantum key distribution (QKD) technique. Hence, in this paper we discuss the integration of QKD with WDM optical networks to secure the SDON architecture by introducing a novel key on demand (KoD) scheme which is enabled by a novel routing, wavelength and key assignment (RWKA) algorithm. The QKD over SDON with KoD model follows two steps to provide security: i) quantum key pools (QKPs) construction for securing the control channels (CChs) and data channels (DChs); ii) the KoD scheme uses RWKA algorithm to allocate and update secret keys for different security requirements. To test our model, we define a security probability index which measures the security gain in CChs and DChs. Simulation results indicate that the security performance of CChs and DChs can be enhanced by provisioning sufficient secret keys in QKPs and performing key-updating considering potential cyberattacks. Also, KoD is beneficial to achieve a positive balance between security requirements and key resource usage.

  8. Is the Green Key standard the golden key for sustainability measurement in the hospitality sector?

    NARCIS (Netherlands)

    Rietbergen, M.G.; Van Rheede, A.

    2014-01-01

    The Green Key is an eco-rating program that aims at promoting sustainable business practices in the hospitality sector. The Green Key assesses amongst others the sustainable management of energy, water and waste within hotels and other hospitality firms. The Green Key standard awards points if

  9. Update of the BIPM.RI(II)-K1.Rn-222 comparison of activity measurements for the radionuclide {sup 222}Rn to include the LNE-LNHB, France

    Energy Technology Data Exchange (ETDEWEB)

    Michotte, C.; Ratel, G. [Bureau International de Poids et Mesures, Pavillon de Breteuil, F-92312 Sevres cedex (France); Cassette, P. [Bureau International de Poids et Mesures, Pavillon de Breteuil, F-92312 Sevres cedex (France); Laboratoire national de metrologie et d' essais -Laboratoire national Henri Becquerel, 91191 Gif-sur-Yvette cedex (France)

    2012-02-15

    In 2007, the Laboratoire national de metrologie et d'essais - Laboratoire national Henri Becquerel (LNE-LNHB), France submitted a sample of known activity of {sup 222}Rn to the International Reference System (SIR) for comparison. The value of the activity submitted was about 90 kBq. This key comparison result joins that of Switzerland and Germany in the key comparison database that now contains three results, identifier BIPM.RI(II)-K1.Rn-222. Consequently, the KCRV has been updated and the degrees of equivalence with the KCRV have been evaluated. (authors)

  10. SUPPLEMENTARY COMPARISON Bilateral comparison on the calibrations of hydrometers for liquid density between INRIM-Italy and INMETRO-Brazil: SIM.M.D-S2

    Science.gov (United States)

    Lorefice, Salvatore; Malta, Dalni; Julio Pinheiro, José; Marteleto, Paulo Roberto

    2010-01-01

    The results of the SIM.M.D-S2 bilateral comparison between INRIM-Italy and INMETRO-Brazil are summarized in this report. The aims of this comparison were to check the stated uncertainty levels and the degrees of equivalence between the two institutes on the calibration of hydrometers for liquid density in the range of 800 kg m-3 to 1000 kg m-3 at 20 ºC, by means of two transfer standards of excellent metrological characteristics. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by SIM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  11. Key-Phenomenon and Religious Meaning

    Directory of Open Access Journals (Sweden)

    Lomuscio Vincenzo

    2017-09-01

    Full Text Available In this paper I develop a phenomenology of religious experience through the notion of keyphenomenon. My analysis moves from a general phenomenology of situation, in which we have to relate different phenomena according to a sense. What does “according to a sense” mean? My suggestion is that we should look for a relationship among these data when we find a key-phenomenon (among a series of phenomena that would enlighten all the others. This key-phenomenon would show a non-phenomenal meaning which would make all the others understandable. Each other datum, therefore, becomes the witness of invisible meaning through a key-witness. The key-phenomenon we choose determines the role (i.e., the truth of each datum within its situation. This phenomenological relationship belongs to both the sense of day-life situations, and that one of possible religious situations. If the religious interpretation of a situation depends on our choice of key-phenomenon, or key-witness, we have to define what kind of keyphenomenon constitutes a religious intuition.

  12. The distinction between key ideas in teaching school physics and key ideas in the discipline of physics

    Science.gov (United States)

    Deng, Zongyi

    2001-05-01

    The distinction between key ideas in teaching a high school science and key ideas in the corresponding discipline of science has been largely ignored in scholarly discourse about what science teachers should teach and about what they should know. This article clarifies this distinction through exploring how and why key ideas in teaching high school physics differ from key ideas in the discipline of physics. Its theoretical underpinnings include Dewey's (1902/1990) distinction between the psychological and the logical and Harré's (1986) epistemology of science. It analyzes how and why the key ideas in teaching color, the speed of light, and light interference at the high school level differ from the key ideas at the disciplinary level. The thesis is that key ideas in teaching high school physics can differ from key ideas in the discipline in some significant ways, and that the differences manifest Dewey's distinction. As a result, the article challenges the assumption of equating key ideas in teaching a high school science with key ideas in the corresponding discipline of science, and the assumption that having a college degree in science is sufficient to teach high school science. Furthermore, the article expands the concept of pedagogical content knowledge by arguing that key ideas in teaching high school physics constitute an essential component.

  13. Final report on CCT-K6: Comparison of local realisations of dew-point temperature scales in the range -50 °C to +20 °C

    Science.gov (United States)

    Bell, S.; Stevens, M.; Abe, H.; Benyon, R.; Bosma, R.; Fernicola, V.; Heinonen, M.; Huang, P.; Kitano, H.; Li, Z.; Nielsen, J.; Ochi, N.; Podmurnaya, O. A.; Scace, G.; Smorgon, D.; Vicente, T.; Vinge, A. F.; Wang, L.; Yi, H.

    2015-01-01

    A key comparison in dew-point temperature was carried out among the national standards held by NPL (pilot), NMIJ, INTA, VSL, INRIM, MIKES, NIST, NIM, VNIIFTRI-ESB and NMC. A pair of condensation-principle dew-point hygrometers was circulated and used to compare the local realisations of dew point for participant humidity generators in the range -50 °C to +20 °C. The duration of the comparison was prolonged by numerous problems with the hygrometers, requiring some repairs, and several additional check measurements by the pilot. Despite the problems and the extended timescale, the comparison was effective in providing evidence of equivalence. Agreement with the key comparison reference value was achieved in the majority of cases, and bilateral degrees of equivalence are also reported. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCT, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  14. Key personality traits of sales managers.

    Science.gov (United States)

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  15. A Distributed Shared Key Generation Procedure Using Fractional Keys

    National Research Council Canada - National Science Library

    Poovendran, Radha; Corson, M. S; Baras, J. S

    1998-01-01

    We present a new class of distributed key generation and recovery algorithms suitable for group communication systems where the group membership is either static or slowly time-varying, and must be tightly controlled...

  16. Key improvements to XTR

    NARCIS (Netherlands)

    Lenstra, A.K.; Verheul, E.R.; Okamoto, T.

    2000-01-01

    This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR public key for signature applications can be reduced by a factor of three at the cost of a small one time computation for the

  17. BIPM comparison BIPM.RI(II)-K1.Zn-65 of activity measurements of the radionuclide 65Zn for the BARC (India) with linked results for the CCRI(II)-K2.Zn-65 comparison

    International Nuclear Information System (INIS)

    Michotte, C.; Ratel, G.; Courte, S.; Joseph, L.

    2015-01-01

    A new participation in the BIPM.RI(II)-K1.Zn-65 comparison has been added to the previous results. A link has been made to the CCRI(II)-K2.Zn-65 comparison held in 2003 through the measurement of all ampoules of the K2 comparison in the International Reference System (SIR) at the BIPM before despatch to the participants. This has produced a revised value for the key comparison reference value (KCRV), calculated using the power-moderated weighted mean. Six NMIs used the K2 comparison to update their degree of equivalence. The degrees of equivalence between each equivalent activity measured in the International Reference System (SIR) and the KCRV have been calculated and the results are given in the form of a table for the remaining two NMIs in the BIPM.RI(II)-K1.Zn-65 comparison and the 17 other participants in the CCRI(II)-K2.Zn-65 comparison. A graphical presentation is also given. (authors)

  18. Importance of the nature of comparison conditions for testing theory-based interventions: reply.

    Science.gov (United States)

    Michie, Susan; Prestwich, Andrew; de Bruin, Marijn

    2010-09-01

    The nature of comparison conditions is a much overlooked feature of designing and interpreting the results of randomized controlled trials, as outlined by Williams (see record 2010-18776-001). We agree that understanding the components and mechanisms of the comparison condition is necessary for making inferences about both intervention effectiveness (whether the intervention worked and which components may have contributed to such an effect) and about theoretical mediators (how it worked). The extent to which one can draw strong inferences regarding the efficacy and mechanisms of an intervention over the comparison is conditional upon a number of key points. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  19. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  20. Key characteristics for tool choice in indicator-based sustainability assessment at farm level

    Directory of Open Access Journals (Sweden)

    Fleur Marchand

    2014-09-01

    Full Text Available Although the literature on sustainability assessment tools to support decision making in agriculture is rapidly growing, little attention has been paid to the actual tool choice. We focused on the choice of more complex integrated indicator-based tools at the farm level. The objective was to determine key characteristics as criteria for tool choice. This was done with an in-depth comparison of 2 cases: the Monitoring Tool for Integrated Farm Sustainability and the Public Goods Tool. They differ in characteristics that may influence tool choice: data, time, and budgetary requirements. With an enhanced framework, we derived 11 key characteristics to describe differences between the case tools. Based on the key characteristics, we defined 2 types of indicator-based tools: full sustainability assessment (FSA and rapid sustainability assessment (RSA. RSA tools are more oriented toward communicating and learning. They are therefore more suitable for use by a larger group of farmers, can help to raise awareness, trigger farmers to become interested in sustainable farming, and highlight areas of good or bad performance. If and when farmers increase their commitment to on-farm sustainability, they can gain additional insight by using an FSA tool. Based on complementary and modular use of the tools, practical recommendations for the different end users, i.e., researchers, farmers, advisers, and so forth, have been suggested.

  1. New weak keys in simplified IDEA

    Science.gov (United States)

    Hafman, Sari Agustini; Muhafidzah, Arini

    2016-02-01

    Simplified IDEA (S-IDEA) is simplified version of International Data Encryption Algorithm (IDEA) and useful teaching tool to help students to understand IDEA. In 2012, Muryanto and Hafman have found a weak key class in the S-IDEA by used differential characteristics in one-round (0, ν, 0, ν) → (0,0, ν, ν) on the first round to produce input difference (0,0, ν, ν) on the fifth round. Because Muryanto and Hafman only use three differential characteristics in one-round, we conducted a research to find new differential characteristics in one-round and used it to produce new weak key classes of S-IDEA. To find new differential characteristics in one-round of S-IDEA, we applied a multiplication mod 216+1 on input difference and combination of active sub key Z1, Z4, Z5, Z6. New classes of weak keys are obtained by combining all of these characteristics and use them to construct two new differential characteristics in full-round of S-IDEA with or without the 4th round sub key. In this research, we found six new differential characteristics in one round and combined them to construct two new differential characteristics in full-round of S-IDEA. When two new differential characteristics in full-round of S-IDEA are used and the 4th round sub key required, we obtain 2 new classes of weak keys, 213 and 28. When two new differential characteristics in full-round of S-IDEA are used, yet the 4th round sub key is not required, the weak key class of 213 will be 221 and 28 will be 210. Membership test can not be applied to recover the key bits in those weak key classes. The recovery of those unknown key bits can only be done by using brute force attack. The simulation result indicates that the bit of the key can be recovered by the longest computation time of 0,031 ms.

  2. SUPPLEMENTARY COMPARISON: Report of the bilateral comparison of the calibrations of hydrometers for liquid density determination between CENAM-Mexico and INRIM-Italy: SIM.M.D-S1

    Science.gov (United States)

    Becerra, Luis Omar; Lorefice, Salvatore

    2009-01-01

    Hydrometers are instruments usually made of glass which are widely used for different levels of precision to measure liquid density and related quantities to control different products and processes. This bilateral comparison on the calibration of hydrometers shows that results reported by CENAM-Mexico and INRIM-Italy are consistent within the claimed uncertainty in the range of 800 kg/m3 to 1200 kg/m3. This bilateral comparison is intended to link the two regional comparisons SIM.M.D-K4 and EURAMET.D-K4. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by SIM, according to the provisions of the CIPM Mutual Recognition Arrangement (MRA).

  3. 25 CFR 502.14 - Key employee.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Key employee. 502.14 Section 502.14 Indians NATIONAL....14 Key employee. Key employee means: (a) A person who performs one or more of the following functions... gaming operation. (d) Any other person designated by the tribe as a key employee. [57 FR 12392, Apr. 9...

  4. International key comparison of free-field hydrophone calibrations in the frequency range 1 to 500 kHz

    CSIR Research Space (South Africa)

    Robinson, SP

    2006-09-01

    Full Text Available South African Develop- ment Community Cooperation in Measurement TraceabilityH20850, and SIM H20849Sistema Interamericano de MetrologiaH20850. Also listed in Table I are the country codes used to identify the results in the graphical representations... in the database on the BIPM web- site also include tabulated data on the bilateral degrees of equivalence between the countries along with associated uncertainties. The data generated by the comparison are available on the BIPM website at H20855http...

  5. Educating Citizens of 'The Global': Mapping Textual Constructs of UNESCO's Global Citizenship Education 2012-2015

    Science.gov (United States)

    VanderDussen Toukan, Elena

    2018-01-01

    In this article, I pose the question of what constructs of 'global citizenship education' are being mobilized by key international actors. I undertake a comparative analysis of three key United Nations (UN) and United Nations Educational, Scientific and Cultural Organization (UNESCO) documents that have emerged in the past 5 years to frame the…

  6. Semantic Keys and Reading

    Directory of Open Access Journals (Sweden)

    Zev bar-Lev

    2016-12-01

    Full Text Available Semantic Keys are elements (word-parts of written language that give an iconic, general representation of the whole word’s meaning. In written Sino-Japanese the “radical” or semantic components play this role. For example, the character meaning ‘woman, female’ is the Semantic Key of the character for Ma ‘Mama’ (alongside the phonetic component Ma, which means ‘horse’ as a separate character. The theory of semantic Keys in both graphic and phonemic aspects is called qTheory or nanosemantics. The most innovative aspect of the present article is the hypothesis that, in languages using alphabetic writing systems, the role of Semantic Key is played by consonants, more specifically the first consonant. Thus, L meaning ‘LIFT’ is the Semantic Key of English Lift, Ladle, Lofty, aLps, eLevator, oLympus; Spanish Leva, Lecantarse, aLto, Lengua; Arabic aLLah, and Hebrew① ªeL-ºaL ‘upto-above’ (the Israeli airline, Polish Lot ‘flight’ (the Polish airline; Hebrew ªeL, ªeLohim ‘God’, and haLLeluyah ‘praise-ye God’ (using Parallels, ‘Lift up God’. Evidence for the universality of the theory is shown by many examples drawn from various languages, including Indo-European Semitic, Chinese and Japanese. The theory reveals hundreds of relationships within and between languages, related and unrelated, that have been “Hiding in Plain Sight”, to mention just one example: the Parallel between Spanish Pan ‘bread’ and Mandarin Fan ‘rice’.

  7. Quantum key distribution via quantum encryption

    CERN Document Server

    Yong Sheng Zhang; Guang Can Guo

    2001-01-01

    A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed. (21 refs).

  8. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  9. Finite key analysis in quantum cryptography

    International Nuclear Information System (INIS)

    Meyer, T.

    2007-01-01

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes the obtainable key rate for any

  10. Finite key analysis in quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, T.

    2007-10-31

    In view of experimental realization of quantum key distribution schemes, the study of their efficiency becomes as important as the proof of their security. The latter is the subject of most of the theoretical work about quantum key distribution, and many important results such as the proof of unconditional security have been obtained. The efficiency and also the robustness of quantum key distribution protocols against noise can be measured by figures of merit such as the secret key rate (the fraction of input signals that make it into the key) and the threshold quantum bit error rate (the maximal error rate such that one can still create a secret key). It is important to determine these quantities because they tell us whether a certain quantum key distribution scheme can be used at all in a given situation and if so, how many secret key bits it can generate in a given time. However, these figures of merit are usually derived under the ''infinite key limit'' assumption, that is, one assumes that an infinite number of quantum states are send and that all sub-protocols of the scheme (in particular privacy amplification) are carried out on these infinitely large blocks. Such an assumption usually eases the analysis, but also leads to (potentially) too optimistic values for the quantities in question. In this thesis, we are explicitly avoiding the infinite key limit for the analysis of the privacy amplification step, which plays the most important role in a quantum key distribution scheme. We still assume that an optimal error correction code is applied and we do not take into account any statistical errors that might occur in the parameter estimation step. Renner and coworkers derived an explicit formula for the obtainable key rate in terms of Renyi entropies of the quantum states describing Alice's, Bob's, and Eve's systems. This results serves as a starting point for our analysis, and we derive an algorithm that efficiently computes

  11. Key rate of quantum key distribution with hashed two-way classical communication

    International Nuclear Information System (INIS)

    Watanabe, Shun; Matsumoto, Ryutaroh; Uyematsu, Tomohiko; Kawano, Yasuhito

    2007-01-01

    We propose an information reconciliation protocol that uses two-way classical communication. The key rates of quantum key distribution (QKD) protocols that use our protocol are higher than those using previously known protocols for a wide range of error rates for the Bennett-Brassard 1984 and six-state protocols. We also clarify the relation between the proposed and known QKD protocols, and the relation between the proposed protocol and entanglement distillation protocols

  12. "Harder, Better, Faster, Stronger": Negative Comparison on Facebook and Adolescents' Life Satisfaction Are Reciprocally Related.

    Science.gov (United States)

    Frison, Eline; Eggermont, Steven

    2016-03-01

    Social networking sites, such as Facebook, offer adolescent users an ideal platform for negative comparison (i.e., experiencing negative feelings from social comparison). Although such negative comparison on Facebook has been associated with users' well-being, the reciprocal relations between the two remain unclear, particularly in an adolescent sample. To examine this reciprocal process, a two-wave study among a representative sample of Flemish adolescents was set up (N Time1 = 1,840). Data were analyzed using structural equation modeling. Cross-lagged analyses indicated that negative comparison on Facebook predicted decreases in life satisfaction over time. Conversely, lower scores on life satisfaction predicted increases in negative comparison on Facebook. The discussion focuses on the understanding of these findings, key limitations, directions for future research, and implications for prevention and intervention strategies.

  13. One-way quantum key distribution: Simple upper bound on the secret key rate

    International Nuclear Information System (INIS)

    Moroder, Tobias; Luetkenhaus, Norbert; Curty, Marcos

    2006-01-01

    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol

  14. A cross sectional observational study of research activity of allied health teams: is there a link with self-reported success, motivators and barriers to undertaking research?

