WorldWideScience

Sample records for vessel ieee transactions

  1. Editorial for IEEE Transactions on Power Electronics

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2007-01-01

    Our IEEE transactions on power electronics has had some very positive progress these past years under the leadership of Dr. Daan van Wyk. Papers have been processed efficiently both in review time and publication time. This success has spread throughout the whole power electronics community which...

  2. Editorial for the IEEE Transactions on Power Electronics, January 2009

    DEFF Research Database (Denmark)

    Blaabjerg, Frede

    2009-01-01

    I am entering the fourth year as the Editor in Chief of the IEEE TRANSACTIONS ON POWER ELECTRONICS. A position like this becomes more and more important for the technical field as publishing in a peer-reviewed highly ranked journal has influence on the industrial and academic career. It is a way...

  3. 2012 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Brown, Dennis; Girard, Sylvain; Gouker, Pascale; Gerardin, Simone; Quinn, Heather; Barnaby, Hugh

    2012-12-01

    The December 2012 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 49th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held July 16-20, 2012, in Miami, Florida USA. 95 papers presented at the 2012 NSREC were submitted for consideration for this year’s special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas. The peer review process for a typical technical journal generally takes six months to one year to complete. To publish this special issue of the IEEE Transactions on Nuclear Science (in December), the review process, from initial submission to final form, must be completed in about 10 weeks. Because of the short schedule, both the authors and reviewers are required to respond very quickly. The reviewers listed on the following pages contributed vitally to this quick-turn review process.We would like to express our sincere appreciation to each of them for accepting this difficult, but critical role in the process. To provide consistent reviews of papers throughout the year, the IEEE Transactions on Nuclear Science relies on a year-round editorial board that manages reviews for submissions throughout the year to the TRANSACTIONS in the area of radiation effects. The review process is managed by a Senior

  4. 2008 Special NSREC Issue of the IEEE Transactions on Nuclear Science Comments by the Editors

    Science.gov (United States)

    Schwank, Jim; Buchner, Steve; Marshall, Paul; Duzellier, Sophie; Brown, Dennis; Poivey, Christian; Pease, Ron

    2008-12-01

    The December 2008 special issue of the IEEE Transactions on Nuclear Science contains selected papers from the 45th annual IEEE International Nuclear and Space Radiation Effects Conference (NSREC) held in Tucson, Arizona, July 14 - 18, 2008. Over 115 papers presented at the 2008 NSREC were submitted for consideration for this year's special issue. Those papers that appear in this special issue were able to successfully complete the review process before the deadline for the December issue. A few additional papers may appear in subsequent issues of the TRANSACTIONS. This publication is the premier archival journal for research on space and nuclear radiation effects in materials, devices, circuits, and systems. This distinction is the direct result of the conscientious efforts of both the authors, who present and document their work, and the reviewers, who selflessly volunteer their time and talent to help review the manuscripts. Each paper in this journal has been reviewed by experts selected by the editors for their expertise and knowledge of the particular subject areas.

  5. Editorial for IEEE Transactions on Power Electronics, January 2013

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Lehman, Brad

    2013-01-01

    should increase the impact factor of the IEEE TRANSACTIONS ON POWER ELECTRONICS (TPEL). In 2007, TPEL published 2600 pages, and it has gradually been increased to 4000 pages in 2011, 5000 pages in 2012, and 5500 pages are projected for 2013. We have decided to publish 12 printed issues so every month...... a new issue will be printed. A graph is provided showing the number of regular papers received in the past years as well as the number of published pages in the TPEL. Finally they note that in 2008, TPEL obtained a record high value for the impact factor (as shown in a figure) but in 2009 it was reduced...... the papers to be read over a longer time span; 2) Web of Science (ISI Thomsen Reuter) began to register new power electronics conferences in their database, and citations from conferences counts and contributes to a higher impact factor....

  6. 19 CFR 4.90 - Simultaneous vessel transactions.

    Science.gov (United States)

    2010-04-01

    ... mentioned in this section and the conditions stated in the sections indicated in the list: 121 For the purposes of this part, an inward foreign voyage is completed at the port of final discharge of inbound... ports (§ 4.88). (b) When a vessel is engaged simultaneously in two or more such transactions, the master...

  7. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.; DeBlasio, R.

    2012-04-01

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  8. Impact of multilateral congestion management on the reliability of power transactions

    International Nuclear Information System (INIS)

    Rodrigues, A.B.; Da Silva, M.G.

    2003-01-01

    The restructuring of the electricity industry has caused an increase in the number of transactions in the energy market. These transactions are defined by market forces without considering operational constraints of the transmission system. Consequently, there are transactions that cause congestion in the transmission network. This paper has as objective to assess the impact of multilateral congestion management on the reliability of power transactions. This assessment is based on reliability indices such as expected power curtailments, curtailment probability, expected cost of congestion management and probability distributions of the total power curtailment. Tests results with IEEE RTS-1996 demonstrate that the multilateral management results in smaller curtailments and congestion costs than traditional bilateral management. (author)

  9. Assessment for feasibility and pricing of wheeling transactions under deregulated environment of power industry

    International Nuclear Information System (INIS)

    Yog Raj Sood; Narayana Prasad Padhy; Hari Om Gupta

    2004-01-01

    Many transactions of electrical power are expected to take place due to deregulation of electrical power industry. It is important for independent power producers, independent system operator and bulk power consumers (load centers) to know and select the least cost transaction among all the feasible transactions. In this paper, selection of best possible wheeling transaction in a deregulated power system has been determined based on available transfer capability and short run marginal cost. The proposed algorithm has been tested and analyzed for IEEE-30 bus test system and hence applied to South African power industry, the results so obtained are found to be of very much practical use. (author)

  10. Pattern of secure bilateral transactions ensuring power economic dispatch in hybrid electricity markets

    International Nuclear Information System (INIS)

    Kumar, Ashwani; Gao, Wenzhong

    2009-01-01

    This paper proposes a new method for secure bilateral transactions determination ensuring economic power dispatch of the generators using new AC distribution factors for pool and bilateral coordinated markets. The new optimization problem considers simultaneous minimization of deviations from scheduled transactions and fuel cost of the generators in the network. The fuel cost has been obtained for hybrid market model and impact of different percentage of bilateral demand on fuel cost, generation share, and pattern of transactions has also been determined. The impact of optimally located unified power flow controller (UPFC) on the bilateral transactions, fuel cost and generation pattern has also been studied. The results have also been obtained for pool market model. The proposed technique has been applied on IEEE 24-bus reliability test system (RTS). (author)

  11. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  12. Contributions to the 14th IEEE/NPSS Symposium on fusion engineering

    International Nuclear Information System (INIS)

    Navarro, A.P.; Almoguera, L.; Alonso Gozalo, J.; Alonso Candenas, J.; Blaumoser, M.

    1992-01-01

    Three communications about the TJ-II device, under construction at CIEMAT with preferential support from EURATOM, were presented to the 14th IEEE/NPSS Symposium on Fusion Engineering and are collected in this report. The first one describes in detail the device and its present status of design and construction. The remaining two deal with the two most critical components of the project: the vacuum vessel and the central hard conductor. (author) 16 fig. 16 ref

  13. New secure bilateral transaction determination and study of pattern under contingencies and UPFC in competitive hybrid electricity markets

    International Nuclear Information System (INIS)

    Kumar, A.; Chanana, S.

    2009-01-01

    In the competitive electricity environment, the flexibility of power transactions is expected to drastically increase among the trading partners and can compromise the system security and reliability. These transactions are to be evaluated ahead of their scheduling in a day-ahead and hour-ahead market to avoid congestion and ensure their feasibility with respect to the system operating conditions. The security of the transactions has become essential in the new environment for better planning and management of competitive electricity markets. This paper proposes a new method of secure bilateral transaction determination using AC distribution factors based on the full Jacobian sensitivity and considering the impact of slack bus for pool and bilateral coordinated markets. The secure bilateral transactions have also been determined considering critical line outage contingencies cases. The bilateral transaction matrix pattern has also been determined in the presence of unified power flow controller (UPFC). The optimal location of UPFC has been determined using mixed integer non-linear programming approach. The proposed technique has been applied on IEEE 24-bus reliability test system (RTS). (author)

  14. The IEEE Milestone event at CERN

    CERN Multimedia

    2005-01-01

    On the initiative of its French and Swiss Sections, the IEEE has honoured CERN with an 'IEEE Milestone in the history of electricity and electronics' for the invention of the multi-wire proportional chamber in 1968. The IEEE established the Electrical Engineering Milestones programe in 1983 to honour significant achievements in the history of electrical and electronics engineering. To be designated, an achievement must be at least 25 years old, must have involved a unique solution to an engineering problem, and must have had at least regional impact. Currently there are more than  50 IEEE Milestones around the world. http://www.ieee.org/organizations/history_center/cern.html The installation and unveiling of this IEEE Milestone will provide the opportunity to emphasize the close relationship between science, technology, industry and well-being in society.  A ceremony, organised with the support of a group of IEEE members working at CERN, will be held at the CERN Globe of Science and Inn...

  15. Active Channel Reservation for Coexistence Mechanism (ACROS) for IEEE 802.15.4 and IEEE 802.11

    Science.gov (United States)

    Shin, Soo Young; Woo, Dong Hyuk; Lee, Jong Wook; Park, Hong Seong; Kwon, Wook Hyun

    In this paper, a coexistence mechanism between IEEE 802.15.4 and IEEE 802.11b, Active Channel Reservation for cOexiStence (ACROS), is proposed. The key idea underlining ACROS is to reserve the channel for IEEE 802.15.4 transmission, where IEEE 802.11 transmissions are forbidden. The request-to-send (RTS)/clear-to send (CTS) mechanism within IEEE 802.11 is used to reserve a channel. The proposed ACROS mechanism is implemented into a PC based prototype. The embedded version of ACROS is also developed to mitigate the timing drift problem in the PC-based ACROS. The efficiency of ACROS is shown using the throughput and packet error rate achieved in actual experiments.

  16. 2012 IEEE Vehicular Networking Conference (VNC)

    NARCIS (Netherlands)

    Altintas, Onur; Chen, Wai; Heijenk, Geert; Oh, Hyun Seo; Chung, Jong-Moon; Dressler, Falko; Kargl, Frank; Pau, Giovanni; Schoch, Elmar

    2012-01-01

    On behalf of the Organizing Committee, we would like to welcome you to the fourth edition of the IEEE Vehicular Networking Conference in Seoul, Korea. IEEE VNC is a unique conference sponsored by both IEEE Communications Society and Intelligent Transportation Systems Society. It brings together

  17. Simulasi Kinerja Jaringan Nirkabel IEEE-802.11a dan IEEE-802.11g Menggunakan NS-2

    Directory of Open Access Journals (Sweden)

    Helm Fitriawan

    2014-03-01

    Full Text Available Wireless network uses transmission media based on radio waves. This type of networks is mainly useddue to its efficiency and mobility in data exchanging. This paper reports the modeling and simulation of wirelessnetworks based on Cisco Aironet 1130ag access point devices with IEEE 802.11a and IEEE 802.11g standards. Themodeling and simulation are performed using network simulator version 2 (NS-2 that is installed on operationsystem Linux Ubuntu v.10.10. The NS-2 is commonly used and works well in numerous types of network simulation. From simulation, we obtain quality of service parameters by employing several simulation scenarios in terms ofnumber of nodes, distances, and packet data sizes. It can be concluded from simulation results that the IEEE 802.11gnetworks transfer data with better quality than those of IEEE 802.11a networks.  Furthermore, the IEEE 802.11gnetworks provide a higher throughput, with smaller amount of delay and packet loss percentage compared to thoseof IEEE 802.11a networks.

  18. IEEE Std 383-1974: IEEE standard for type test of Class IE electric cables, field splices, and connections for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard provides direction for establishing type tests which may be used in qualifying Class 1E electric cables, field splices, and other connections for service in nuclear power generating stations. General guidelines for qualifications are given in IEEE Std 323-1974, Standard for Qualifying Class IE Electric Equipment for Nuclear Power Generating Stations. Categories of cables covered are those used for power control and instrumentation services. Though intended primarily to pertain to cable for field installation, this guide may also be used for the qualification of internal wiring of manufactured devices. This guide does not cover cables for service within the reactor vessel

  19. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    Science.gov (United States)

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  20. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    Science.gov (United States)

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  1. A coexistence model of IEEE 802.15.4 and IEEE 802.1 lbIg

    NARCIS (Netherlands)

    Yuan, Wei; Wang, Xiangyu; Linnartz, J.P.M.G.

    2007-01-01

    IEEE 802.15.4 was developed to meet the needs for low-rate wireless communication. However, due to its low power, IEEE 802.15.4 is potentially vulnerable to interference by other wireless technologies having much higher power and working in the same industrial, scientific, and medical (ISM) band

  2. Notice of Violation of IEEE Publication PrinciplesJoint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath

    Science.gov (United States)

    Li, Lei; Hu, Jianhao

    2010-12-01

    Notice of Violation of IEEE Publication Principles"Joint Redundant Residue Number Systems and Module Isolation for Mitigating Single Event Multiple Bit Upsets in Datapath"by Lei Li and Jianhao Hu,in the IEEE Transactions on Nuclear Science, vol.57, no.6, Dec. 2010, pp. 3779-3786After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.This paper contains substantial duplication of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:"Multiple Error Detection and Correction Based on Redundant Residue Number Systems"by Vik Tor Goh and M.U. Siddiqi,in the IEEE Transactions on Communications, vol.56, no.3, March 2008, pp.325-330"A Coding Theory Approach to Error Control in Redundant Residue Number Systems. I: Theory and Single Error Correction"by H. Krishna, K-Y. Lin, and J-D. Sun, in the IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol.39, no.1, Jan 1992, pp.8-17In this paper, we propose a joint scheme which combines redundant residue number systems (RRNS) with module isolation (MI) for mitigating single event multiple bit upsets (SEMBUs) in datapath. The proposed hardening scheme employs redundant residues to improve the fault tolerance for datapath and module spacings to guarantee that SEMBUs caused by charge sharing do not propagate among the operation channels of different moduli. The features of RRNS, such as independence, parallel and error correction, are exploited to establish the radiation hardening architecture for the datapath in radiation environments. In the proposed

  3. Performance comparison of IEEE 802.11g and IEEE 802.11n in the presence of interference from 802.15.4 networks

    OpenAIRE

    Masood, Syed Haani

    2013-01-01

    In this paper we compare the packet error rate (PER) and maximum throughput of IEEE 802.11n and IEEE 802.11g under interference from IEEE 802.15.4 by using MATLAB to simulate the IEEE PHY for 802.11n and 802.11g networks.

  4. IEEE International Symposium on Biomedical Imaging.

    Science.gov (United States)

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  5. Transactions in Software Components: Container-Interposed Transactions

    Czech Academy of Sciences Publication Activity Database

    Procházka, M.; Plášil, František

    2002-01-01

    Roč. 3, č. 2 (2002), s. - ISSN 1525-9293 R&D Projects: GA ČR GA201/99/0244; GA AV ČR IAA2030902 Institutional research plan: AV0Z1030915 Keywords : transactions * component-based software architectures * transaction propagation policy * transaction attributes * container -interposed transactions Subject RIV: JC - Computer Hardware ; Software

  6. Coexistence of IEEE 802.11b/g WLANs and IEEE 802.15.4 WSNs : Modeling and Protocol Enhancements

    NARCIS (Netherlands)

    Yuan, W.

    2011-01-01

    As an emerging short-range wireless technology, IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) are increasingly used in the fields of home control, industrial control, consumer electronics, energy management, building automation, telecom services, personal healthcare, etc. IEEE

  7. Researching the roots of IEEE Region 8

    NARCIS (Netherlands)

    Bastiaans, M.J.

    2013-01-01

    This paper describes the preliminary steps towards the foundation and the early history of IRE Region 9 / IEEE Region 8. The information has been gathered mainly from the archives of the IEEE Benelux Section.

  8. Modeling Respiratory Gas Dynamics in the Aviator’s Breathing System. Volume 2. Appendices

    Science.gov (United States)

    1994-05-01

    Rideout, at at. Dfference-Differentlat Equations for Fluid C... Flow in Distensible Tubes. IEEE Transactions on Bio-Medlcat C... Enginhering. Vot INE-14...McGraw-Hill; 1970; Chapter 13: 433-450. 12. Astrand, PO; Saltin, B. Oxygen uptake during the first minutes of heavy muscular exercise. J Appl Physiol...1802-1814; 1986. 233. Linehan, JH; Haworth, ST; Nelin, LD; Krenz, GS; Dawson, CA. A Simple Distensible Vessel Model for Interpreting Pulmonary

  9. A model for ultrasound contrast agent in a phantom vessel

    KAUST Repository

    Qamar, Adnan

    2014-02-01

    A theoretical framework to model the dynamics of Ultrasound Contrast Agent (UCA) inside a phantom vessel is presented. The model is derived from the reduced Navier-Stokes equation and is coupled with the evolving flow field solution inside the vessel by a similarity transformation approach. The results are computed, and compared with experiments available in literature, for the initial UCA radius of Ro=1.5 μm and 2 μm for the vessel diameter of D=12 μm and 200 μm with the acoustic parameters as utilized in the experiments. When compared to other models, better agreement on smaller vessel diameter is obtained with the proposed coupled model. The model also predicts, quite accurately, bubble fragmentation in terms of acoustic and geometric parameters. © 2014 IEEE.

  10. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  11. IEEE C37.82-1987: IEEE standard for the qualification of switchgear assemblies for Class 1E applications in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the methods and requirements for qualifying switchgear assemblies for indoor areas outside of the containment in nuclear power generating stations. These assemblies include (1) metal-enclosed low-voltage power circuit breaker switchgear assemblies, as defined in ANSI/IEEE C37.20.1-1987, (2) metal-clad switchgear assemblies, as defined in ANSI/IEEE C37.20.2-1987, (3) metal-enclosed bus, as defined in ANSI/IEEE C37.23-1987, and (4) metal-enclosed interrupter switchgear assemblies, as defined in ANSI/IEEE C37.20.3-1987. The purpose of this document is to provide amplification of the general requirements of ANSI/IEEE Std 323-1983 as they apply to the specific features of Class 1E switchgear assemblies. Where differences exist between this document and ANSI/IEEE Std 323-1983, this document takes precedence insofar as switchgear assemblies are concerned

  12. Fiber optics backbone for IEEE 802.3 networks

    Science.gov (United States)

    Shani, Ron

    1990-01-01

    In the last few years the IEEE 802.3 committee has developed fiber optics inter-repeater link standard called FOIRL. This standard defines the "Fiber Optics Media Access Unit" (FOMAU) which is used to connect two IEEE 802.3 repeaters that are up to 1Km apart. The IEEE 802.3 lOBaseF task force is currently standardizing a full F/O system in two directions: passive and active. The active approach is a compromise between the FOIRL (Asynchronous) approach and the Synchronous approach. As a result of this activity the IEEE 802.3 standard will define three different F/O interfaces and several devices that will not inter-operate. Such a standard will lower the credibility among the IEEE 802.3 user community, as customers will be confused amidst the many chapters and devices with no clear choice. This paper describes a method that can reduce the number of standards to two (passive and active), while proposing a solution for all the requirements of 802.3 F/O LAN. (The question of passive vs active approach will be discussed in this paper).

  13. The scalable coherent interface, IEEE P1596

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the scalable coherent interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960--1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics

  14. Proceedings of IEEE Machine Learning for Signal Processing Workshop XV

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the Fifteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP’2005), held in Mystic, Connecticut, USA, September 28-30, 2005. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP) organized...... by the NNSP Technical Committee of the IEEE Signal Processing Society. The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized...... by the Machine Learning for Signal Processing Technical Committee with sponsorship of the IEEE Signal Processing Society. Following the practice started two years ago, the bound volume of the proceedings is going to be published by IEEE following the Workshop, and we are pleased to offer to conference attendees...

  15. Unconventional uranium transactions

    International Nuclear Information System (INIS)

    Anderson, S.C.

    1981-01-01

    The purpose of this paper is to describe some representative unconventional transactions which have been observed in the uranium market; to explain the circumstances giving rise to these transactions; and to describe the benefits resulting from these transactions. Unconventional transactions are usually quite specialized, since they are tailored to meet the particular needs of specific market participants. Nevertheless, most of these transactions fall into the following basic categories: multi-party (back-to-back; bridge); swap (deconversion; nationality); barter; inventory financing (leasing with repurchase obligation; sale with repurchase option). These transactions are explained and discussed. (U.K.)

  16. Qualification test of Class 1E equipment based on IEEE323 Std 2003

    International Nuclear Information System (INIS)

    Kim, J. S.; Jung, S. C.; Kim, T. R.

    2004-01-01

    IEEE Standard for Qualifying Class 1E Equipment has been updated to 2003 edition since the issue of IEEE Std 323-1971, 1974, 1983. NRC approved the IEEE Std 323-1974 as Qualification standard of Class 1E Equipment in domestic nuclear power plant. IEEE Std 323-2003 was issued in September of 2003 and utility is waiting the approval of NRC. IEEE Std 323-2003 suggest a new qualification technique which adopts the condition monitoring. Performance of two transient during DBA test is no longer recommended in IEEE Std 323-2003. IEEE323 Std 2003 included a chapter of ''extension of Qualified life'' to make available the life extension of components during plant life extension. For the efficient control of preserving EQ in domestic nuclear power plant, IEEE323 Std 2003 is strongly recommended

  17. Transactional Memory

    CERN Document Server

    Harris, Tim; Rajwar, Ravi

    2010-01-01

    The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs.This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI(atomicity, consistency, isolation) properties of transactions provide a foundation to ensure that concurrent reads and writes of shared data do not produce inconsistent or incorrect results. At a higher level, a computation wrapped in a transaction executes atomically - either it completes successfullyand

  18. IEEE Prize for Lucio Rossi

    CERN Multimedia

    IEEE Council on Superconductivity

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity's Awards Committee (right).

  19. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    Science.gov (United States)

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  20. Proceedings IEEE Visualization Conference and IEEE Information Visualization Conference (VIS'07 and INFOVIS'07, Sacramento CA, USA, October 28-November 1, 2007)

    NARCIS (Netherlands)

    Chen, M.; Hansen, C.; North, C.; Pang, A.; Wijk, van J.J.

    2007-01-01

    These are the proceedings of the IEEE Visualization Conference 2007 (Vis 2007) and the IEEE Information Visualization Conference 2007 (InfoVis 2007) held during October 28 to November 1, 2007 in Sacramento, California. The power of using computing technology to create useful, effective imagery for

  1. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  2. Return of IEEE Std 627 and its Value to Equipment Qualification Programs

    International Nuclear Information System (INIS)

    Horvath, D.A.

    2012-01-01

    IEEE Std 627 ''Design Qualification of Safety Systems Equipment Used in Nuclear Power Generating Stations'' was issued to more generically establish qualification requirements in the form of a high level umbrella document. Efforts on this standard began in late 1975 at the request of the IEEE Nuclear Standards Management Board. In 1977 a joint ASME/IEEE agreement established responsibility for qualification and quality assurance standards preparation. ASME accepted responsibility for Quality Assurance and IEEE for qualification. In accordance with that agreement, IEEE completed the generic qualification standard in 1980. This document provided high level approaches, criteria, guidance, and principles for qualification of both electrical and mechanical equipment that at that time appeared in no other industry standard. IEEE Std 627-1980 was later reaffirmed in 1996. In 1986, ASME's Board on Nuclear Codes and Standards directed its Committee on Qualification of Mechanical Equipment (QME) to develop a standard for qualifying mechanical equipment. This task was completed in several parts during the time frame from 1992 to 1994. Partly in response to this activity, IEEE Std 627 was withdrawn in 2002. Later although withdrawn, it was found that IEEE Std 627 was continuing to be used and referenced by many entities both in the US and other countries including in ASME's QME-1-2002 ''Qualification of Active Mechanical Equipment Used in Nuclear Power Plants'', US NRC's NUREG-0800 Standard Review Plan Section 3.11, at least one reactor vendor's Design Certification Document (DCD), several international licensing documents, and elsewhere. As a result, in 2007, the IEEE Standards Board authorized Working Group 2.10 of Subcommittee 2 (Qualification) of the Power and Energy Society's Nuclear Power Engineering Committee to resurrect and update IEEE Std 627-1980 (Reaff 1996). The result was the culmination IEEE Std 627 in 2010. This paper will report on the eight improvements made

  3. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    The Nobel prize winner Georges Charpak and W. Cleon Anderson, IEEE President, unveil the Milestone bronze plaques. At a ceremony on 26 September at the Globe of Science and Innovation, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally dedicated Milestone plaques recognising the invention of electronic particle detectors at CERN. The plaque were unveiled by Mr Anderson and Georges Charpak, the Nobel-prize winning inventor of wire chamber technology at CERN in 1968. The IEEE is the world's largest professional association dedicated to the advancement of technology with 365,000 individual members in over 150 countries. Established in 1983, there are currently over 60 Milestones around the world. They honour momentous achievements in the history of electrical and electronics engineering, such as the landing of the first transatlantic cable, code breaking at Bletchley Park during World War II, and the development of the Japanese Bullet train, the Tokaido Shin...

  4. IEEE Transactions on Professional Communication

    DEFF Research Database (Denmark)

    2008-01-01

    Guest Editors: Pavel Zemliansky begin_of_the_skype_highlighting     end_of_the_skype_highlighting, James Madison University, USA; Constance Kampf, University of Aarhus, Denmark Overview Most literature in technical communication published in the United States focuses on the state of the discipline......, the theory and practice of technical communication in Europe, Asia, South America, and other places deserve closer attention. Substantial differences between the state of the discipline in North America and abroad impact our work in this globalized world, as well as our current students' future professional...... and education is emerging, and the implications of these origins for theory, practice and teaching.  Possible Topics for Articles Possible topics, issues and questions to be examined in this issue include but are not limited to:   Which theoretical perspectives and disciplinary roots affect technical...

  5. IEEE Std 535-1986: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 308-1980 can be demonstrated by using the procedures provided in this standard in accordance with ANSI/IEEE Std 323-1983. Battery sizing, maintenance, capacity testing, installation, charging equipment, and consideration of other type batteries are beyond the scope of this standard

  6. On Correlated Failures in Survivable Storage Systems

    Science.gov (United States)

    2002-05-01

    Littlewood, D.R. Miller, “Conceptual modeling of coincident failures in multiversion software”, IEEE Transactions on Software Engineering, Volume: 15 Issue...Recovery in Multiversion Software”. IEEE Transaction on Software Engineering, Vol. 16 No.3, March 1990 [Plank1997] J. Plank “A tutorial on Reed-Solomon

  7. Managerial accounting for transaction costs

    OpenAIRE

    Лабынцев, Николай Тихонович

    2015-01-01

    Essence and significance of transaction accounting and its basic concepts – transaction and transaction costs – have been determined. Main types of transaction costs and elements of transaction accounting for expenses have been considered. Source documents forms for the purpose of accounting for transaction costs have been worked out.

  8. IEEE Std 535-1979: IEEE standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1971 and IEE Std 308-1978, can be demonstrated by using the procedures provided in this standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other type batteries are beyond the scope of this standard

  9. Communication Dependent Control of Multi-Vehicle Formations

    Science.gov (United States)

    2016-05-11

    On Maximizing the Second Smallest Eigen- value of a State-Dependent Graph Laplacian,” IEEE Transactions on Au- tomatic Control, vol. 51, no. 1, pp...Collective Motion With Limited Communication,” IEEE Transactions on Au- tomatic Control, vol. 53, no. 3, pp. 706–719, 2008. [Online]. Available: http

  10. IEEE Prize for Lucio Rossi

    CERN Multimedia

    2007-01-01

    Lucio Rossi receives his prize from John Spargo, Chairman of the IEEE Council on Superconductivity (left), and Martin Nisenoff, Chairman of the Council on Superconductivity’s Awards Committee (right). (Photo: IEEE Council on Superconductivity)With the magnets installed in the tunnel and work on the interconnections almost completed, Lucio Rossi has reaped the rewards of fifteen years of work. And yet, when the physicist from Milan arrived to take charge of the group responsible for the superconducting magnets in 2001, success seemed far from assured. Endowed with surprising levels of energy, Lucio Rossi, together with his team, ensured that production of these highly complex magnets got underway. Today, that achievement earns them the recognition not only of CERN but also of the international superconducting community. It is for this achievement that Lucio Rossi was awarded the prize by the IEEE’s (Institute of Electrical an...

  11. Multi-Mode Analysis of Dual Ridged Waveguide Systems for Material Characterization

    Science.gov (United States)

    2015-09-17

    analysis”. Instrumenta- tion and Measurement, IEEE Transactions on, 44(1):19–27, 1995. [26] Maode, Niu, Su Yong, Yan Jinkui, Fu Chenpeng, and Xu Deming ...waveguide method”. Instrumentation and Measurement, IEEE Transactions on, 46(2):519–522, 1997. [35] Wang, Shoujun, Maode Niu, and Deming Xu. “A frequency

  12. IEEE Conference Publications in Libraries.

    Science.gov (United States)

    Johnson, Karl E.

    1984-01-01

    Conclusions of surveys (63 libraries, OCLC database, University of Rhode Island users) assessing handling of Institute of Electrical and Electronics Engineers (IEEE) conference publications indicate that most libraries fully catalog these publications using LC cataloging, and library patrons frequently require series access to publications. Eight…

  13. IEEE International Workshop on Machine Learning for Signal Processing: Preface

    DEFF Research Database (Denmark)

    Tao, Jianhua

    The 21st IEEE International Workshop on Machine Learning for Signal Processing will be held in Beijing, China, on September 18–21, 2011. The workshop series is the major annual technical event of the IEEE Signal Processing Society's Technical Committee on Machine Learning for Signal Processing...

  14. IEEE guide for the analysis of human reliability

    International Nuclear Information System (INIS)

    Dougherty, E.M. Jr.

    1987-01-01

    The Institute of Electrical and Electronics Engineers (IEEE) working group 7.4 of the Human Factors and Control Facilities Subcommittee of the Nuclear Power Engineering Committee (NPEC) has released its fifth draft of a Guide for General Principles of Human Action Reliability Analysis for Nuclear Power Generating Stations, for approval of NPEC. A guide is the least mandating in the IEEE hierarchy of standards. The purpose is to enhance the performance of an human reliability analysis (HRA) as a part of a probabilistic risk assessment (PRA), to assure reproducible results, and to standardize documentation. The guide does not recommend or even discuss specific techniques, which are too rapidly evolving today. Considerable maturation in the analysis of human reliability in a PRA context has taken place in recent years. The IEEE guide on this subject is an initial step toward bringing HRA out of the research and development arena into the toolbox of standard engineering practices

  15. Implicit Block ACK Scheme for IEEE 802.11 WLANs

    Science.gov (United States)

    Sthapit, Pranesh; Pyun, Jae-Young

    2016-01-01

    The throughput of IEEE 802.11 standard is significantly bounded by the associated Medium Access Control (MAC) overhead. Because of the overhead, an upper limit exists for throughput, which is bounded, including situations where data rates are extremely high. Therefore, an overhead reduction is necessary to achieve higher throughput. The IEEE 802.11e amendment introduced the block ACK mechanism, to reduce the number of control messages in MAC. Although the block ACK scheme greatly reduces overhead, further improvements are possible. In this letter, we propose an implicit block ACK method that further reduces the overhead associated with IEEE 802.11e’s block ACK scheme. The mathematical analysis results are presented for both the original protocol and the proposed scheme. A performance improvement of greater than 10% was achieved with the proposed implementation.

  16. IEEE Std 650-1990: IEEE standard for qualification of Class 1E static battery chargers and inverters for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Methods for qualifying static battery chargers and inverters for Class 1E installations in a mild environment outside containment in nuclear power generating stations are described. The qualification methods set forth employ a combination of type testing and analysis, the latter including a justification of methods, theories, and assumptions used. These procedures meet the requirements of IEEE Std 323-1983, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations

  17. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The award was presented by the deputy programme chair Vince Cianciolo (left) at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November.

  18. 17 CFR 37.8 - Information relating to transactions on derivatives transaction execution facilities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Information relating to transactions on derivatives transaction execution facilities. 37.8 Section 37.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION DERIVATIVES TRANSACTION EXECUTION FACILITIES § 37.8...

  19. IEEE Conference Record - Abstracts. 1997 IEEE International Conference on Plasma Science, 19 - 22 May 1997 San Diego, California

    National Research Council Canada - National Science Library

    Hyman, Julius

    1997-01-01

    This 360 page softbound publication includes the following major sections. An invitation to ICOPS'97, Catamaran Resort Hotel Floor Pinas, Officers of the IEEE Nuclear and Plasma Sciences Society, Conference Information...

  20. Managing transaction risks in interdependent supply chains: an extended transaction cost economics perspective

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    The present study examines the management of transaction risks in supply chains. Risk management studies often ignore the wider supply chain context in which individual transactions take place. However, risk management strategies which are suitable to use when only a single transaction is considered

  1. Principles of Transactional Memory The Theory

    CERN Document Server

    Guerraoui, Rachid

    2010-01-01

    Transactional memory (TM) is an appealing paradigm for concurrent programming on shared memory architectures. With a TM, threads of an application communicate, and synchronize their actions, via in-memory transactions. Each transaction can perform any number of operations on shared data, and then either commit or abort. When the transaction commits, the effects of all its operations become immediately visible to other transactions; when it aborts, however, those effects are entirely discarded. Transactions are atomic: programmers get the illusion that every transaction executes all its operati

  2. THE SPECIFICITY OF INTRACOMMUNITY TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    PALIU-POPA LUCIA

    2011-09-01

    Full Text Available Considered from the perspective of Romania's accession to the European Union, we can say that starting with 1 January 2007, foreign trade transactions were delimited in relation to the customs borders in intra-Community transactions and international transactions. In this context, the way of conducting these operations is influenced by both the economic and financial features specific to both categories of transactions, that relate to the economic character of the activity, the diversity and specificity of the foreign trade activity, transport of goods, the complexity and regulation of intra-Community and international commercial transactions, and by the specific features of each category of transaction. Starting from the consideration that the economic and financial characteristics of foreign trade activity, specific to intra-Community commercial transactions, have a significant influence in the organization and management of accounting of the entities involved in such transactions, determining in a greater or lesser extent, the way of capitalization of the financial and accounting information in the processes of analysis, decision and control, in this paper we proposed to address the features of intra-Community trade.

  3. Valuation of Transactive Systems

    Energy Technology Data Exchange (ETDEWEB)

    Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Homer, Juliet S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gilbert, Erik I. [Navigant Consulting, Boulder, CO (United States); Chandler, Shawn [Navigant Consulting, Portland, OR (United States); Shandross, Richard [Navigant Consulting, Burlington, MA (United States)

    2016-05-12

    This is a final report from a project funded by the U.S. Department of Energy to formulate and test a methodology for valuation of systems where transaction-based mechanisms coordinate the exchange of value between the system’s actors. Today, the principal commodity being exchanged is electrical energy, and such mechanisms are called transactive energy systems. The authors strove to lay a foundation for meaningful valuations of transactive systems in general, and transactive energy systems as a special case. The word valuation is used in many different ways. This report proposes a valuation methodology that is inclusive of many types of valuations. Many will be familiar with cost-benefit valuations, in which both costs and benefits are assessed to determine whether the assets are worth their cost. Another set of valuation methods attempt to optimize an outcome using available resources, as is the case with integrated resource planning. In the end, this report’s methodology was most influenced by and most resembles the integrated-resource-planning approach. Regardless, we wish to enforce the premise that all valuations are comparative and should clearly specify a baseline scenario. A long, annotated list of prior valuation studies and valuation methodologies that influenced this report has been appended to this report. Much research is being conducted today concerning transactive systems, but only a handful of transactive system mechanisms have been formulated and field tested. They are found to be quite diverse, and the documentation of the various mechanisms is uneven in breadth and quality. It is therefore not adequate to simply assert that a valuation scenario includes a transactive system; certain characteristics and qualities of the chosen transactive system mechanism must be defined and stated. The report lists and discusses most of the known transactive system mechanisms. It offers a set of questions that may be used to help specify important

  4. Maximum Interconnectedness and Availability for Directional Airborne Range Extension Networks

    Science.gov (United States)

    2016-08-29

    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Maximum Interconnectedness and Availability for Directional Airborne Range Extension Networks Thomas...2 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS I. INTRODUCTION Tactical military networks both on land and at sea often have restricted transmission...a standard definition in graph theoretic and networking literature that is related to, but different from, the metric we consider. August 29, 2016

  5. Energy Harvesting - Wireless Sensor Networks for Indoors Applications Using IEEE 802.11

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Sørensen, Thomas; Madsen, Jan

    2014-01-01

    The paper investigates the feasibility of using IEEE 802.11 in energy harvesting low-power sensing applications. The investigation is based on a prototype carbon dioxide sensor node that is powered by artificial indoors light. The wireless communication module of the sensor node is based on the RTX......4100 module. RTX4100 incorporates a wireless protocol that duty-cycles the radio while being compatible with IEEE 802.11 access points. The presented experiments demonstrate sustainable operation but indicate a trade-off between the benefits of using IEEE 802.11 in energy harvesting applications...

  6. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  7. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  8. Networks and Transaction Costs

    DEFF Research Database (Denmark)

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation...... determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs observed for different input and output markets. At a first stage we estimate a multiple input...... transaction cost functions for all traded farm inputs and outputs. Estimation results based on a sample of 315 Polish farms imply a significant influence of social network structures on farm’s transaction costs. Moreover, estimated transaction costs correspond to a reasonable amount of farm specific shadow...

  9. Networks and Transaction Costs

    DEFF Research Database (Denmark)

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs observed for different input and output markets. At a first stage we estimate a multiple input......Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation...... transaction cost functions for all traded farm inputs and outputs. Estimation results based on a sample of 315 Polish farms imply a significant influence of social network structures on farm’s transaction costs. Moreover, estimated transaction costs correspond to a reasonable amount of farm specific shadow...

  10. Micro-transactions for concurrent data structures

    DEFF Research Database (Denmark)

    Meawad, Fadi; Iyer, Karthik; Schoeberl, Martin

    2013-01-01

    implementation of transactional memory that we call micro-transactions. In particular, we argue that hardware support for micro-transactions allows us to efficiently implement certain data structures. Those data structures are difficult to realize with the atomic operations provided by stock hardware and provide......, atomic instructions, and micro-transactions. Our results suggest that transactional memory is an interesting alternative to traditional concurrency control mechanisms....

  11. CERN receives prestigious Milestone recognition from IEEE

    CERN Multimedia

    2005-01-01

    At a ceremony at CERN, Mr W. Cleon Anderson, President of the Institute of Electrical and Electronics Engineers (IEEE) formally a Milestone plaque in recognition of the invention of electronic particle detectors at CERN

  12. 0011-0030.How to make an abstract in IEEE Format for ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.How to make an abstract in IEEE Format for AvishkarMulticultural Night in IEEE R10 Student Congress 2009Performances.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook ...

  13. IEEE 1451.2 based Smart sensor system using ADuc847

    Science.gov (United States)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  14. Transactional Network Platform: Applications

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  15. Transactions in domain-specific information systems

    Science.gov (United States)

    Zacek, Jaroslav

    2017-07-01

    Substantial number of the current information system (IS) implementations is based on transaction approach. In addition, most of the implementations are domain-specific (e.g. accounting IS, resource planning IS). Therefore, we have to have a generic transaction model to build and verify domain-specific IS. The paper proposes a new transaction model for domain-specific ontologies. This model is based on value oriented business process modelling technique. The transaction model is formalized by the Petri Net theory. First part of the paper presents common business processes and analyses related to business process modeling. Second part defines the transactional model delimited by REA enterprise ontology paradigm and introduces states of the generic transaction model. The generic model proposal is defined and visualized by the Petri Net modelling tool. Third part shows application of the generic transaction model. Last part of the paper concludes results and discusses a practical usability of the generic transaction model.

  16. Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Hartel, Pieter H.; Butler, Michael J.; de Jong, Eduard; Longley, Mark; Olivieira, J.N.; Zave, P.

    A transacted memory that is implemented using EEPROM technology offers persistence, undoability and auditing. The transacted memory system is formally specified in Z, and refined in two steps to a prototype C implementation / SPIN model. Conclusions are offered both on the transacted memory system

  17. IEEE No. 323, IEEE trial-use standard: General guide for qualifying Class I electric equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements for the qualification of Class I electric equipment. This is equipment which is essential to the safe shutdown and isolation of the reactor or whose failure or damage could result in significant release of radioactive material. The purpose of this document is to provide guidance for demonstrating the qualifications of electrical equipment as required in the IEEE Std 279 -- Criteria for Nuclear Power Generating Station Protection Systems, and IEEE Std 308 -- Criteria for Class 1E Electric Systems for Nuclear Power Generating Stations. The qualification methods described may be used in conjunction with the Guides for qualifying specific types of equipment, (see Foreword), for updating qualification following modifications or for qualifying equipment for which no applicable Guide exists

  18. The IEEE 802.11a standards

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. The IEEE 802.11a standards. Provides higher data rate and system capacities and uses OFDM in Physical Layer to mitigate the multi path effects;. Supports multiple 20Mhz channel. Each channel being an OFDM Modulated;; 52 Carriers. 48 data carrier; 4 Carry pilot ...

  19. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  20. Introduction to IEEE Std. 7-4.3.2 Annex D -- ''Qualification of existing commercial computers''

    International Nuclear Information System (INIS)

    Holmstrom, K.J.

    1995-01-01

    On September 15th of 1993 the IEEE standards board approved IEEE Std. 7-4.3.2-1993, IEEE Standard for Digital Computers in Safety Systems of Nuclear Power Generating Stations. This paper is an introduction to Annex D of this document which concerns the commercial grade dedication of existing computers or new non-1E computers

  1. Transaction Costs For Innovations Diffusion

    Directory of Open Access Journals (Sweden)

    Ilya A. Romanov

    2012-10-01

    Full Text Available The article deals with the analysis of transaction costs of the innovations distribution. The factors, affecting the innovations diffusion in accordance with the clusters, relations, dynamics of the distribution are disclosed. Transaction costs as a result of bounded rationality of economic entities are detected. The inevitability of transaction costs as an objective phenomenon is shown. Their dependence on the quality of economic information and information uncertainty is indicated. Correlative approach for the analysis of these costs is applied. The article justifies that the reduction of transaction costs increases the efficiency of innovations.

  2. Transactions Concurrency Control in Web Service Environment

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Nejdl, Wolfgang

    2006-01-01

    an engineering point of view as it does not change the way consumers or clients of web services have to be programmed. Furthermore, it avoids direct communication between transaction coordinators which preserves security by keeping the information about business transactions restricted to the coordinators which......Business transactions in web service environments run with relaxed isolation and atomicity property. In such environments, transactions can commit and roll back independently on each other. Transaction management has to reflect this issue and address the problems which result for example from...... concurrent access to web service resources and data. In this paper we propose an extension to the WS-Transaction Protocol which ensures the consistency of the data when independent business transactions access the data concurrently under the relaxed transaction properties. Our extension is based...

  3. Isolan - A Fibre Optic Network Conforming To IEEE 802.3 Standards

    Science.gov (United States)

    Roworth, D. A. A.; Howe, N.

    1986-10-01

    The progress of the IEEE 802.3 standard for fibre optic LANs is indicated with reference to both mixed media networks and full fibre networks. For a fibre optic network the most suitable layout is a "snowflake" topology composed of multiport repeaters and active fibre hubs. A range of components is described which enables the realisation of such a topology in conformance with the IEEE 802.3 standard.

  4. Identifying Bitcoin users by transaction behavior

    Science.gov (United States)

    Monaco, John V.

    2015-05-01

    Digital currencies, such as Bitcoin, offer convenience and security to criminals operating in the black marketplace. Some Bitcoin marketplaces, such as Silk Road, even claim anonymity. This claim contradicts the findings in this work, where long term transactional behavior is used to identify and verify account holders. Transaction timestamps and network properties observed over time contribute to this finding. The timestamp of each transaction is the result of many factors: the desire purchase an item, daily schedule and activities, as well as hardware and network latency. Dynamic network properties of the transaction, such as coin flow and the number of edge outputs and inputs, contribute further to reveal account identity. In this paper, we propose a novel methodology for identifying and verifying Bitcoin users based on the observation of Bitcoin transactions over time. The behavior we attempt to quantify roughly occurs in the social band of Newell's time scale. A subset of the Blockchain 230686 is taken, selecting users that initiated between 100 and 1000 unique transactions per month for at least 6 different months. This dataset shows evidence of being nonrandom and nonlinear, thus a dynamical systems approach is taken. Classification and authentication accuracies are obtained under various representations of the monthly Bitcoin samples: outgoing transactions, as well as both outgoing and incoming transactions are considered, along with the timing and dynamic network properties of transaction sequences. The most appropriate representations of monthly Bitcoin samples are proposed. Results show an inherent lack of anonymity by exploiting patterns in long-term transactional behavior.

  5. Extending Software Transactional Memory in Clojure with Side-Effects and Transaction Control

    DEFF Research Database (Denmark)

    Jensen, Søren Kejser; Thomsen, Lone Leth

    2016-01-01

    In conjunction with the increase of multi-core processors the use of functional programming languages has increased in recent years. The functional language Clojure has concurrency as a core feature, and provides Software Transactional Memory (STM) as a substitute for locks. Transactions in Cloju...

  6. Decision, Transaction, Law and Contract

    DEFF Research Database (Denmark)

    Koch, Carsten Allan

    Copy from ”Preface to Post Doctoral Dissertation” ”Decision, transaction, law and contract” The period since 1970 has witnessed an explosion in contributions to what is now often referred to as the new institutional economics. One of the most influential (but also most atypical) of these approaches...... and Hierarchies” from 1975. Since then Williamson has, almost singlehandedly, erected an impressive research program which aims at explaining the institutional structures at the micro-level under which economic transactions take place. A number of different phenomena that were very hard to rationalize given...... further. Compared to earlier contributions, the mode of analysis employed differs in at least three ways. Firstly, the analysis is made in terms of the decision premises for entering a transactional relationship. This is in opposition to traditional transaction cost economics, where the transaction...