    Science.gov (United States)

    Wenke, Rachel J; Mickan, Sharon; Bisset, Leanne

    2017-02-06

    Team-based approaches to research capacity building (RCB) may be an efficient means to promote allied health research participation and activity. In order to tailor such interventions, a clearer understanding of current patterns of research participation within allied health teams is needed. Different self-report measures exist which evaluate a team's research capacity and participation, as well as associated barriers and motivators. However, it remains unclear how such measures are associated with a team's actual research activity (e.g., journal publications, funding received). In response, this observational study aimed to identify the research activity, self-reported success, and motivations and barriers to undertaking research of eight allied health professional (AHP) teams and to explore whether any relationships exist between the self-reported measures and actual research activity within each team. A total of 95 AHPs from eight teams completed the research capacity and culture survey to evaluate team success, barriers and motivators to undertaking research, and an audit of research activity from January 2013 to August 2014 was undertaken within each team. Kendell's correlation coefficients were used to determine the association between research activity (i.e., number of journal publications, ethically approved projects and funding received) and the self-reported measures. Seven out of eight teams rated their teams as having average success in research and demonstrated some form of research activity including at least two ethically approved projects. Research activity varied between teams, with funding received ranging from $0 to over $100,000, and half the teams not producing any journal publications. Team motivators demonstrated a stronger association with research activity compared to barriers, with the motivator "enhancing team credibility" being significantly associated with funding received. No significant association between self-reported research

  15. SUPPLEMENTARY COMPARISON: EUROMET.L-S10 Comparison of squareness measurements

    Science.gov (United States)

    Mokros, Jiri

    2005-01-01

    from the weighted mean of data from participating laboratories, while some of them were excluded on the basis of statistical evaluation. Graphical interpretations of all deviations are contained in the Final Report. In order to compare the individual deviations mutually (25 profiles for the granite square and 44 profiles for the cylinder), graphical illustrations of 'standard deviations' and both extreme values (max. and min.) of deviations were created. This regional supplementary comparison has provided independent information about the metrological properties of the measuring equipment and method used by the participating NMIs. The Final Report does not contain the En values. Participants could not estimate some contributions in the uncertainty budget on the basis of previous comparisons, since no comparison of this kind had ever been organized. Therefore the En value cannot reflect the actual state of the given NMI. Instead of En, an analysis has been performed by means of the Grubbs test according to ISO 5725-2. This comparison provided information about the state of provision of metrological services in the field of big squares measurement. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by EUROMET, according to the provisions of the Mutual Recognition Arrangement (MRA).

  16. Quantum key distribution network for multiple applications

    Science.gov (United States)

    Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.

    2017-09-01

    The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.

  17. Algorithms for Lightweight Key Exchange.

    Science.gov (United States)

    Alvarez, Rafael; Caballero-Gil, Cándido; Santonja, Juan; Zamora, Antonio

    2017-06-27

    Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are even more significant in critical infrastructure and emergency scenarios where peer-to-peer networks are deployed for increased availability and resiliency. We benchmark several public-key key-exchange algorithms, determining those that are better for the requirements of critical infrastructure and emergency applications and propose a security framework based on these algorithms and study its application to decentralized node or sensor networks.

  18. Decoy State Quantum Key Distribution

    Science.gov (United States)

    Lo, Hoi-Kwong

    2005-10-01

    Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states--a vacuum and a weak decoy state--asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution

  19. Results of an international comparison for the determination of radionuclide activity in bilberry material

    International Nuclear Information System (INIS)

    Wätjen, U.; Altzitzoglou, T.; Ceccatelli, A.; Dikmen, H.; Emteborg, H.; Ferreux, L.; Frechou, C.; La Rosa, J.; Luca, A.; Moreno, Y.; Oropesa, P.; Pierre, S.; Schmiedel, M.

    2012-01-01

    Radioactivity found in wild food products has assumed greater importance when assessing the total exposure of the population. For this reason, IRMM has been developing a reference material for the activity concentration of three radionuclides in bilberry samples. In order to characterise this new material, a CCRI(II) supplementary comparison was organised. The difficulties encountered in this comparison are discussed, in particular the efficiency calibration for volume sources of gamma-ray emitters, and comparison reference values for 137 Cs and 40 K are calculated. - Highlights: ► CCRI(II) supplementary comparison for Cs-137 and K-40 in bilberry matrix completed. ► Fundamentally different methods used to establish link to SI traceable standards and SIR. ► Variation of results higher than in CCRI(II) key comparisons. ► Comparison reference values will be robust property values of IRMM reference material. ► Certified reference material for radioactivity in food developed.

  20. “Ensure that you are well aware of the risks you are taking…”: actions and activities medical tourists’ informal caregivers can undertake to protect their health and safety

    Directory of Open Access Journals (Sweden)

    Valorie A. Crooks

    2017-05-01

    Full Text Available Abstract Background When seeking care at international hospitals and clinics, medical tourists are often accompanied by family members, friends, or other caregivers. Such caregiver-companions assume a variety of roles and responsibilities and typically offer physical assistance, provide emotional support, and aid in decision-making and record keeping as medical tourists navigate unfamiliar environments. While traveling abroad, medical tourists’ caregiver-companions can find themselves confronted with challenging communication barriers, financial pressures, emotional strain, and unsafe environments. Methods To better understand what actions and activities medical tourists’ informal caregivers can undertake to protect their health and safety, 20 interviews were conducted with Canadians who had experienced accompanying a medical tourist to an international health care facility for surgery. Interview transcripts were subsequently used to identify inductive and deductive themes central to the advice research participants offered to prospective caregiver-companions. Results Advice offered to future caregiver-companions spanned the following actions and activities to protect health and safety: become an informed health care consumer; assess and avoid exposure to identifiable risks; anticipate the care needs of medical tourists and thereby attempt to guard against caregiver burden; become familiar with important logistics related to travel and anticipated recovery timelines; and take practical measures to protect one’s own health. Conclusion Given that a key feature of public health is to use research findings to develop interventions and policies intended to promote health and reduce risks to individuals and populations, the paper draws upon major points of advice offered by study participants to take the first steps toward the development of an informational intervention designed specifically for the health and safety needs of medical tourists

  1. Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

    Science.gov (United States)

    Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato

    2017-07-01

    An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

  2. Data-derived symbol synchronization of MASK and QASK signals. [Multilevel and Quadrature Amplitude Shift Keying

    Science.gov (United States)

    Simon, M. K.

    1975-01-01

    Much has been said in the literature regarding the problem of establishing symbol synchronization in binary baseband digital communication systems. By comparison, the literature contains little information relating to the extraction of symbol sync from multilevel baseband data. With the recent interest in multilevel amplitude-shift keying (MASK) and quadrature amplitude-shift keying (QASK) as signaling techniques for multilevel digital communications systems, the problem of providing symbol synchronization in the receivers of such systems becomes paramount. This paper presents a technique for extracting symbol sync from a MASK or QASK signal which has been transmitted over an infinite-bandwidth white Gaussian noise channel. The scheme is essentially a generalization of the data transition tracking loop (DTTL) which has heretofore been used in PSK systems. The performance of the loop is analyzed in terms of its mean-squared symbol sync jitter and its effects on the data detection process in MASK and QASK systems.

  3. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  4. Lean production efforts help save 7.5M dollars in 1 year.

    Science.gov (United States)

    2005-12-01

    System undertakes 150 rapid process improvement workshops. Eliminating various types of waste is one of key foci of lean production approach. Time is main metric of methodology; observers measure processes with stopwatches.

  5. VerSi. A method for the quantitative comparison of repository systems

    Energy Technology Data Exchange (ETDEWEB)

    Kaempfer, T.U.; Ruebel, A.; Resele, G. [AF-Consult Switzerland Ltd, Baden (Switzerland); Moenig, J. [GRS Braunschweig (Germany)

    2015-07-01

    Decision making and design processes for radioactive waste repositories are guided by safety goals that need to be achieved. In this context, the comparison of different disposal concepts can provide relevant support to better understand the performance of the repository systems. Such a task requires a method for a traceable comparison that is as objective as possible. We present a versatile method that allows for the comparison of different disposal concepts in potentially different host rocks. The condition for the method to work is that the repository systems are defined to a comparable level including designed repository structures, disposal concepts, and engineered and geological barriers which are all based on site-specific safety requirements. The method is primarily based on quantitative analyses and probabilistic model calculations regarding the long-term safety of the repository systems under consideration. The crucial evaluation criteria for the comparison are statistical key figures of indicators that characterize the radiotoxicity flux out of the so called containment-providing rock zone (einschlusswirksamer Gebirgsbereich). The key figures account for existing uncertainties with respect to the actual site properties, the safety relevant processes, and the potential future impact of external processes on the repository system, i.e., they include scenario-, process-, and parameter-uncertainties. The method (1) leads to an evaluation of the retention and containment capacity of the repository systems and its robustness with respect to existing uncertainties as well as to potential external influences; (2) specifies the procedures for the system analyses and the calculation of the statistical key figures as well as for the comparative interpretation of the key figures; and (3) also gives recommendations and sets benchmarks for the comparative assessment of the repository systems under consideration based on the key figures and additional qualitative

  6. Analysis of the differential-phase-shift-keying protocol in the quantum-key-distribution system

    International Nuclear Information System (INIS)

    Rong-Zhen, Jiao; Chen-Xu, Feng; Hai-Qiang, Ma

    2009-01-01

    The analysis is based on the error rate and the secure communication rate as functions of distance for three quantum-key-distribution (QKD) protocols: the Bennett–Brassard 1984, the Bennett–Brassard–Mermin 1992, and the coherent differential-phase-shift keying (DPSK) protocols. We consider the secure communication rate of the DPSK protocol against an arbitrary individual attack, including the most commonly considered intercept-resend and photon-number splitting attacks, and concluded that the simple and efficient differential-phase-shift-keying protocol allows for more than 200 km of secure communication distance with high communication rates. (general)

  7. Non proliferation regimes undertakings: Benefits and limits of synergies in verification technologies and procedures

    International Nuclear Information System (INIS)

    Richard, M.

    2001-01-01

    Full text: Thirty years ago the NPT was entering into force. Therewith, when a State became party to the NPT, it had, in accordance with article III.1 of the Treaty, an undertaking to conclude a Comprehensive Safeguards agreement with the IAEA and accept safeguards verification on source or special fissionable material in all peaceful nuclear activities within its territories in order to verify that such material is not diverted. This multilateral instrument was the foundation stone of the non-proliferation regime and marked the actual birth of internationally accepted measures to verily compliance with politically stringent agreements. Since that time several important multilateral or bilateral instruments on non-proliferation and disarmament have been negotiated and adopted to curb the development and the acquisition of Weapons of Mass Destruction (WMD) most of them since the middle of the eighties and the collapse of the Soviet Union. Amongst the multilateral instruments are the Convention on the Prohibition of Bacteriological Weapon and Toxin Weapons (1972), the Convention on the Prohibition of Chemical Weapons (1993), the Comprehensive Test Ban Treaty (1996), the Strengthening of the IAEA Safeguards and the Additional Protocol (1997), with some still in negotiation like the Protocol of the Convention on the Prohibition of Bacteriological and Toxin Weapons, and some on which negotiation is still a wish like the Fissile Material Cut-off Treaty. Bilateral disarmament agreements between the United States of America and the Russian Federation such as the INF Treaty, START I and II, the agreements on the elimination of excess defence nuclear material as well as the Trilateral Initiative with the IAEA pave the way to nuclear disarmament with the reduction of both the number of nuclear weapons arsenal and the fissile material inventories. The politically stringent undertakings of States that have become parties to those agreements would not be possible without the

  8. Molecular characterization of adenosine 5'-monophosphate deaminase--the key enzyme responsible for the umami taste of nori (Porphyra yezoensis Ueda, Rhodophyta).

    Science.gov (United States)

    Minami, Seiko; Sato, Minoru; Shiraiwa, Yoshihiro; Iwamoto, Koji

    2011-12-01

    The enzyme adenosine 5'-monophosphate deaminase (AMPD, EC 3.5.4.6) catalyzes the conversion of adenosine 5'-monophosphate to inosine 5'-mononucleotide (IMP). IMP is generally known as the compound responsible for the umami taste of the edible red alga Porphyra yezoensis Ueda that is known in Japan as nori. Therefore, we suspect that AMPD plays a key role in providing a favorable nori taste. In this study, we undertake the molecular characterization of nori-derived AMPD. The nori AMPD protein has a molecular mass of 55 kDa as estimated from both gel filtration and sodium dodecyl sulfate polyacrylamide gel electrophoresis. The calculated molecular mass from the amino acid sequence deduced from cDNA is 57.1 kDa. The isoelectric point is 5.71. The coding region of AMPD consists of 1,566 bp encoding 522 amino acids and possesses a transmembrane domain and two N-glycosylation sites. The sequence identity of nori AMPD in human and yeast AMPDs was found to be less than 50% and 20% in DNA and amino acid sequences, respectively. Proline in the conserved motif of [SA]-[LIVM]-[NGS]-[STA]-D-D-P was found to be converted to glutamate. These results indicate that nori AMPD is a novel type of AMPD.

  9. KeyPathwayMinerWeb

    DEFF Research Database (Denmark)

    List, Markus; Alcaraz, Nicolas; Dissing-Hansen, Martin

    2016-01-01

    , for instance), KeyPathwayMiner extracts connected sub-networks containing a high number of active or differentially regulated genes (proteins, metabolites) in the molecular profiles. The web interface at (http://keypathwayminer.compbio.sdu.dk) implements all core functionalities of the KeyPathwayMiner tool set......We present KeyPathwayMinerWeb, the first online platform for de novo pathway enrichment analysis directly in the browser. Given a biological interaction network (e.g. protein-protein interactions) and a series of molecular profiles derived from one or multiple OMICS studies (gene expression...... such as data integration, input of background knowledge, batch runs for parameter optimization and visualization of extracted pathways. In addition to an intuitive web interface, we also implemented a RESTful API that now enables other online developers to integrate network enrichment as a web service...

  10. NTP comparison process

    Science.gov (United States)

    Corban, Robert

    The systems engineering process for the concept definition phase of the program involves requirements definition, system definition, and consistent concept definition. The requirements definition process involves obtaining a complete understanding of the system requirements based on customer needs, mission scenarios, and nuclear thermal propulsion (NTP) operating characteristics. A system functional analysis is performed to provide a comprehensive traceability and verification of top-level requirements down to detailed system specifications and provides significant insight into the measures of system effectiveness to be utilized in system evaluation. The second key element in the process is the definition of system concepts to meet the requirements. This part of the process involves engine system and reactor contractor teams to develop alternative NTP system concepts that can be evaluated against specific attributes, as well as a reference configuration against which to compare system benefits and merits. Quality function deployment (QFD), as an excellent tool within Total Quality Management (TQM) techniques, can provide the required structure and provide a link to the voice of the customer in establishing critical system qualities and their relationships. The third element of the process is the consistent performance comparison. The comparison process involves validating developed concept data and quantifying system merits through analysis, computer modeling, simulation, and rapid prototyping of the proposed high risk NTP subsystems. The maximum amount possible of quantitative data will be developed and/or validated to be utilized in the QFD evaluation matrix. If upon evaluation of a new concept or its associated subsystems determine to have substantial merit, those features will be incorporated into the reference configuration for subsequent system definition and comparison efforts.

  11. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    OpenAIRE

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  12. Resumption of menstruation and pituitary response to gonadotropin-releasing hormone in functional hypothalamic amenorrhea subjects undertaking estrogen replacement therapy.

    Science.gov (United States)

    Shen, Z Q; Xu, J J; Lin, J F

    2013-11-01

    Functional hypothalamic amenorrhea (FHA) refers to a functional menstrual disorder with various causes and presentations. Recovery of menstrual cyclicity is common in long-term follow-up but the affecting factors remain unknown. To explore factors affecting the menstrual resumption and to evaluate the pituitary response to gonadotropin-releasing hormone (GnRH) in FHA. Thirty cases with FHA were recruited. All subjects were put on continuous 1 mg/day estradiol valerate orally and followed up monthly. Recovery was defined as the occurrence of at least three consecutive regular cycles. Responder referred to those who recovered within two years of therapy. Gonadotropin response to the 50 μg GnRH challenge was tested every three months. Nineteen (63.3%) subjects recovered with a mean time to recovery of 26.8 months. Time to recovery was negatively correlated with body mass index (BMI) before and by amenorrhea. Twentyone cases had undertaken therapy for more than two years and 10 of them recovered. BMI before and by amenorrhea were negatively correlated with the recovery. Significant increase of serum luteinizing hormone (LH) and LH response to GnRH were noted after recovery. Menstrual resumption was common in FHA undertaking estrogen replacement therapy (ERT). The likelihood of recovery was affected by their BMI before and by amenorrhea but not by the weight gain during therapy. Low serum LH and attenuated LH response to GnRH were the main features of pituitary deficiency in FHA. The menstrual resumption in FHA was accompanied by the recovery of serum LH and the LH response to GnRH.

  13. Key handling in wireless sensor networks

    International Nuclear Information System (INIS)

    Li, Y; Newe, T

    2007-01-01

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided

  14. Key handling in wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y; Newe, T [Optical Fibre Sensors Research Centre, Department of Electronic and Computer Engineering, University of Limerick, Limerick (Ireland)

    2007-07-15

    With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

  15. Secret-key expansion from covert communication

    Science.gov (United States)

    Arrazola, Juan Miguel; Amiri, Ryan

    2018-02-01

    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  16. High-efficiency Gaussian key reconciliation in continuous variable quantum key distribution

    Science.gov (United States)

    Bai, ZengLiang; Wang, XuYang; Yang, ShenShen; Li, YongMin

    2016-01-01

    Efficient reconciliation is a crucial step in continuous variable quantum key distribution. The progressive-edge-growth (PEG) algorithm is an efficient method to construct relatively short block length low-density parity-check (LDPC) codes. The qua-sicyclic construction method can extend short block length codes and further eliminate the shortest cycle. In this paper, by combining the PEG algorithm and qua-si-cyclic construction method, we design long block length irregular LDPC codes with high error-correcting capacity. Based on these LDPC codes, we achieve high-efficiency Gaussian key reconciliation with slice recon-ciliation based on multilevel coding/multistage decoding with an efficiency of 93.7%.

  17. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  18. FPGA BASED HARDWARE KEY FOR TEMPORAL ENCRYPTION

    Directory of Open Access Journals (Sweden)

    B. Lakshmi

    2010-09-01

    Full Text Available In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS – II processor (a virtual microcontroller which is brought out from Altera FPGA that communicates with the keys to the personal computer through JTAG (Joint Test Action Group communication and the computer is used to perform encryption (or decryption. In this case the FPGA serves as hardware key (dongle for data encryption (or decryption.

  19. Qualified nurses' rate new nursing graduates as lacking skills in key clinical areas.

    Science.gov (United States)

    Missen, Karen; McKenna, Lisa; Beauchamp, Alison; Larkins, Jo-Ann

    2016-08-01

    The aim of this study was to explore perceptions of qualified nurses on the abilities of newly registered nursing graduates to perform a variety of clinical skills. Evidence from the literature suggests that undergraduate nursing programmes do not adequately prepare nursing students to be practice-ready on completion of their nursing courses. A descriptive quantitative design was used. Participants were recruited through the Australian Nursing and Midwifery Federation, Victorian branch. A brief explanation of the study and a link to the survey were promoted in their monthly e-newsletter. A total of 245 qualified nurses in the state of Victoria, Australia participated in this study. A survey tool of 51 clinical skills and open-ended questions was used, whereby participants were asked to rate new nursing graduates' abilities using a 5-point Likert scale. Overall participants rated new nursing graduates' abilities for undertaking clinical skills as good or very good in 35·3% of skills, 33·3% were rated as adequate and 31·4% rated as being performed poorly or very poorly. Of concern, essential clinical skills, such as critical thinking and problem solving, working independently and assessment procedures, were found to be poorly executed and affecting new registered nurses graduates' competence. The findings from this study can further serve as a reference for nursing education providers to enhance nursing curricula and work collaboratively with healthcare settings in preparing nurses to be competent, safe practitioners on completion of their studies. Identifying key areas in which new nursing graduates are not yet competent means that educational providers and educators from healthcare settings can focus on these skills in better preparing our nurses to be work ready. © 2016 John Wiley & Sons Ltd.