  7. Nonblocking Scheduling for Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Balke, Wolf-Tilo; Dolog, Peter

    2007-01-01

    . In this paper, we propose a novel nonblocking scheduling mechanism that is used prior to the actual service invocations. Its aim is to reach an agreement between the client and all participating providers on what transaction processing times have to be expected, accepted, and guaranteed. This enables service......For improved flexibility and concurrent usage existing transaction management models for Web services relax the isolation property of Web service-based transactions. Correctness of the concurrent execution then has to be ensured by commit order-preserving transaction schedulers. However, local...... schedulers of service providers typically do take into account neither time constraints for committing the whole transaction, nor the individual services' constraints when scheduling decisions are made. This often leads to an unnecessary blocking of transactions by (possibly long-running) others...

  8. 0011-0030.What is IEEE 754 StandardHow to convert real number ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.What is IEEE 754 StandardHow to convert real number in binary format using IEEE 754 StandardAn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  9. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false IEEE 1680 Standard for the... CONTRACT CLAUSES Text of Provisions and Clauses 52.223-16 IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE...

  10. Playing Detective: Reconstructing Software Architecture from Available Evidence

    Science.gov (United States)

    1997-10-01

    information • PostgreSQL (based on POSTGRES [Stonebraker 90]) for model storage • IAPR [Kazman 96c], RMTool [Murphy 95], and Perl for analysis and...720-741. Stonebraker, M.; Rowe, L; & Hirohama, M. ’The Implementation of POSTGRES ." IEEE Transactions on Knowledge and Data Engineering 2,1 (March...Engineering 19,7 (July 1993): 720-741. Stonebraker, M.; Rowe, L; & Hirohama, M. "The Implementation of POSTGRES ." IEEE Transactions on Knowledge and

  11. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  12. Nanoparticle Contrast Agents for Enhanced Microwave Imaging and Thermal Treatment of Breast Cancer

    Science.gov (United States)

    2010-10-01

    31 UTC from IEEE Xplore . Restrictions apply. 1832 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 8, AUGUST 2010 In this paper, we report...the same Authorized licensed use limited to: University of Wisconsin. Downloaded on July 20,2010 at 13:52:31 UTC from IEEE Xplore . Restrictions apply...Authorized licensed use limited to: University of Wisconsin. Downloaded on July 20,2010 at 13:52:31 UTC from IEEE Xplore . Restrictions apply. 1834 IEEE

  13. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    Science.gov (United States)

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  14. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  15. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    Science.gov (United States)

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  16. Augmenting the Energy-Saving Impact of IEEE 802.3az via the Control Plane

    OpenAIRE

    Thaenchaikun , Chakadkit; Jakllari , Gentian; Paillassa , Béatrice

    2015-01-01

    International audience; IEEE 802.3az, the recent standard for Energy Efficient Ethernet, is one of the main contributions of the ICT industry to the global quest for energy efficiency. Energy consumption reduction is accomplished by essentially replacing the continuous IDLE of legacy IEEE 802.3 cards with a Low Power Idle. While this is an important step in the right direction, studies have shown that the energy saving with IEEE 802.3az highly depends on the traffic load and stops for link ut...

  17. Radio Frequency Fingerprinting Techniques Through Preamble Modification in IEEE 802.11B

    Science.gov (United States)

    2014-06-30

    4.2.1 Wald–Wolfowitz Runs Test . . . . . . . . . . . . . . . . . . . . . . 41 4.2.2 Wald–Wolfowitz Application to SXS System . . . . . . . . . . . . 42...Station SXS Signals eXploitation System USB Universal Serial Bus xiv Acronym Definition USRP Universal Software Radio Peripheral WLAN Wireless Local...Electronics Engineers (IEEE) defines standards applicable to the IEEE 802.11 protocol, however the standard does not reach the level of specificity to dictate

  18. Rethinking Ethiopian Secured Transactions Law through ...

    African Journals Online (AJOL)

    Various countries have reformed their secured transaction laws recognizing the significance of modern secured transactions law in enhancing access to credit and economic development. Ethiopia has not undertaken comprehensive secured transactions law reform, despite the demonstrable mismatch between the legal ...

  19. Private benefits in corporate control transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in corporate control transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer is a more efficient monitor...... with high security benefits, or because the buyer has high private benefits from the control rights that come with the shares? Using voting rights as the vehicle for private benefits, I find that the selling shareholders in block transactions attach more value to private benefits than the buyers. In tender...... offer transactions, the answer is that private benefits are insignificant to both sides of the transaction. As an alternative measure of the transaction premium, I calculate the abnormal return premium. This represents the stock market's valuation of the transaction. I find that the stock market puts...

  20. Harmonization of IEEE323 and IEC60780 standards For Environmental Qualificaiton of Electric Equipment

    International Nuclear Information System (INIS)

    Kim, Jong Seog

    2009-01-01

    IEEE323 standard has been widely used for the qualification of electric equipment in Asian pacific area while IEC6070 has been mostly used in European area. Since each plant use different standard for environmental qualification, manufacturer has to perform the qualification test twice in accordance with each standard. Problem also can be happened in the plant site when they are going to purchase equipment qualified by different qualification standard which are not used in his plant. The need of harmonization of each standard has been raised several years and it is known that some studies are in progress by IEEE committee. KEPRI has a plan of comparing EQ relative standards of IEEE, IEC and RCC in 2009. In this paper, brief comparing result between IEEE323 and IEC60780 and the proper harmonization method is introduced

  1. Resources and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2004-01-01

    resources depends on the propertyrights that she holds to those resources and on the transaction costs of exchanging,defining and protecting the relevant property rights. While transaction costs aremajor sources of value dissipation, value may be created by reducing suchdissipation. Implications for the RBV...

  2. Transaction cost of micro and small enterprises financing

    Directory of Open Access Journals (Sweden)

    Ghana Atma Sulistya

    2016-10-01

    Full Text Available High transaction costs become one of the obstacles for the micro and small enterprises (MSEs to access financial loans to the bank. In order to minimize the transaction costs, group lending scheme become  alternative, so that both sides are pay lower transaction costs, and MSEs are able to improve their welfare. This study aims to analyze the credit process and transaction costs incurred on the model of individuals and groups lending and to compare the magnitude of transaction costs on both models. Mixed Method Analysis is used to analyze the component of transaction costs and the magnitude of the transaction cost on both models.These results indicate there are differences in transaction costs incurred on both schemes. In the amount of the transaction costs, the overall group scheme still allows for greater compared to individual schemes and dominated by the cost of the disbursement. Even so, the transaction cost per member group is much smaller than the individual schemes.

  3. Fundamentals of computational intelligence neural networks, fuzzy systems, and evolutionary computation

    CERN Document Server

    Keller, James M; Fogel, David B

    2016-01-01

    This book covers the three fundamental topics that form the basis of computational intelligence: neural networks, fuzzy systems, and evolutionary computation. The text focuses on inspiration, design, theory, and practical aspects of implementing procedures to solve real-world problems. While other books in the three fields that comprise computational intelligence are written by specialists in one discipline, this book is co-written by current former Editor-in-Chief of IEEE Transactions on Neural Networks and Learning Systems, a former Editor-in-Chief of IEEE Transactions on Fuzzy Systems, and the founding Editor-in-Chief of IEEE Transactions on Evolutionary Computation. The coverage across the three topics is both uniform and consistent in style and notation. Discusses single-layer and multilayer neural networks, radial-basi function networks, and recurrent neural networks Covers fuzzy set theory, fuzzy relations, fuzzy logic interference, fuzzy clustering and classification, fuzzy measures and fuzz...

  4. Resources and transaction costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2005-01-01

    from resources depends on the property rights that he or she holds and on the transaction costs of exchanging, defining, and protecting them. While transaction costs are a major source of value dissipation, reducing such dissipation may create value. Implications for the RBV analysis of sustained...

  5. Combining Tasking and Transactions

    OpenAIRE

    Kienzle, Jörg

    1999-01-01

    This position paper discusses the issues in design and development of a transaction support for Ada 95. Transactions and other fault tolerance mechanisms are reviewed, and their applicability in a concurrent programming language is analyzed. Possible ways of integration are presented and implementation problems are discussed.

  6. 31 CFR 541.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 541.406 Section 541.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 541.406 Offshore transactions. The prohibitions in § 541.201 on transactions involving blocked...

  7. 31 CFR 537.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 537.406 Section 537.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 537.406 Offshore transactions. The prohibitions in § 537.201 on transactions involving blocked...

  8. 31 CFR 542.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 542.406 Section 542.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 542.406 Offshore transactions. The prohibitions in § 542.201 on transactions involving blocked...

  9. Transaction Costs in Housing Markets

    OpenAIRE

    Ommeren, van, Jos

    2008-01-01

    According to economic theory, there are no strong reasons to tax (or to subsidise) residential moves, although low levels of taxation may be potentially justified to deal with the presence of externalities and economic stability. This is in contrast to practise in most countries where governments have created strong barriers to moving (transaction taxes, rent control) which induces substantial transaction costs. Likely, the welfare losses due to these government-induced transaction costs are ...

  10. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    OpenAIRE

    V. Balaji; S. Anand; C.R. Hota; G. Raghurama

    2016-01-01

    In this paper we present a Cooperative Spectrum Sensing (CSS) algorithm for Cognitive Radios (CR) based on IEEE 802.22Wireless Regional Area Network (WRAN) standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration) to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22) within a time constraint (channel sensing time). To meet this objectiv...

  11. 31 CFR 543.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 543.406 Section 543.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... Interpretations § 543.406 Offshore transactions. The prohibitions in § 543.201 on transactions or dealings...

  12. 31 CFR 547.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 547.406 Section 547.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... REGULATIONS Interpretations § 547.406 Offshore transactions. The prohibitions in § 547.201 on transactions or...

  13. 31 CFR 548.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 548.406 Section 548.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 548.406 Offshore transactions. The prohibitions in § 548.201 on transactions or dealings involving...

  14. 31 CFR 546.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 546.406 Section 546.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... § 546.406 Offshore transactions. The prohibitions in § 546.201 on transactions or dealings involving...

  15. 31 CFR 588.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 588.406 Section 588.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... Interpretations § 588.406 Offshore transactions. The prohibitions in § 588.201 on transactions involving blocked...

  16. Ring Confidential Transactions

    Directory of Open Access Journals (Sweden)

    Shen Noether

    2016-12-01

    Full Text Available This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.

  17. A formal analysis of ISO/IEEE P11073-20601 standard of medical device communication

    NARCIS (Netherlands)

    Goga, Nicolae; Costache, Stefania; Moldoveanu, Florica

    2009-01-01

    This article presents the formal work done for the ISO/IEEE P11073-20601 Draft Standard for Health informatics - Personal health device communication - Application profile Optimized exchange protocol. ISO/IEEE 11073 family defines standards for device communication between agents (e.g. blood

  18. Pantomimic gestures for human-robot interaction

    CSIR Research Space (South Africa)

    Burke, Michael G

    2015-10-01

    Full Text Available -1 IEEE TRANSACTIONS ON ROBOTICS 1 Pantomimic Gestures for Human-Robot Interaction Michael Burke, Student Member, IEEE, and Joan Lasenby Abstract This work introduces a pantomimic gesture interface, which classifies human hand gestures using...

  19. IEEE standard for qualification of class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    IEEE Std 323-1974, Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, was developed to provide guidance for demonstrating and documenting the adequacy of electrical equipment used in all Class 1E and interface systems. This standard, IEEE Std 535-1979, was developed to provide specific methods and type test procedures for lead storage batteries in reference to IEEE Std 323-1974

  20. A versatile electrical penetration design qualified to IEEE Std. 317-1983

    International Nuclear Information System (INIS)

    Lankenau, W.; Wetherill, T.M.

    1994-01-01

    Although worldwide demand for new construction of nuclear power stations has been on a decline, the available opportunities for the design and construction of qualified electrical penetrations continues to offer challenges, requiring a highly versatile design. Versatility is necessary in order to meet unique customer requirements within the constraints of a design basis qualified to IEEE Std. 317-1983. This paper summarizes such a versatile electrical penetration designed, built and tested to IEEE Std. 317-1983. The principal features are described including major materials of construction. Some of the design constraints such as sealing requirements, and conductor density (including numerical example) are discussed. The requirements for qualification testing of the penetration assembly to IEEE Std. 317-1983 are delineated in a general sense, and some typical test ranges for preconditioning, radiation exposure, and LOCA are provided. The paper concludes by describing ways in which this versatile design has been adapted to meet unique customer requirements in a variety of nuclear power plants

  1. Spectrum Hole Identification in IEEE 802.22 WRAN using Unsupervised Learning

    Directory of Open Access Journals (Sweden)

    V. Balaji

    2016-01-01

    Full Text Available In this paper we present a Cooperative Spectrum Sensing (CSS algorithm for Cognitive Radios (CR based on IEEE 802.22Wireless Regional Area Network (WRAN standard. The core objective is to improve cooperative sensing efficiency which specifies how fast a decision can be reached in each round of cooperation (iteration to sense an appropriate number of channels/bands (i.e. 86 channels of 7MHz bandwidth as per IEEE 802.22 within a time constraint (channel sensing time. To meet this objective, we have developed CSS algorithm using unsupervised K-means clustering classification approach. The received energy level of each Secondary User (SU is considered as the parameter for determining channel availability. The performance of proposed algorithm is quantified in terms of detection accuracy, training and classification delay time. Further, the detection accuracy of our proposed scheme meets the requirement of IEEE 802.22 WRAN with the target probability of falsealrm as 0.1. All the simulations are carried out using Matlab tool.

  2. An Extended IEEE 118-Bus Test System With High Renewable Penetration

    Energy Technology Data Exchange (ETDEWEB)

    Pena, Ivonne; Martinez-Anido, Carlo Brancucci; Hodge, Bri-Mathias

    2018-01-01

    This article describes a new publicly available version of the IEEE 118-bus test system, named NREL-118. The database is based on the transmission representation (buses and lines) of the IEEE 118-bus test system, with a reconfigured generation representation using three regions of the US Western Interconnection from the latest Western Electricity Coordination Council (WECC) 2024 Common Case [1]. Time-synchronous hourly load, wind, and solar time series are provided for over one year (8784 hours). The public database presented and described in this manuscript will allow researchers to model a test power system using detailed transmission, generation, load, wind, and solar data. This database includes key additional features that add to the current IEEE 118-bus test model, such as: the inclusion of 10 generation technologies with different heat rate functions, minimum stable levels and ramping rates, GHG emissions rates, regulation and contingency reserves, and hourly time series data for one full year for load, wind and solar generation.

  3. Throughput and delay analysis of IEEE 802.15.6-based CSMA/CA protocol.

    Science.gov (United States)

    Ullah, Sana; Chen, Min; Kwak, Kyung Sup

    2012-12-01

    The IEEE 802.15.6 is a new communication standard on Wireless Body Area Network (WBAN) that focuses on a variety of medical, Consumer Electronics (CE) and entertainment applications. In this paper, the throughput and delay performance of the IEEE 802.15.6 is presented. Numerical formulas are derived to determine the maximum throughput and minimum delay limits of the IEEE 802.15.6 for an ideal channel with no transmission errors. These limits are derived for different frequency bands and data rates. Our analysis is validated by extensive simulations using a custom C+ + simulator. Based on analytical and simulation results, useful conclusions are derived for network provisioning and packet size optimization for different applications.

  4. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  5. Disintermediation of Inter-Blockchain Transactions

    OpenAIRE

    English, S. Matthew; Orlandi, Fabrizio; Auer, Soeren

    2016-01-01

    Different versions of peer-to-peer electronic cash exist as data represented by separate blockchains. Payments between such systems cannot be sent directly from one party to another without going through a financial institution. Bitcoin provided part of the solution but its utility is limited to intra-blockchain transactions. The benefits are lost if a trusted third party is required to execute inter-blockchain transactions. We propose a solution to the inter-blockchain transaction problem us...

  6. IEEE C37.105-1987: IEEE standard for qualifying Class 1E protective relays and auxiliaries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E protective relays and auxiliaries such as test and control switches, terminal blocks, and indicating lamps for applications in nuclear power generating stations. When properly employed it can be used to demonstrate the design adequacy of such equipment under normal, abnormal, design basis event and post design basis event conditions in accordance with ANSI/IEEE Std 323-1983. When protective relays and auxiliaries are located in areas not subject to harsh environments, environmental qualification is not required. Protective relays and auxiliaries located inside primary containment in a nuclear power generating station present special conditions beyond the scope of this document. The qualification procedure presented is generic in nature. Other methods may be used at the discretion of the qualifier, provided the basic precepts of ANSI/IEEE Std 32301983 are satisfied

  7. Guest editors' introduction : Highlights from IEEE Pacific Visualization

    NARCIS (Netherlands)

    Wijk, van J.J.; North, S.; Shen, H.-W.

    2010-01-01

    This article looks briefly at four articles based on papers from the 2010 IEEE Pacific Visualization Symposium. These articles, which strongly focus on visual design and applications, cover a range of applications in scientific visualization, information visualization, and graph visualization,

  8. Comparison Of Several Methods Of Implementing A Fiber Optic IEEE 802.3 Ethernet

    Science.gov (United States)

    Thompson, Geoffrey O.

    1987-01-01

    Several different methods of implementing a fiber optic version of IEEE 802.3 10BASE LANs have been proposed as a candidate for standardization by IEEE. There have been extensive discussions as to the relative merits and features of the several systems. This paper will discuss the merits of each for this particular application on a comparative basis.

  9. Implementation of DoS attack and mitigation strategies in IEEE 802.11b/g WLAN

    Science.gov (United States)

    Deng, Julia; Meng, Ke; Xiao, Yang; Xu, Roger

    2010-04-01

    IEEE 802.11 wireless Local Area Network (WLAN) becomes very prevalent nowadays. Either as a simple range extender for a home wired Ethernet interface, or as a wireless deployment throughout an enterprise, WLAN provides mobility, convenience, and low cost. However, an IEEE 802.11b/g wireless network uses the frequency of unlicensed 2.4GHz, which makes the network unsafe and more vulnerable than traditional Ethernet networks. As a result, anyone who is familiar with wireless network may initiate a Denial of Service (DoS) attack to influence the common communication of the network or even make it crash. In this paper, we present our studies on the DoS attacks and mitigation strategies for IEEE 802.11b/g WLANs and describe some initial implementations using IEEE 802.11b/g wireless devices.

  10. Evaluation of H.264/AVC over IEEE 802.11p vehicular networks

    Science.gov (United States)

    Rozas-Ramallal, Ismael; Fernández-Caramés, Tiago M.; Dapena, Adriana; García-Naya, José Antonio

    2013-12-01

    The capacity of vehicular networks to offer non-safety services, like infotainment applications or the exchange of multimedia information between vehicles, have attracted a great deal of attention to the field of Intelligent Transport Systems (ITS). In particular, in this article we focus our attention on IEEE 802.11p which defines enhancements to IEEE 802.11 required to support ITS applications. We present an FPGA-based testbed developed to evaluate H.264/AVC (Advanced Video Coding) video transmission over vehicular networks. The testbed covers some of the most common situations in vehicle-to-vehicle and roadside-to-vehicle communications and it is highly flexible, allowing the performance evaluation of different vehicular standard configurations. We also show several experimental results to illustrate the quality obtained when H.264/AVC encoded video is transmitted over IEEE 802.11p networks. The quality is measured considering two important parameters: the percentage of recovered group of pictures and the frame quality. In order to improve performance, we propose to substitute the convolutional channel encoder used in IEEE 802.11p for a low-density parity-check code encoder. In addition, we suggest a simple strategy to decide the optimum number of iterations needed to decode each packet received.

  11. Comments by the Editors

    Science.gov (United States)

    Fleetwood, Dan M.; Brown, Dennis; Girard, Sylvain; Gerardin, Simone; Quinn, Heather; Kobayashi, Daisuke; Esqueda, Ivan Sanchez; Robinson, William; Moss, Steven

    2017-08-01

    The August 2017 special issue of the IEEE Transactions on Nuclear Science contains more than 40 selected, peer-reviewed, journal articles that were prepared on the basis of presentations made at the 2016 Conference on Radiation and Its Effects on Components and Systems (RADECS) held on September 19-23, 2016, in Bremen, Germany. A few additional papers may appear in subsequent issues of the Transactions. A full conference record of RADECS 2016 will also be available in the IEEE Xplore.

  12. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  13. Enhancing MAC performance of DCF protocol for IEEE 802.11 wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong

    2017-01-01

    The DCF (Distributed Coordination Function) is the basic MAC (Medium Access Control) protocol of IEEE 802.11 wireless LANs and compatible with various IEEE 802.11 PHY extensions. The performance of the DCF degrades exponentially as the number of nodes participating in the DCF transmission procedure increases. To deal with this problem, we propose a simple, however efficient modification of the DCF by which the performance of the DCF is greatly enhanced.

  14. Pre-clinical and Clinical Evaluation of High Resolution, Mobile Gamma Camera and Positron Imaging Devices

    Science.gov (United States)

    2010-10-01

    Downloaded on February 20,2010 at 10:55:59 EST from IEEE Xplore . Restrictions apply. STUDENSKI et al.: ACQUISITION AND PROCESSING METHODS FOR A BEDSIDE...February 20,2010 at 10:55:59 EST from IEEE Xplore . Restrictions apply. 208 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 57, NO. 1, FEBRUARY 2010 from the...59 EST from IEEE Xplore . Restrictions apply. STUDENSKI et al.: ACQUISITION AND PROCESSING METHODS FOR A BEDSIDE CARDIAC SPECT IMAGING SYSTEM 209

  15. Performance Evaluations for IEEE 802.15.4-based IoT Smart Home Solution

    Directory of Open Access Journals (Sweden)

    Nga Dinh

    2016-09-01

    Full Text Available The Internet of Things (IoT is going to be a market-changing force for a variety of real-time applications such as e-healthcare, home automation, environmental monitoring, and industrial automation. Low power wireless communication protocols offering long lifetime and high reliability such as the IEEE 802.15.4 standard have been a key enabling technology for IoT deployments and are deployed for home automation recently. The issues of the IEEE 802.15.4 networks have moved from theory to real world deployments. The work presented herein intends to demonstrate the use of the IEEE 802.15.4 standard in recent IoT commercial products for smart home applications: the Smart Home Starter Kit. The contributions of the paper are twofold. First, the paper presents how the IEEE 802.15.4 standard is employed in Smart Home Starter Kit. In particular, network topology, network operations, and data transfer mode are investigated. Second, network performance metrics such as end-to-end (E2E delay and frame reception ratio (FRR are evaluated by experiments. In addition, the paper discusses several directions for future improvements of home automation commercial products.