  20. Key Management Strategies for Safeguards Authentication and Encryption

    International Nuclear Information System (INIS)

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  1. Identifying Key Drivers of Return Reversal with Dynamical Bayesian Factor Graph.

    Directory of Open Access Journals (Sweden)

    Shuai Zhao

    Full Text Available In the stock market, return reversal occurs when investors sell overbought stocks and buy oversold stocks, reversing the stocks' price trends. In this paper, we develop a new method to identify key drivers of return reversal by incorporating a comprehensive set of factors derived from different economic theories into one unified dynamical Bayesian factor graph. We then use the model to depict factor relationships and their dynamics, from which we make some interesting discoveries about the mechanism behind return reversals. Through extensive experiments on the US stock market, we conclude that among the various factors, the liquidity factors consistently emerge as key drivers of return reversal, which is in support of the theory of liquidity effect. Specifically, we find that stocks with high turnover rates or high Amihud illiquidity measures have a greater probability of experiencing return reversals. Apart from the consistent drivers, we find other drivers of return reversal that generally change from year to year, and they serve as important characteristics for evaluating the trends of stock returns. Besides, we also identify some seldom discussed yet enlightening inter-factor relationships, one of which shows that stocks in Finance and Insurance industry are more likely to have high Amihud illiquidity measures in comparison with those in other industries. These conclusions are robust for return reversals under different thresholds.

  2. Key performance indicators to benchmark hospital information systems - a delphi study.

    Science.gov (United States)

    Hübner-Bloder, G; Ammenwerth, E

    2009-01-01

    To identify the key performance indicators for hospital information systems (HIS) that can be used for HIS benchmarking. A Delphi survey with one qualitative and two quantitative rounds. Forty-four HIS experts from health care IT practice and academia participated in all three rounds. Seventy-seven performance indicators were identified and organized into eight categories: technical quality, software quality, architecture and interface quality, IT vendor quality, IT support and IT department quality, workflow support quality, IT outcome quality, and IT costs. The highest ranked indicators are related to clinical workflow support and user satisfaction. Isolated technical indicators or cost indicators were not seen as useful. The experts favored an interdisciplinary group of all the stakeholders, led by hospital management, to conduct the HIS benchmarking. They proposed benchmarking activities both in regular (annual) intervals as well as at defined events (for example after IT introduction). Most of the experts stated that in their institutions no HIS benchmarking activities are being performed at the moment. In the context of IT governance, IT benchmarking is gaining importance in the healthcare area. The found indicators reflect the view of health care IT professionals and researchers. Research is needed to further validate and operationalize key performance indicators, to provide an IT benchmarking framework, and to provide open repositories for a comparison of the HIS benchmarks of different hospitals.

  3. Harry Potter and the Dichotomous Key

    Science.gov (United States)

    Crowther, David T.

    2003-01-01

    In this lesson, students use Bertie Bott's Every Flavor Beans--a "wild" candy written about in the Harry Potter books and now available in stores--to learn about classification and dichotomous keys. In these activities, students sort jelly beans according to a key and then construct a key for a "new" flavor of beans. Students then build on their…

  4. Synoptic comparison of major US and UK simulations

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, D.B.; Oxenham, D.

    1994-07-01

    The six simulations considered include two from the United Kingdom: The United Kingdom Extended Air Defence Test Bed (UKEADTB) and the Air Defence Test Bed (ADTB). There are two from the Test Bed Product Office of the US Army Space and Strategic Defense Command (USASSDC) in Huntsville, Alabama: The Extended Air Defense Test Bed (EADTB) and the Extended Air Defense Simulation (EADSIM). There are two from the National Test Facility in Colorado Springs, Colorado: The Test Planning Tool (TPT) and the Human in Control Test Bed (HICTB). A seventh, the Brilliant Eyes Simulator (BESim) -- an element simulation and a close family member of the system level TPT -- is included along with TPT by noting exceptions where necessary. The comparisons are designed to be compact and comprehensible, with no table occupying more than a single page. The present report is organized with the tables on the odd numbered pages and some commentary on the facing even numbered pages. While the effort reported is extensive, it needs to be further developed as planned as the Subpanel`s next major undertaking. Analogously with simulations themselves, there remains the question of validation or accreditation. Also analogously, these depend upon the question being served. That is, the responses reported here, while extensive and interesting, need to be explicitly reviewed in the light of any given serious application. Unfortunately, and again analogously with simulations, this accreditation can not be done in the abstract or once and for all.

  5. Comparison on the calibrations of hydrometers for liquids density determination between SIM laboratories

    Science.gov (United States)

    Morales, Abed; Quiroga, Aldo; Daued, Arturo; Cantero, Diana; Sequeira, Francisco; Castro, Luis Carlos; Becerra, Luis Omar; Salazar, Manuel; Vega, Maria

    2017-01-01

    A supplementary comparison was made between SIM laboratories concerning the calibration of four hydrometers within the range of 600 kg/m3 to 2000 kg/m3. The main objectives of the comparison were to evaluate the degree of equivalences SIM NMIs in the calibration of hydrometers of high accuracy. The participant NMIs were: CENAM, IBMETRO, INEN, INDECOPI, INM, INTN and LACOMET. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  6. Climate change between the mid and late Holocene in northern high latitudes – Part 2: Model-data comparisons

    Directory of Open Access Journals (Sweden)

    K. Holmgren

    2010-09-01

    Full Text Available The climate response over northern high latitudes to the mid-Holocene orbital forcing has been investigated in three types of PMIP (Paleoclimate Modelling Intercomparison Project simulations with different complexity of the modelled climate system. By first undertaking model-data comparison, an objective selection method has been applied to evaluate the capability of the climate models to reproduce the spatial response pattern seen in proxy data. The possible feedback mechanisms behind the climate response have been explored based on the selected model simulations. Subsequent model-model comparisons indicate the importance of including the different physical feedbacks in the climate models. The comparisons between the proxy-based reconstructions and the best fit selected simulations show that over the northern high latitudes, summer temperature change follows closely the insolation change and shows a common feature with strong warming over land and relatively weak warming over ocean at 6 ka compared to 0 ka. Furthermore, the sea-ice-albedo positive feedback enhances this response. The reconstructions of temperature show a stronger response to enhanced insolation in the annual mean temperature than winter and summer temperature. This is verified in the model simulations and the behaviour is attributed to the larger contribution from the large response in autumn. Despite a smaller insolation during winter at 6 ka, a pronounced warming centre is found over Barents Sea in winter in the simulations, which is also supported by the nearby northern Eurasian continental and Fennoscandian reconstructions. This indicates that in the Arctic region, the response of the ocean and the sea ice to the enhanced summer insolation is more important for the winter temperature than the synchronous decrease of the insolation.

  7. VICKEY: Mining Conditional Keys on Knowledge Bases

    OpenAIRE

    Symeonidou , Danai; Galárraga , Luis; Pernelle , Nathalie; Saïs , Fatiha; Suchanek , Fabian

    2017-01-01

    International audience; A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs of millions of facts. We also show that the conditional keys we mine can improve the quality of entity linking by up to 47 percentage points.

  8. Multiple Information Fusion Face Recognition Using Key Feature Points

    Directory of Open Access Journals (Sweden)

    LIN Kezheng

    2017-06-01

    Full Text Available After years of face recognition research,due to the effect of illumination,noise and other conditions have led to the recognition rate is relatively low,2 d face recognition technology has couldn’t keep up with the pace of The Times the forefront,Although 3 d face recognition technology is developing step by step,but it has a higher complexity. In order to solve this problem,based on the traditional depth information positioning method and local characteristic analysis methods LFA,puts forward an improved 3 d face key feature points localization algorithm, and on the basis of the trained sample which obtained by complete cluster,further put forward the global and local feature extraction algorithm of weighted fusion. Through FRGC and BU-3DFE experiment data comparison and analysis of the two face library,the method in terms of 3 d face recognition effect has a higher robustness.

  9. VICKEY: Mining Conditional Keys on Knowledge Bases

    DEFF Research Database (Denmark)

    Symeonidou, Danai; Prado, Luis Antonio Galarraga Del; Pernelle, Nathalie

    2017-01-01

    A conditional key is a key constraint that is valid in only a part of the data. In this paper, we show how such keys can be mined automatically on large knowledge bases (KBs). For this, we combine techniques from key mining with techniques from rule mining. We show that our method can scale to KBs...

  10. Using vegetation model-to-data comparisons to test the role of abiotic factors in the Neogene and Quaternary origins of modern C4 grasslands

    Science.gov (United States)

    Fox, D. L.; Strömberg, C.; Pau, S.; Taylor, L.; Lehmann, C.; Osborne, C.; Beerling, D. J.; Still, C. J.

    2014-12-01

    Grasslands dominated by taxa using the C4 photosynthetic pathway evolved on several continents during the Neogene and Quaternary, long after C4 photosynthesis first evolved among grasses. The histories of these ecosystems are relatively well documented in the geological record from stable carbon isotopes (fossil vertebrate herbivores, paleosols) and the plant microfossil record (pollen, phytoliths). The distinct biogeography and ecophysiology of modern C3 and C4 grasses have led to hypotheses explaining the origins of C4 grasslands in terms of long term changes in the Earth system such as increased aridity and decreasing atmospheric pCO2. However, proxies for key parameters of these hypotheses (e.g., temperature, precipitation, pCO2) are still in development, not yet widely applied, or remain contentious, so testing the hypotheses globally remains difficult. To understand better possible links between changes in the Earth system and the origin of C4 grasslands on different continents, we are undertaking a global scale comparison between observational records of C4 grass abundances in Miocene and Pliocene localities compiled from the literature, and three increasingly complex models of C4 dominance and abundance. The literature compilation comprises >2,600 δ13C values of both fossil vertebrates and of paleosol carbonates and >6,700 paleobotanical records. We are using paleoclimate output from the HadCM3L GCM over a range of pCO2 values for each epoch to model C4 dominance or abundance in grid cells as (Model 1) months per year exceeding the temperature at which net assimilation is greater for C4 than C3 photosynthesis (crossover temperature); (Model 2) the number of months per year exceeding the crossover temperature and having sufficient precipitation for growth (≥25 cm/yr; Collatz model); and (Model 3) the Sheffield Dynamic Global Vegetation Model (SDGVM), output from which includes biomass (g C/m2/yr) for distinct structural components (roots, stems, leaves

  11. Key distillation in quantum cryptography

    Science.gov (United States)

    Slutsky, Boris Aron

    1998-11-01

    Quantum cryptography is a technique which permits two parties to communicate over an open channel and establish a shared sequence of bits known only to themselves. This task, provably impossible in classical cryptography, is accomplished by encoding the data on quantum particles and harnessing their unique properties. It is believed that no eavesdropping attack consistent with the laws of quantum theory can compromise the secret data unknowingly to the legitimate users of the channel. Any attempt by a hostile actor to monitor the data carrying particles while in transit reveals itself through transmission errors it must inevitably introduce. Unfortunately, in practice a communication is not free of errors even when no eavesdropping is present. Key distillation is a technique that permits the parties to overcome this difficulty and establish a secret key despite channel defects, under the assumption that every particle is handled independently from other particles by the enemy. In the present work, key distillation is described and its various aspects are studied. A relationship is derived between the average error rate resulting from an eavesdropping attack and the amount of information obtained by the attacker. Formal definition is developed of the security of the final key. The net throughput of secret bits in a quantum cryptosystem employing key distillation is assessed. An overview of quantum cryptographic protocols and related information theoretical results is also given.

  12. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2008-01-01

    Full Text Available Abstract Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  13. Dynamic Session-Key Generation for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Cheng-Ta Li

    2008-09-01

    Full Text Available Recently, wireless sensor networks have been used extensively in different domains. For example, if the wireless sensor node of a wireless sensor network is distributed in an insecure area, a secret key must be used to protect the transmission between the sensor nodes. Most of the existing methods consist of preselecting m keys from a key pool and forming a key chain. Then, the sensor nodes make use of the key chain to encrypt the data. However, while the secret key is being transmitted, it can easily be exposed during transmission. We propose a dynamic key management protocol, which can improve the security of the key juxtaposed to existing methods. Additionally, the dynamic update of the key can lower the probability of the key to being guessed correctly. In addition, with the new protocol, attacks on the wireless sensor network can be avoided.

  14. Multidimensional Welfare Comparisons of EU Member States Before, During, and After the Financial Crisis

    DEFF Research Database (Denmark)

    Hussain, M. Azhar; Siersbæk, Nikolaj; Østerdal, Lars Peter

    How did the financial crisis affect population welfare in EU member states in key dimensions such as income, health, and education? Using EU-SILC data, we seek to answer this question by way of first order dominance comparisons between countries and over time. The novel feature of our study...... is that we perform welfare comparisons on the basis of multi-level multidimensional ordinal data. We find that the countries most often dominated are southern and eastern European member states, and the dominant countries are mostly northern and western European member states. However, for most country...

  15. Securing information using optically generated biometric keys

    Science.gov (United States)

    Verma, Gaurav; Sinha, Aloka

    2016-11-01

    In this paper, we present a new technique to obtain biometric keys by using the fingerprint of a person for an optical image encryption system. The key generation scheme uses the fingerprint biometric information in terms of the amplitude mask (AM) and the phase mask (PM) of the reconstructed fingerprint image that is implemented using the digital holographic technique. Statistical tests have been conducted to check the randomness of the fingerprint PM key that enables its usage as an image encryption key. To explore the utility of the generated biometric keys, an optical image encryption system has been further demonstrated based on the phase retrieval algorithm and the double random phase encoding scheme in which keys for the encryption are used as the AM and the PM key. The advantage associated with the proposed scheme is that the biometric keys’ retrieval requires the simultaneous presence of the fingerprint hologram and the correct knowledge of the reconstruction parameters at the decryption stage, which not only verifies the authenticity of the person but also protects the valuable fingerprint biometric features of the keys. Numerical results are carried out to prove the feasibility and the effectiveness of the proposed encryption system.

  16. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  17. SUPPLY CHAIN MANAGEMENT – KEY FACTORS

    Directory of Open Access Journals (Sweden)

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  18. Key Points to Facilitate the Adoption of Computer-Based Assessments.

    Science.gov (United States)

    Burr, S A; Chatterjee, A; Gibson, S; Coombes, L; Wilkinson, S

    2016-01-01

    There are strong pedagogical arguments in favor of adopting computer-based assessment. The risks of technical failure can be managed and are offset by improvements in cost-effectiveness and quality assurance capability. Academic, administrative, and technical leads at an appropriately senior level within an institution need to be identified, so that they can act as effective advocates. All stakeholder groups need to be represented in undertaking a detailed appraisal of requirements and shortlisting software based on core functionality, summative assessment life cycle needs, external compatibility, security, and usability. Any software that is a candidate for adoption should be trialed under simulated summative conditions, with all stakeholders having a voice in agreeing the optimum solution. Transfer to a new system should be carefully planned and communicated, with a programme of training established to maximize the success of adoption.

  19. Key Points to Facilitate the Adoption of Computer-Based Assessments

    Directory of Open Access Journals (Sweden)

    S.A. Burr

    2016-01-01

    Full Text Available There are strong pedagogical arguments in favor of adopting computer-based assessment. The risks of technical failure can be managed and are offset by improvements in cost-effectiveness and quality assurance capability. Academic, administrative, and technical leads at an appropriately senior level within an institution need to be identified, so that they can act as effective advocates. All stakeholder groups need to be represented in undertaking a detailed appraisal of requirements and shortlisting software based on core functionality, summative assessment life cycle needs, external compatibility, security, and usability. Any software that is a candidate for adoption should be trialed under simulated summative conditions, with all stakeholders having a voice in agreeing the optimum solution. Transfer to a new system should be carefully planned and communicated, with a programme of training established to maximize the success of adoption.

  20. Model plant Key Measurement Points

    International Nuclear Information System (INIS)

    Schneider, R.A.

    1984-01-01

    For IAEA safeguards a Key Measurement Point is defined as the location where nuclear material appears in such a form that it may be measured to determine material flow or inventory. This presentation describes in an introductory manner the key measurement points and associated measurements for the model plant used in this training course

  1. Results of the EURAMET.RI(II)-S6.I-129 supplementary comparison

    Science.gov (United States)

    García-Toraño, Eduardo; Altzitzoglou, Timotheos; Auerbach, Pavel; Bé, Marie-Martine; Lourenço, Valérie; Bobin, Christophe; Cassette, Philippe; Dersch, Rainer; Kossert, Karsten; Nähle, Ole; Peyrés, Virginia; Pommé, Stefaan; Rozkov, Andrej; Sanchez-Cabezudo, Anabel; Sochoro&vacute; , Jana

    2015-01-01

    An international comparison of the long-lived gamma-ray emitter 129I has been recently completed. A total of 5 laboratories measured a solution prepared by Centro de Investigaciones Energéticas, Medioambientales y Tecnológicas (CIEMAT). Aliquots of the master solution were standardized in terms of activity per mass unit by participant laboratories using 4 different techniques. The results of the comparison can be used as the basis for establishing the equivalence among the laboratories. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCRI, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  2. Bilateral Comparison Between NIM and NMC Over the Temperature Range from 83.8058 K to 692.677 K

    Science.gov (United States)

    Sun, Jianping; Ye, Shaochun; Kho, Haoyuan; Zhang, Jintao; Wang, Li

    2015-08-01

    A bilateral comparison of local realization of the International Temperature Scale of 1990 between the National Institute of Metrology (NIM) and National Metrology Centre (NMC) was carried out over the temperature range from 83.8058 K to 692.677 K. It involved six fixed points including the argon triple point, the mercury triple point, the triple point of water, the melting point of gallium, the freezing point of tin, and the freezing point of zinc. In 2009, NMC asked NIM to participate in a bilateral comparison to link the NMC results to the Consultative Committee for Thermometry Key Comparison 3 (CCT-K3) and facilitate the NMC's calibration and measurement capabilities submission. This comparison was agreed by NIM and Asia Pacific Metrology Programme in 2009, and registered in the Key Comparison Database in 2010 as CCT-K3.2. NMC supplied two fused silica sheath standard platinum resistance thermometers (SPRTs) as traveling standards. One of them was used at the Ga, Sn, and Zn fixed points, while the other one was used at the Ar and Hg fixed points. NMC measured them before and after NIM measured them. During the comparison, a criterion for the SPRT was set as the stability at the triple point of water to be less than 0.3 mK. The results for both laboratories are summarized. A proposal for linking the NMC's comparison results to CCT-K3 is presented. The difference between NMC and NIM and the difference between NMC and the CCT-K3 average reference value using NIM as a link are reported with expanded uncertainties at each measured fixed point.