  16. IEEE Standard for qualification of Class 1E lead storage batteries for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1980-01-01

    This document describes qualification methods for Class 1E lead storage batteries and racks to be used in nuclear power generating stations outside of primary containment. Qualification required in ANSI/IEEE Std 279-1979 and IEEE Std 308-1978, can be demonstrated by using the procedures provided in this Standard in accordance with IEEE Std 323-1974. Battery sizing, maintenance, capacity testing, installation, charging equipment and consideration of other types batteries are beyond the scope of this Standard

  17. IEEE 693 seismic qualification of composites for substation high-voltage equipment

    Energy Technology Data Exchange (ETDEWEB)

    Schiff, A.J. [Precision Measurement Instruments, Los Altos Hills, CA (United States); Kempner, L.Jr. [Bonneville Power Administration, Vancouver, BC (Canada)

    2004-07-01

    Standard 693-1997 of the Institute of Electrical and Electronic Engineers (IEEE) is the recommended practice for seismic design of substations. It represents a significant improvement in the way the power industry seismically qualifies substation high-voltage equipment. This paper described the use of IEEE Standard 693 for hollow-core composite insulators that are used on high-voltage transformers and demonstrated that changes are warranted. The following four failure modes associated with the composite insulator were discussed: bond degradation, bond failure, tube degradation and tube layer delamination. The authors evaluated the IEEE 693 qualification procedure of time history shake-table and static-pull tests and were concerned about acceptance criteria. It was shown that acceptance criteria are not valid for qualifying hollow-core composites and that static-pull tests are needed after the vibration qualification tests are completed. It was suggested that more research is warranted to determine if bonding at the top part of the flange can be eliminated, thereby eliminating bond degradation. The resulting increase in system damping would improve the dynamic response of the unit. 1 ref., 10 figs.

  18. Value and Transaction Costs

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2003-01-01

    caused by transaction costs), andnew types of resources (i.e., capture and protection capabilities), clarifies the roleof contracting in the exercise of market power, and suggests that `strategizing'and `economizing' perspectives are related to a larger extent than is normallyrecognized. Refutable......AbstractWe forge linkages between the economics of property rights (Coase, Demsetz,Cheung, Barzel) and strategic management. Property rights to resources consistof the rights to consume, obtain income from, and alienate these resources.Transaction costs are the costs of exchanging, protecting...... and capturing propertyrights. We clarify the key role of transaction costs with respect to understandingvalue creation and the limitations and opportunities of strategizing relative tocompetitive forces. The economics of property rights identifies new sources ofvalue creation (i.e., reducing the dissipation...

  19. 2011 IEEE Vehicular Networking Conference (VNC): Demo Summaries

    NARCIS (Netherlands)

    Altintas, O.; Chen, W.; Heijenk, Geert; Dressler, F.; Ekici, E.; Kargl, Frank; Shigeno, H.; Dietzel, Stefan

    2011-01-01

    Foreword For the first time in its history, IEEE VNC has included this year’s demonstrations in its program. Demonstrations play an important role to expose the research community to practical aspects of research and to foster cross-fertilization among researchers both in academia and in industry.

  20. Transactive System: Part II: Analysis of Two Pilot Transactive Systems using Foundational Theory and Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sun, Y. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wu, Di [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ren, Huiying [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2018-01-24

    This document is the second of a two-part report. Part 1 reviewed several demonstrations of transactive control and compared them in terms of their payoff functions, control decisions, information privacy, and mathematical solution concepts. It was suggested in Part 1 that these four listed components should be adopted for meaningful comparison and design of future transactive systems. Part 2 proposes qualitative and quantitative metrics that will be needed to compare alternative transactive systems. It then uses the analysis and design principles from Part 1 while conducting more in-depth analysis of two transactive demonstrations: the American Electric Power (AEP) gridSMART Demonstration, which used a double –auction market mechanism, and a consensus method like that used in the Pacific Northwest Smart Grid Demonstration. Ultimately, metrics must be devised and used to meaningfully compare alternative transactive systems. One significant contribution of this report is an observation that the decision function used for thermostat control in the AEP gridSMART Demonstration has superior performance if its decision function is recast to more accurately reflect the power that will be used under for thermostatic control under alternative market outcomes.

  1. IEEE prize awarded to CERN PhD student

    CERN Multimedia

    2006-01-01

    Rafael Ballabriga Suñe (right) receives the Student Paper Award. Rafael Ballabriga Suñe is the recipient of the 2006 Institute of Electrical and Electronics Engineers, Inc. (IEEE) Nuclear and Plasma Sciences Society (NPSS)'s Student Paper Award. Ballabriga's winning paper reported on a prototype chip, which belongs to a new generation of single photon counting hybrid pixel detector readout chips - Medipix3. The NPSS established this award in 2005 to encourage outstanding student contributions and greater student participation as principle or sole authors of papers. The prizes were presented at the IEEE Nuclear Science Symposium held in San Diego on 29 October to 4 November. The prototype chip was designed by Ballabriga based on ideas generated within the CERN Medipix team - part of the PH Microelectronics group. It could be used in various fields in the future, including medical imaging, neutron imaging, electron microscopy, radiation monitoring and other applications in high-energy physics. The novel aspe...

  2. 78 FR 11950 - Identification of Entities and Vessels Pursuant to the Iranian Transactions and Sanctions...

    Science.gov (United States)

    2013-02-20

    ...; Telephone (356)(21241232) [IRAN] Linked To: NATIONAL IRANIAN TANKER COMPANY. 42. SINA SHIPPING COMPANY...; MMSI 572449210 (vessel) [IRAN] Linked To: NATIONAL IRANIAN TANKER COMPANY. 93. SINA (9HNY9) Crude Oil...

  3. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  4. Complexity Measure for the Prototype System Description Language (PSDL)

    Science.gov (United States)

    2002-06-01

    Albrecht, A. and Gaffney , J., Software Function Source Lines of Code and Development Effort Prediction, IEEE Transactions on Software Engineering...Through Meausrement”; Proceedings of the IEEE, Vol. 77, No. 4, April 89. Schach, Stephen, R., Software Engineering, Second Edition, IRWIN, Burr Ridge

  5. Performance of the IEEE 802.3 EPON registration scheme under high load

    Science.gov (United States)

    Bhatia, Swapnil P.; Bartos, Radim

    2004-09-01

    The proposed standard for the IEEE 802.3 Ethernet Passive Optical Network includes a random delayed transmission scheme for registration of new nodes. Although the scheme performs well on low loads, our simulation demonstrates the degraded and undesirable performance of the scheme at higher loads. We propose a simple modification to the current scheme that increases its range of operation and is compatible with the IEEE draft standard. We demonstrate the improvement in performance gained without any significant increase in registration delay.

  6. Multi-period fuzzy mean-semi variance portfolio selection problem with transaction cost and minimum transaction lots using genetic algorithm

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Barati

    2016-04-01

    Full Text Available Multi-period models of portfolio selection have been developed in the literature with respect to certain assumptions. In this study, for the first time, the portfolio selection problem has been modeled based on mean-semi variance with transaction cost and minimum transaction lots considering functional constraints and fuzzy parameters. Functional constraints such as transaction cost and minimum transaction lots were included. In addition, the returns on assets parameters were considered as trapezoidal fuzzy numbers. An efficient genetic algorithm (GA was designed, results were analyzed using numerical instances and sensitivity analysis were executed. In the numerical study, the problem was solved based on the presence or absence of each mode of constraints including transaction costs and minimum transaction lots. In addition, with the use of sensitivity analysis, the results of the model were presented with the variations of minimum expected rate of programming periods.

  7. VARNOST BREZŽIČNIH OMREŽIJ PO STANDARDU IEEE 802.11

    OpenAIRE

    Štumberger, Matej

    2013-01-01

    Diplomska naloga se osredotoča na problem varovanja brezžičnih omrežij, zasnovanih po standardu IEEE 802.11. Opisano je združenje IEEE in njihova specifikacija standardov z oznako 802, prav tako pa so opisani tudi standardi, protokoli in tehnike varovanja in zaščite omrežij, ki delujejo po tej specifikaciji. Predstavljeno je tudi trenutno stanje varnosti brezžičnih omrežij na področju mesta Ptuj, opisani in prikazani pa so tudi različni pristopi za zlorabo brezžičnih omrežij, skupaj s program...

  8. International Conference on Grey Systems and intelligent Services (IEEE GSIS 2009)

    CERN Document Server

    Liu, Sifeng; Advances in Grey Systems Research

    2010-01-01

    This book contains contributions by some of the leading researchers in the area of grey systems theory and applications. All the papers included in this volume are selected from the contributions physically presented at the 2009 IEEE International Conference on Grey Systems and Intelligent Services, November 11 – 12, 2009, Nanjing, Jiangsu, People’s Republic of China. This event was jointly sponsored by IEEE Systems, Man, and Cybernetics Society, Natural Science Foundation of China, and Grey Systems Society of China. Additionally, Nanjing University of Aeronautics and Astronautics also invested heavily in this event with its direct and indirect financial and administrative supports.

  9. Sparse Representation of Multimodality Sensing Databases for Data Mining and Retrieval

    Science.gov (United States)

    2015-04-09

    Information ," IEEE Transactions on Multimedia, vol 14, no 1, pp. 3-16, Feb 2012. Preprint posted electronically on IEEE Xplore on Sept 5, 2011...08/30/2012 08/30/2012 Received Paper 6.00 7.00 8.00 K.-J. Hsiao, J. Kulezsa, A.O. Hero. Social Collaborative Retrieval, IEEE JOURNAL OF SELECTED...III. Ensemble estimators for multivariate entropy estimation, IEEE Trans on Information Theory, (07 2013): 4374. doi: A.O. Hero, K. Todros. On

  10. Segmentized Clear Channel Assessment for IEEE 802.15.4 Networks.

    Science.gov (United States)

    Son, Kyou Jung; Hong, Sung Hyeuck; Moon, Seong-Pil; Chang, Tae Gyu; Cho, Hanjin

    2016-06-03

    This paper proposed segmentized clear channel assessment (CCA) which increases the performance of IEEE 802.15.4 networks by improving carrier sense multiple access with collision avoidance (CSMA/CA). Improving CSMA/CA is important because the low-power consumption feature and throughput performance of IEEE 802.15.4 are greatly affected by CSMA/CA behavior. To improve the performance of CSMA/CA, this paper focused on increasing the chance to transmit a packet by assessing precise channel status. The previous method used in CCA, which is employed by CSMA/CA, assesses the channel by measuring the energy level of the channel. However, this method shows limited channel assessing behavior, which comes from simple threshold dependent channel busy evaluation. The proposed method solves this limited channel decision problem by dividing CCA into two groups. Two groups of CCA compare their energy levels to get precise channel status. To evaluate the performance of the segmentized CCA method, a Markov chain model has been developed. The validation of analytic results is confirmed by comparing them with simulation results. Additionally, simulation results show the proposed method is improving a maximum 8.76% of throughput and decreasing a maximum 3.9% of the average number of CCAs per packet transmission than the IEEE 802.15.4 CCA method.

  11. Real-time-service-based Distributed Scheduling Scheme for IEEE 802.16j Networks

    OpenAIRE

    Kuo-Feng Huang; Shih-Jung Wu

    2013-01-01

    Supporting Quality of Service (QoS) guarantees for diverse multimedia services is the primary concern for IEEE802.16j networks. A scheduling scheme that satisfies the QoS requirements has become more important for wireless communications. We proposed an adaptive nontransparent-based distributed scheduling scheme (ANDS) for IEEE 802.16j networks. ANDS comprises three major components: Priority Assignment, Resource Allocation, Preserved Bandwidth Adjustment. Different service-type connections p...

  12. Application of IEEE 1588 to the real-time control system of accelerator

    International Nuclear Information System (INIS)

    Ma Mingchao; Chen Jianfeng; Shen Liren; Jiang Geyang

    2014-01-01

    Background: Time synchronization is one of the core technology of realizing the real-time control of accelerator under the distributed control system architecture. The ordinary crystal frequency deviation of IEEE 1588 causes low synchronous accuracy, which doesn't meet the needs of high precision synchronization. Purpose: This paper proposes an algorithm to improve the synchronization precision caused by the crystal frequency deviation. Methods: According to the basic principle of IEEE 1588 time synchronization, a dynamic frequency compensation (DFC) algorithm module was designed and a test platform was built to verify the feasibility and practicability of the algorithm. The influence of the synchronous cycle and delay jitter of the switch on the synchronization accuracy were analyzed. Results: Experimental results showed the great precision improvement of synchronization after using DFC algorithm. Conclusion: Low synchronous accuracy caused by the crystal frequency deviation can be improved by using DFC algorithm implemented for precision time protocol (PTP) of IEEE 1588. (authors)

  13. Security of M-Commerce transactions

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2013-07-01

    Full Text Available In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here's how to analyze the security of M-commerce transactions and ways to increase security for these transactions taking into account the organization of M-Commerce applications, software used, hardware used and other important issues in the development of these applications.

  14. The development by the German Transactional Analysis Association of a scientifically-based online evaluation system of transactional analysis training

    Directory of Open Access Journals (Sweden)

    Norbert Nagel

    2017-07-01

    Full Text Available The authors present the development and statistical analysis, conducted under the auspices of the German Transactional Analysis Association (DGTA, of an online evaluation system of transactional analysis training.  The understanding of evaluation research is clarified, and the data-entry form and its grounding in the theory of transactional analysis are presented. Emphasis is placed on the development of the competence concept, the definition of competence categories, and the representation of the foundations of a transactional-analytic educational theory.  The scientific examination of the validity and reliability of the scales, the research process with pre-test and re-test, and the evaluation of the data in the system of online evaluation are extensively documented.  In conclusion, it is claimed that this online-based DGTA evaluation is one of the few result-oriented teaching evaluation instruments in the German-speaking countries which meets scientific control criteria and is published. Citation - APA format: Nagel, N., König, J., Ottmann, S., & Hahnle, A. (2017. The development by the German Transactional Analysis Association of a scientifically-based online evaluation system of transactional analysis training. International Journal of Transactional Analysis Research & Practice, 8(2, 3-23.

  15. Optimizing Concurrent M3-Transactions: A Fuzzy Constraint Satisfaction Approach

    Directory of Open Access Journals (Sweden)

    Peng LI

    2004-10-01

    Full Text Available Due to the high connectivity and great convenience, many E-commerce application systems have a high transaction volume. Consequently, the system state changes rapidly and it is likely that customers issue transactions based on out-of-date state information. Thus, the potential of transaction abortion increases greatly. To address this problem, we proposed an M3-transaction model. An M3-transaction is a generalized transaction where users can issue their preferences in a request by specifying multiple criteria and optional data resources simultaneously within one transaction. In this paper, we introduce the transaction grouping and group evaluation techniques. We consider evaluating a group of M3-transactions arrived to the system within a short duration together. The system makes optimal decisions in allocating data to transactions to achieve better customer satisfaction and lower transaction failure rate. We apply the fuzzy constraint satisfaction approach for decision-making. We also conduct experimental studies to evaluate the performance of our approach. The results show that the M3-transaction with group evaluation is more resilient to failure and yields much better performance than the traditional transaction model.

  16. IEEE 1547 and 2030 Standards for Distributed Energy Resources Interconnection and Interoperability with the Electricity Grid

    Energy Technology Data Exchange (ETDEWEB)

    Basso, T.

    2014-12-01

    Public-private partnerships have been a mainstay of the U.S. Department of Energy and the National Renewable Energy Laboratory (DOE/NREL) approach to research and development. These partnerships also include technology development that enables grid modernization and distributed energy resources (DER) advancement, especially renewable energy systems integration with the grid. Through DOE/NREL and industry support of Institute of Electrical and Electronics Engineers (IEEE) standards development, the IEEE 1547 series of standards has helped shape the way utilities and other businesses have worked together to realize increasing amounts of DER interconnected with the distribution grid. And more recently, the IEEE 2030 series of standards is helping to further realize greater implementation of communications and information technologies that provide interoperability solutions for enhanced integration of DER and loads with the grid. For these standards development partnerships, for approximately $1 of federal funding, industry partnering has contributed $5. In this report, the status update is presented for the American National Standards IEEE 1547 and IEEE 2030 series of standards. A short synopsis of the history of the 1547 standards is first presented, then the current status and future direction of the ongoing standards development activities are discussed.

  17. Remedial transactions curtailment via optimization

    Directory of Open Access Journals (Sweden)

    Maksimović Viktor

    2009-01-01

    Full Text Available The new method developed in this paper is aiming at transmission congestion management (CM. The new, Optimal Transactions Management method (OTM, is based on linear programming (LP, DC load flow (DCLF and linear security constraints. The OTM method is embedded in Available Transfer Capabilities (ATCs and Power Transfer Distribution Factors (PTDFs definitions' environment. Well-suited for both preventive and corrective modes of operation, the OTM method aids transmission system operator in running a congested power system network, where congestions are due to transactions. Potential congestion threat is solved by finding the 'culprit' transaction and its optimal reduction. Besides the proposed downsizing of scheduled and/or committed transactions, controls of the OTM method also include redispatching of generation and load levels. The task is to establish a system state without constraint violations. To ensure the feasible network solution, both DC and AC power flows are used. The common 5 nodes/7 lines Ward&Hale sample power system is used to clarify the OTM method. Besides, six other power system networks including the real-life power system network of Serbia, Macedonia and Montenegro (part of the South East Europe - SEE grid are used to test remedial potentials and CPU-time performances of the method. The 24-hour daily demand diagram is used with all test networks to study the effects of transactions as they are being superimposed to the regional grid. The remedial, transactions-curtailing OTM method is found well suited for market-related analyses precluding the hour-ahead, the day-ahead dispatch, as well as the real-time generation dispatch. It could also suit for the novel, Day Ahead Congestion Forecast (DACF procedure used in power markets. .

  18. Distributed Management of Concurrent Web Service Transactions

    DEFF Research Database (Denmark)

    Alrifai, Mohammad; Dolog, Peter; Balke, Wolf-Tilo

    2009-01-01

    Business processes involve dynamic compositions of interleaved tasks. Therefore, ensuring reliable transactional processing of Web services is crucial for the success of Web service-based B2B and B2C applications. But the inherent autonomy and heterogeneity of Web services render the applicability...... of conventional ACID transaction models for Web services far from being straightforward. Current Web service transaction models relax the isolation property and rely on compensation mechanisms to ensure atomicity of business transactions in the presence of service failures. However, ensuring consistency...... in the open and dynamic environment of Web services, where interleaving business transactions enter and exit the system independently, remains an open issue. In this paper, we address this problem and propose an architecture that supports concurrency control on the Web services level. An extension...

  19. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  20. Design of a Ku band Instrumentation Synthetic Aperture Radar System

    Science.gov (United States)

    2015-10-14

    Transactions on Image Processing, 17(1), 84-93. Retrieved from IEEE Xplore Digital Library website: http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber...where L = the length of the antenna[1] m Wa Azimuth Weighting factor (0.886 used in the IEEE Derivation for the case of no weighting) Table 1...image is equal to the noise power in the signal (a Signal to Noise Ratio of 1). The formula for NEσ0, taken from an IEEE Derivation is shown below[5

  1. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  2. Study of Allocation Guaranteed Time Slot Wireless Body Area Networks Based on IEEE 802.15.4

    Science.gov (United States)

    Yundra, E.; Harsono, G. D.

    2018-04-01

    This paper aims to determine the size of the Guaranteed Time Slot (GTS) on the super frame structure required for each sensor as well as to know the performance of the GTS resized system compared to the GTS standard on IEEE 802.15.4. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called allocation Guaranteed Time Slot (ALGATIS). ALGATIS is expected to effectively allocate guaranteed time slot to the requested sensors, it adjusts the length of the slot in super frame duration based on the length of the packet data. This article presents a simulation experiment of IEEE 802.15.4, especially for star network, to predict the throughput of networks and average energy consumption. The simulation experiments show that the performance of ALGATIS is better than that of IEEE 802.15.4 standard in term of the throughput of networks and average energy consumption

  3. A versatile trigger and synchronization module with IEEE1588 capabilities and EPICS support

    International Nuclear Information System (INIS)

    Lopez, J.M.; Ruiz, M.; Borrego, J.; Arcas, G. de; Barrera, E.; Vega, J.

    2010-01-01

    Event timing and synchronization are two key aspects to improve in the implementation of distributed data acquisition (dDAQ) systems such as the ones used in fusion experiments. It is also of great importance the integration of dDAQ in control and measurement networks. This paper analyzes the applicability of the IEEE1588 and EPICS standards to solve these problems, and presents a hardware module implementation based in both of them that allow adding these functionalities to any DAQ. The IEEE1588 standard facilitates the integration of event timing and synchronization mechanisms in distributed data acquisition systems based on IEEE 803.3 (Ethernet). An optimal implementation of such system requires the use of network interface devices which include specific hardware resources devoted to the IEE1588 functionalities. Unfortunately, this is not the approach followed in most of the large number of applications available nowadays. Therefore, most solutions are based in software and use standard hardware network interfaces. This paper presents the development of a hardware module (GI2E) with IEEE1588 capabilities which includes USB, RS232, RS485 and CAN interfaces. This permits to integrate any DAQ element that uses these interfaces in dDAQ systems in an efficient and simple way. The module has been developed with Motorola's Coldfire MCF5234 processor and National Semiconductors's PHY DP83640T, providing it with the possibility to implement the PTP protocol of IEEE1588 by hardware, and therefore increasing its performance over other implementations based in software. To facilitate the integration of the dDAQ system in control and measurement networks the module includes a basic Input/Output Controller (IOC) functionality of the Experimental Physics and Industrial Control System (EPICS) architecture. The paper discusses the implementation details of this module and presents its applications in advanced dDAQ applications in the fusion community.

  4. Management Control of Market Transactions: The Relation Between Transaction Characteristics, Incomplete Contract Design and Subsequent Performance

    NARCIS (Netherlands)

    Anderson, S.W.; Dekker, H.C.

    2005-01-01

    Using an unusually comprehensive database on 858 transactions for information technology products and accompanying services, we study how close partners who are exposed to opportunistic hazards structure and control a significant transaction. We analyze data on the terms of contracting to determine

  5. 45 CFR 162.1901 - Medicaid pharmacy subrogation transaction.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Medicaid pharmacy subrogation transaction. 162... STANDARDS AND RELATED REQUIREMENTS ADMINISTRATIVE REQUIREMENTS Medicaid Pharmacy Subrogation § 162.1901 Medicaid pharmacy subrogation transaction. The Medicaid pharmacy subrogation transaction is the...

  6. 21 CFR 1404.200 - What is a covered transaction?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false What is a covered transaction? 1404.200 Section 1404.200 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Covered Transactions § 1404.200 What is a covered transaction? A covered transaction is a...

  7. 17 CFR 155.6 - Trading standards for the transaction of business on registered derivatives transaction execution...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Trading standards for the transaction of business on registered derivatives transaction execution facilities. 155.6 Section 155.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION TRADING STANDARDS § 155.6 Trading...

  8. Proceedings of IEEE Machine Learning for Signal Processing Workshop XVI

    DEFF Research Database (Denmark)

    Larsen, Jan

    These proceedings contains refereed papers presented at the sixteenth IEEE Workshop on Machine Learning for Signal Processing (MLSP'2006), held in Maynooth, Co. Kildare, Ireland, September 6-8, 2006. This is a continuation of the IEEE Workshops on Neural Networks for Signal Processing (NNSP......). The name of the Technical Committee, hence of the Workshop, was changed to Machine Learning for Signal Processing in September 2003 to better reflect the areas represented by the Technical Committee. The conference is organized by the Machine Learning for Signal Processing Technical Committee...... the same standard as the printed version and facilitates the reading and searching of the papers. The field of machine learning has matured considerably in both methodology and real-world application domains and has become particularly important for solution of problems in signal processing. As reflected...

  9. Capacity Evaluation for IEEE 802.16e Mobile WiMAX

    Directory of Open Access Journals (Sweden)

    Chakchai So-In

    2010-01-01

    Full Text Available We present a simple analytical method for capacity evaluation of IEEE 802.16e Mobile WiMAX networks. Various overheads that impact the capacity are explained and methods to reduce these overheads are also presented. The advantage of a simple model is that the effect of each decision and sensitivity to various parameters can be seen easily. We illustrate the model by estimating the capacity for three sample applications—Mobile TV, VoIP, and data. The analysis process helps explain various features of IEEE 802.16e Mobile WiMAX. It is shown that proper use of overhead reducing mechanisms and proper scheduling can make an order of magnitude difference in performance. This capacity evaluation method can also be used for validation of simulation models.

  10. Self-Coexistence among IEEE 802.22 Networks: Distributed Allocation of Power and Channel

    OpenAIRE

    Sayef Azad Sakin; Md. Abdur Razzaque; Mohammad Mehedi Hassan; Atif Alamri; Nguyen H. Tran; Giancarlo Fortino

    2017-01-01

    Ensuring self-coexistence among IEEE 802.22 networks is a challenging problem owing to opportunistic access of incumbent-free radio resources by users in co-located networks. In this study, we propose a fully-distributed non-cooperative approach to ensure self-coexistence in downlink channels of IEEE 802.22 networks. We formulate the self-coexistence problem as a mixed-integer non-linear optimization problem for maximizing the network data rate, which is an NP-hard one. This work explores a s...

  11. Modeling, Simulation and Design of Plasmonic Interconnects for On-Chip Signal Processing

    Science.gov (United States)

    2011-02-14

    Transactions on Nanotechnology. (already available in IEEE Xplore , though the paper version has not been scheduled yet). 7. K. Song, and P. Mazumder, “One...in Nanoelectronics and Plasmonics,” Proceedings on IEEE Conference on Nanotechnology, Cincinnati, July 2006. 2. K. Song and P. Mazumder, “Surface...Plasmon Dynamics of a Metallic Nanoparticle,” Proceedings on IEEE Conference on Nanotechnology, Hong Kong, Aug. 2007. 3. K. Song and P. Mazumder

  12. How to deal with malleability of BitCoin transactions

    OpenAIRE

    Andrychowicz, Marcin; Dziembowski, Stefan; Malinowski, Daniel; Mazurek, Łukasz

    2013-01-01

    BitCoin transactions are malleable in a sense that given a transaction an adversary can easily construct an equivalent transaction which has a different hash. This can pose a serious problem in some BitCoin distributed contracts in which changing a transaction's hash may result in the protocol disruption and a financial loss. The problem mostly concerns protocols, which use a "refund" transaction to withdraw a deposit in a case of the protocol interruption. In this short note, we show a gener...

  13. Foreign exchange transaction exposure of enterprises in Serbia

    Directory of Open Access Journals (Sweden)

    Bogićević Jasmina

    2016-01-01

    Full Text Available Enterprises involved in international business face transaction exposure to foreign exchange risk. This type of exposure occurs when an enterprise trades, borrows, or lеnds in foreign currency. Transaction exposure has a direct effect on an enterprise’s financial position and profitability. It is one of the three forms of exposure to exchange rate fluctuations, the other two being translation exposure and operating exposure. The aim of this paper is to assess the transaction exposure of enterprises in Serbia operating internationally. In addition to identifying and measuring transaction exposure, this paper explores the practical importance that enterprises in Serbia attach to management of this type of foreign exchange risk. We do not find significant differences between domestic and foreign enterprises in their choice of the type of foreign exchange risk exposure to manage. Although transaction exposure is the most managed type of foreign exchange risk, research has shown that, compared to foreign businesses, Serbian enterprises do not use sufficient protective measures to minimize the negative impact of this type of exposure on their cash flows and profitability. We expected that there would be a statistically significant dependence between the volume of enterprises’ foreign currency transactions and the level of applied transaction exposure management practices. However, the results of our research, based on a sample of enterprises in Serbia operating internationally, show that transaction exposure management practices can be influenced by factors other than the level of an enterprise’s foreign currency transactions, such as the enterprise’s country of origin.

  14. Entrepreneurship, transaction costs, and resource attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2006-01-01

    transaction costs shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction.......This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognise how exactly...

  15. Entrepreneurship, transaction costs, and resource attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    2006-01-01

    This paper responds to Kim and Mahoney's "How Property Rights Economics Furthers the Resource-Based View: Resources, Transaction Costs and Entrepreneurial Discovery" (a comment on Foss and Foss, 2005). While we agree with many of their arguments, we argue that they fail to recognise how exactly t...... transaction costs shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  16. A Videography Analysis Framework for Video Retrieval and Summarization (Open Access)

    Science.gov (United States)

    2012-09-07

    J. S. D. Mason, and M.Pawlewski. Video genre classification using dy- namics. In IEEE ICASSP, 2001. [16] Ashutosh Saxena, Sung H. Chung, and Andrew Y...directing semantics for film shot classification. IEEE Transactions on Circuits and Systems for Video Technology (TCSVT), 19(10):1529–1542, 2009. [23

  17. Transactive Systems Simulation and Valuation Platform Trial Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Widergren, Steven E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hammerstrom, Donald J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Qiuhua [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kalsi, Karanjit [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lian, Jianming [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McDermott, Thomas E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sivaraman, Deepak [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Tang, Yingying [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Veeramany, Arun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Woodward, James C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-04-01

    Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvements to the time-simulation environment that is being used to evaluate transactive scenarios.

  18. Transactive Systems Simulation and Valuation Platform Trial Analysis

    International Nuclear Information System (INIS)

    Widergren, Steven E.; Hammerstrom, Donald J.; Huang, Qiuhua; Kalsi, Karanjit; Lian, Jianming; Makhmalbaf, Atefe; McDermott, Thomas E.; Sivaraman, Deepak; Tang, Yingying; Veeramany, Arun; Woodward, James C.

    2017-01-01

    Transactive energy systems use principles of value to coordinate responsive supply and demand in energy systems. Work continues within the Transactive Systems Program, which is funded by the U.S. Department of Energy at Pacific Northwest National Laboratory, to understand the value of, understand the theory behind, and simulate the behaviors of transactive energy systems. This report summarizes recent advances made by this program. The main capability advances include a more comprehensive valuation model, including recommended documentation that should make valuation studies of all sorts more transparent, definition of economic metrics with which transactive mechanisms can be evaluated, and multiple improvements to the time-simulation environment that is being used to evaluate transactive scenarios.

  19. Transactive Demand Side Management Programs in Smart Grids with High Penetration of EVs

    Directory of Open Access Journals (Sweden)

    Poria Hasanpor Divshali

    2017-10-01

    Full Text Available Due to environmental concerns, economic issues, and emerging new loads, such as electrical vehicles (EVs, the importance of demand side management (DSM programs has increased in recent years. DSM programs using a dynamic real-time pricing (RTP method can help to adaptively control the electricity consumption. However, the existing RTP methods, particularly when they consider the EVs and the power system constraints, have many limitations, such as computational complexity and the need for centralized control. Therefore, a new transactive DSM program is proposed in this paper using an imperfect competition model with high EV penetration levels. In particular, a heuristic two-stage iterative method, considering the influence of decisions made independently by customers to minimize their own costs, is developed to find the market equilibrium quickly in a distributed manner. Simulations in the IEEE 37-bus system with 1141 customers and 670 EVs are performed to demonstrate the effectiveness of the proposed method. The results show that the proposed method can better manage the EVs and elastic appliances than the existing methods in terms of power constraints and cost. Also, the proposed method can solve the optimization problem quick enough to run in real-time.

  20. PERFORMANCE STUDY OF DISTRIBUTED COORDINATION FUNCTION OVER IEEE 802.11A PHYSICAL LAYER

    Directory of Open Access Journals (Sweden)

    S. SELVAKENEDDY

    2006-06-01

    Full Text Available IEEE 802.11a is one of the latest standards to be released by the IEEE Project 802 for wireless LANs. It has specified an additional physical layer (PHY to support higher data rates, and is termed as the orthogonal frequency division multiplexing (OFDM. In order to exploit its benefits, one of the medium access control (MAC protocols specified in the IEEE 802.11 specification is called distributed coordination function (DCF. DCF is a carrier sense multiple access with collision avoidance (CSMA/CA scheme with slotted binary exponential backoff. The frames can be transmitted using the basic access scheme or the RTS/CTS scheme in DCF. It was demonstrated previously that the RTS/CTS mechanism works well in most scenarios for the previously specified PHYs. In this work, a simple simulator is developed to verify the scalability of the RTS/CTS mechanism over OFDM PHY, which supports much higher data rates.

  1. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  2. A Self-Adaptive Energy-Efficient Framework for Large Unattended Wireless Sensor Networks

    Science.gov (United States)

    2014-11-06

    Transactions on Vehicular Technology, (10 2011): 3919. doi: 10.1109/ TVT .2011.2166093 Miao Zhao, Yuanyuan Yang. Optimization-Based DistributedAlgorithms for...Networks, IEEE Transactions on Vehicular Technology, (05 2013): 0. doi: 10.1109/ TVT .2012.2229309 Miao Zhao, Ming Ma, Yuanyuan Yang. Applying

  3. The Influence of an External Transaction on a BPEL Scope

    Science.gov (United States)

    Kopp, Oliver; Mietzner, Ralph; Leymann, Frank

    Business processes constitute an integral part of today's IT applications. They contain transactions as essential building blocks to ensure integrity and all-or-nothing behavior. The Business Process Execution Language is the dominant standard for modeling and execution of business processes in a Web service environment. BPEL itself contains a transaction model based on compensation, that describes the (local) transactions in a business process. The WS-Coordination framework deals with (external) transactions between Web services and is used to define the transaction behavior between a BPEL process and its partners. In this paper, we investigate how external transactions between Web services interrelate with local transactions of BPEL.

  4. Dynamic Self-Healing Mechanism for Transactional Business Process

    Directory of Open Access Journals (Sweden)

    Yuhai Zhao

    2015-01-01

    Full Text Available It is clear that transactional behavior consistency is a prerequisite and basis for construction of a reliable services-based business application. However, in previous works, maintaining transactional consistency during exception handling was ignored. Maintaining transactional consistency requires functionality for rolling back some operations and revoking uploaded data. Replacing only the failed service will eventually lead to overall business application failure. In this study, we take fully into account the behavioral consistency of transactional services and propose two effective self-healing mechanisms for service-based applications. If a service enters into potential failure condition, a rescheduling mechanism is triggered to maintain consistent transactional behavior and to ensure reliable execution; if a service fails during execution, the compensation operation is triggered and the system will take action to ensure transactional behavior consistency. Meanwhile, cost-benefit analysis with compensation support is proposed to minimize the dynamic reselection cost. Finally, the experimental analysis shows that the proposed strategies can effectively guarantee the reliability of Web-based applications system.

  5. Reactive GTS Allocation Protocol for Sporadic Events Using the IEEE 802.15.4

    Directory of Open Access Journals (Sweden)

    Mukhtar Azeem

    2014-01-01

    by the IEEE 802.15.4 standard. The proposed control protocol ensures that a given offline sporadic schedule can be adapted online in a timely manner such that the static periodic schedule has not been disturbed and the IEEE 802.15.4 standard compliance remains intact. The proposed protocol is simulated in OPNET. The simulation results are analyzed and presented in this paper to prove the correctness of the proposed protocol regarding the efficient real-time sporadic event delivery along with the periodic event propagation.

  6. A transaction assessment method for allocation of transmission services

    Science.gov (United States)

    Banunarayanan, Venkatasubramaniam

    The purpose of this research is to develop transaction assessment methods for allocating transmission services that are provided by an area/utility to power transactions. Transmission services are the services needed to deliver, or provide the capacity to deliver, real and reactive power from one or more supply points to one or more delivery points. As the number of transactions increase rapidly in the emerging deregulated environment, accurate quantification of the transmission services an area/utility provides to accommodate a transaction is becoming important, because then appropriate pricing schemes can be developed to compensate for the parties that provide these services. The Allocation methods developed are based on the "Fair Resource Allocation Principle" and they determine for each transaction the following: the flowpath of the transaction (both real and reactive power components), generator reactive power support from each area/utility, real power loss support from each area/utility. Further, allocation methods for distributing the cost of relieving congestion on transmission lines caused by transactions are also developed. The main feature of the proposed methods is representation of actual usage of the transmission services by the transactions. The proposed method is tested extensively on a variety of systems. The allocation methods developed in this thesis for allocation of transmission services to transactions is not only useful in studying the impact of transactions on a transmission system in a multi-transaction case, but they are indeed necessary to meet the criteria set forth by FERC with regard to pricing based on actual usage. The "consistency" of the proposed allocation methods has also been investigated and tested.

  7. Eleanor McElwee and the Formation of IEEE PCS

    Science.gov (United States)

    Malone, Edward A.

    2015-01-01

    This article examines the historical professional project that created the Institute of Radio Engineers' Professional Group on Engineering Writing an Speech (IRE PGEWS)--now called the Institute of Electrical and Electronics Engineers' Professional Communication Society (IEEE PCS)--and recounts the group's early history in detail. It also traces…

  8. Disincentives to voluntary transactions

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Current legal, regulatory and institutional standards and practices provide several disincentives for a utility wishing to engage in voluntary wheeling transactions, and are discussed here. These disincentives largely arise from the fact that regulation, like the transmission system itself, is based on the notion of integrated utilities engaging in transactions largely for reliability reasons. Factors which fall into this category are: a pricing regime based on embedded costs, the ratemaking treatment of revenues derived from coordination and transmission services, and several provisions in legislation and FERC regulations

  9. Transaction Costs for Design-Build-Finance-Maintain Contracts

    NARCIS (Netherlands)

    Favie, R.; Beelen, W.A.; Maas, G.J.; Ceric, A.; Radujkovic, M.

    2009-01-01

    This paper gives insight in how transaction costs arise and how in theory transaction costs can be reduced. A comparison between theory and practice has been made. A study of a case in the Netherlands, the Second Coentunnel showed how transaction costs in practice appear, in which stage of the

  10. 31 CFR 587.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 587.406 Section 587.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... MONTENEGRO) MILOSEVIC SANCTIONS REGULATIONS Interpretations § 587.406 Offshore transactions. The prohibitions...

  11. Entrepreneurship, Transaction Costs, and Resource Attributes

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai Juul

    transaction costs and property rights shape the process of entrepreneurial discovery. We provide a sketch of the mechanisms that link entrepreneurship, property rights, and transaction costs in a resource-based setting, contributing further to the attempt to take the RBV in a more dynamic direction....

  12. On Transaction-Cost Models in Continuous-Time Markets

    Directory of Open Access Journals (Sweden)

    Thomas Poufinas

    2015-04-01

    Full Text Available Transaction-cost models in continuous-time markets are considered. Given that investors decide to buy or sell at certain time instants, we study the existence of trading strategies that reach a certain final wealth level in continuous-time markets, under the assumption that transaction costs, built in certain recommended ways, have to be paid. Markets prove to behave in manners that resemble those of complete ones for a wide variety of transaction-cost types. The results are important, but not exclusively, for the pricing of options with transaction costs.

  13. Financial and Cost Aspects of Other Transactions

    National Research Council Canada - National Science Library

    1998-01-01

    ...." This report discusses the DoD administration of "other transactions." The second audit report will discuss the review of costs charged to the agreements by the "other transaction" participant...

  14. On IEEE 802.15.6 IR-UWB receivers - simulations for DBPSK modulation.

    Science.gov (United States)

    Niemelä, Ville; Hämäläinen, Matti; Iinatti, Jari

    2013-01-01

    In 2002, Federal Communications Commission (FCC) was the first in defining regulations for ultra wideband (UWB) communications followed by Europe and Japan some years later. Focusing on impulse radio (IR) UWB, in 2007 was the time for the first published standard targeting in personal area networks, released by the IEEE. The second IEEE released standard including UWB definitions is targeted for wireless body area networks (WBAN) and was published in 2012. As the wireless communications has been and will be passing through almost any levels in society, the natural step with WBAN is using it in different medical, healthcare and wellbeing applications. The arguments for these are related to the modern lifestyle, in which people have increasingly more free time and are more interested in taking care of their health and wellbeing. Another challenge is the population composition, i.e., aging in developed countries which call for new solutions and procedures, particularly from cost wise. In this paper, we are evaluating UWB receivers based on the IEEE 802.15.6 physical layer definitions and capable of detecting differentially encoded modulation. The evaluation is performed using two different WBAN channel models.

  15. 31 CFR 357.28 - Transaction requests.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Transaction requests. 357.28 Section 357.28 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL... System (Legacy Treasury Direct) § 357.28 Transaction requests. (a) General. Unless otherwise authorized...

  16. 31 CFR 544.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 544.406 Section 544.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... SANCTIONS REGULATIONS Interpretations § 544.406 Offshore transactions. The prohibitions in § 544.201 on...

  17. 31 CFR 593.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 593.406 Section 593.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... SANCTIONS REGULATIONS Interpretations § 593.406 Offshore transactions. The prohibitions in § 593.201 on...

  18. 31 CFR 103.63 - Structured transactions.

    Science.gov (United States)

    2010-07-01

    ... Section 103.63 Money and Finance: Treasury Regulations Relating to Money and Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.63 Structured transactions. No person shall for the purpose of evading the reporting requirements of § 103.22 with respect to...

  19. Reactions to Corporate Insider’s Transactions

    DEFF Research Database (Denmark)

    Rose, Caspar; Søpstad, Nicolai

    2015-01-01

    We test the impact on security prices of top manager’s requirement’s to disclose their own share transactions in the firm. Specifically we study whether buy or sales transactions convey relevant information for market participants thereby studying the effects of legal stock market disclosure rules...

  20. Transaction-Based Building Controls Framework, Volume 1: Reference Guide

    Energy Technology Data Exchange (ETDEWEB)

    Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Pratt, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fernandez, Nicholas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Foster, Nikolas AF [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somani, Abhishek [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Steckley, Andrew C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Taylor, Zachary T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-12-01

    This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

  1. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model......We argue that in the presence of transaction costs, observed productivity measures may in many cases understate the true productivity, as production data seldom distinguish between resources entering the production process and resources of a similar type that are sacrificed for transaction costs....... Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...

  2. The transactional interpretation of quantum mechanics

    Science.gov (United States)

    Cramer, John G.

    2001-06-01

    The transactional interpretation of quantum mechanics [1] was originally published in 1986 and is now about 14 years old. It is an explicitly nonlocal and Lorentz invariant alternative to the Copenhagen interpretation. It interprets the formalism for a quantum interaction as describing a "handshake" between retarded waves (ψ) and advanced waves (ψ*) for each quantum event or "transaction" in which energy, momentum, angular momentum, and other conserved quantities are transferred. The transactional interpretation offers the advantages that (1) it is actually "visible" in the formalism of quantum mechanics, (2) it is economical, involving fewer independent assumptions than its rivals, (3) it is paradox-free, resolving all of the paradoxes of standard quantum theory including nonlocality and wave function collapse, (4) it does not give a privileged role to observers or measurements, and (5) it permits the visualization of quantum events. We will review the transactional interpretation and some of its applications to "quantum paradoxes."

  3. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  4. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  5. Absorbers in the Transactional Interpretation of Quantum Mechanics

    Science.gov (United States)

    Boisvert, Jean-Sébastien; Marchildon, Louis

    2013-03-01

    The transactional interpretation of quantum mechanics, following the time-symmetric formulation of electrodynamics, uses retarded and advanced solutions of the Schrödinger equation and its complex conjugate to understand quantum phenomena by means of transactions. A transaction occurs between an emitter and a specific absorber when the emitter has received advanced waves from all possible absorbers. Advanced causation always raises the specter of paradoxes, and it must be addressed carefully. In particular, different devices involving contingent absorbers or various types of interaction-free measurements have been proposed as threatening the original version of the transactional interpretation. These proposals will be analyzed by examining in each case the configuration of absorbers and, in the special case of the so-called quantum liar experiment, by carefully following the development of retarded and advanced waves through the Mach-Zehnder interferometer. We will show that there is no need to resort to the hierarchy of transactions that some have proposed, and will argue that the transactional interpretation is consistent with the block-universe picture of time.

  6. 76 FR 40779 - Retail Foreign Exchange Transactions

    Science.gov (United States)

    2011-07-12

    ... transaction are offset when: (i) The customer maintains separate accounts managed by different advisors; (ii... could nominate a deposit account as containing margin for its retail forex transactions. Nothing in this...

  7. 31 CFR 597.406 - Offshore transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Offshore transactions. 597.406 Section 597.406 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... REGULATIONS Interpretations § 597.406 Offshore transactions. The prohibitions contained in § 597.201 apply to...

  8. 31 CFR 596.304 - Financial transaction.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Financial transaction. 596.304 Section 596.304 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... term includes: (a) A transaction which in any way or degree affects interstate or foreign commerce; (1...

  9. An analytical model for the performance analysis of concurrent transmission in IEEE 802.15.4.

    Science.gov (United States)

    Gezer, Cengiz; Zanella, Alberto; Verdone, Roberto

    2014-03-20

    Interference is a serious cause of performance degradation for IEEE802.15.4 devices. The effect of concurrent transmissions in IEEE 802.15.4 has been generally investigated by means of simulation or experimental activities. In this paper, a mathematical framework for the derivation of chip, symbol and packet error probability of a typical IEEE 802.15.4 receiver in the presence of interference is proposed. Both non-coherent and coherent demodulation schemes are considered by our model under the assumption of the absence of thermal noise. Simulation results are also added to assess the validity of the mathematical framework when the effect of thermal noise cannot be neglected. Numerical results show that the proposed analysis is in agreement with the measurement results on the literature under realistic working conditions.

  10. 0011-0030.Data Representation amp Computer Arithmetic6 IEEE ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.Data Representation amp Computer Arithmetic6 IEEE Standard Double Precision FormatIn.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News.

  11. Study on Additional Carrier Sensing for IEEE 802.15.4 Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bih-Hwang Lee

    2010-06-01

    Full Text Available Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs. The slotted carrier sense multiple access with collision avoidance (CSMA/CA is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC delay and power consumption of CCA detection.

  12. Study on additional carrier sensing for IEEE 802.15.4 wireless sensor networks.

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Ruei-Lung; Wu, Huai-Kuei; Wong, Chi-Ming

    2010-01-01

    Wireless sensor networks based on the IEEE 802.15.4 standard are able to achieve low-power transmissions in the guise of low-rate and short-distance wireless personal area networks (WPANs). The slotted carrier sense multiple access with collision avoidance (CSMA/CA) is used for contention mechanism. Sensor nodes perform a backoff process as soon as the clear channel assessment (CCA) detects a busy channel. In doing so they may neglect the implicit information of the failed CCA detection and further cause the redundant sensing. The blind backoff process in the slotted CSMA/CA will cause lower channel utilization. This paper proposes an additional carrier sensing (ACS) algorithm based on IEEE 802.15.4 to enhance the carrier sensing mechanism for the original slotted CSMA/CA. An analytical Markov chain model is developed to evaluate the performance of the ACS algorithm. Both analytical and simulation results show that the proposed algorithm performs better than IEEE 802.15.4, which in turn significantly improves throughput, average medium access control (MAC) delay and power consumption of CCA detection.