  3. Competency Assessment Using Key Performance Indicators

    OpenAIRE

    Elena Alexandra Toader; Laura Brad

    2015-01-01

    The paper proposes a method for computing the scores of the key performance indicators resulted in the competency assessment process. The key performance indicators are estimated considering four performance levels that an IT professional can obtain at the end of the assessment process. We suggest as the best approach for estimating the performance key indicators an online questionnaire filled by 60 employees that work in IT Romanian companies. The results provide evidence that the difference...

  4. BIPM comparison BIPM.RI(II)-K1.Eu-152 of activity measurements of the radionuclide 152Eu for the VNIIM (Russia), the LNE-LNHB (France) and the CNEA (Argentina), with linked results for the COOMET.RI(II)-K2.Eu-152 comparison

    International Nuclear Information System (INIS)

    Michotte, C.; Ratel, G.; Courte, S.; Kharitonov, I.A.; Zanevsky, A.V.; Terechtchenko, E.E.; Moune, M.; Aubineau-Laniece, I.; Bobin, C.; Arenillas, P.; Balpardo, C.

    2014-01-01

    Three new participants in the BIPM.RI(II)-K1.Eu-152 comparison have been added to the previous results and this has produced a revised value for the key comparison reference value (KCRV), calculated using the power-moderated weighted mean. A link has been made to the COOMET.RI(II)-K2.Eu-152 comparison held in 2010 through the VNIIM who participated in both comparisons. Three National Metrology Institutes (NMIs) used the K1 or K2 comparisons to update their degree of equivalence. The degrees of equivalence between each equivalent activity measured in the International Reference System (SIR) and the KCRV have been calculated and the results are given in the form of a table for four NMIs in the BIPM.RI(II)-K1.Eu-152 comparison, three participants in the COOMET.RI(II)-K2.Eu-152 comparison and the 18 other participants in the previous CCRI(II)-K2.Eu-152 comparison. A graphical presentation is also given. (authors)

  5. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  6. A Novel Key Distribution Solution for Combined Public/Secret Key ...

    African Journals Online (AJOL)

    Moreover, an implementation over the new IPv6 Internet protocol is presented such that the system can be ported to both wired and wireless networking environments. Keywords: cryptography, key distribution, security server. AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors ...

  7. Comparison of source-term calculations using the AREST and SYVAC-Vault models: [Final report

    International Nuclear Information System (INIS)

    Apted, M.J.; Engel, D.W.; Garisto, N.C.; LeNeveu, D.M.

    1988-07-01

    A comparison of the calculated radionuclide release from a waste package in a geologic repository has been performed using the verified SYVAC-Vault Model and AREST Model. the purpose of this comparison is to further establish the credibility of these codes for predictive performance assessment and to identify improvements that may be required. A reference case for a Canadian conceptual design with spent fuel as the waste form was chosen to make an initial comparison. The results from the two models were in good agreement, including peak release rates, time to reach peak release, and long term release rates. Differences in results from the two models are attributed to differences in computational approaches. Studies of the effects of sorption, convective flow, distributed containment failure, and precipitation are identified as key areas for further comparisons and are currently in progress. 11 refs., 3 figs., 5 tabs

  8. Enciphered Data Steganography Using Secret Key

    Directory of Open Access Journals (Sweden)

    BANGALORE G.Tilak

    2010-10-01

    Full Text Available A new method is proposed to maintain thesecrecy of data by enciphering and embedding using asecret key. There is no restriction on the length of thekey used to encipher and embed the data. Since the keyis not stored for validation, it prevents unauthorizedaccess to the key, even if decoding procedure is known.The correct message can be recovered only with thespecific key used in encipherment and embedding. Thismethod can also be used for multiple levelsteganography.

  9. Fully device-independent conference key agreement

    Science.gov (United States)

    Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie

    2018-02-01

    We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N -1 . We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N -1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  10. Key World Energy Statistics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997. This new edition responds to the enormously positive reaction to the book since then. Key World Energy Statistics produced by the IEA contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts. It exists in different formats to suit our readers' requirements.

  11. Factors influencing nurse participation in continuing professional development activities : Survey results from the Netherlands

    NARCIS (Netherlands)

    Brekelmans, G.A.; Maassen, S.; Poell, R.F.; Weststrate, J.; Geurdes, E.

    2016-01-01

    Background Professionals are individually responsible for planning and carrying out continuing professional development (CPD) activities, ensuring their relevance to current practice and career development. The key factors that encourage nurses to undertake CPD activities are not yet clear. Several

  12. What are the key drivers of MAC curves? A partial-equilibrium modelling approach for the UK

    International Nuclear Information System (INIS)

    Kesicki, Fabian

    2013-01-01

    Marginal abatement cost (MAC) curves are widely used for the assessment of costs related to CO 2 emissions reduction in environmental economics, as well as domestic and international climate policy. Several meta-analyses and model comparisons have previously been performed that aim to identify the causes for the wide range of MAC curves. Most of these concentrate on general equilibrium models with a focus on aspects such as specific model type and technology learning, while other important aspects remain almost unconsidered, including the availability of abatement technologies and level of discount rates. This paper addresses the influence of several key parameters on MAC curves for the United Kingdom and the year 2030. A technology-rich energy system model, UK MARKAL, is used to derive the MAC curves. The results of this study show that MAC curves are robust even to extreme fossil fuel price changes, while uncertainty around the choice of the discount rate, the availability of key abatement technologies and the demand level were singled out as the most important influencing factors. By using a different model type and studying a wider range of influencing factors, this paper contributes to the debate on the sensitivity of MAC curves. - Highlights: ► A partial-equilibrium model is employed to test key sensitivities of MAC curves. ► MAC curves are found to be robust to wide-ranging changes in fossil fuel prices. ► Most influencing factors are the discount rate, availability of key technologies. ► Further important uncertainty in MAC curves is related to demand changes

  13. Key numbers: Energy

    International Nuclear Information System (INIS)

    1994-01-01

    The key numbers of energy give statistical data related to production, consumption, and to foreign trade of each energy in the World and in France. A chapter is dedicated to environment and brings quantitative elements on pollutant emissions connected to energy uses

  14. Depression and key associated factors in female sex workers and women living with HIV/AIDS in the Dominican Republic.

    Science.gov (United States)

    Rael, Christine T; Davis, Alissa

    2017-04-01

    Little is known about the mental health of female sex workers and women living with HIV/AIDS in the Dominican Republic, which impedes HIV prevention, testing, and treatment. This project estimates the prevalence of depression and identifies key contributing factors to this outcome in female sex workers, women living with HIV/AIDS, and a comparison group. Participants were female sex workers (N = 349), women living with HIV/AIDS (N = 213), and a comparison group of HIV-negative women who were not sex workers (N = 314) from the Dominican Republic. Participants completed questionnaires assessing demographic characteristics and depression. Female sex workers and women living with HIV/AIDS completed additional questionnaires ascertaining HIV or sex work-related internalized stigma. Depression was prevalent among female sex workers (70.2%), women living with HIV/AIDS (81.1%), and the comparison group (52.2%). Adjusted logistic regressions showed that internalized stigma was associated with depression for female sex workers (OR = 2.73; 95% CI = 1.95-3.84) and women living with HIV/AIDS (OR = 3.06; 95% CI = 1.86-5.05). Permanent income was associated with this outcome for female sex workers (OR = 0.08; 95% CI = 0.01-0.80) and the comparison group (OR = 0.04; 95% CI = 0.00-0.45).

  15. Multiparty quantum key agreement with single particles

    Science.gov (United States)

    Liu, Bin; Gao, Fei; Huang, Wei; Wen, Qiao-yan

    2013-04-01

    Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

  16. Comparison of high-latitude thermospheric meridionalwinds I: optical and radar experimental comparisons

    Directory of Open Access Journals (Sweden)

    E. M. Griffin

    2004-03-01

    Full Text Available Thermospheric neutral winds at Kiruna, Sweden (67.4°N, 20.4°E are compared using both direct optical Fabry-Perot Interferometer (FPI measurements and those derived from European incoherent scatter radar (EISCAT measurements. This combination of experimental data sets, both covering well over a solar cycle of data, allows for a unique comparison of the thermospheric meridional component of the neutral wind as observed by different experimental techniques. Uniquely in this study the EISCAT measurements are used to provide winds for comparison using two separate techniques: the most popular method based on the work of Salah and Holt (1974 and the Meridional Wind Model (MWM (Miller et al., 1997 application of servo theory. The balance of forces at this location that produces the observed diurnal pattern are investigated using output from the Coupled Thermosphere and Ionosphere (CTIM numerical model. Along with detailed comparisons from short periods the climatological behaviour of the winds have been investigated for seasonal and solar cycle dependence using the experimental techniques. While there are features which are consistent between the 3 techniques, such as the evidence of the equinoctial asymmetry, there are also significant differences between the techniques both in terms of trends and absolute values. It is clear from this and previous studies that the high-latitude representation of the thermospheric neutral winds from the empirical Horizontal Wind Model (HWM, though improved from earlier versions, lacks accuracy in many conditions. The relative merits of each technique are discussed and while none of the techniques provides the perfect data set to address model performance at high-latitude, one or more needs to be included in future HWM reformulations.

    Key words. Meteorology and atmospheric dynamics (thermospheric dynamics, Ionosphere (ionosphere-atmosphere interactions, auroral ionosphere

  17. Comparison of high-latitude thermospheric meridionalwinds I: optical and radar experimental comparisons

    Directory of Open Access Journals (Sweden)

    E. M. Griffin

    2004-03-01

    Full Text Available Thermospheric neutral winds at Kiruna, Sweden (67.4°N, 20.4°E are compared using both direct optical Fabry-Perot Interferometer (FPI measurements and those derived from European incoherent scatter radar (EISCAT measurements. This combination of experimental data sets, both covering well over a solar cycle of data, allows for a unique comparison of the thermospheric meridional component of the neutral wind as observed by different experimental techniques. Uniquely in this study the EISCAT measurements are used to provide winds for comparison using two separate techniques: the most popular method based on the work of Salah and Holt (1974 and the Meridional Wind Model (MWM (Miller et al., 1997 application of servo theory. The balance of forces at this location that produces the observed diurnal pattern are investigated using output from the Coupled Thermosphere and Ionosphere (CTIM numerical model. Along with detailed comparisons from short periods the climatological behaviour of the winds have been investigated for seasonal and solar cycle dependence using the experimental techniques. While there are features which are consistent between the 3 techniques, such as the evidence of the equinoctial asymmetry, there are also significant differences between the techniques both in terms of trends and absolute values. It is clear from this and previous studies that the high-latitude representation of the thermospheric neutral winds from the empirical Horizontal Wind Model (HWM, though improved from earlier versions, lacks accuracy in many conditions. The relative merits of each technique are discussed and while none of the techniques provides the perfect data set to address model performance at high-latitude, one or more needs to be included in future HWM reformulations. Key words. Meteorology and atmospheric dynamics (thermospheric dynamics, Ionosphere (ionosphere-atmosphere interactions, auroral ionosphere

  18. Institutional Racist Melancholia: A Structural Understanding of Grief and Power in Schooling

    Science.gov (United States)

    Vaught, Sabina E.

    2012-01-01

    In this article, Sabina Vaught undertakes the theoretical and analytical project of conceptually integrating "Whiteness as property", a key structural framework of Critical Race Theory (CRT), and "melancholia", a framework originally emerging from psychoanalysis. Specifically, Vaught engages "Whiteness as property" as…

  19. Paediatric Abdominal Surgical Emergencies in a General Surgical ...

    African Journals Online (AJOL)

    ... organized for general surgeons undertaking paediatric surgical emergencies. More paediatric surgeons should be trained and more paediatric surgical units should established in the country. Key Words: Paediatric Abdominal Surgical Emergencies; Paediatric Surgeons, General Surgeons. Journal of College of Medicine ...

  20. Key performance indicators

    NARCIS (Netherlands)

    Zwetsloot, G.I.J.M.

    2014-01-01

    This paper addresses how organisations can use OSH performance indicators. This is an important way to mainstream OSH into business management. Key performance indicators (KPIs) should provide objective data on the OSH situation. It is often said that ‘what gets measured gets managed’. Without

  1. Differential phase-shift keying and channel equalization in free space optical communication system

    Science.gov (United States)

    Zhang, Dai; Hao, Shiqi; Zhao, Qingsong; Wan, Xiongfeng; Xu, Chenlu

    2018-01-01

    We present the performance benefits of differential phase-shift keying (DPSK) modulation in eliminating influence from atmospheric turbulence, especially for coherent free space optical (FSO) communication with a high communication rate. Analytic expression of detected signal is derived, based on which, homodyne detection efficiency is calculated to indicate the performance of wavefront compensation. Considered laser pulses always suffer from atmospheric scattering effect by clouds, intersymbol interference (ISI) in high-speed FSO communication link is analyzed. Correspondingly, the channel equalization method of a binormalized modified constant modulus algorithm based on set-membership filtering (SM-BNMCMA) is proposed to solve the ISI problem. Finally, through the comparison with existing channel equalization methods, its performance benefits of both ISI elimination and convergence speed are verified. The research findings have theoretical significance in a high-speed FSO communication system.

  2. Transcriptome analysis of adiposity in domestic ducks by transcriptomic comparison with their wild counterparts.

    Science.gov (United States)

    Chen, L; Luo, J; Li, J X; Li, J J; Wang, D Q; Tian, Y; Lu, L Z

    2015-06-01

    Excessive adiposity is a major problem in the duck industry, but its molecular mechanisms remain unknown. Genetic comparisons between domestic and wild animals have contributed to the exploration of genetic mechanisms responsible for many phenotypic traits. Significant differences in body fat mass have been detected between domestic and wild ducks. In this study, we used the Peking duck and Anas platyrhynchos as the domestic breed and wild counterpart respectively and performed a transcriptomic comparison of abdominal fat between the two breeds to comprehensively analyze the transcriptome basis of adiposity in ducks. We obtained approximately 350 million clean reads; assembled 61 250 transcripts, including 23 699 novel ones; and identified alternative 5' splice sites, alternative 3' splice sites, skipped exons and retained intron as the main alternative splicing events. A differential expression analysis between the two breeds showed that 753 genes exhibited differential expression. In Peking ducks, some lipid metabolism-related genes (IGF2, FABP5, BMP7, etc.) and oncogenes (RRM2, AURKA, CYR61, etc.) were upregulated, whereas genes related to tumor suppression and immunity (TNFRSF19, TNFAIP6, IGSF21, NCF1, etc.) were downregulated, suggesting adiposity might closely associate with tumorigenesis in ducks. Furthermore, 280 576 single-nucleotide variations were found differentiated between the two breeds, including 8641 non-synonymous ones, and some of the non-synonymous ones were found enriched in genes involved in lipid-associated and immune-associated pathways, suggesting abdominal fat of the duck undertakes both a metabolic function and immune-related function. These datasets enlarge our genetic information of ducks and provide valuable resources for analyzing mechanisms underlying adiposity in ducks. © 2015 Stichting International Foundation for Animal Genetics.

  3. SUPPLEMENTARY COMPARISON: Final report on supplementary comparison APMP-T-S3-03 of industrial platinum resistance and liquid in glass thermometers from -40 °C to 250 °C

    Science.gov (United States)

    Norranim, Uthai; Nguyen, Mong Kim; Ballico, Mark J.

    2007-01-01

    Industrial thermometers such as industrial platinum resistance thermometers (iprts) and liquid-in-glass thermometers (LIGTs) are widely used in industry. Because Key Comparisons are limited to direct realizations of ITS-90, and not all APMP NMIs have participated in them, the national metrology institutes (NMIs) of Thailand and Australia (NIMT and NIMA) organized an APMP supplementary comparison to support the approval of CMCs (calibration and measurement capabilities) for these laboratories. The comparison, performed in 2003, covered the range from -40.0 °C to 250.0 °C, using IPRTs (Hart Scientific 5626-12-S), total immersion (ASTM 62C, 120C) and partial immersion (ASTM 40C) LIGTs. Ten NMIs from the APMP: KIM-LIPI (Indonesia), ITDI (Philippines), MSL (New Zealand), NBSM (Nepal), NMIA (Australia), NIMT (Thailand), SCL (Hong Kong), SIRIM (Malaysia), SPRING (Singapore) and VMI (Vietnam) were divided into two loops to shorten the circulation time, and these were linked by the two pilot laboratories. This report describes details of the artifacts, the circulation schedule, the measurement procedures, the results submitted by participants, uncertainties and the analysis of the results. Reference values calculated using simple mean, median and weighted mean were consistent with each other, but as the Birge criterion was satisfied, the weighted mean with its lower uncertainty was adopted. The artifacts were found to be stable over the comparison and the results of the loop linking labs consistent, allowing an uncertainty of 2 mK to 4 mK to be achieved for the IPRT reference value and 10 mK to 20 mK for the LIGT reference values. These uncertainties allowed the comparison data to be used to adequately test the uncertainties of all the participant laboratories, and hence to directly support their CMC claims. Main text. To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database

  4. Privacy for Key-Trees with Adaptive Adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2011-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Butty´an [3] and Beye and Veugen

  5. Anonymity for key-trees with adaptive adversaries

    NARCIS (Netherlands)

    Beye, M.; Veugen, P.J.M.

    2012-01-01

    Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen

  6. Secure image retrieval with multiple keys

    Science.gov (United States)

    Liang, Haihua; Zhang, Xinpeng; Wei, Qiuhan; Cheng, Hang

    2018-03-01

    This article proposes a secure image retrieval scheme under a multiuser scenario. In this scheme, the owner first encrypts and uploads images and their corresponding features to the cloud; then, the user submits the encrypted feature of the query image to the cloud; next, the cloud compares the encrypted features and returns encrypted images with similar content to the user. To find the nearest neighbor in the encrypted features, an encryption with multiple keys is proposed, in which the query feature of each user is encrypted by his/her own key. To improve the key security and space utilization, global optimization and Gaussian distribution are, respectively, employed to generate multiple keys. The experiments show that the proposed encryption can provide effective and secure image retrieval for each user and ensure confidentiality of the query feature of each user.

  7. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  8. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  9. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  10. Nickel exposure from keys: alternatives for protection and prevention.

    Science.gov (United States)

    Hamann, Dathan; Scheman, Andrew J; Jacob, Sharon E

    2013-01-01

    Keys are an important exposure source of metal allergens to consumers and confer a significant problem for nickel-allergic individuals because of repeated daily use. The aims of this study were to investigate the frequency of nickel and cobalt release in keys and to consider the effectiveness of coatings for preventing metallic allergen release from common metal allergen-releasing keys. Keys from a variety of common stores were nickel and cobalt spot tested. Nickel-releasing keys were coated with enamel sprays, subjected to a use test, and retested to assess for metal allergen release. Of 55 tested keys, 80% showed a strong positive result to the nickel spot test. None of the tested keys exhibited cobalt release. No keys initially released nickel after enamel coatings. Key coatings chipped at the portion inserted into a lock after 30 insertions, and keys were found to release nickel. The handle of the key was not found to release nickel after 60 insertions. Nickel release from keys is very common; nickel-allergic consumers should consider purchasing keys that do not release nickel (eg, brass, anodized). Enamel coating may be useful in protecting nickel-sensitive individuals from their keys but cannot consistently prevent nickel-release from portions used frequently.

  11. Information verification cryptosystem using one-time keys based on double random phase encoding and public-key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-08-01

    A novel image encryption system based on double random phase encoding (DRPE) and RSA public-key algorithm is proposed. The main characteristic of the system is that each encryption process produces a new decryption key (even for the same plaintext), thus the encryption system conforms to the feature of the one-time pad (OTP) cryptography. The other characteristic of the system is the use of fingerprint key. Only with the rightful authorization will the true decryption be obtained, otherwise the decryption will result in noisy images. So the proposed system can be used to determine whether the ciphertext is falsified by attackers. In addition, the system conforms to the basic agreement of asymmetric cryptosystem (ACS) due to the combination with the RSA public-key algorithm. The simulation results show that the encryption scheme has high robustness against the existing attacks.

  12. Comparison of INTAKE24 (an Online 24-h Dietary Recall Tool) with Interviewer-Led 24-h Recall in 11-24 Year-Old.

    Science.gov (United States)

    Bradley, Jennifer; Simpson, Emma; Poliakov, Ivan; Matthews, John N S; Olivier, Patrick; Adamson, Ashley J; Foster, Emma

    2016-06-09

    Online dietary assessment tools offer a convenient, low cost alternative to traditional dietary assessment methods such as weighed records and face-to-face interviewer-led 24-h recalls. INTAKE24 is an online multiple pass 24-h recall tool developed for use with 11-24 year-old. The aim of the study was to undertake a comparison of INTAKE24 (the test method) with interviewer-led multiple pass 24-h recalls (the comparison method) in 180 people aged 11-24 years. Each participant completed both an INTAKE24 24-h recall and an interviewer-led 24-h recall on the same day on four occasions over a one-month period. The daily energy and nutrient intakes reported in INTAKE24 were compared to those reported in the interviewer-led recall. Mean intakes reported using INTAKE24 were similar to the intakes reported in the interviewer-led recall for energy and macronutrients. INTAKE24 was found to underestimate energy intake by 1% on average compared to the interviewer-led recall with the limits of agreement ranging from minus 49% to plus 93%. Mean intakes of all macronutrients and micronutrients (except non-milk extrinsic sugars) were within 4% of the interviewer-led recall. Dietary assessment that utilises technology may offer a viable alternative and be more engaging than paper based methods, particularly for children and young adults.

  13. Formal Analysis of Key Integrity in PKCS#11

    Science.gov (United States)

    Falcone, Andrea; Focardi, Riccardo

    PKCS#11 is a standard API to cryptographic devices such as smarcards, hardware security modules and usb crypto-tokens. Though widely adopted, this API has been shown to be prone to attacks in which a malicious user gains access to the sensitive keys stored in the devices. In 2008, Delaune, Kremer and Steel proposed a model to formally reason on this kind of attacks. We extend this model to also describe flaws that are based on integrity violations of the stored keys. In particular, we consider scenarios in which a malicious overwriting of keys might fool honest users into using attacker's own keys, while performing sensitive operations. We further enrich the model with a trusted key mechanism ensuring that only controlled, non-tampered keys are used in cryptographic operations, and we show how this modified API prevents the above mentioned key-replacement attacks.

  14. Keyed shear joints

    DEFF Research Database (Denmark)

    Hansen, Klaus

    This report gives a summary of the present information on the behaviour of vertical keyed shear joints in large panel structures. An attemp is made to outline the implications which this information might have on the analysis and design of a complete wall. The publications also gives a short...

  15. Exploration of the Future – a Key to Sustainable Development

    Directory of Open Access Journals (Sweden)

    Vatroslav Zovko

    2013-01-01

    Full Text Available Throughout the history people were fascinated and curious about the future. The future was, and still is seen as a key for prosperous development in all aspects of the society. As such, new discipline is developed – future studies.This paper discusses the discipline of future studies and its role in the society and science. Future studies are analyzed in the context of sustainable development. It is argued that future studies and sustainable development are complementary in nature. Based on analysis of most developed countries in the world, that spend the greatest portion of their budget on research, development and science in comparison to the rest of the world, there is a conclusive link between investments in research, development and science, and the recognition of the importance of thinking about the future. Those countries started to formalize their future orientation in many respected research centres and universities through their educational programs and research. That situation poses the need for other, less well off countries, to follow up.

  16. The Complete Chloroplast Genome of a Key Ancestor of Modern Roses, Rosa chinensis var. spontanea, and a Comparison with Congeneric Species

    Directory of Open Access Journals (Sweden)

    Hong-Ying Jian

    2018-02-01

    Full Text Available Rosa chinensis var. spontanea, an endemic and endangered plant of China, is one of the key ancestors of modern roses and a source for famous traditional Chinese medicines against female diseases, such as irregular menses and dysmenorrhea. In this study, the complete chloroplast (cp genome of R. chinensis var. spontanea was sequenced, analyzed, and compared to congeneric species. The cp genome of R. chinensis var. spontanea is a typical quadripartite circular molecule of 156,590 bp in length, including one large single copy (LSC region of 85,910 bp and one small single copy (SSC region of 18,762 bp, separated by two inverted repeat (IR regions of 25,959 bp. The GC content of the whole genome is 37.2%, while that of LSC, SSC, and IR is 42.8%, 35.2% and 31.2%, respectively. The genome encodes 129 genes, including 84 protein-coding genes (PCGs, 37 transfer RNA (tRNA genes, and eight ribosomal RNA (rRNA genes. Seventeen genes in the IR regions were found to be duplicated. Thirty-three forward and five inverted repeats were detected in the cp genome of R. chinensis var. spontanea. The genome is rich in SSRs. In total, 85 SSRs were detected. A genome comparison revealed that IR contraction might be the reason for the relatively smaller cp genome size of R. chinensis var. spontanea compared to other congeneric species. Sequence analysis revealed that the LSC and SSC regions were more divergent than the IR regions within the genus Rosa and that a higher divergence occurred in non-coding regions than in coding regions. A phylogenetic analysis showed that the sampled species of the genus Rosa formed a monophyletic clade and that R. chinensis var. spontanea shared a more recent ancestor with R. lichiangensis of the section Synstylae than with R. odorata var. gigantea of the section Chinenses. This information will be useful for the conservation genetics of R. chinensis var. spontanea and for the phylogenetic study of the genus Rosa, and it might also

  17. The Complete Chloroplast Genome of a Key Ancestor of Modern Roses, Rosa chinensis var. spontanea, and a Comparison with Congeneric Species.

    Science.gov (United States)

    Jian, Hong-Ying; Zhang, Yong-Hong; Yan, Hui-Jun; Qiu, Xian-Qin; Wang, Qi-Gang; Li, Shu-Bin; Zhang, Shu-Dong

    2018-02-12

    Rosa chinensis var. spontanea , an endemic and endangered plant of China, is one of the key ancestors of modern roses and a source for famous traditional Chinese medicines against female diseases, such as irregular menses and dysmenorrhea. In this study, the complete chloroplast (cp) genome of R. chinensis var. spontanea was sequenced, analyzed, and compared to congeneric species. The cp genome of R. chinensis var. spontanea is a typical quadripartite circular molecule of 156,590 bp in length, including one large single copy (LSC) region of 85,910 bp and one small single copy (SSC) region of 18,762 bp, separated by two inverted repeat (IR) regions of 25,959 bp. The GC content of the whole genome is 37.2%, while that of LSC, SSC, and IR is 42.8%, 35.2% and 31.2%, respectively. The genome encodes 129 genes, including 84 protein-coding genes (PCGs), 37 transfer RNA (tRNA) genes, and eight ribosomal RNA (rRNA) genes. Seventeen genes in the IR regions were found to be duplicated. Thirty-three forward and five inverted repeats were detected in the cp genome of R. chinensis var. spontanea. The genome is rich in SSRs. In total, 85 SSRs were detected. A genome comparison revealed that IR contraction might be the reason for the relatively smaller cp genome size of R. chinensis var. spontanea compared to other congeneric species. Sequence analysis revealed that the LSC and SSC regions were more divergent than the IR regions within the genus Rosa and that a higher divergence occurred in non-coding regions than in coding regions. A phylogenetic analysis showed that the sampled species of the genus Rosa formed a monophyletic clade and that R. chinensis var. s pontanea shared a more recent ancestor with R. lichiangensis of the section Synstylae than with R. odorata var. gigantea of the section Chinenses . This information will be useful for the conservation genetics of R. chinensis var. spontanea and for the phylogenetic study of the genus Rosa , and it might also facilitate the

  18. Nickel exposure from keys: a Brazilian issue.

    Science.gov (United States)

    Suzuki, Nathalie Mie; Duarte, Ida Alzira Gomes; Hafner, Mariana de Figueiredo Silva; Lazzarini, Rosana

    2017-01-01

    Keys are a significant source of exposure to metal allergens and can be a relevant problem for nickel-allergic individuals. This study aimed to perform nickel and cobalt spot testing among the 5 most common Brazilian brands of keys. Among the tested keys, 100% showed positive result to nickel spot test, 83,3% presented strong positive reaction. 50% exhibited cobalt release as well. Nickel release from keys is very common in our country and may cause a negative impact on sensitized individual's quality of life. Study's results highlight the importance of establishing directives to regulate nickel release in Brazil.

  19. International comparison CCQM-K119 liquefied petroleum gas

    Science.gov (United States)

    Brewer, P. J.; Downey, M. L.; Atkins, E.; Brown, R. J. C.; Brown, A. S.; Zalewska, E. T.; van der Veen, A. M. H.; Smeulders, D. E.; McCallum, J. B.; Satumba, R. T.; Kim, Y. D.; Kang, N.; Bae, H. K.; Woo, J. C.; Konopelko, L. A.; Popova, T. A.; Meshkov, A. V.; Efremova, O. V.; Kustikov, Y.

    2018-01-01

    Liquefied hydrocarbon mixtures with traceable composition are required in order to underpin measurements of the composition and other physical properties of LPG (liquefied petroleum gas), thus meeting the needs of an increasingly large industrial market. This comparison aims to assess the analytical capabilities of laboratories for measuring the composition of a Liquid Petroleum Gas (LPG) mixture when sampled in the liquid phase from a Constant Pressure Cylinder. Mixtures contained ethane, propane, propene, i-butane, n-butane, but-1-ene and i-pentane with nominal amount fractions of 2, 71, 9, 4, 10, 3 and 1 cmol mol-1 respectively. Main text To reach the main text of this paper, click on Final Report. Note that this text is that which appears in Appendix B of the BIPM key comparison database kcdb.bipm.org/. The final report has been peer-reviewed and approved for publication by the CCQM, according to the provisions of the CIPM Mutual Recognition Arrangement (CIPM MRA).

  20. Enhanced diffie-hellman algorithm for reliable key exchange

    Science.gov (United States)

    Aryan; Kumar, Chaithanya; Vincent, P. M. Durai Raj

    2017-11-01

    The Diffie -Hellman is one of the first public-key procedure and is a certain way of exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common secret key in Diffie-Hellman algorithm and then they start communicating with each other over the public channel which is known to everyone. A number of internet services are secured by Diffie -Hellman. In Public key cryptosystem, the sender has to trust while receiving the public key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-the-middle attack, the attacker exists in the public channel, the attacker receives the public key of both sender and receiver and sends public keys to sender and receiver which is generated by his own. This is how man-in-the-middle attack is possible on Diffie-Hellman algorithm. Denial of service attack is another attack which is found common on Diffie-Hellman. In this attack, the attacker tries to stop the communication happening between sender and receiver and attacker can do this by deleting messages or by confusing the parties with miscommunication. Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-Hellman algorithm to a next level. In this paper, we are extending the Diffie -Hellman algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key and that secret key is further exchanged between the sender and the receiver so that for each message, a new secret shared key would be generated. The second secret key will be generated by taking primitive root of the first secret key.

  1. Selecting numerical scales for pairwise comparisons

    International Nuclear Information System (INIS)

    Elliott, Michael A.

    2010-01-01

    It is often desirable in decision analysis problems to elicit from an individual the rankings of a population of attributes according to the individual's preference and to understand the degree to which each attribute is preferred to the others. A common method for obtaining this information involves the use of pairwise comparisons, which allows an analyst to convert subjective expressions of preference between two attributes into numerical values indicating preferences across the entire population of attributes. Key to the use of pairwise comparisons is the underlying numerical scale that is used to convert subjective linguistic expressions of preference into numerical values. This scale represents the psychological manner in which individuals perceive increments of preference among abstract attributes and it has important implications about the distribution and consistency of an individual's preferences. Three popular scale types, the traditional integer scales, balanced scales and power scales are examined. Results of a study of 64 individuals responding to a hypothetical decision problem show that none of these scales can accurately capture the preferences of all individuals. A study of three individuals working on an actual engineering decision problem involving the design of a decay heat removal system for a nuclear fission reactor show that the choice of scale can affect the preferred decision. It is concluded that applications of pairwise comparisons would benefit from permitting participants to choose the scale that best models their own particular way of thinking about the relative preference of attributes.

  2. Optimizing Key Updates in Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2011-01-01

    Sensor networks offer the advantages of simple and low–resource communication. Nevertheless, security is of particular importance in many cases such as when sensitive data is communicated or tamper-resistance is required. Updating the security keys is one of the key points in security, which...

  3. Subcarrier multiplexing optical quantum key distribution

    International Nuclear Information System (INIS)

    Ortigosa-Blanch, A.; Capmany, J.

    2006-01-01

    We present the physical principles of a quantum key distribution system that opens the possibility of parallel quantum key distribution and, therefore, of a substantial improvement in the bit rate of such systems. Quantum mechanics allows for multiple measurements at different frequencies and thus we exploit this concept by extending the concept of frequency coding to the case where more than one radio-frequency subcarrier is used for independently encoding the bits onto an optical carrier. Taking advantage of subcarrier multiplexing techniques we demonstrate that the bit rate can be greatly improved as parallel key distribution is enabled

  4. Setting objectives for managing Key deer

    Science.gov (United States)

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  5. Comparative analysis as a basic research orientation: Key methodological problems

    Directory of Open Access Journals (Sweden)

    N P Narbut

    2015-12-01

    Full Text Available To date, the Sociological Laboratory of the Peoples’ Friendship University of Russia has accumulated a vast experience in the field of cross-cultural studies reflected in the publications based on the results of mass surveys conducted in Moscow, Maikop, Beijing, Guangzhou, Prague, Belgrade, and Pristina. However, these publications mainly focus on the comparisons of the empirical data rather than methodological and technical issues, that is why the aim of this article is to identify key problems of the comparative analysis in cross-cultural studies that become evident only if you conduct an empirical research yourself - from the first step of setting the problem and approving it by all the sides (countries involved to the last step of interpreting and comparing the data obtained. The authors are sure that no sociologist would ever doubt the necessity and importance of comparative analysis in the broadest sense of the word, but at the same time very few are ready to discuss its key methodological challenges and prefer to ignore them completely. We summarize problems of the comparative analysis in sociology as follows: (1 applying research techniques to the sample in another country - both in translating and adapting them to different social realities and worldview (in particular, the problematic status of standardization and qualitative approach; (2 choosing “right” respondents to question and relevant cases (cultures to study; (3 designing the research scheme, i.e. justifying the sequence of steps (what should go first - methodology or techniques; (4 accepting the procedures that are correct within one country for cross-cultural work (whether or not that is an appropriate choice.

  6. Diversity of micro-crustaceans in temporary habitats of the province ...

    African Journals Online (AJOL)

    ... and Eucypris virens (Ostracoda). Our results highlight the importance of temporary habitats as potential biodiversity hotspots, in spite of a few carried out by freshwater ecologists and taxonomists in undertaking scientific investigations in these environments. Key words: Ostracoda, cladocera, copepoda, biodiversity, Izmir, ...

  7. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    Science.gov (United States)

    Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu

    2018-04-01

    In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.

  8. The LOFAR Transients Key Science Project

    NARCIS (Netherlands)

    Stappers, B.; Fender, R.; Wijers, R.

    2009-01-01

    The Transients Key Science Project (TKP) is one of six Key Science Projects of the next generation radio telescope LOFAR. Its aim is the study of transient and variable low-frequency radio sources with an extremely broad science case ranging from relativistic jet sources to pulsars, exoplanets,

  9. Ten Key Steps to Developing a Programme of University Mentoring for Newly Enrolled Students

    Directory of Open Access Journals (Sweden)

    Raquel Casado-Muñoz

    2015-05-01

    Full Text Available Peer mentoring or tutoring is an educational guidance method that is growing in universities around the world. Directed at the integration of students over the first year of university studies, it is based on the support and guidance that a more experienced student offers to a recently enrolled fellow student. It is a recent process in Spain which started a little over a decade ago, but each course brings more experiences. This article, derived from research, seeks to identify a series of key steps and ideas to implement this type of programme. The summary of the proposals stems from three main sources: a the experience and assessment of the Mentoring Programme at the University of Burgos; b the review of the peer mentoring programs implemented at 35 Spanish universities; and c the review, comparison and adaptation of formal mentoring to the university according to Perrone (2003.  The outcomes may be especially useful for those universities that wish to start mentoring programmes, and as a source of reflection and comparison for those with greater experience. We believe that special attention should be given on increasing and improving participation in the mentoring of newly enrolled students and on monitoring and assessing the whole process.

  10. Coherent one-way quantum key distribution

    Science.gov (United States)

    Stucki, Damien; Fasel, Sylvain; Gisin, Nicolas; Thoma, Yann; Zbinden, Hugo

    2007-05-01

    Quantum Key Distribution (QKD) consists in the exchange of a secrete key between two distant points [1]. Even if quantum key distribution systems exist and commercial systems are reaching the market [2], there are still improvements to be made: simplify the construction of the system; increase the secret key rate. To this end, we present a new protocol for QKD tailored to work with weak coherent pulses and at high bit rates [3]. The advantages of this system are that the setup is experimentally simple and it is tolerant to reduced interference visibility and to photon number splitting attacks, thus resulting in a high efficiency in terms of distilled secret bits per qubit. After having successfully tested the feasibility of the system [3], we are currently developing a fully integrated and automated prototype within the SECOQC project [4]. We present the latest results using the prototype. We also discuss the issue of the photon detection, which still remains the bottleneck for QKD.

  11. Disposing of the world's excess plutonium

    International Nuclear Information System (INIS)

    McCormick, J.M.; Bullen, D.B.

    1998-01-01

    The authors undertake three key objectives in addressing the issue of plutonium disposition at the end of the Cold War. First, the authors estimate the total global inventory of plutonium both from weapons dismantlement and civil nuclear power reactors. Second, they review past and current policy toward handling this metal by the US, Russia, and other key countries. Third, they evaluate the feasibility of several options (but especially the vitrification and mixed oxide fuel options announced by the Clinton administration) for disposing of the increasing amounts of plutonium available today. To undertake this analysis, the authors consider both the political and scientific problems confronting policymakers in dealing with this global plutonium issue. Interview data with political and technical officials in Washington and at the International Atomic Energy Agency in Vienna, Austria, and empirical inventory data on plutonium from a variety of sources form the basis of their analysis

  12. Multicomponent reactions provide key molecules for secret communication.

    Science.gov (United States)

    Boukis, Andreas C; Reiter, Kevin; Frölich, Maximiliane; Hofheinz, Dennis; Meier, Michael A R

    2018-04-12

    A convenient and inherently more secure communication channel for encoding messages via specifically designed molecular keys is introduced by combining advanced encryption standard cryptography with molecular steganography. The necessary molecular keys require large structural diversity, thus suggesting the application of multicomponent reactions. Herein, the Ugi four-component reaction of perfluorinated acids is utilized to establish an exemplary database consisting of 130 commercially available components. Considering all permutations, this combinatorial approach can unambiguously provide 500,000 molecular keys in only one synthetic procedure per key. The molecular keys are transferred nondigitally and concealed by either adsorption onto paper, coffee, tea or sugar as well as by dissolution in a perfume or in blood. Re-isolation and purification from these disguises is simplified by the perfluorinated sidechains of the molecular keys. High resolution tandem mass spectrometry can unequivocally determine the molecular structure and thus the identity of the key for a subsequent decryption of an encoded message.