  13. IEEE P1596, a scalable coherent interface for GigaByte/sec multiprocessor applications

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1988-11-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained during the development of Fastbus (IEEE 960), Futurebus (IEEE 896.1) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor; efficient support of a coherent distributed-cache image of shared memory; and support for segmentation, bus repeaters and general switched interconnections like Banyan, Omega, or full crossbar networks. To achieve these ambitious goals, SCI must sacrifice the immediate handshake characteristic of the present generation of buses in favor of a packet-like split-cycle protocol. Wire-ORs, broadcasts, and even ordinary passive bus structures are to be avoided. However, a lower performance (1 GByte/sec per backplane instead of per processor) implementation using a register insertion ring architecture on a passive ''backplane'' appears to be possible using the same interface as for the more costly switch networks. This paper presents a summary of current directions, and reports the status of the work in progress

  14. The transactional approach in company boundaries

    Directory of Open Access Journals (Sweden)

    Bruno Chaihuaque Dueñas

    2009-12-01

    Full Text Available This article shows the relationship between market and firms through the theory of transactional cost and the relationsthat determine the structure and boundaries of the firm. Using the assumptions from the transactional cost approach,this article proposes some variables that determine optimal organizational structures and their boundaries.

  15. 31 CFR 515.206 - Exempt transactions.

    Science.gov (United States)

    2010-07-01

    ... credit issued by a Cuban bank and confirmed by an American bank. These are permissible transactions under... enhancements. (b) Donation of food. The prohibitions contained in this part do not apply to transactions incident to the donation of food to nongovernmental organizations or individuals in Cuba. [54 FR 5233, Feb...

  16. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  17. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2kV, and 15kV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15kV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  18. Qualification of cables to IEEE standards 323-1974 and 383-1974

    International Nuclear Information System (INIS)

    Hosticka, C.; Kingsbury, E.R.; Bruhin, A.C.

    1980-01-01

    Wire and Cable manufacturers generally qualify products for class IE application by envelope type testing to user specifications and environmental conditions recommended by IEEE Standards 323-1974 and 383-1974. The General Electric Wire and Cable Business Department recently completed two such qualification programs. Cable constructions tested were 600V control cables and 600 V, 2KV, and 15KV power cables insulated with flame resistant mineral filled crosslinked polyethylene. The 15KV samples included taped field splices. In the second test program, the steam pressure-temperature profile included a simulated main steam line break. Test specimens were wrapped on grounded mandrels and were electrically loaded throughout the simulated LOCA tests. After completion of environmental testing, samples were subjected to the IEEE 383 simulated post-LOCA test. 6 refs

  19. Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection

    Science.gov (United States)

    2012-03-01

    IEEE Xplore . 8. Hal Stoen. (2001) VFR Flight. Retrieved February 15, 2012 from http://stoenworks.com/vfr%20flight.html 9. Cohen, B., & Smith, A...7. Gilbert, G. (1973). Historical development of the air traffic control system. IEEE Transactions on Communications, 364-375. Retrieved from...1998. Proceedings., 17th DASC. the AIAA/ IEEE /SAE,2 F44/1- F44/8 vol.2. 10. Livack, G. S., McDaniel, J. I., Battiste, V., & Johnson, W. W. (2000

  20. The scalable coherent interface, IEEE P1596, status and possible applications to data acquisition and physics

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1990-01-01

    IEEE P1596, the Scalable Coherent Interface (formerly known as SuperBus) is based on experience gained while developing Fastbus (ANSI/IEEE 960-1986, IEC 935), Futurebus (IEEE P896.x) and other modern 32-bit buses. SCI goals include a minimum bandwidth of 1 GByte/sec per processor in multiprocessor systems with thousands of processors; efficient support of a coherent distributed-cache image of distributed shared memory; support for repeaters which interface to existing or future buses; and support for inexpensive small rings as well as for general switched interconnections like Banyan, Omega, or crossbar networks. This paper presents a summary of current directions, reports the status of the work in progress, and suggests some applications in data acquisition and physics. 7 refs

  1. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    The convenience of IEEE 8O2.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors However, this use is predicated on an implicit assumption of confidentiality...

  2. How to Use EMTS to Report Transactions for Fuel Programs

    Science.gov (United States)

    Reporting instructions for parties who transact Renewable Identification Numbers (RINs) and must enter transaction information in the EPA Moderated Transaction System (EMTS) within five (5) business days.

  3. ACCOUNTING TREATMENTS SPECIFIC TO COUNTERPART COMMERCIAL TRANSACTIONS

    Directory of Open Access Journals (Sweden)

    Lucia PALIU - POPA

    2010-12-01

    Full Text Available Given the lack of availability of funds in foreign currency, felt in many countries, especially in the developing and developed countries and the economic or financial crisis in the global foreign exchange, counterpart commercial transactions were imposed as a “disarming” condition of the international trade. In the counterpart a purchase transaction is combined with a sale transaction, an import with an export in order to ensure balanced trade between the partners, trade that involves eliminating or reducing the currency as a payment source and its replacement with trade of goods and services. Thus, in the context of an acute need to export of greatly industrialized countries, where the overproduction phenomenon tends to have a chronic character, the counterpart has become a highly complex and sustainable phenomenon, which has seen a steady increase in the volume of amounts, with a geographical area and large variety of forms and mechanisms of implementation. Based on the characteristics and structure of counterpart transactions, we shall describe in this paper the accounting models specific to international trade, as part of the combined foreign trade transactions without neglecting the tax treatments that influence the entry in the accounts

  4. IEEE Std 101-1987: IEEE guide for the statistical analysis of thermal life test data

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This revision of IEEE Std 101-1972 describes statistical analyses for data from thermally accelerated aging tests. It explains the basis and use of statistical calculations for an engineer or scientist. Accelerated test procedures usually call for a number of specimens to be aged at each of several temperatures appreciably above normal operating temperatures. High temperatures are chosen to produce specimen failures (according to specified failure criteria) in typically one week to one year. The test objective is to determine the dependence of median life on temperature from the data, and to estimate, by extrapolation, the median life to be expected at service temperature. This guide presents methods for analyzing such data and for comparing test data on different materials

  5. Novel transmission pricing scheme based on point-to-point tariff and transaction pair matching for pool market

    International Nuclear Information System (INIS)

    Chen, Qixin; Xia, Qing; Kang, Chongqing

    2010-01-01

    Transmission pricing scheme is a key component in the infrastructure of power market, and pool is an indispensable pattern of market organization; meanwhile, pay-as-bid (PAB) serves as a main option to determine market prices in pool. In this paper, a novel transmission pricing scheme is proposed for pool power market based on PAB. The new scheme is developed by utilizing point-to-point (PTP) tariff and introducing an approach of transaction pair matching (TPM). The model and procedure of the new scheme are presented in detail. Apart from the advantages of existing transmission pricing schemes, such as ensuing open, fair and non-discriminatory access, proper recovery for investment as well as transparency, the new scheme provides economic signals to promote the maximum use of the existing transmission network, encourages appropriate bidding behaviors in pool, and helps to reduce the possibility of the enforcement of market power and the appearing of price spikes; thus improves market operation efficiency and trading effects. In order to testify the effectiveness of the proposed scheme, a case based on IEEE 30-bus system is studied. (author)

  6. Novel transmission pricing scheme based on point-to-point tariff and transaction pair matching for pool market

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Qixin; Xia, Qing; Kang, Chongqing [State Key Lab. of Power System, Dept. of Electrical Engineering, Tsinghua University, Beijing 100084 (China)

    2010-04-15

    Transmission pricing scheme is a key component in the infrastructure of power market, and pool is an indispensable pattern of market organization; meanwhile, pay-as-bid (PAB) serves as a main option to determine market prices in pool. In this paper, a novel transmission pricing scheme is proposed for pool power market based on PAB. The new scheme is developed by utilizing point-to-point (PTP) tariff and introducing an approach of transaction pair matching (TPM). The model and procedure of the new scheme are presented in detail. Apart from the advantages of existing transmission pricing schemes, such as ensuing open, fair and non-discriminatory access, proper recovery for investment as well as transparency, the new scheme provides economic signals to promote the maximum use of the existing transmission network, encourages appropriate bidding behaviors in pool, and helps to reduce the possibility of the enforcement of market power and the appearing of price spikes; thus improves market operation efficiency and trading effects. In order to testify the effectiveness of the proposed scheme, a case based on IEEE 30-bus system is studied. (author)

  7. Transaction management with integrity checking

    DEFF Research Database (Denmark)

    Martinenghi, Davide; Christiansen, Henning

    2005-01-01

    Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typically up to the database designer and application programmer to enforce integrity via triggers or tests at the application level....... 2.~In concurrent database systems, besides the traditional correctness criterion, the execution schedule must ensure that the different transactions can overlap in time without destroying the consistency requirements tested by other, concurrent transactions....

  8. The tree identify protocol of IEEE 1394 in uCRL

    NARCIS (Netherlands)

    C. Shankland; M.B. van der Zwaag

    1998-01-01

    textabstractWe specify the tree identify protocol of the IEEE 1394 high performance serial multimedia bus at three different levels of detail using $mu$CRL. We use the cones and foci verification technique of Groote and Springintveld to show that the descriptions are equivalent under branching

  9. Supply Chain-Wide Consequences of Transaction Risks and Their Contractual Solutions: Towards an Extended Transaction Cost Economics Framework

    NARCIS (Netherlands)

    Wever, M.; Wognum, P.M.; Trienekens, J.H.; Omta, S.W.F.

    2012-01-01

    How supply chain actors manage their exposure to both supply- and demand-side risks is a topic that has been insufficiently examined within the transaction cost economics (TCE) literature. TCE studies often only examine transaction risks in the context of bilateral exchanges. This study aims to

  10. IEEE Std 649-1991: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The basic principles, requirements, and methods for qualifying Class 1E motor control centers for both harsh and mild environment applications in nuclear power generating stations are described. In addition to defining specific qualification requirements for Class 1E motor control centers and their components in accordance with the more general qualification requirements of IEEE Std 323-1983, this standard is intended to provide guidance in establishing a qualification program for demonstrating the adequacy of Class 1E motor control centers in nuclear power generating station applications

  11. A Case for Including Transactions in OpenMP

    Energy Technology Data Exchange (ETDEWEB)

    Wong, M; Bihari, B L; de Supinski, B R; Wu, P; Michael, M; Liu, Y; Chen, W

    2010-01-25

    Transactional Memory (TM) has received significant attention recently as a mechanism to reduce the complexity of shared memory programming. We explore the potential of TM to improve OpenMP applications. We combine a software TM (STM) system to support transactions with an OpenMP implementation to start thread teams and provide task and loop-level parallelization. We apply this system to two application scenarios that reflect realistic TM use cases. Our results with this system demonstrate that even with the relatively high overheads of STM, transactions can outperform OpenMP critical sections by 10%. Overall, our study demonstrates that extending OpenMP to include transactions would ease programming effort while allowing improved performance.

  12. 31 CFR 575.533 - Certain new transactions.

    Science.gov (United States)

    2010-07-01

    ..., Authorizations, and Statements of Licensing Policy § 575.533 Certain new transactions. (a) New transactions..., including any aviation, financial, or trade requirements of agencies other than the Department of the... subsequent permanent Iraqi government: Agricultural Cooperative Bank Al-Rafidain Shipping Company Industrial...

  13. IEEE 802.3 Fiber Optic Inter-Repeater Link

    Science.gov (United States)

    Tarrant, Peter J.

    1987-01-01

    This paper describes the implementation of a fiber optic inter-repeater link (FOIRL), used for connecting two remote copper segments of an IEEE 802.3 local area network. The rationale for the design, the signalling used and the collision detection mechanism is discussed. The evolution of the draft international standard for the FOIRL and the concurrence amongst various manufacturers is also presented. Finally some examples of typical applications, highlighting the ease of installation, are given.

  14. ARC Researchers at IEEE 2015 Vehicle Power and Propulsion Conference

    Science.gov (United States)

    Contacts Researchers News & Events Event Calendar Annual Program Review Research Seminars Press Room Event Archives ARC Researchers at the IEEE 2015 Vehicle Power and Propulsion Conference (October 19-22 Ballroom B P-SS4-2 Comparison of SOFC and PEM Fuel Cell Hybrid Power Management Strategies for Mobile

  15. Analysis and Enhancement of IEEE 802.15.4e DSME Beacon Scheduling Model

    Directory of Open Access Journals (Sweden)

    Kwang-il Hwang

    2014-01-01

    Full Text Available In order to construct a successful Internet of things (IoT, reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.

  16. A selective logging mechanism for hardware transactional memory systems

    OpenAIRE

    Lupon Navazo, Marc; Magklis, Grigorios; González Colás, Antonio María

    2011-01-01

    Log-based Hardware Transactional Memory (HTM) systems offer an elegant solution to handle speculative data that overflow transactional L1 caches. By keeping the pre-transactional values on a software-resident log, speculative values can be safely moved across the memory hierarchy, without requiring expensive searches on L1 misses or commits.

  17. A Fast MAC-Layer Handover for an IEEE 802.16e-Based WMAN

    Science.gov (United States)

    Ray, Sayan K.; Pawlikowski, Krzysztof; Sirisena, Harsha

    We propose a modification of the IEEE 802.16e hard handover (HHO) procedure, which significantly reduces the handover latency constraint of the original HHO procedure in IEEE 802.16e networks. It allows a better handling of the delay-sensitive traffic by avoiding unnecessary time-consuming scanning and synchronization activity as well as simplifies the network re-entry procedure. With the help of the backhaul network, it reduces the number of control messages in the original handover policy, making the handover latency acceptable also for real-time streaming traffic. Preliminary performance evaluation studies show that the modified handover procedure is able to reduce the total handover latency by about 50%.

  18. The IEEE 1355 Standard. Developments, performance and application in high energy physics

    International Nuclear Information System (INIS)

    Haas, S.

    1998-12-01

    The data acquisition systems of the next generation High Energy Physics experiments at the Large Hadron Collider (LHC) at CERN will rely on high-speed point-to-point links and switching networks for their higher level trigger and event building systems. This thesis provides a detailed evaluation of the DS-Link and switch technology, which is based on the IEEE 1355 standard for Heterogeneous Interconnect (HIC). The DS-Link is a bidirectional point-to-point serial interconnect, operating at speeds up to 200 MBaud. The objective of this thesis was to study the performance of the IEEE 1355 link and switch technology and to demonstrate that switching networks using this technology would scale to meet the requirements of the High Energy Physics applications

  19. Visualizing Dynamic Bitcoin Transaction Patterns.

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J

    2016-06-01

    This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network.

  20. Visualizing Dynamic Bitcoin Transaction Patterns

    Science.gov (United States)

    McGinn, Dan; Birch, David; Akroyd, David; Molina-Solana, Miguel; Guo, Yike; Knottenbelt, William J.

    2016-01-01

    Abstract This work presents a systemic top-down visualization of Bitcoin transaction activity to explore dynamically generated patterns of algorithmic behavior. Bitcoin dominates the cryptocurrency markets and presents researchers with a rich source of real-time transactional data. The pseudonymous yet public nature of the data presents opportunities for the discovery of human and algorithmic behavioral patterns of interest to many parties such as financial regulators, protocol designers, and security analysts. However, retaining visual fidelity to the underlying data to retain a fuller understanding of activity within the network remains challenging, particularly in real time. We expose an effective force-directed graph visualization employed in our large-scale data observation facility to accelerate this data exploration and derive useful insight among domain experts and the general public alike. The high-fidelity visualizations demonstrated in this article allowed for collaborative discovery of unexpected high frequency transaction patterns, including automated laundering operations, and the evolution of multiple distinct algorithmic denial of service attacks on the Bitcoin network. PMID:27441715

  1. A PROPOSED NOVEL ARCHITECTURE OF EC CONTROL SYSTEM USING IEEE 802.11n NETWORK AT ITER-INDIA GYROTRON TEST FACILITY

    Directory of Open Access Journals (Sweden)

    Deepak Mandge

    2017-06-01

    Full Text Available IEEE 802.11 Wi-Fi networks are increasingly becoming popular for its use in industrial applications. With the availability of recent amendments to IEEE 802.11 series of standards, particularly IEEE 802.11n, the adoption of Wi-Fi networks for process automation is gaining more focus and importance. The installation of Wireless networks naturally provides reduction in cable and its maintenance related costs, provides increased flexibility and mobility to enhance performance of industrial control system. The IEEE 802.11n supports parameterization that can be set for particular industrial applications and hence it has addressed to the aspects of timeliness and criticality to some extent. This paper proposes the use of IEEE 802.11n network to interconnect field instruments with Siemens PLC controller in harsh EMI/EMC environment. An application example is shown where the alternate control system architecture is developed in which non-critical and non-safety signals are communicated over Wi-Fi. While, for critical and safety signals, traditional hardwired signals methods can be implemented.

  2. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  3. 31 CFR 800.302 - Transactions that are not covered transactions.

    Science.gov (United States)

    2010-07-01

    ... A also negotiates contractual rights that give it the power to control important matters of... Example 2, except that Corporation X, a U.S. business, has developed important technology in connection... Corporation X, including production facilities, customer lists, technology, and staff. This transaction is a...

  4. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    Science.gov (United States)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  5. Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    M. Udin Harun Al Rasyid

    2013-12-01

    Full Text Available IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology. Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

  6. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    International Nuclear Information System (INIS)

    Sklavos, N; Selimis, G; Koufopavlou, O

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given

  7. Validation of IEEE P1547.1 Interconnection Test Procedures: ASCO 7000 Soft Load Transfer System

    Energy Technology Data Exchange (ETDEWEB)

    Kroposki, B.; Englebretson, S.; Pink, C.; Daley, J.; Siciliano, R.; Hinton, D.

    2003-09-01

    This report presents the preliminary results of testing the ASCO 7000 Soft Load Transfer System according to IEEE P1547.1 procedures. The ASCO system interconnects synchronous generators with the electric power system and provides monitoring and control for the generator and grid connection through extensive protective functions. The purpose of this testing is to evaluate and give feedback on the contents of IEEE Draft Standard P1547.1 Conformance Tests Procedures for Equipment Interconnecting Distributed Resources With Electric Power Systems.

  8. 26 CFR 1.1221-2 - Hedging transactions.

    Science.gov (United States)

    2010-04-01

    ... serves a hedging function, or that the transaction serves a similar function or purpose. (4) Coordination... business units. A separate set of books and records is maintained with respect to the activities, assets... under the marking member's method of accounting. (iii) Treatment of intercompany hedging transactions...

  9. Transactive Campus Energy Systems: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Corbin, Charles D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Haack, Jereme N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hao, He [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kim, Woohyun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, Donna J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Akyol, Bora A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Allwardt, Craig H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Carpenter, Brandon J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Sen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Liu, Guopeng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lutes, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Makhmalbaf, Atefe [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mendon, Vrushali V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ngo, Hung [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Somasundaram, Sriram [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Underhill, Ronald M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Zhao, Mingjie [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-09-26

    Transactive energy refers to the combination of economic and control techniques to improve grid reliability and efficiency. The fundamental purpose of transactive energy management is to seamlessly coordinate the operation of large numbers of new intelligent assets—such as distributed solar, energy storage and responsive building loads—to provide the flexibility needed to operate the power grid reliably and at minimum cost, particularly one filled with intermittent renewable generation such as the Pacific Northwest. It addresses the key challenge of providing smooth, stable, and predictable “control” of these assets, despite the fact that most are neither owned nor directly controlled by the power grid. The Clean Energy and Transactive Campus (CETC) work described in this report was done as part of a Cooperative Research and Development Agreement (CRADA) between the U.S. Department of Energy’s Pacific Northwest National Laboratory (PNNL) and the Washington State Department of Commerce (Commerce) through the Clean Energy Fund (CEF). The project team consisted of PNNL, the University of Washington (UW) and Washington State University (WSU), to connect the PNNL, UW, and WSU campuses to form a multi-campus testbed for transaction-based energy management—transactive—solutions. Building on the foundational transactive system established by the Pacific Northwest Smart Grid Demonstration (PNWSGD), the purpose of the project was to construct the testbed as both a regional flexibility resource and as a platform for research and development (R&D) on buildings/grid integration and information-based energy efficiency. This report provides a summary of the various tasks performed under the CRADA.

  10. Stress Testing of Transactional Database Systems

    OpenAIRE

    Meira , Jorge Augusto; Cunha De Almeida , Eduardo; Sunyé , Gerson; Le Traon , Yves; Valduriez , Patrick

    2013-01-01

    International audience; Transactional database management systems (DBMS) have been successful at supporting traditional transaction processing workloads. However, web-based applications that tend to generate huge numbers of concurrent business operations are pushing DBMS performance over their limits, thus threatening overall system availability. Then, a crucial question is how to test DBMS performance under heavy workload conditions. Answering this question requires a testing methodology to ...

  11. The Value Added Tax Implications of Illegal Transactions

    Directory of Open Access Journals (Sweden)

    SP van Zyl

    2011-01-01

    Full Text Available In the case of MP Finance Group CC (In Liquidation v CSARS the High Court of Appeal ruled that income "received by" a taxpayer from illegal gains will be taxable in the hands of the taxpayer. This article explores whether or not the decision in the MP Finance-case (and preceding cases on the taxation of illegal receipts can be applied to determine if illegal transactions are subject to VAT and moreover if a trader in illegal goods and services should register as a VAT vendor. Although strictly speaking no analogy can be drawn between the charging provisions for income tax and VAT, it is clear that in the determination of the taxability of illegal income, the courts applied the principle of tax neutrality. In terms of the principle of tax neutrality, taxes are not concerned with the legality or illegality of a transaction, but rather with whether the transaction complies with the requirements for it to be taxed or not. That said, the European Court of Justice has a different approach in applying this principle. According to the European Court of Justice where the intrinsic nature of the goods excludes it from the commercial arena (like narcotic drugs it should not be subject to VAT, but where the goods compete with a legal market it must be subject to VAT. Charging VAT on illegal transactions might give the impression that government benefits from criminal activities. However, if illegal transactions are not subject to VAT the trader in illegal goods will benefit as his products will be 14% cheaper than his rival’s. Is this necessarily a moral dilemma? In conclusion three arguments can be deduced on the question if illegal transactions should be subject to VAT:1. Illegal transactions should not be taxed at all. Illegal goods or services fall outside the sphere of the application of the charging provision in section 7(1 of the VAT Act. Moreover, taxing illegal transactions lends a quasi-validity to the contract and gives the impression that

  12. Related Party Transactions and Firms Financial Performance

    African Journals Online (AJOL)

    Prof

    Chien and Hsu (2010) found a positive moderating effect of corporate governance on the related transactions-firm performance relationship and deduce that presence of corporate governance could 'transfer' related party transactions 'conflict- of-interest' to be efficient. Past studies on the impact of RPT on financial reporting ...