  13. Partitioned key-value store with atomic memory operations

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2017-02-07

    A partitioned key-value store is provided that supports atomic memory operations. A server performs a memory operation in a partitioned key-value store by receiving a request from an application for at least one atomic memory operation, the atomic memory operation comprising a memory address identifier; and, in response to the atomic memory operation, performing one or more of (i) reading a client-side memory location identified by the memory address identifier and storing one or more key-value pairs from the client-side memory location in a local key-value store of the server; and (ii) obtaining one or more key-value pairs from the local key-value store of the server and writing the obtained one or more key-value pairs into the client-side memory location identified by the memory address identifier. The server can perform functions obtained from a client-side memory location and return a result to the client using one or more of the atomic memory operations.

  14. Secret key distillation from shielded two-qubit states

    International Nuclear Information System (INIS)

    Bae, Joonwoo

    2010-01-01

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  15. Key to marine arthropod larvae

    Directory of Open Access Journals (Sweden)

    John A. Fornshell

    2012-03-01

    Full Text Available The scope of this key is restricted to the larvae of marine arthropods. The key is based solely on their morphology, patterns of body segmentation, numbers of appendages, and mode of locomotion. An effort has been made to treat all traditionally named larval forms, both planktonic and benthic. It is intended that this key be useful for a researcher working with archived museum specimens and therefore, does not include habitat information as a identifying trait, even though this information is usually available in the archived records. Within the phylum Arthropoda there are two sub-phyla and eleven classes having larval stages in the marineenvironment. Where feasible the original names of the various larval types have been used. Because this nomenclature is less commonly used today compared to the past, the more recent taxonomic affinities are included in parentheses after the original larval name. The key includes the following thirty-four larvae: Branchhiopoda nauplii; Cephalocarida nauplii; Mystacocarida nauplii; trilobite larva; protonymphon; hexapod larvae; Remipedia nauplii; nauplius - Y larvae; Cirripedia nauplii; Ascothoracida nauplii; Ostracoda nauplii; Euphausiacea nauplii; Penaeidea nauplii; Cyclopoida nauplii; Calanoida nauplii; Harpacticoida nauplii;Polyarthra nauplii; cypris larva; eryonecius larva; cypris-Y larva; elapthocaris larvae; mysis larvae; lucifer zoea; acetes zoea; acanthosoma larva; phyllosoma; antizoea larva; anomuran zoea; brachyuran zoea; calyptopis larvae; furcilia larva; crytopia larva; puerulus larva; alima larva.

  16. [Key informers. When and How?].

    Science.gov (United States)

    Martín González, R

    2009-03-01

    When information obtained through duly designed and developed studies is not available, the solution to certain problems that affect the population or that respond to certain questions may be approached by using the information and experience provided by the so-called key informer. The key informer is defined as a person who is in contact with the community or with the problem to be studied, who is considered to have good knowledge of the situation and therefore who is considered an expert. The search for consensus is the basis to obtain information through the key informers. The techniques used have different characteristics based on whether the experts chosen meet together or not, whether they are guided or not, whether they interact with each other or not. These techniques include the survey, the Delphi technique, the nominal group technique, brainwriting, brainstorming, the Phillips 66 technique, the 6-3-5 technique, the community forum and the community impressions technique. Information provided by key informers through the search for consensus is relevant when this is not available or cannot be obtained by other methods. It has permitted the analysis of the existing neurological care model, elaboration of recommendations on visit times for the out-patient neurological care, and the elaboration of guidelines and recommendations for the management of prevalent neurological problems.

  17. Medical research - a comparative study of the situation in the RSA ...

    African Journals Online (AJOL)

    The other important form of research undertaking is one of national importance which assumes dimensions necessitating the creation of specific facilities in the form of ... In whatever manner our available research funds are calculated for comparison with those available - elsewhere, whether based on money available per ...

  18. a Performance Comparison of Feature Detectors for Planetary Rover Mapping and Localization

    Science.gov (United States)

    Wan, W.; Peng, M.; Xing, Y.; Wang, Y.; Liu, Z.; Di, K.; Teng, B.; Mao, X.; Zhao, Q.; Xin, X.; Jia, M.

    2017-07-01

    Feature detection and matching are key techniques in computer vision and robotics, and have been successfully implemented in many fields. So far there is no performance comparison of feature detectors and matching methods for planetary mapping and rover localization using rover stereo images. In this research, we present a comprehensive evaluation and comparison of six feature detectors, including Moravec, Förstner, Harris, FAST, SIFT and SURF, aiming for optimal implementation of feature-based matching in planetary surface environment. To facilitate quantitative analysis, a series of evaluation criteria, including distribution evenness of matched points, coverage of detected points, and feature matching accuracy, are developed in the research. In order to perform exhaustive evaluation, stereo images, simulated under different baseline, pitch angle, and interval of adjacent rover locations, are taken as experimental data source. The comparison results show that SIFT offers the best overall performance, especially it is less sensitive to changes of image taken at adjacent locations.

  19. A PERFORMANCE COMPARISON OF FEATURE DETECTORS FOR PLANETARY ROVER MAPPING AND LOCALIZATION

    Directory of Open Access Journals (Sweden)

    W. Wan

    2017-07-01

    Full Text Available Feature detection and matching are key techniques in computer vision and robotics, and have been successfully implemented in many fields. So far there is no performance comparison of feature detectors and matching methods for planetary mapping and rover localization using rover stereo images. In this research, we present a comprehensive evaluation and comparison of six feature detectors, including Moravec, Förstner, Harris, FAST, SIFT and SURF, aiming for optimal implementation of feature-based matching in planetary surface environment. To facilitate quantitative analysis, a series of evaluation criteria, including distribution evenness of matched points, coverage of detected points, and feature matching accuracy, are developed in the research. In order to perform exhaustive evaluation, stereo images, simulated under different baseline, pitch angle, and interval of adjacent rover locations, are taken as experimental data source. The comparison results show that SIFT offers the best overall performance, especially it is less sensitive to changes of image taken at adjacent locations.

  20. Workplace Mental Health Training in Health Care: Key Ingredients of Implementation.

    Science.gov (United States)

    Moll, Sandra E; VandenBussche, Jessica; Brooks, Katelyn; Kirsh, Bonnie; Stuart, Heather; Patten, Scott; MacDermid, Joy C

    2018-01-01

    Despite growing awareness of the importance of workplace mental health training and an increasing number of educational resources, there is a gap in knowledge regarding what shapes training effectiveness. The purpose of this study was to compare and describe the active ingredients of 2 workplace mental health education programs for health care workers. Within the context of a randomized clinical trial, a multimethod process evaluation was conducted to explore key process elements shaping implementation outcomes: the innovation, service recipients, service providers, and the organizational context. Data collection included descriptive statistics regarding program participation, postprogram interviews with a purposive sample of 18 service recipients, 182 responses to open-ended questions on postgroup and follow-up surveys, and field journal reflections on the process of implementation. Data analysis was informed by an interpretive description approach, using a process evaluation framework to categorize responses from all data sources, followed by within and cross-case comparison of data from both programs. Five key forces shaped the implementation and perceived outcomes of both programs: a contact-based education approach, information tailored to the workplace context, varied stakeholder perspectives, sufficient time to integrate and apply learning, and organizational support. The Beyond Silence program provided more opportunity for contact-based education, health care-specific content, and in-depth discussion of diverse perspectives. To increase mental health literacy and reduce stigma, workplace training should be based on best practice principles of contact-based education, with contextually relevant examples and support from all levels of the organization.

  1. Key Working for Families with Young Disabled Children

    Directory of Open Access Journals (Sweden)

    Bernie Carter

    2011-01-01

    Full Text Available For families with a disabled child, the usual challenges of family life can be further complicated by the need to access a wide range of services provided by a plethora of professionals and agencies. Key working aims to support children and their families in navigating these complexities ensuring easy access to relevant, high quality, and coordinated care. The aim of this paper is to explore the key worker role in relation to “being a key worker” and “having a key worker”. The data within this paper draw on a larger evaluation study of the Blackpool Early Support Pilot Programme. The qualitative study used an appreciative and narrative approach and utilised mixed methods (interviews, surveys and a nominal group workshop. Data were collected from 43 participants (parents, key workers, and other stakeholders. All stakeholders who had been involved with the service were invited to participate. In the paper we present and discuss the ways in which key working made a difference to the lives of children and their families. We also consider how key working transformed the perspectives of the key workers creating a deeper and richer understanding of family lives and the ways in which other disciplines and agencies worked. Key working contributed to the shift to a much more family-centred approach, and enhanced communication and information sharing between professionals and agencies improved. This resulted in families feeling more informed. Key workers acted in an entrepreneurial fashion, forging new relationships with families and between families and other stakeholders. Parents of young disabled children and their service providers benefited from key working. Much of the benefit accrued came from strong, relational, and social-professional networking which facilitated the embedding of new ways of working into everyday practice. Using an appreciative inquiry approach provided an effective and relevant way of engaging with parents, professionals

  2. Comparison of INTAKE24 (an Online 24-h Dietary Recall Tool with Interviewer-Led 24-h Recall in 11–24 Year-Old

    Directory of Open Access Journals (Sweden)

    Jennifer Bradley

    2016-06-01

    Full Text Available Online dietary assessment tools offer a convenient, low cost alternative to traditional dietary assessment methods such as weighed records and face-to-face interviewer-led 24-h recalls. INTAKE24 is an online multiple pass 24-h recall tool developed for use with 11–24 year-old. The aim of the study was to undertake a comparison of INTAKE24 (the test method with interviewer-led multiple pass 24-h recalls (the comparison method in 180 people aged 11–24 years. Each participant completed both an INTAKE24 24-h recall and an interviewer-led 24-h recall on the same day on four occasions over a one-month period. The daily energy and nutrient intakes reported in INTAKE24 were compared to those reported in the interviewer-led recall. Mean intakes reported using INTAKE24 were similar to the intakes reported in the interviewer-led recall for energy and macronutrients. INTAKE24 was found to underestimate energy intake by 1% on average compared to the interviewer-led recall with the limits of agreement ranging from minus 49% to plus 93%. Mean intakes of all macronutrients and micronutrients (except non-milk extrinsic sugars were within 4% of the interviewer-led recall. Dietary assessment that utilises technology may offer a viable alternative and be more engaging than paper based methods, particularly for children and young adults.

  3. Once again on Interregional, International and Cross-age Comparison of Unemployment

    OpenAIRE

    Gennadi Kazakevitch

    2003-01-01

    Any discussion on unemployment is never restricted with the data on unemployment only. Unemployment is linked to several key indicators such as number of employed, active population and participation rate. As we often see, increase in unemployment occurs simultaneously with increase in the number of jobs, if participation rate increases at the same time. This makes doubtful any simplistic interregional, international, inter-temporal or cross-age comparison of unemployment data taken in isolat...

  4. Key World Energy Statistics 2013

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-01

    The IEA produced its first handy, pocket-sized summary of key energy data in 1997 and every year since then it has been more and more successful. Key World Energy Statistics contains timely, clearly-presented data on supply, transformation and consumption of all major energy sources. The interested businessman, journalist or student will have at his or her fingertips the annual Canadian production of coal, the electricity consumption in Thailand, the price of diesel oil in Spain and thousands of other useful energy facts.

  5. Key Lake spill. Final report

    International Nuclear Information System (INIS)

    1984-03-01

    On January 5, 1984 contaminated water overflowed a storage reservoir at the Key Lake uranium mill onto the ice on a neighboring lake, into a muskeg area and onto a road. Outflow continued for two days, partially undercutting a retaining dyke. This report concludes the spill was the result of poor operation by the Key Lake Mining Corp.. The environmental impact will be minimal after cleanup. Improvements can be made in the regulatory process, and it is necessary to prepare for possible future mishaps

  6. Travelling through a warming world: climate change and migratory species

    NARCIS (Netherlands)

    Robinson, A.; Crick, H.Q.P.; Learmonth, J.A.; Maclean, I.M.D.; Thomas, C.D.; Bairlein, F.; Forchhammer, M.C.; Francis, C.M.; Gill, J.A.; Godley, B.J.; Harwood, J.; Hays, G.C.; Huntley, B.; Hutson, A.M.; Pierce, G.J.; Rehfisch, M.M.; Sims, D.W.; Vieira dos Santos, M.C.; Sparks, T.H.; Stroud, D.; Visser, M.E.

    2009-01-01

    Long-distance migrations are among the wonders of the natural world, but this multi-taxon review shows that the characteristics of species that undertake such movements appear to make them particularly vulnerable to detrimental impacts of climate change. Migrants are key components of biological

  7. Approaches to and tools for managing environmental conflicts in ...

    African Journals Online (AJOL)

    increases and rapid economic growth compound pressures on and intensify ... Integrated Coastal Zone Management (ICZM) is essentially about conflict ... undertakes a desk top study focusing on the key debates and issues in relation to .... coastal resources disintegrate when privatisation and/or markets and associated.

  8. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  9. Establishing Key Performance Indicators : Case company X

    OpenAIRE

    Singh, Jatinder

    2015-01-01

    The key performance indicators serve as the navigational tools for a business organization to monitor its performance. They enable the management team to take real time decisions to keep organization’s resources aligned to its business strategy to accomplish its strategic objec-tives. This research was conducted to analyse the process of establishing successful key per-formance indicators for a business organization. The research was conducted to recommend key performance indicators developme...

  10. NAGRADATA. Code key. Geology

    International Nuclear Information System (INIS)

    Mueller, W.H.; Schneider, B.; Staeuble, J.

    1984-01-01

    This reference manual provides users of the NAGRADATA system with comprehensive keys to the coding/decoding of geological and technical information to be stored in or retreaved from the databank. Emphasis has been placed on input data coding. When data is retreaved the translation into plain language of stored coded information is done automatically by computer. Three keys each, list the complete set of currently defined codes for the NAGRADATA system, namely codes with appropriate definitions, arranged: 1. according to subject matter (thematically) 2. the codes listed alphabetically and 3. the definitions listed alphabetically. Additional explanation is provided for the proper application of the codes and the logic behind the creation of new codes to be used within the NAGRADATA system. NAGRADATA makes use of codes instead of plain language for data storage; this offers the following advantages: speed of data processing, mainly data retrieval, economies of storage memory requirements, the standardisation of terminology. The nature of this thesaurian type 'key to codes' makes it impossible to either establish a final form or to cover the entire spectrum of requirements. Therefore, this first issue of codes to NAGRADATA must be considered to represent the current state of progress of a living system and future editions will be issued in a loose leave ringbook system which can be updated by an organised (updating) service. (author)

  11. Development of a questionnaire to measure the key attributes of the community palliative care specialist nurse role.

    Science.gov (United States)

    Cameron, Dee; Johnston, Bridget

    2015-02-01

    Recent worldwide economic events have forced an examination of the nurse's contribution to high-quality, effective, person-centred care. Since the role of specialist nurses is considered one of the least understood or valued developments in nursing, specialist nurses must demonstrate their contribution to quality, person-centred health care. To develop a questionnaire which aims to measure the quality of care provided by palliative care specialist nurses from the patients' perspective and to undertake initial validation. The process of questionnaire development involved six phases including systematic literature reviews, patient advisory groups and expert panel reviews, each of which contributed to the questionnaire face and content validity. Johnston's Expert Palliative Care Nurse Model (2002; 2005) provided an evidence-based framework for the development of the questionnaire, and enabled the identification of the key attributes of the palliative care specialist nurse role, thereby providing the themes on which to base the questionnaire. The Quality Measure for Palliative Nursing, a questionnaire, was developed. The themes identified in the questionnaire--personal characteristics, communication skills, knowledge, relationship with patient and providing comfort--aim to facilitate measurement of the quality of care provided by palliative care specialist nurses. Designed for use by palliative patients the Quality Measure for Palliative Nursing is a one-page questionnaire comprising of 15 questions. The Quality Measure for Palliative Nursing is unique since it aims to measure the quality of care provided by community palliative care specialist nurses, and could also be used to measure patient satisfaction with the quality of care provided. Further testing is recommended to ensure that this questionnaire can provide reliable and valid results.

  12. Sarcopenia and sarcopenic obesity in comparison: prevalence, metabolic profile, and key differences. A cross-sectional study in Italian hospitalized elderly.

    Science.gov (United States)

    Perna, Simone; Peroni, Gabriella; Faliva, Milena Anna; Bartolo, Arianna; Naso, Maurizio; Miccono, Alessandra; Rondanelli, Mariangela

    2017-12-01

    The aim of this study is to identify the prevalence, assess the metabolic profile, and key differences (versus healthy) in a cohort of subjects with sarcopenia (S) and in sarcopenic obesity (SO) hospitalized elderly. A standardized comprehensive geriatric assessment was performed. We enrolled 639 elderly subjects (196 men, 443 women) with a mean age of 80.90 ± 7.77 years. Analysis of variance and a multinomial logistic regression analysis adjusting for covariates were used to assess the differences between groups. The prevalence of (S) was 12.42% in women and 23.47% in men. (SO) was 8.13% in women and 22.45% in men. Data showed that either groups had a functional impairment (Barthel index 15 mm/h), CPR (>0.50 mg/dl) homocysteine (>12 micromol/l), and hemoglobin (145 mcg/dl) was detected in either cohort (due to inflammation). (SO) had glycemia (>110 mg/dl). Key differences in (S) cohort (versus healthy) were a reduction in functional impairment (p Sarcopenia is closely linked to an increase in the risk of hip-femur fractures, inflammation, edema, and malnutrition. The (SO) subjects seem to benefit from the "obesity paradox."

  13. Electronic Nicotine Delivery Systems Key Facts Infographic

    Data.gov (United States)

    U.S. Department of Health & Human Services — Explore the Electronic Nicotine Delivery Systems Key Facts Infographic which outlines key facts related to electronic nicotine delivery systems (ENDS), including...

  14. Four new Gammarus species from Tibetan Plateau with a key to Tibetan freshwater gammarids (Crustacea, Amphipoda, Gammaridae

    Directory of Open Access Journals (Sweden)

    Zhonge Hou

    2018-03-01

    Full Text Available Four new species of the genus Gammarus are described and illustrated from Tibetan Plateau. Gammarus altus sp. n. and G. limosus sp. n. are characterized by pereopods III–IV with a few short setae and uropod III with marginal spines accompanied by short setae. Gammarus kangdingensis sp. n. and G. gonggaensis sp. n. are characterized by pereopods III–IV with long straight setae on posterior margins and inner ramus of uropod III 0.4 times as long as outer ramus. Detailed morphological comparisons with related species are discussed. A key to 15 Gammarus species from the Tibetan Plateau and a map of their distributions are provided.

  15. 75 FR 20364 - Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property

    Science.gov (United States)

    2010-04-19

    ... GENERAL SERVICES ADMINISTRATION [Wildlife Order 187; 4-D-FL-1218] Public Buildings Service; Key Largo Beacon Annex Site; Key Largo, FL; Transfer of Property Pursuant to section 2 of Public Law 537, 80th Congress, approved May 19, 1948 (16 U.S.C. 667c), notice is hereby given that: 1. The General...

  16. The Attribution of Income in the Netherlands and the United Kingdom

    NARCIS (Netherlands)

    Wheeler, J.

    2011-01-01

    This article undertakes an extensive comparison of the domestic law of the Netherlands and the United Kingdom in respect of the attribution of income to a person for tax purposes. After a general introduction to both countries, the article looks at a series of specific situations in which the

  17. Media Education across Four Asian Societies: Issues and Themes

    Science.gov (United States)

    Cheung, Chi-Kim

    2009-01-01

    This paper undertakes a comparative review of the development and implementation of media education in four Asian societies. The comparison focuses on the following issues: the general pedagogical transition from inoculation to empowerment; the roles of government policy and educational reform in facilitating the development of media education;…

  18. Multidimensional Welfare Comparisons of EU Member States Before, During, and After the Financial Crisis: A Dominance Approach

    DEFF Research Database (Denmark)

    Hussain, M. Azhar; Siersbæk, Nikolaj; Østerdal, Lars Peter

    How did the financial crisis affect population welfare in EU member states in key dimensions such as income, health, and education? Using EU-SILC data, we seek to answer this question by way of first order dominance comparisons between countries and over time. The novel feature of our study...... is that we perform welfare comparisons on the basis of multi-level multidimensional ordinal data. We nd that the countries most often dominated are southern and eastern European member states, and the dominant countries are mostly northern and western European member states. However, for most country...

  19. Key Facts about Tularemia

    Science.gov (United States)

    ... Submit What's this? Submit Button Key Facts About Tularemia Recommend on Facebook Tweet Share Compartir This fact ... and Prevention (CDC) Tularemia Web site . What is Tularemia? Tularemia is a potentially serious illness that occurs ...

  20. The Key Lake project

    International Nuclear Information System (INIS)

    Glattes, G.

    1985-01-01

    Aspects of project financing for the share of the Canadian subsidiary of Uranerzbergbau-GmbH, Bonn, in the uranium mining and milling facility at Key Lake, Saskatchewan, by a Canadian bank syndicate. (orig.) [de

  1. Synchronization in Quantum Key Distribution Systems

    Directory of Open Access Journals (Sweden)

    Anton Pljonkin

    2017-10-01

    Full Text Available In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector’s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.

  2. Multi-country comparisons of energy performance: The index decomposition analysis approach

    International Nuclear Information System (INIS)

    Ang, B.W.; Xu, X.Y.; Su, Bin

    2015-01-01

    Index decomposition analysis (IDA) is a popular tool for studying changes in energy consumption over time in a country or region. This specific application of IDA, which may be called temporal decomposition analysis, has been extended by researchers and analysts to study variations in energy consumption or energy efficiency between countries or regions, i.e. spatial decomposition analysis. In spatial decomposition analysis, the main objective is often to understand the relative contributions of overall activity level, activity structure, and energy intensity in explaining differences in total energy consumption between two countries or regions. We review the literature of spatial decomposition analysis, investigate the methodological issues, and propose a spatial decomposition analysis framework for multi-region comparisons. A key feature of the proposed framework is that it passes the circularity test and provides consistent results for multi-region comparisons. A case study in which 30 regions in China are compared and ranked based on their performance in energy consumption is presented. - Highlights: • We conducted cross-regional comparisons of energy consumption using IDA. • We proposed two criteria for IDA method selection in spatial decomposition analysis. • We proposed a new model for regional comparison that passes the circularity test. • Features of the new model are illustrated using the data of 30 regions in China

  3. Conditions and Motivations to Undertake

    Directory of Open Access Journals (Sweden)

    Flor Ángela Marulanda Valencia

    2017-02-01

    Full Text Available This study aims at deepening in the analysis of motivations shown by a group of entrepreneurs in Medellin, Antioquia. It also describes the different perceptions about the enablers and obstacles for the development of entrepreneurship in appropriate environments to promote it. It was found that independence was the principal motivation for entrepreneurship and that the city offered the most favourable environment to foster it. Additionally, it was found that the most important obstacle to develop it was the difficulties to access a bank credit.

  4. Economic contribution of recreating visitors to the Florida Keys/Key West

    Science.gov (United States)

    Donald B.K. English; Warren Kriesel; Vernon R Leeworthy; Peter C. Wiley

    1996-01-01

    This report provides estimates of the economic impact that visitors to the Florida Keys have on both the Monroe County and larger South Florida regional economies. Estimates are made for output/sales, income, and employment and include both direct and secondary economic impacts. This report provides the basis for demonstrating the income-producing asset value of the...

  5. International price comparisons for pharmaceuticals. Measurement and policy issues.

    Science.gov (United States)

    Danzon, P M; Kim, J D

    1998-01-01

    dropped. When such an approach is taken to the comparison of international drug prices, quite different results from those obtained from less comprehensive comparisons may be obtained. Indeed, a major conclusion of this analysis is that international drug price comparisons are extremely sensitive to choices made about certain key methodological issues, such as sample selection, unit of measurement for price and volume, the relative weight given to consumption patterns in the countries being compared, and the use of exchange rates or purchasing power parities for currency conversion. In particular, the results of this analysis indicate that recent reports suggesting that manufacturer prices in the US are 32% higher than in Canada and 60% higher than in the UK are in fact overstatements which arise from limitations of the sample and methods used to calculate these price differentials.

  6. Turn key contracts

    International Nuclear Information System (INIS)

    Feretic, D.

    1975-01-01

    The aim of this summary is to point out some specific areas which have to be covered in a turn-key contract and which are of primarily interest to the buyer of a nuclear plant. It will be assumed that the buyer is utility company in a developing country and a plant supplier a company in an industrial country. (orig./FW) [de

  7. AMBER and Ecolego Intercomparisons using Calculations from SR 97

    International Nuclear Information System (INIS)

    Maul, Philip; Robinson, Peter; Avila, Rodolfo; Broed, Robert; Pereira, Antonio

    2003-08-01

    The AMBER compartmental modelling software has been used by Quintessa in undertaking Performance Assessment (PA) calculations for SKI for the last four years. In particular, it was used in helping to identify key issues in the safety case for SFR 1. SSI and the Norwegian Radiation Protection Authority (NRPA) are supporting the development of Ecolego which is based on the Matlab/Simulink general purpose modelling software and provides a user-friendly Graphical User Interface which is particularly suitable for undertaking PA calculations. At SKI/SSI expert group meetings in September 2002, Quintessa presented some radionuclide transport calculations for a deep repository for spent fuel using AMBER. Comparisons were presented with calculations undertaken by SKB in their SR 97 study. It was agreed that it would be useful to undertake some intercomparison calculations using AMBER and Ecolego based on calculation cases considered in SR 97. The reasons for undertaking such intercomparisons include: 1. to give confidence in the use of AMBER and Ecolego for whole system PA calculations for a deep repository; and 2. to provide SKI and SSI with an understanding of some of the technical issues raised by seeking to repeat the SR 97 calculations with different models and software. This report documents the intercomparison calculations that have been undertaken. The main conclusions that have been drawn are: 1. Both modelling packages could successfully reproduce SKB's SR 97 calculations for the near field, geosphere and biosphere. 2. The results of the deterministic calculations for the near field and both deterministic and probabilistic calculations for the biosphere, where AMBER and Ecolego used compartment models, were typically in agreement to within one significant figure. The identical results for the calculated equilibrium inventories in Bay sediments illustrate that the calculations by AMBER and Ecolego are essentially the same when the compartment models are identical

  8. Entangled quantum key distribution with a biased basis choice

    International Nuclear Information System (INIS)

    Erven, Chris; Ma Xiongfeng; Laflamme, Raymond; Weihs, Gregor

    2009-01-01

    We investigate a quantum key distribution (QKD) scheme that utilizes a biased basis choice in order to increase the efficiency of the scheme. The optimal bias between the two measurement bases, a more refined error analysis and finite key size effects are all studied in order to assure the security of the final key generated with the system. We then implement the scheme in a local entangled QKD system that uses polarization entangled photon pairs to securely distribute the key. A 50/50 non-polarizing beamsplitter (BS) with different optical attenuators is used to simulate a variable BS in order to allow us to study the operation of the system for different biases. Over 6 h of continuous operation with a total bias of 0.9837/0.0163 (Z/X), we were able to generate 0.4567 secure key bits per raw key bit as compared to 0.2550 secure key bits per raw key bit for the unbiased case. This represents an increase in the efficiency of the key generation rate by 79%.

  9. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  10. Key figures for the regional- and distribution grid

    International Nuclear Information System (INIS)

    Vikingstad, S.

    1996-02-01

    In Norway, improving the efficiency of the hydroelectric grid operation is a stated goal of the Energy Act. Several studies have identified potential profits of such improvement. This publication focuses on costs and improvement potentials. Publication of key figures may stimulate grid owners, boards and administrations to improve the operating efficiency of their grids. The publication shows key figures for the regional- and distribution grid and is based on accounting data for 1994. The key figures are divided into: (1) Cost structure: The key figures express the relative contributions of each cost component to the total income of the grid, (2) Costs and physical quantities: The key figures show the cost of delivering the transport services, (3) Physical quantities: The key figures describe the working conditions of the energy utility. It appears that the cost structure of the sector varies considerably. The same is true of the cost related to the delivery of grid services. 30 figs., 6 tabs

  11. Comparison analysis for classification algorithm in data mining and the study of model use

    Science.gov (United States)

    Chen, Junde; Zhang, Defu

    2018-04-01

    As a key technique in data mining, classification algorithm was received extensive attention. Through an experiment of classification algorithm in UCI data set, we gave a comparison analysis method for the different algorithms and the statistical test was used here. Than that, an adaptive diagnosis model for preventive electricity stealing and leakage was given as a specific case in the paper.

  12. Performance awareness execution performance of HEP codes on RISC platforms,issues and solutions

    CERN Document Server

    Yaari, R; Yaari, Refael; Jarp, Sverre

    1995-01-01

    The work described in this paper was started during the migration of Aleph's production jobs from the IBM mainframe/CRAY supercomputer to several RISC/Unix workstation platforms. The aim was to understand why Aleph did not obtain the performance on the RISC platforms that was "promised" after a CERN Unit comparison between these RISC platforms and the IBM mainframe. Remedies were also sought. Since the work with the Aleph jobs in turn led to the related task of understanding compilers and their options, the conditions under which the CERN benchmarks (and other benchmarks) were run, kernel routines and frequently used CERNLIB routines, the whole undertaking expanded to try to look at all the factors that influence the performance of High Energy Physics (HEP) jobs in general. Finally, key performance issues were reviewed against the programs of one of the LHC collaborations (Atlas) with the hope that the conclusions would be of long- term interest during the establishment of their simulation, reconstruction and...

  13. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  14. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. Economic motivation of households to undertake private precautionary measures against floods

    Science.gov (United States)

    Kreibich, H.; Christenberger, S.; Schwarze, R.

    2011-02-01

    Flood damage is on the increase due to a combination of growing vulnerability and a changing climate. This trend can be mitigated only through significantly improved flood risk management which, alongside the efforts of public authorities, will include improvements in the mitigation measures adopted by private households. Economically "reasonable" efforts to self-insure and self-protect should be expected from households before the government steps in with publicly-funded relief programmes. To gain a deeper understanding of the benefits of households' precautionary measures, telephone interviews with private home owners were conducted in the Elbe and Danube catchments in Germany after the floods of 2002 and again after the floods in 2005 and 2006. Only detached, solid single-family houses were included in this study, which is based on 759 interviews. In addition, market-based cost assessments were solicited based on a "model building". Expert interviews and a literature review - including catalogues and price lists for building materials and household appliances - were used as back-up information for the cost assessments. The comparison of costs and benefits shows that large investments, such as building a sealed cellar, are only economically efficient if the building is flooded very frequently, that is, if it is located in a high flood risk area. In such areas it would be preferable in economic terms not to build a new house at all - or else to build a house without a cellar. Small investments, however, such as oil tank protection, can prevent serious damage at low cost. Such investments are still profitable even if the building is flooded every 50 years or less on average. It could be argued that these low-cost measures should be made mandatory through the enforcement of building codes. Financial incentives built into insurance contracts coupled with limits set on governmental relief programmes would provide an economic motivation for people to invest in

  16. Economic motivation of households to undertake private precautionary measures against floods

    Directory of Open Access Journals (Sweden)

    H. Kreibich

    2011-02-01

    Full Text Available Flood damage is on the increase due to a combination of growing vulnerability and a changing climate. This trend can be mitigated only through significantly improved flood risk management which, alongside the efforts of public authorities, will include improvements in the mitigation measures adopted by private households. Economically "reasonable" efforts to self-insure and self-protect should be expected from households before the government steps in with publicly-funded relief programmes. To gain a deeper understanding of the benefits of households' precautionary measures, telephone interviews with private home owners were conducted in the Elbe and Danube catchments in Germany after the floods of 2002 and again after the floods in 2005 and 2006. Only detached, solid single-family houses were included in this study, which is based on 759 interviews. In addition, market-based cost assessments were solicited based on a "model building". Expert interviews and a literature review – including catalogues and price lists for building materials and household appliances – were used as back-up information for the cost assessments. The comparison of costs and benefits shows that large investments, such as building a sealed cellar, are only economically efficient if the building is flooded very frequently, that is, if it is located in a high flood risk area. In such areas it would be preferable in economic terms not to build a new house at all – or else to build a house without a cellar. Small investments, however, such as oil tank protection, can prevent serious damage at low cost. Such investments are still profitable even if the building is flooded every 50 years or less on average. It could be argued that these low-cost measures should be made mandatory through the enforcement of building codes. Financial incentives built into insurance contracts coupled with limits set on governmental relief programmes would provide an economic motivation for

  17. Sustainable Aquatic Resource Management Initiative | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... identify key choices in a state-of-the-art publication. They will also undertake field research in collaboration with the Centre for Resource Management and Environmental Studies (CERMES), University of the West Indies, on the application of new thinking (resilience, Complex Adaptive Systems theory) to coastal practices.

  18. Southern Cone Countries Primary Healthcare Study | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Researchers will undertake a literature review, documentary analysis, key informant interviews, focal group discussions with leading stakeholders, and surveys of PHC users and professionals. The idea is to identify opportunities for and limits to using PHC as a strategy to achieve more integrated and universal health care.

  19. Search Results | Page 717 | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Results 7161 - 7170 of 9602 ... Partnerships involving public and private actors are becoming a key institutional ... Gender, Sexual Culture and HIV/AIDS in the Caribbean ... in the context of increasing economic integration and pressure for industrial ... undertakes research and policy dialogue on priority issues affecting Africa, ...

  20. Reassessing the Concept of Emotional Labour in Student Nurse Education: Role of Link Lecturers and Mentors in a Time of Change.

    Science.gov (United States)

    Smith, Pam; Gray, Benjamin

    2001-01-01

    Interviews with nursing students and nurses revealed how nurses undertake emotional labor--the induction or suppression of feeling in order to sustain a caring environment. Instructors and mentors in clinical settings play a key role in fostering reflective learning and providing emotional support. (Contains 33 references.) (SK)

  1. Finding faults: analogical comparison supports spatial concept learning in geoscience.

    Science.gov (United States)

    Jee, Benjamin D; Uttal, David H; Gentner, Dedre; Manduca, Cathy; Shipley, Thomas F; Sageman, Bradley

    2013-05-01

    A central issue in education is how to support the spatial thinking involved in learning science, technology, engineering, and mathematics (STEM). We investigated whether and how the cognitive process of analogical comparison supports learning of a basic spatial concept in geoscience, fault. Because of the high variability in the appearance of faults, it may be difficult for students to learn the category-relevant spatial structure. There is abundant evidence that comparing analogous examples can help students gain insight into important category-defining features (Gentner in Cogn Sci 34(5):752-775, 2010). Further, comparing high-similarity pairs can be especially effective at revealing key differences (Sagi et al. 2012). Across three experiments, we tested whether comparison of visually similar contrasting examples would help students learn the fault concept. Our main findings were that participants performed better at identifying faults when they (1) compared contrasting (fault/no fault) cases versus viewing each case separately (Experiment 1), (2) compared similar as opposed to dissimilar contrasting cases early in learning (Experiment 2), and (3) viewed a contrasting pair of schematic block diagrams as opposed to a single block diagram of a fault as part of an instructional text (Experiment 3). These results suggest that comparison of visually similar contrasting cases helped distinguish category-relevant from category-irrelevant features for participants. When such comparisons occurred early in learning, participants were more likely to form an accurate conceptual representation. Thus, analogical comparison of images may provide one powerful way to enhance spatial learning in geoscience and other STEM disciplines.

  2. Accelerating foreign-key joins using asymmetric memory channels

    NARCIS (Netherlands)

    Pirk, H.; Manegold, S.; Kersten, M.

    2011-01-01

    Indexed Foreign-Key Joins expose a very asymmetric access pattern: the Foreign-Key Index is sequentially scanned whilst the Primary-Key table is target of many quasi-random lookups which is the dominant cost factor. To reduce the costs of the random lookups the fact-table can be (re-) partitioned at

  3. Cost feasibility of a pre-checking medical tourism system for U.S. patients undertaking joint replacement surgery in Taiwan.

    Science.gov (United States)

    Haung, Ching-Ying; Wang, Sheng-Pen; Chiang, Chih-Wei

    2010-01-01

    Medical tourism is a relatively recent global economic and political phenomenon that has assumed increasing importance for developing countries, particularly in Asia. In fact, Taiwan possesses a niche for developing medical tourism because many hospitals provide state-of-the-art medicine in all disciplines and many doctors are trained in the United States (US). Among the most common medical procedures outsourced, joint replacements such as total knee replacement (TKR) and total hip replacement (THR) are two surgeries offered to US patients at a lower cost and shorter waiting time than in the US. This paper proposed a pre-checking medical tourism system (PCMTS) and evaluated the cost feasibility of recruiting American clients traveling to Taiwan for joint replacement surgery. Cost analysis was used to estimate the prime costs for each stage in the proposed PCMTS. Sensitivity analysis was implemented to examine how different pricings for medical checking and a surgical operation (MC&SO) and recovery, can influence the surplus per patient considering the PCMTS. Finally, the break-even method was adopted to test the tradeoff between the sunk costs of investment in the PCMTS and the annual surplus for participating hospitals. A novel business plan was built showing that pre-checking stations in medical tourism can provide post-operative care and recovery follow-up. Adjustable pricing for hospital administrators engaged in the PCMTS consisted of two main costs: US$3,700 for MC&SO and US$120 for the hospital stay. Guidelines for pricing were provided to maximize the annual surplus from this plan with different number of patients participating in PCMTS. The maximal profit margin from each American patient undertaking joint surgery is about US$24,315. Using cost analysis, this article might be the first to evaluate the feasibility of PCMTS for joint replacement surgeries. The research framework in this article is applicable when hospital administrators evaluate the

  4. Ancel Keys: a tribute

    Directory of Open Access Journals (Sweden)

    VanItallie Theodore B

    2005-02-01

    Full Text Available Abstract Ancel Keys, Ph.D., who died in November, 2004, at the age of 100, was among the first scientists to recognize that human atherosclerosis is not an inevitable consequence of aging, and that a high-fat diet can be a major risk factor for coronary heart disease. During World War II, he and a group of talented co-workers at the University of Minnesota conducted a large-scale study of experimentally-induced human starvation. The data generated by this study – which was immediately recognized to be a classic – continue to be of inestimable value to nutrition scientists. In his later years, Keys spent more time at his home in Naples, Italy, where he had the opportunity to continue his personal study of the beneficial effects on health and longevity of a Mediterranean diet.