  13. An IEEE 802.11 EDCA Model with Support for Analysing Networks with Misbehaving Nodes

    Directory of Open Access Journals (Sweden)

    Szott Szymon

    2010-01-01

    Full Text Available We present a novel model of IEEE 802.11 EDCA with support for analysing networks with misbehaving nodes. In particular, we consider backoff misbehaviour. Firstly, we verify the model by extensive simulation analysis and by comparing it to three other IEEE 802.11 models. The results show that our model behaves satisfactorily and outperforms other widely acknowledged models. Secondly, a comparison with simulation results in several scenarios with misbehaving nodes proves that our model performs correctly for these scenarios. The proposed model can, therefore, be considered as an original contribution to the area of EDCA models and backoff misbehaviour.

  14. Accounting costs of transactions in real estate

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2005-01-01

    in relating theoretical conceptualizations of transaction costs to national accounting and further to the identification and quantification of actions on units of real estate. The notion of satellite accounting of the System of National Accounts is applied to the segment of society concerned with changes......The costs of transactions in real estate is of importance for households, for investors, for statistical services, for governmental and international bodies concerned with the efficient delivery of basic state functions, as well as for research. The paper takes a multi-disciplinary approach...... in real estate. The paper ends up with an estimate of the cost of a major real property transaction in Denmark....

  15. VOLTTRON Lite: Integration Platform for the Transactional Network

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Katipamula, Srinivas; Akyol, Bora A.; Lutes, Robert G.

    2013-10-31

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform. The platform is intended to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop units (RTUs) and the electric grid using applications or “agents” that reside on the platform, on the equipment, on local building controller or in the Cloud. This document describes the core of the transactional network platform, the Volttron Lite™ software and associated services hosted on the platform. Future enhancements are also discussed. The appendix of the document provides examples of how to use the various services hosted on the platform.

  16. Transaction-Based Controls for Building-Grid Integration: VOLTTRON™

    Energy Technology Data Exchange (ETDEWEB)

    Akyol, Bora A.; Haack, Jereme N.; Hernandez, George; Katipamula, Srinivas; Widergren, Steven E.

    2015-07-01

    The U.S. Department of Energy’s (DOE’s) Building Technologies Office (BTO) is supporting the development of a “transactional network” concept that supports energy, operational, and financial transactions between building systems (e.g., rooftop units -- RTUs), and the electric power grid using applications, or 'agents', that reside either on the equipment, on local building controllers, or in the Cloud. The transactional network vision is delivered using a real-time, scalable reference platform called VOLTTRON that supports the needs of the changing energy system. VOLTTRON is an agent execution and an innovative distributed control and sensing software platform that supports modern control strategies, including agent-based and transaction-based controls. It enables mobile and stationary software agents to perform information gathering, processing, and control actions.

  17. Transaction costs and social networks in productivity measurement

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H. C. A.

    2015-01-01

    . Hence, both the absolute productivity measures and, more importantly, the productivity ranking will be distorted. A major driver of transaction costs is poor access to information and contract enforcement assistance. Social networks often catalyse information exchange as well as generate trust...... and support. Hence, we use measures of a firm’s access to social networks as a proxy for the transaction costs the firm faces. We develop a microeconomic production model that takes into account transaction costs and networks. Using a data set of 384 Polish farms, we empirically estimate this model...... and compare different parametric, semiparametric, and nonparametric model specifications. Our results generally support our hypothesis. Especially, large trading networks and dense household networks have a positive influence on a farm’s productivity. Furthermore, our results indicate that transaction costs...

  18. Combating Corruption in International Business Transactions

    OpenAIRE

    Celentani, Marco; Ganuza, Juan-José; Peydró, José-Luis

    2004-01-01

    International business transactions pose the problem of deterring bribing of public officials by foreign firms. We first analyse a convention styled after the OECD's 'Convention on Combating Bribery of Foreign Public Officials in International Business Transactions', which requires signatory countries to proceed against firms that have bribed public officials of any foreign country. We then study the case in which the convention requires signatory countries to proceed against firms that have ...

  19. Transient Stability Improvement of IEEE 9 Bus System Using Power World Simulator

    Directory of Open Access Journals (Sweden)

    Kaur Ramandeep

    2016-01-01

    Full Text Available The improvement of transient stability of power system was one of the most challenging research areas in power engineer.The main aim of this paper was transient stability analysis and improvement of IEEE 9 bus system. These studies were computed using POWER WORLD SIMULATOR. The IEEE 9 bus system was modelled in power world simulator and load flow studies were performed to determine pre-fault conditions in the system using Newton-Raphson method. The transient stability analysis was carried out using Runga method during three-phase balanced fault. For the improvement transient stability, the general methods adopted were fast acting exciters, FACT devices and addition of parallel transmission line. These techniques play an important role in improving the transient stability, increasing transmission capacity and damping low frequency oscillations.

  20. Transaction costs and community-based natural resource management in Nepal.

    Science.gov (United States)

    Adhikari, Bhim; Lovett, Jon C

    2006-01-01

    Transaction costs in community-based resource management are incurred by households attempting to enforce property right rules over common resources similar to those inherent in private property rights. Despite their importance, transaction costs of community-based management of common pool resources (CPRs) are often not incorporated into the economic analysis of participatory resource management. This paper examines the transaction costs incurred by forest users in community forestry (CF) based on a survey of 309 households belonging to eight different forest user groups (FUGs) in the mid hills of Nepal. The analysis reveals that the average 'poor' household incurred Nepalese rupees (NRS) 1265 in transaction costs annually, while wealthier 'rich' households incurred an average of NRS 2312 per year. Although richer households bear higher proportions of such costs, transaction costs for CF management as a percentage of resource appropriation costs are higher for poorer households (26%) than those of middle-wealth (24%) or rich households (14%). There are also village differences in the level of transaction costs. The results show that transaction costs are a major component of resource management costs and vary according to socio-economic status of resource users and characteristics of the community.

  1. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2018-01-01

    A central construct in competitive strategy research is market power, the ability to raise price above marginal cost. Positioning research focuses on attempts to build, protect, and exercise market power. However, this approach contains hidden assumptions about transaction costs. Parties made worse...... off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  2. Transactive-Market-Based Operation of Distributed Electrical Energy Storage with Grid Constraints

    Directory of Open Access Journals (Sweden)

    M. Nazif Faqiry

    2017-11-01

    Full Text Available In a transactive energy market, distributed energy resources (DERs such as dispatchable distributed generators (DGs, electrical energy storages (EESs, distribution-scale load aggregators (LAs, and renewable energy sources (RESs have to earn their share of supply or demand through a bidding process. In such a market, the distribution system operator (DSO may optimally schedule these resources, first in a forward market, i.e., day-ahead, and in a real-time market later on, while maintaining a reliable and economic distribution grid. In this paper, an efficient day-ahead scheduling of these resources, in the presence of interaction with wholesale market at the locational marginal price (LMP, is studied. Due to inclusion of EES units with integer constraints, a detailed mixed integer linear programming (MILP formulation that incorporates simplified DistFlow equations to account for grid constraints is proposed. Convex quadratic line and transformer apparent power flow constraints have been linearized using an outer approximation. The proposed model schedules DERs based on distribution locational marginal price (DLMP, which is obtained as the Lagrange multiplier of the real power balance constraint at each distribution bus while maintaining physical grid constraints such as line limits, transformer limits, and bus voltage magnitudes. Case studies are performed on a modified IEEE 13-bus system with high DER penetration. Simulation results show the validity and efficiency of the proposed model.

  3. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  4. Simultaneous transmission of the IEEE 802.11 radio signal and optical Gbit Ethernet over the multimode fiber link

    Science.gov (United States)

    Maksymiuk, L.; Podziewski, A.

    2015-09-01

    In the paper we present a successful joint transmission of the IEEE 802.11 signal and an optical Gbit Ethernet over a multimode fiber based link. Most importantly, the multiplexation of both signals was performed in the optical domain. Due to the utilization of the multimode fiber the OBI noise was avoided and both channels were able to operate at the same wavelength. We prove that potential RoF link for IEEE 802.11 signal distribution may be used to additionally transmit other signals as Gbit Ethernet and therefore utilize the fiber infrastructure installed more effectively. The qualities of both the IEEE 802.11 and Ethernet transmissions fulfilled the requirements imposed by appropriate standards.

  5. 49 CFR 1180.2 - Types of transactions.

    Science.gov (United States)

    2010-10-01

    .... Transactions proposed under 49 U.S.C. 11323 involving more than one common carrier by railroad are of four... review and approval of these transactions is not necessary to carry out the rail transportation policy of... renewal of trackage rights by a rail carrier over lines owned or operated by any other rail carrier or...

  6. Electronic Business Transaction Infrastructure Analysis Using Petri Nets and Simulation

    Science.gov (United States)

    Feller, Andrew Lee

    2010-01-01

    Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…

  7. 15 CFR 908.14 - Business to be transacted in writing.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Business to be transacted in writing... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.14 Business to be transacted in writing. All business transacted with the National Oceanic and Atmospheric Administration with...

  8. Strategic R&D transactions in personalized drug development.

    Science.gov (United States)

    Makino, Tomohiro; Lim, Yeongjoo; Kodama, Kota

    2018-03-21

    Although external collaboration capability influences the development of personalized medicine, key transactions in the pharmaceutical industry have not been addressed. To explore specific trends in interorganizational transactions and key players, we longitudinally surveyed strategic transactions, comparing them with other advanced medical developments, such as antibody therapy, as controls. We found that the financing deals of start-ups have surged over the past decade, accelerating intellectual property (IP) creation. Our correlation and regression analyses identified determinants of financing deals among alliance deals, acquisition deals, patents, research and development (R&D) licenses, market licenses, and scientific papers. They showed that patents positively correlated with transactions, and that the number of R&D licenses significantly predicted financing deals. This indicates, for the first time, that start-ups and investors lead progress in personalized medicine. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  10. Real-Time Wait-Free Queues using Micro-Transactions

    DEFF Research Database (Denmark)

    Meawad, Fadi; Iyer, Karthik; Schoeberl, Martin

    2011-01-01

    This paper evaluates the applicability of transactional mem- ory to the implementation of dierent non-blocking data structures in the context of the Real-time Specication for Java. In particular, we argue that hardware support for micro-transaction allows us to implement eciently data structures...... that are often dicult to realize with the atomic operations provided by stock hardware. Our main imple- mentation platform is the Java Optimized Processor sys- tem. We report on the performance of data structures imple- mented with locks, compare and swap and micro-transactions. Our results conrm...

  11. Implementation of IEEE-1588 timing and synchronization for ATCA control and data acquisition systems

    International Nuclear Information System (INIS)

    Correia, Miguel; Sousa, Jorge; Combo, Álvaro; Rodrigues, António P.; Carvalho, Bernardo B.; Batista, António J.N.; Gonçalves, Bruno; Correia, Carlos M.B.A.; Varandas, Carlos A.F.

    2012-01-01

    Highlights: ► IEEE-1588 over Ethernet protocol is implemented for the synchronization of all clock signals of an ATCA AMC carrier module. ► The ATCA hardware consists of an AMC quad-carrier main-board with PCI Express switching. ► IEEE-1588 is to be implemented on a Virtex-6 FPGA. ► Timing signals on the ATX-AMC4-PTP are managed and routed by a crosspoint-switch implemented on a Virtex-6 FPGA. ► Each clock signal source may be independently located (on each of the AMC cards, RTM or ATCA backplane). - Abstract: Control and data acquisition (C and DA) systems for Fusion experiments are required to provide accurate timing and synchronization (T and S) signals to all of its components. IPFN adopted PICMG's Advanced Telecommunications Computing Architecture (ATCA) industry standard to develop C and DA instrumentation. ATCA was chosen not only for its high throughput characteristics but also for its high availability (HA) features which become of greater importance in steady-state operation scenarios. However, the specified ATCA clock and synchronization interface may be too limited for the timing and synchronization needs in advanced Physics experiments. Upcoming specification extensions, developed by the “xTCA for Physics” workgroups, will contemplate, among others, a complementary timing specification, developed by the PICMG xTCA for Physics IO, Timing and Synchronization Technical Committee. The IEEE-1588 Precision Time Protocol (PTP) over Ethernet is one of the protocols, proposed by the Committee, aiming for precise synchronization of clocks in measurement and control systems, based on low jitter and slave-to-slave skew criteria. The paper presents an implementation of IEEE-1588 over Ethernet, in an ATCA hardware platform. The ATCA hardware consists of an Advanced Mezzanine Card (AMC) quad-carrier front board with PCI Express switching. IEEE-1588 is to be implemented on a Virtex-6 FPGA. Ethernet connectivity with the remote master clock is located on

  12. Transaction costs, externalities and information technology in health care.

    Science.gov (United States)

    Ferguson, B; Keen, J

    1996-01-01

    This paper discusses some of the economic issues which underpin the rationale for investment in information and communications technologies (ICTs). Information imperfections lead to significant transaction costs (search, negotiating and monitoring) which in turn confer a negative externality on parties involved in exchange. This divergence in private and social costs leads to a degree of resource misallocation (efficiency loss) which, uncorrected, results in a sub-optimal outcome. Traditional solutions to this problem are to rely upon direct government action to reduce the costs of transacting between market agents, or to employ tax/subsidy measures and other legislative action to achieve the desired market outcome. Three key policy questions are raised in the context of the NHS purchaser/provider relationship. Firstly, what is the optimum level of transaction costs; secondly, can ICTs assist in lowering the level of transaction costs to the optimum level; thirdly, who should bear the investment cost in reducing the level of transaction costs? The issue of property rights in different information systems is discussed and raises interesting policy questions about how much investment should be undertaken centrally rather than devolved to a more local level. In some ways this economic framework offers a post hoc justification of why different ICT systems have been introduced at various levels of the NHS. Essentially this reduces to the problem of externalities: providing good information confers a positive externality: not providing relevant, timely and accurate information confers a negative externality, by increasing further the level of transaction costs. The crucial role which ICT systems can play lies in attempting to reduce the level of transaction costs and driving the market towards what Dahlman has described as the transaction-cost-constrained equilibrium.

  13. Comparison of IEEE383-2003 and IEC60505-2004 standards for harmonization of environmental qualification procedure of electric cable

    International Nuclear Information System (INIS)

    Kim, Jong Seog; Jeong, Sun Chul; Park, Kyung Heum; Jang, Kyung Nam

    2010-01-01

    Needs for harmonization of international equipment qualification(EQ) standards have been raised several years due to purchasing problem of nuclear equipment supplied from abroad country. To meet the regulatory requirement of domestic nuclear power plant, manufacturers have to qualify their equipment in accordance with each standard such as IEEE, IEC and RCC-E. Double qualification increase the equipment cost, which result in high construction cost. Even the unification of each standard have been discussed several years, we have got the long way to go yet. Comparison and harmonization of each international standard will give help to purchase the equipment qualified by not endorsed standard. Environmental qualification, seismic qualification and EMI/EMC qualification are major targets for harmonization. Since concern about cable qualification of 60 years life has been raised recently, harmonization of cable qualification standard also needs to be discussed. KEPRI launched a project for harmonization of EQ relative standards such as IEEE, IEC and RCC-E. A study for harmonization of IEEE323 and IEC60780 is known in progress by IEEE committee. In this paper, harmonization of international standards for cable qualification will be discussed. IEEE383 standard is qualification standard for electric cable broadly used in Asian pacific area while IEC60505 is mostly used in European area. Since these two standards have different requirements for environmental qualification of cable, problem can be happened in the plant site when they purchase cable qualified by not endorsed standard. IEEE383-2003 and IEC60505-2004 is the latest version of each standard. Comparison results and recommendations for harmonization of these two standards are introduced herein

  14. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    Science.gov (United States)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  15. Aid Effectiveness, Transaction Costs and Conditionality in the Education Sector

    Science.gov (United States)

    Ashford, Richard; Biswas, Shampa

    2010-01-01

    The reduction of transaction costs is a commonly mentioned yet rarely elaborated goal for aid effectiveness in educational development. The casual use of the concept of transaction costs conceals which costs may be reduced, which costs are required and, indeed, what transaction costs actually are. Examining issues related to harmonizing the…

  16. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  17. Two-Layer Transaction Management for Workflow Management Applications

    NARCIS (Netherlands)

    Grefen, P.W.P.J.; Vonk, J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management applications require advanced transaction management that is not offered by traditional database systems. For this reason, a number of extended transaction models has been proposed in the past. None of these models seems completely adequate, though, because workflow management

  18. Spectrum-efficient multi-channel design for coexisting IEEE 802.15.4 networks: A stochastic geometry approach

    KAUST Repository

    Elsawy, Hesham

    2014-07-01

    For networks with random topologies (e.g., wireless ad-hoc and sensor networks) and dynamically varying channel gains, choosing the long term operating parameters that optimize the network performance metrics is very challenging. In this paper, we use stochastic geometry analysis to develop a novel framework to design spectrum-efficient multi-channel random wireless networks based on the IEEE 802.15.4 standard. The proposed framework maximizes both spatial and time domain frequency utilization under channel gain uncertainties to minimize the number of frequency channels required to accommodate a certain population of coexisting IEEE 802.15.4 networks. The performance metrics are the outage probability and the self admission failure probability. We relax the single channel assumption that has been used traditionally in the stochastic geometry analysis. We show that the intensity of the admitted networks does not increase linearly with the number of channels and the rate of increase of the intensity of the admitted networks decreases with the number of channels. By using graph theory, we obtain the minimum required number of channels to accommodate a certain intensity of coexisting networks under a self admission failure probability constraint. To this end, we design a superframe structure for the coexisting IEEE 802.15.4 networks and a method for time-domain interference alignment. © 2002-2012 IEEE.

  19. Analysis Of Impact Of Various Parameters On BER Performance For IEEE 802.11b

    Directory of Open Access Journals (Sweden)

    Nilesh B. Kalani

    2015-08-01

    Full Text Available Abstract This paper discusses about IEEE 802.11b simulation model implemented using LabVIEW software and its analyses for impact on bit error rate BER for different parameters as channel type channel number data transmission rate and packet size. Audio file is being transmitted processed and analyzed using the model for various parameters. This paper gives analysis of BER verses ESN0 for various parameter like data rate packet size and communication channel for the IEEE 802.11b simulation model generated using LabVIEW. It is proved that BER can be optimized by tweaking different parameters of wireless communication system.

  20. Diseño y verificación de un amplificador para IEEE802.16

    OpenAIRE

    Lloret Arjona, Patricia

    2005-01-01

    Hace más de 6 años se empezó a gestar el IEEE802.16, un estándar para una nueva tecnología inalámbrica de banda ancha. El primer capítulo consiste en una introducción sobre este estándar, su evolución, las diferentes versiones que han ido apareciendo y las características principales de cada una de ellas, seguido de un pequeño comentario sobre su faceta comercial, WiMAX. El IEEE802.16 está empezando a tener relevancia, de modo que se decidió realizar un amplificador capaz de...

  1. Transaction based approach

    Science.gov (United States)

    Hunka, Frantisek; Matula, Jiri

    2017-07-01

    Transaction based approach is utilized in some methodologies in business process modeling. Essential parts of these transactions are human beings. The notion of agent or actor role is usually used for them. The paper on a particular example describes possibilities of Design Engineering Methodology for Organizations (DEMO) and Resource-Event-Agent (REA) methodology. Whereas the DEMO methodology can be regarded as a generic methodology having its foundation in the theory of Enterprise Ontology the REA methodology is regarded as the domain specific methodology and has its origin in accountancy systems. The results of these approaches is that the DEMO methodology captures everything that happens in the reality with a good empirical evidence whereas the REA methodology captures only changes connected with economic events. Economic events represent either change of the property rights to economic resource or consumption or production of economic resources. This results from the essence of economic events and their connection to economic resources.

  2. Distributed Global Transaction Support for Workflow Management Applications

    NARCIS (Netherlands)

    Vonk, J.; Grefen, P.W.P.J.; Boertjes, E.M.; Apers, Peter M.G.

    Workflow management systems require advanced transaction support to cope with their inherently long-running processes. The recent trend to distribute workflow executions requires an even more advanced transaction support system that is able to handle distribution. This paper presents a model as well

  3. Service differentiated and adaptive CSMA/CA over IEEE 802.15.4 for Cyber-Physical Systems.

    Science.gov (United States)

    Xia, Feng; Li, Jie; Hao, Ruonan; Kong, Xiangjie; Gao, Ruixia

    2013-01-01

    Cyber-Physical Systems (CPS) that collect, exchange, manage information, and coordinate actions are an integral part of the Smart Grid. In addition, Quality of Service (QoS) provisioning in CPS, especially in the wireless sensor/actuator networks, plays an essential role in Smart Grid applications. IEEE 802.15.4, which is one of the most widely used communication protocols in this area, still needs to be improved to meet multiple QoS requirements. This is because IEEE 802.15.4 slotted Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) employs static parameter configuration without supporting differentiated services and network self-adaptivity. To address this issue, this paper proposes a priority-based Service Differentiated and Adaptive CSMA/CA (SDA-CSMA/CA) algorithm to provide differentiated QoS for various Smart Grid applications as well as dynamically initialize backoff exponent according to traffic conditions. Simulation results demonstrate that the proposed SDA-CSMA/CA scheme significantly outperforms the IEEE 802.15.4 slotted CSMA/CA in terms of effective data rate, packet loss rate, and average delay.

  4. Outdoor Long-Range WLANs : A Lesson for IEEE 802.11ah

    NARCIS (Netherlands)

    Aust, Stefan; Venkatesha Prasad, R.; Niemegeers, Ignas G M M

    2015-01-01

    Several service applications have been reported by many who proposed the use of wireless LANs (WLANs) over a wide variety of outdoor deployments. In particular, the upcoming IEEE 802.11ah WLAN protocol will enable a longer transmission range between WLAN access points (APs) and stations (STAs) up to

  5. Commercial agencies and surrogate motherhood: a transaction cost approach.

    Science.gov (United States)

    Galbraith, Mhairi; McLachlan, Hugh V; Swales, J Kim

    2005-03-01

    In this paper we investigate the legal arrangements involved in UK surrogate motherhood from a transaction-cost perspective. We outline the specific forms the transaction costs take and critically comment on the way in which the UK institutional and organisational arrangements at present adversely influence transaction costs. We then focus specifically on the potential role of surrogacy agencies and look at UK and US evidence on commercial and voluntary agencies. Policy implications follow.

  6. Transactive Control of Commercial Buildings for Demand Response

    Energy Technology Data Exchange (ETDEWEB)

    Hao, He; Corbin, Charles D.; Kalsi, Karanjit; Pratt, Robert G.

    2017-01-01

    Transactive control is a type of distributed control strategy that uses market mechanism to engage self-interested responsive loads to achieve power balance in the electrical power grid. In this paper, we propose a transactive control approach of commercial building Heating, Ventilation, and Air- Conditioning (HVAC) systems for demand response. We first describe the system models, and identify their model parameters using data collected from Systems Engineering Building (SEB) located on our Pacific Northwest National Laboratory (PNNL) campus. We next present a transactive control market structure for commercial building HVAC system, and describe its agent bidding and market clearing strategies. Several case studies are performed in a simulation environment using Building Control Virtual Test Bed (BCVTB) and calibrated SEB EnergyPlus model. We show that the proposed transactive control approach is very effective at peak clipping, load shifting, and strategic conservation for commercial building HVAC systems.