  5. KeyPathwayMiner 4.0

    DEFF Research Database (Denmark)

    Alcaraz, Nicolas; Pauling, Josch; Batra, Richa

    2014-01-01

    release of KeyPathwayMiner (version 4.0) that is not limited to analyses of single omics data sets, e.g. gene expression, but is able to directly combine several different omics data types. Version 4.0 can further integrate existing knowledge by adding a search bias towards sub-networks that contain...... (avoid) genes provided in a positive (negative) list. Finally the new release now also provides a set of novel visualization features and has been implemented as an app for the standard bioinformatics network analysis tool: Cytoscape. CONCLUSION: With KeyPathwayMiner 4.0, we publish a Cytoscape app...

  6. Key China Energy Statistics 2012

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-05-01

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). The Group has published seven editions to date of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  7. Key China Energy Statistics 2011

    Energy Technology Data Exchange (ETDEWEB)

    Levine, Mark [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fridley, David [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lu, Hongyou [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Fino-Chen, Cecilia [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2012-01-15

    The China Energy Group at Lawrence Berkeley National Laboratory (LBNL) was established in 1988. Over the years the Group has gained recognition as an authoritative source of China energy statistics through the publication of its China Energy Databook (CED). In 2008 the Group published the Seventh Edition of the CED (http://china.lbl.gov/research/chinaenergy-databook). This handbook summarizes key statistics from the CED and is expressly modeled on the International Energy Agency’s “Key World Energy Statistics” series of publications. The handbook contains timely, clearly-presented data on the supply, transformation, and consumption of all major energy sources.

  8. Stellar neutron capture rates – key data for the s process

    Directory of Open Access Journals (Sweden)

    Käppeler F.

    2013-12-01

    Full Text Available Neutron reactions are responsible for the formation of the elements heavier than iron. The corresponding scenarios relate to the He- and C- burning phases of stellar evolution (s process and to supernova explosions (r and p processes. The s process, which is characterized by low neutron densities, operates in or near the valley of β stability and has produced about half of the elemental abundances between Fe and Bi in the solar system and in the Universe. Because the s abundances are essentially determined by the (n, γ cross sections along the reaction path, accurate neutron data constitute the key input for s process studies. Important constraints for the physical conditions at the stellar sites can be inferred by comparison of the abundance patterns from current s-process models with solar system material or presolar grains. The experimental methods for the determination of stellar (n, γ rates are outlined at the example of recent cross section measurements and remaining quests will be discussed with respect to existing laboratory neutron sources and new developments.

  9. GuiaTreeKey, a multi-access electronic key to identify tree genera in French Guiana.

    Science.gov (United States)

    Engel, Julien; Brousseau, Louise; Baraloto, Christopher

    2016-01-01

    The tropical rainforest of Amazonia is one of the most species-rich ecosystems on earth, with an estimated 16000 tree species. Due to this high diversity, botanical identification of trees in the Amazon is difficult, even to genus, often requiring the assistance of parataxonomists or taxonomic specialists. Advances in informatics tools offer a promising opportunity to develop user-friendly electronic keys to improve Amazonian tree identification. Here, we introduce an original multi-access electronic key for the identification of 389 tree genera occurring in French Guiana terra-firme forests, based on a set of 79 morphological characters related to vegetative, floral and fruit characters. Its purpose is to help Amazonian tree identification and to support the dissemination of botanical knowledge to non-specialists, including forest workers, students and researchers from other scientific disciplines. The electronic key is accessible with the free access software Xper ², and the database is publicly available on figshare: https://figshare.com/s/75d890b7d707e0ffc9bf (doi: 10.6084/m9.figshare.2682550).

  10. Basic study on the rectangular numeric keys for touch screen.

    Science.gov (United States)

    Harada, H; Katsuura, T; Kikuchi, Y

    1997-06-01

    The present study was conducted to examine the optimum inter-key spacing of numeric rectangular keys for touch screens. Six male students (22-25 years old) and three female students (21-24 years old) participated in the experiment. Each subject performed the data entry task using rectangular keys of touch devices. These keys were arranged in both horizontal and vertical layouts. The sizes of the rectangular keys in both layouts were 12 x 21 mm and 15 x 39 mm, and each of the inter-key spacing of each key was 0, 3, 6, 12 and 21 mm. The response time with inter-key spacing of 3 mm was significantly faster than with the inter-key spacing of 0, 12 and 21 mm (p < 0.05). Keys of vertical position produced faster response time than that of horizontal position. The subjective ratings showed that the inter-key spacing of 6 mm was significantly better than the inter-key spacing of 0, 3, 12 and 21 mm (p < 0.05).

  11. Secret-key rates and privacy leakage in biometric systems

    NARCIS (Netherlands)

    Ignatenko, T.

    2009-01-01

    In this thesis both the generation of secret keys from biometric data and the binding of secret keys to biometric data are investigated. These secret keys can be used to regulate access to sensitive data, services, and environments. In a biometric secrecy system a secret key is generated or chosen

  12. Il governo della performance dei processi di business : dai Key Performance Indicators ai Key Risk Indicators

    OpenAIRE

    Sergio Beretta; Saverio Bozzolan

    2013-01-01

    The recent paper issued by COSO ["Developing Key Risk Indicators to Strengthen Enterprise Risk Management" (Coso, 2010)] is the starting point of this article whose aim is to discuss the relevance of the business process dimension in the design and implementation of Key Risk Indicators. The Authors analyze the reasons of the systematic underestimation of the business process dimension in the COSO papers and debate the implications that the explicit consideration of the business process dimens...

  13. Fundamental quantitative security in quantum key generation

    International Nuclear Information System (INIS)

    Yuen, Horace P.

    2010-01-01

    We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographic context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.

  14. Key Frame Extraction in the Summary Space.

    Science.gov (United States)

    Li, Xuelong; Zhao, Bin; Lu, Xiaoqiang; Xuelong Li; Bin Zhao; Xiaoqiang Lu; Lu, Xiaoqiang; Li, Xuelong; Zhao, Bin

    2018-06-01

    Key frame extraction is an efficient way to create the video summary which helps users obtain a quick comprehension of the video content. Generally, the key frames should be representative of the video content, meanwhile, diverse to reduce the redundancy. Based on the assumption that the video data are near a subspace of a high-dimensional space, a new approach, named as key frame extraction in the summary space, is proposed for key frame extraction in this paper. The proposed approach aims to find the representative frames of the video and filter out similar frames from the representative frame set. First of all, the video data are mapped to a high-dimensional space, named as summary space. Then, a new representation is learned for each frame by analyzing the intrinsic structure of the summary space. Specifically, the learned representation can reflect the representativeness of the frame, and is utilized to select representative frames. Next, the perceptual hash algorithm is employed to measure the similarity of representative frames. As a result, the key frame set is obtained after filtering out similar frames from the representative frame set. Finally, the video summary is constructed by assigning the key frames in temporal order. Additionally, the ground truth, created by filtering out similar frames from human-created summaries, is utilized to evaluate the quality of the video summary. Compared with several traditional approaches, the experimental results on 80 videos from two datasets indicate the superior performance of our approach.

  15. Exploiting Support Vector Machine Algorithm to Break the Secret Key

    Directory of Open Access Journals (Sweden)

    S. Hou

    2018-04-01

    Full Text Available Template attacks (TA and support vector machine (SVM are two effective methods in side channel attacks (SCAs. Almost all studies on SVM in SCAs assume the required power traces are sufficient, which also implies the number of profiling traces belonging to each class is equivalent. Indeed, in the real attack scenario, there may not be enough power traces due to various restrictions. More specifically, the Hamming Weight of the S-Box output results in 9 binomial distributed classes, which significantly reduces the performance of SVM compared with the uniformly distributed classes. In this paper, the impact of the distribution of profiling traces on the performance of SVM is first explored in detail. And also, we conduct Synthetic Minority Oversampling TEchnique (SMOTE to solve the problem caused by the binomial distributed classes. By using SMOTE, the success rate of SVM is improved in the testing phase, and SVM requires fewer power traces to recover the key. Besides, TA is selected as a comparison. In contrast to what is perceived as common knowledge in unrestricted scenarios, our results indicate that SVM with proper parameters can significantly outperform TA.

  16. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    2008-06-01

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  17. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    2008-04-01

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  18. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial QKD systems in commercial fiber networks

    Science.gov (United States)

    Jacak, Monika; Jacak, Janusz; Jóźwiak, Piotr; Jóźwiak, Ireneusz

    2016-06-01

    The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.

  19. A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we have scrutinized two (Mishra et al., Xu et al.) remote user authentication protocols using smart card and explained that both the protocols are suffering against several security weaknesses. We have then presented three-factor user authentication and key agreement protocol usable for TMIS, which fix the security pitfalls of the above mentioned schemes. The informal cryptanalysis makes certain that the proposed protocol provides well security protection on the relevant security attacks. Furthermore, the simulator AVISPA tool confirms that the protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The security functionalities and performance comparison analysis confirm that our protocol not only provide strong protection on security attacks, but it also achieves better complexities along with efficient login and password change phase as well as session key verification property.

  20. Novel secret key generation techniques using memristor devices

    Science.gov (United States)

    Abunahla, Heba; Shehada, Dina; Yeun, Chan Yeob; Mohammad, Baker; Jaoude, Maguy Abi

    2016-02-01

    This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC) memristor based security.

  1. Secure key distribution by swapping quantum entanglement

    International Nuclear Information System (INIS)

    Song, Daegene

    2004-01-01

    We report two key distribution schemes achieved by swapping quantum entanglement. Using two Bell states, two bits of secret key can be shared between two distant parties that play symmetric and equal roles. We also address eavesdropping attacks against the schemes

  2. Calculation of key reduction for B92 QKD protocol

    Science.gov (United States)

    Mehic, Miralem; Partila, Pavol; Tovarek, Jaromir; Voznak, Miroslav

    2015-05-01

    It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

  3. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  4. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  5. Key Concepts in Microbial Oceanography

    Science.gov (United States)

    Bruno, B. C.; Achilles, K.; Walker, G.; Weersing, K.; Team, A

    2008-12-01

    The Center for Microbial Oceanography: Research and Education (C-MORE) is a multi-institution Science and Technology Center, established by the National Science Foundation in 2006. C-MORE's research mission is to facilitate a more comprehensive understanding of the diverse assemblages of microorganisms in the sea, ranging from the genetic basis of marine microbial biogeochemistry including the metabolic regulation and environmental controls of gene expression, to the processes that underpin the fluxes of carbon, related bioelements, and energy in the marine environment. The C-MORE education and outreach program is focused on increasing scientific literacy in microbial oceanography among students, educators, and the general public. A first step toward this goal is defining the key concepts that constitute microbial oceanography. After lengthy discussions with scientists and educators, both within and outside C-MORE, we have arrived at six key concepts: 1) Marine microbes are very small and have been around for a long time; 2) Life on Earth could not exist without microbes; 3) Most marine microbes are beneficial; 4) Microbes are everywhere: they are extremely abundant and diverse; 5) Microbes significantly impact our global climate; and 6) There are new discoveries every day in the field of microbial oceanography. A C-MORE-produced brochure on these six key concepts will be distributed at the meeting. Advanced copies may be requested by email or downloaded from the C-MORE web site(http://cmore.soest.hawaii.edu/downloads/MO_key_concepts_hi-res.pdf). This brochure also includes information on career pathways in microbial oceanography, with the aim of broadening participation in the field. C-MORE is eager to work in partnership to incorporate these key concepts into other science literacy publications, particularly those involving ocean and climate literacy. We thank the following contributors and reviewers: P Chisholm, A Dolberry, and A Thompson (MIT); N Lawrence

  6. Key-space analysis of double random phase encryption technique

    Science.gov (United States)

    Monaghan, David S.; Gopinathan, Unnikrishnan; Naughton, Thomas J.; Sheridan, John T.

    2007-09-01

    We perform a numerical analysis on the double random phase encryption/decryption technique. The key-space of an encryption technique is the set of possible keys that can be used to encode data using that technique. In the case of a strong encryption scheme, many keys must be tried in any brute-force attack on that technique. Traditionally, designers of optical image encryption systems demonstrate only how a small number of arbitrary keys cannot decrypt a chosen encrypted image in their system. However, this type of demonstration does not discuss the properties of the key-space nor refute the feasibility of an efficient brute-force attack. To clarify these issues we present a key-space analysis of the technique. For a range of problem instances we plot the distribution of decryption errors in the key-space indicating the lack of feasibility of a simple brute-force attack.

  7. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  8. Increase in physical activities in kindergarten children with cerebral palsy by employing MaKey-MaKey-based task systems.

    Science.gov (United States)

    Lin, Chien-Yu; Chang, Yu-Ming

    2014-09-01

    In this study, we employed Flash- and Scratch-based multimedia by using a MaKey-MaKey-based task system to increase the motivation level of children with cerebral palsy to perform physical activities. MaKey MaKey is a circuit board that converts physical touch to a digital signal, which is interpreted by a computer as a keyboard message. In this study, we used conductive materials to control this interaction. This study followed single-case design using ABAB models in which A indicated the baseline and B indicated the intervention. The experiment period comprised 1 month and a half. The experimental results demonstrated that in the case of two kindergarten children with cerebral palsy, their scores were considerably increased during the intervention phrases. The developmental applications of the results are also discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Low carbon development. Key issues

    Energy Technology Data Exchange (ETDEWEB)

    Urban, Frauke; Nordensvaard, Johan (eds.)

    2013-03-07

    This comprehensive textbook addresses the interface between international development and climate change in a carbon constrained world. It discusses the key conceptual, empirical and policy-related issues of low carbon development and takes an international and interdisciplinary approach to the subject by drawing on insights from across the natural sciences and social sciences whilst embedding the discussion in a global context. The first part explores the concept of low carbon development and explains the need for low carbon development in a carbon constrained world. The book then discusses the key issues of socio-economic, political and technological nature for low carbon development, exploring topics such as the political economy, social justice, financing and carbon markets, and technologies and innovation for low carbon development. This is followed by key issues for low carbon development in policy and practice, which is presented based on cross-cutting issues such as low carbon energy, forestry, agriculture and transportation. Afterwards, practical case studies are discussed from low carbon development in low income countries in Africa, middle income countries in Asia and Latin America and high income countries in Europe and North America.

  10. Autoshaping of key pecking in pigeons with negative reinforcement.

    Science.gov (United States)

    Rachlin, H

    1969-07-01

    Pigeons exposed to gradually increasing intensities of pulsing electric shock pecked a key and thereby reduced the intensity of shock to zero for 2 min. Acquisition of key pecking was brought about through an autoshaping process in which periodic brief keylight presentations immediately preceded automatic reduction of the shock. On the occasions of such automatic reduction of shock preceding the first measured key peck, little or no orientation to the key was observed. Observations of pigeons with autoshaping of positive reinforcement also revealed little evidence of orientation toward the key.

  11. Small private key MQPKS on an embedded microprocessor.

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-03-19

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012.

  12. Small Private Key PKS on an Embedded Microprocessor

    Science.gov (United States)

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  13. Key-lock colloids in a nematic liquid crystal.

    Science.gov (United States)

    Silvestre, Nuno M; Tasinkevych, M

    2017-01-01

    The Landau-de Gennes free energy is used to study theoretically the effective interaction of spherical "key" and anisotropic "lock" colloidal particles. We assume identical anchoring properties of the surfaces of the key and of the lock particles, and we consider planar degenerate and perpendicular anchoring conditions separately. The lock particle is modeled as a spherical particle with a spherical dimple. When such a particle is introduced into a nematic liquid crystal, it orients its dimple at an oblique angle θ_{eq} with respect to the far field director n_{∞}. This angle depends on the depth of the dimple. Minimization results show that the free energy of a pair of key and lock particles exhibits a global minimum for the configuration when the key particle is facing the dimple of the lock colloidal particle. The preferred orientation ϕ_{eq} of the key-lock composite doublet relative to n_{∞} is robust against thermal fluctuations. The preferred orientation θ_{eq}^{(2)} of the dimple particle in the doublet is different from the isolated situation. This is related to the "direct" interaction of defects accompanying the key particle with the edge of the dimple. We propose that this nematic-amplified key-lock interaction can play an important role in self-organization and clustering of mixtures of colloidal particles with dimple colloids present.

  14. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.

  15. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption

    Science.gov (United States)

    Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min

    2016-01-01

    Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196

  16. Environmental Education and Small Business Environmental Activity

    Science.gov (United States)

    Redmond, Janice; Walker, Beth

    2011-01-01

    Environmental education is seen as a key driver of small business environmental management, yet little is known about the activities small business owner-managers are undertaking to reduce their environmental impact or in what areas they may need education. Therefore, research that can identify environmental management activities being undertaken…

  17. Mathematical Background of Public Key Cryptography

    DEFF Research Database (Denmark)

    Frey, Gerhard; Lange, Tanja

    2005-01-01

    The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material.......The two main systems used for public key cryptography are RSA and protocols based on the discrete logarithm problem in some cyclic group. We focus on the latter problem and state cryptographic protocols and mathematical background material....

  18. Renyi information gain on quantum key

    International Nuclear Information System (INIS)

    Brandt, Howard E

    2007-01-01

    The concept of maximum Renyi information gain from quantum key is important in eavesdropping and security analyses of quantum key distribution. It is particularly useful in the design optimization of eavesdropping probes. The present work reviews the quantitative measure of Renyi information gain, its optimization, and application to the design of eavesdropping probes in which single-photon probe states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver

  19. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  20. Novel secret key generation techniques using memristor devices

    Directory of Open Access Journals (Sweden)

    Heba Abunahla

    2016-02-01

    Full Text Available This paper proposes novel secret key generation techniques using memristor devices. The approach depends on using the initial profile of a memristor as a master key. In addition, session keys are generated using the master key and other specified parameters. In contrast to existing memristor-based security approaches, the proposed development is cost effective and power efficient since the operation can be achieved with a single device rather than a crossbar structure. An algorithm is suggested and demonstrated using physics based Matlab model. It is shown that the generated keys can have dynamic size which provides perfect security. Moreover, the proposed encryption and decryption technique using the memristor based generated keys outperforms Triple Data Encryption Standard (3DES and Advanced Encryption Standard (AES in terms of processing time. This paper is enriched by providing characterization results of a fabricated microscale Al/TiO2/Al memristor prototype in order to prove the concept of the proposed approach and study the impacts of process variations. The work proposed in this paper is a milestone towards System On Chip (SOC memristor based security.