  7. Third sector organizations in rural development: a transaction cost perspective

    Directory of Open Access Journals (Sweden)

    V. VALENTINOV

    2008-12-01

    Full Text Available In many parts of the world, rural development is supported by third sector organizations, such as nongovernmental organizations, farmer associations, and cooperatives. This essay develops a transaction cost explanation of these organizations’ role in rural areas. Since the traditional transaction cost theory is concerned with the choice of governance mechanisms within the for-profit sector, this essay adopts an alternative conceptualization of the notion of transaction cost by building on the theory of the division of labor. This theory regards transaction cost as a constraint on the division of labor causing the replacement of exchange with self-sufficiency. The proposed transaction cost explanation of rural third sector organizations consists of two arguments: 1 third sector organizations embody partial reliance on self-sufficiency; and 2 rural areas exhibit rurality-specific transaction cost acting as a constraint on the division of labor and thus creating a niche for third sector organizations. The essay concludes with suggesting a research program on developing an economic theory of the rural third sector.;

  8. HEV

    African Journals Online (AJOL)

    Moatez Billah HARIDA

    Hybrid Electrical Vehicle Model Balance Fidelity and Speed (HEVMBFS) .... introduced to the automatic control engineering community for the ..... Incorporating Engine Transient Characteristics, IEEE transactions on vehicular technology, no.

  9. 16 CFR 802.53 - Certain foreign banking transactions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Certain foreign banking transactions. 802.53 Section 802.53 Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENTS AND... foreign banking transactions. An acquisition which requires the consent or approval of the Board of...

  10. Effects of traditional land transactions on soil erosion and land degradation

    OpenAIRE

    Leduka, R.C.

    1998-01-01

    A research report on the effects of traditional land transactions on soil erosion and land degradation in Lesotho. This report focuses on the land transactions in Lesotho and how these transaction affect the growing erosion rates of the soil.

  11. Medium-term load forecasting and wholesale transaction profitability

    International Nuclear Information System (INIS)

    Selker, F.K.; Wroblewski, W.R.

    1996-01-01

    The volume of wholesale transactions quoted at firm prices is increasing. The cost, and thus profitability, of serving these contracts strongly depends upon native load during the time of delivery. However, transactions extend beyond load forecasts based on weather information, and long-term resource planning forecasts of load peaks and energy provide inadequate detail. To address this need, Decision Focus Inc. (DFI) and Commonwealth Edison (ComEd) developed a probabilistic, medium-term load forecasting capability. In this paper the authors use a hypothetical utility to explore the impact of uncertain medium-term loads on transaction profitability

  12. Performance Analysis of Non-saturated IEEE 802.11 DCF Networks

    Science.gov (United States)

    Zhai, Linbo; Zhang, Xiaomin; Xie, Gang

    This letter presents a model with queueing theory to analyze the performance of non-saturated IEEE 802.11 DCF networks. We use the closed queueing network model and derive an approximate representation of throughput which can reveal the relationship between the throughput and the total offered load under finite traffic load conditions. The accuracy of the model is verified by extensive simulations.

  13. New Evidence of the Effect of Transaction Costs on Residential Mobility

    NARCIS (Netherlands)

    Ommeren, van Jos; Leuvensteijn, van Michiel

    2002-01-01

    Transaction costs have attracted considerably attention in the theoretical literature on residential mobility. In many European countries, these costs mainly consist of ad-valorem transaction costs. In the current paper, we demonstrate empirically for the Netherlands that the transaction costs have

  14. Challenges facing transactional e-government systems

    OpenAIRE

    AI-Sebie, Madi M

    2005-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 17/10/2005. A review of normative literature, in the field of e-government, indicates that the transactional stage of e-government is one of the most important to the implementation of an e-government system as it represents the highest level of interaction within organisations and between customers and government organisations. Due to the importance of the transactional stage of the e-govern...

  15. Environmental taxes and transaction costs

    Energy Technology Data Exchange (ETDEWEB)

    Vollebergh, Herman R.J. [Centre for Economic Policy OCFEB, Erasmus University Rotterdam (Netherlands)

    1994-06-01

    A well-known tax policy principle in the case of environmental bads holds that optimality would apply to a special class of environmental taxes, the so called Pigovian or effluent taxes (or fees or charges). However, an interesting paradox arises here for effluent taxes are seldom chosen in practical policies by governments. An explanation for this discrepancy is that effluent taxes are generally supposed to bring about the highest amount of transaction costs in order to enforce this kind of tax. This would be caused by the fact that usually large numbers of agents are involved if effluents are taken as the principal tax base. Unfortunately this explanation seems to boomerang for it brings about an impossibility result: effluent taxes can never be first best taxes if transaction costs are allowed. Up till now theoretical economics has not paid much attention to this problem. In contrast this essay offers an explanation for the discrepancy and it shows why the impossibility theorem is a paradox. As soon as one allows for transaction costs in welfare analysis, one not only has to acknowledge that such costs are attached to the internalization device but also to the initial status quo. Moreover, the amount of transaction costs is not independent of the tax contracts themselves, neither are the benefits of regulation through taxation. Accordingly a more general welfare assessment of questions where it is optimal to levy environmental taxes shows that first best Pigovian taxes need not be effluent taxes (even if abatement is possible), although in some cases effluent taxes might still be the best policy option from an economic perspective. 31 refs.

  16. Environmental taxes and transaction costs

    International Nuclear Information System (INIS)

    Vollebergh, Herman R.J.

    1994-06-01

    A well-known tax policy principle in the case of environmental bads holds that optimality would apply to a special class of environmental taxes, the so called Pigovian or effluent taxes (or fees or charges). However, an interesting paradox arises here for effluent taxes are seldom chosen in practical policies by governments. An explanation for this discrepancy is that effluent taxes are generally supposed to bring about the highest amount of transaction costs in order to enforce this kind of tax. This would be caused by the fact that usually large numbers of agents are involved if effluents are taken as the principal tax base. Unfortunately this explanation seems to boomerang for it brings about an impossibility result: effluent taxes can never be first best taxes if transaction costs are allowed. Up till now theoretical economics has not paid much attention to this problem. In contrast this essay offers an explanation for the discrepancy and it shows why the impossibility theorem is a paradox. As soon as one allows for transaction costs in welfare analysis, one not only has to acknowledge that such costs are attached to the internalization device but also to the initial status quo. Moreover, the amount of transaction costs is not independent of the tax contracts themselves, neither are the benefits of regulation through taxation. Accordingly a more general welfare assessment of questions where it is optimal to levy environmental taxes shows that first best Pigovian taxes need not be effluent taxes (even if abatement is possible), although in some cases effluent taxes might still be the best policy option from an economic perspective. 31 refs

  17. 17 CFR 33.3 - Unlawful commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Unlawful commodity option... REGULATION OF DOMESTIC EXCHANGE-TRADED COMMODITY OPTION TRANSACTIONS § 33.3 Unlawful commodity option... of, or maintain a position in, any commodity option transaction subject to the provisions of this...

  18. Enhancing reliable online transaction with intelligent rule-based ...

    African Journals Online (AJOL)

    Enhancing reliable online transaction with intelligent rule-based fraud detection technique. ... These are with a bid to reducing amongst other things the cost of production and also dissuade the poor handling of Nigeria currency. The CBN pronouncement has necessitated the upsurge in transactions completed with credit ...

  19. Allocation and management issues in multiple-transaction open access transmission networks

    Science.gov (United States)

    Tao, Shu

    This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical

  20. The transaction management perspective on procurement in the era of globalization

    NARCIS (Netherlands)

    den Butter, F.A.G.

    2012-01-01

    Fragmentation of production into more and more complex supply chains is a prominent feature of globalisation. Transaction management purports to minimise the transaction costs associated with this fragmentation of production. In this era of globalisation, transaction costs carry a large weight in

  1. 31 CFR 103.25 - Reports of transactions with foreign financial agencies.

    Science.gov (United States)

    2010-07-01

    ... Finance FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Reports Required To Be Made § 103.25 Reports of transactions with foreign financial agencies. (a) Promulgation of reporting... financial institutions to file reports of certain transactions with designated foreign financial agencies...

  2. Marketable pollution permits with uncertainty and transaction costs

    International Nuclear Information System (INIS)

    Montero, Juan-Pablo

    1998-01-01

    Increasing interest in the use of marketable permits for pollution control has become evident in recent years. Concern regarding their performance still remains because empirical evidence has shown transaction costs and uncertainty to be significant in past and existing marketable permits programs. In this paper we develop theoretical and numerical models that include transaction costs and uncertainty (in trade approval) to show their effects on market performance (i.e., equilibrium price of permits and trading volume) and aggregate control costs. We also show that in the presence of transaction costs and uncertainty the initial allocation of permits may not be neutral in terms of efficiency. Furthermore, using a numerical model for a hypothetical NO x trading program in which participants have discrete control technology choices, we find that aggregate control costs and the equilibrium price of permits are sensitive to the initial allocation of permits, even for constant marginal transaction costs and certainty

  3. Proving Opacity of Transactional Memory with Early Release

    Directory of Open Access Journals (Sweden)

    Siek Konrad

    2015-12-01

    Full Text Available Transactional Memory (TM is an alternative way of synchronizing concurrent accesses to shared memory by adopting the abstraction of transactions in place of low-level mechanisms like locks and barriers. TMs usually apply optimistic concurrency control to provide a universal and easy-to-use method of maintaining correctness. However, this approach performs a high number of aborts in high contention workloads, which can adversely affect performance. Optimistic TMs can cause problems when transactions contain irrevocable operations. Hence, pessimistic TMs were proposed to solve some of these problems. However, an important way of achieving efficiency in pessimistic TMs is to use early release. On the other hand, early release is seemingly at odds with opacity, the gold standard of TM safety properties, which does not allow transactions to make their state visible until they commit. In this paper we propose a proof technique that makes it possible to demonstrate that a TM with early release can be opaque as long as it prevents inconsistent views.

  4. Transactional Infrastructure of the Economy: the Evolution of Concepts and Synthesis of Definitions

    Directory of Open Access Journals (Sweden)

    Maruschak Irina Valeryevna

    2017-03-01

    Full Text Available The overview of evolution of market infrastructure concepts is provided, the first concepts of institutional infrastructure are revealed in the paper. Evolutionarily developed narrowing of essence of infrastructure in connection with the priority analysis of its physical (material and technological components is proved. It ignores the fact that transactional resources, being drivers (driving forces of economic systems evolution, in turn evolve, becoming harder and harder, combining increase in efficiency of the elements and strengthening of heterogeneity and discrepancy of their structure. Transactional evolution of economy in general and evolution of separate transactional resources of production are the perspective directions of the special analysis. Transactional infrastructure is considered as the integrated complex of institutional, organizational (relational and information infrastructures. The problems of the first concepts of transactional infrastructure connected with difficulties of differentiation of its subsystems always operating jointly are revealed. Prospect of transition from the isolated analysis of separate resources of transactional type (institutes, organizations, information, social capital, trust, etc. to studying corresponding specific software infrastructures and to the system analysis of integrated transactional infrastructure of economy are argued. The transactional sector (as set of the specialized industries and the appropriate collective and individual subjects providing with resources market transaction is offered to be considered as transactional structure of economy. Transactional infrastructure is treated as critically significant factor of economic evolution which in the conditions of post-industrial type of economy gradually purchases transactional nature.

  5. Transactional Sex among Noninjecting Illicit Drug Users: Implications for HIV Transmission

    Directory of Open Access Journals (Sweden)

    Rafael Alves Guimarães

    2016-01-01

    Full Text Available Noninjecting illicit drug users (NIDUs present high risk for HIV infection, due especially to transactional sex. This study aimed to estimate the prevalence and risk factors for transactional sex among NIDUs in the Southwest region of Goiás State, Central Brazil. The prevalence of self-reported transactional sex was 22.8%. Prevalence in women and men was 52.7% and 16.8%, respectively, a significant difference (p<0.001. Crack use and history of sexually transmitted infections (STI were risk factors for transactional sex in men. Homelessness, crack use, sex under the influence of drugs, and history of sexual violence were risk factors for transactional sex in women. A high prevalence of transactional sex was observed among NIDUs. This risk behavior may contribute to the high rates of HIV among this population and their social networks and in the general population.

  6. IEEE Std 381-1977: IEEE standard criteria for type tests of Class 1E modules used in nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This document describes the basic requirements of a type test program with the objective of verifying that a module used as Class 1E equipment in a nuclear power generating station meets or exceeds its design specifications. This document is limited to class 1E modules from and including the sensor through the logic circuitry of the final actuation devices. Except for those that are part of a module, switchgear, cables, connections, motors, valve actuators, station batteries, and penetrations are not included and are covered by other IEEE documents. The purpose of this document is to supplement the procedures and requirements given in IEEE Std 323-1974 [24] for type testing Class 1E modules, thereby providing directions for establishment of a type test program which will obtain the required test data and yield the required documentation of test methods and results. This standard is structured to present to the user the principal performance characteristics and environmental parameters which must be considered in designing a type test program for any give Class 1E module. These modules range from tiny sensors to complete racks or cabinets full of equipment that may be located inside or outside containment. The Class 1E modules are required to perform their function before, during, or after, or all, any design basis event specified for the module. The vast variety of modules covered by this document precludes the listing here of specific requirements for each type test

  7. Measuring the Influence of Networks on Transaction Costs Using a Nonparametric Regression Technique

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian H.C.A.

    All business transactions as well as achieving innovations take up resources, subsumed under the concept of transaction costs. One of the major factors in transaction costs theory is information. Firm networks can catalyse the interpersonal information exchange and hence, increase the access to non......-public information so that transaction costs are reduced.Many resources that are sacrificed for transaction costs are inputs that also enter the technical production process. As most production data do not distinguish between these two usages of inputs, high transaction costs result in reduced observed productivity...

  8. Transactional Sex among Noninjecting Illicit Drug Users: Implications for HIV Transmission.

    Science.gov (United States)

    Guimarães, Rafael Alves; Rodovalho, Aurélio Goulart; Fernandes, Inaina Lara; Silva, Graciele Cristina; de Felipe, Rodrigo Lopes; Vera, Ivânia; Gregório, Valéria Duarte; Lucchese, Roselma

    2016-01-01

    Noninjecting illicit drug users (NIDUs) present high risk for HIV infection, due especially to transactional sex. This study aimed to estimate the prevalence and risk factors for transactional sex among NIDUs in the Southwest region of Goiás State, Central Brazil. The prevalence of self-reported transactional sex was 22.8%. Prevalence in women and men was 52.7% and 16.8%, respectively, a significant difference (p drugs, and history of sexual violence were risk factors for transactional sex in women. A high prevalence of transactional sex was observed among NIDUs. This risk behavior may contribute to the high rates of HIV among this population and their social networks and in the general population.

  9. 17 CFR 32.3 - Unlawful commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Unlawful commodity option... REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.3 Unlawful commodity option transactions. (a) On and after... extend credit in lieu thereof) from an option customer as payment of the purchase price in connection...

  10. 12 CFR 370.4 - Transaction Account Guarantee Program.

    Science.gov (United States)

    2010-01-01

    ... GENERAL POLICY TEMPORARY LIQUIDITY GUARANTEE PROGRAM § 370.4 Transaction Account Guarantee Program. (a) In addition to the coverage afforded to depositors under 12 CFR Part 330, a depositor's funds in a noninterest... determining whether funds are in a noninterest-bearing transaction account for purposes of this section, the...

  11. IEEE 8023 ethernet, current status and future prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging. 8 Refs.

  12. Problems and solutions in application of IEEE standards at Savannah River Site, Department of Energy (DOE) nuclear facilities

    International Nuclear Information System (INIS)

    Lee, Y.S.; Bowers, T.L.; Chopra, B.J.; Thompson, T.T.; Zimmerman, E.W.

    1993-01-01

    The Department of Energy (DOE) Nuclear Material Production Facilities at the Savannah River Site (SRS) were designed, constructed, and placed into operation in the early 1950's, based on existing industry codes/standards, design criteria, analytical procedures. Since that time, DOE has developed Orders and Polices for the planning, design and construction of DOE Nuclear Reactor Facilities which invoke or reference commercial nuclear reactor codes and standards. The application of IEEE reactor design requirements such as Equipment Qualification, Seismic Qualification, Single Failure Criteria, and Separation Requirement, to non-reactor facilities has been a problem since the IEEE reactor criteria do not directly confirm to the needs of non-reactor facilities. SRS Systems Engineering is developing a methodology for the application of IEEE Standards to non-reactor facilities at SRS

  13. 2008 Annual Report of SGCC on Electricity Market Transactions

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    On April 14,2009,the State Grid Corporation of China (SGCC) held the press conference in Beijing on electricity market transactions and then released the "2008 Annual Report of SGCC on Electricity Market Transactions".

  14. Integration of IEEE 1451 and HL7 exchanging information for patients' sensor data.

    Science.gov (United States)

    Kim, Wooshik; Lim, Suyoung; Ahn, Jinsoo; Nah, Jiyoung; Kim, Namhyun

    2010-12-01

    HL7 (Health Level 7) is a standard developed for exchanging incompatible healthcare information generated from programs or devices among heterogenous medical information systems. At present, HL7 is growing as a global standard. However, the HL7 standard does not support effective methods for treating data from various medical sensors, especially from mobile sensors. As ubiquitous systems are growing, HL7 must communicate with various medical transducers. In the area of sensor fields, IEEE 1451 is a group of standards for controlling transducers and for communicating data from/to various transducers. In this paper, we present the possibility of interoperability between the two standards, i.e., HL7 and IEEE 1451. After we present a method to integrate them and show the preliminary results of this approach.

  15. A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN

    Directory of Open Access Journals (Sweden)

    Chang-Seop Park

    2015-01-01

    Full Text Available A new key management and security scheme is proposed to integrate Layer Two (L2 and Layer Three (L3 keys for secure and fast Mobile IPv6 handover over IEEE 802.11 Wireless Local Area Network (WLAN. Unlike the original IEEE 802.11-based Mobile IPv6 Fast Handover (FMIPv6 that requires time-consuming IEEE 802.1x-based Extensible Authentication Protocol (EAP authentication on each L3 handover, the newly proposed key management and security scheme requires only one 802.1x-EAP regardless of how many L3 handovers occur. Therefore, the proposed scheme reduces the handover latency that results from a lengthy 802.1x-based EAP. The proposed key management and security scheme is extensively analyzed in terms of security and performance, and the proposed security scheme is shown to be more secure than those that were previously proposed.

  16. The Econometric Procedures of Specific Transaction Identification

    Directory of Open Access Journals (Sweden)

    Doszyń Mariusz

    2017-06-01

    Full Text Available The paper presents the econometric procedures of identifying specific transactions, in which atypical conditions or attributes may occur. These procedures are based on studentized and predictive residuals of the accordingly specified econometric models. The dependent variable is a unit transactional price, and explanatory variables are both the real properties’ attributes and accordingly defined artificial binary variables. The utility of the proposed method has been verified by means of a real market data base. The proposed procedures can be helpful during the property valuation process, making it possible to reject real properties that are specific (both from the point of view of the transaction conditions and the properties’ attributes and, consequently, to select an appropriate set of similar attributes that are essential for the valuation process.

  17. Basic security measures for IEEE 802.11 wireless networks

    OpenAIRE

    Sarmiento, Oscar P.; Guerrero, Fabio G.; Rey Argote, David

    2008-01-01

    This article presents a tutorial/discussion of three commonly-used IEEE 802.11 wireless network security standards: WEP, WPA and WPA2. A detailed analysis of the RC4 algorithm supporting WEP is presented, including its vulnerabilities. The WPA and WPA2 encryption protocols’ most relevant aspects and technical characteristics are reviewed for a comparative analysis of the three standards in terms of the security they provide. Special attention has been paid to WEP encryption by using an educat...

  18. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  19. Sampling returns for realized variance calculations: tick time or transaction time?

    NARCIS (Netherlands)

    Griffin, J.E.; Oomen, R.C.A.

    2008-01-01

    This article introduces a new model for transaction prices in the presence of market microstructure noise in order to study the properties of the price process on two different time scales, namely, transaction time where prices are sampled with every transaction and tick time where prices are

  20. IEEE C37.98-1987: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in IEEE Std 344-1987. To define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general, they are (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay that constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new application, then proof testing must be performed for that new case

  1. IEEE C37.98-1978: IEEE standard seismic testing of relays

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard specifies the procedures to be used in the seismic testing of relays used in power system facilities. The standard is concerned with the determination of the seismic fragility level of relays and also gives recommendations for proof testing. The purpose of this standard is to establish procedures for determining the seismic capabilities of protective and auxiliary relays. These procedures employ what has been called fragility testing in ANSI/IEEE Std 344-1975, Recommended Practices for Seismic Qualification of Class 1E Equipment for Nuclear Power Generating Stations. In order to define the conditions for fragility testing of relays, parameters in three separate areas must be specified. In general they are: (1) the electrical settings and inputs to the relay, and other information to define its conditions during the test; (2) the change in state, deviation in operating characteristics or tolerances, or other change of performance of the relay which constitutes failure; (3) the seismic vibration environment to be imposed during the test. Since it is not possible to define the conditions for every conceivable application for all relays, those parameters, which in practice encompass the majority of applications, have been specified in this standard. When the application of the relay is other than as specified under any of (1), (2), and (3), or if it is not practical to apply existing results of fragility tests to that new case

  2. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias; Kuhn, Alexander; Engelke, Wito; Theisel, Holger

    2012-01-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall

  3. 17th IEEE NPSS Real Time Conference – RT-2010

    CERN Multimedia

    Carlos Varandas

    2010-01-01

    Congress Centre of “Instituto Superior Técnico”, Lisboa, Portugal, 24-28 May, 2010 ABSTRACT SUBMISSION OPEN Abstract Submission Deadline: March 1st, 2010 Dear Sir/Madam, We are pleased to announce that abstract submission for the 17th IEEE NPSS Real Time Conference is now open on our web site. The deadline for submitting an abstract is 1st March 2010. Full conference details General Chairman

  4. Leveraged Public to Private Transactions in the UK

    NARCIS (Netherlands)

    Renneboog, L.D.R.; Simons, T.; Wright, M.

    2005-01-01

    This paper examines the magnitude and the sources of the expected shareholder gains in UK public to private transactions (PTPs) in the second wave from 1997-2003.Pre-transaction shareholders on average receive a premium of 40% and the share price reaction to the PTP announcement is about 30%.The

  5. Incorporating antenna beamswitching technique into drivers for IEEE802.11 WLAN devices

    CSIR Research Space (South Africa)

    Mofolo, M

    2015-11-23

    Full Text Available the beamswitching technique for switched parasitic array (SPA) and electronically steerable parasitic array radiator (ESPAR) antennas in the drivers for IEEE802.11 WLAN devices. The modifications of the open source drivers (ath5k and ath9k) to enable real...

  6. How vulnerable is the emissions market to transaction costs?: An ABMS Approach

    International Nuclear Information System (INIS)

    Lee, Kangil; Han, Taek-Whan

    2016-01-01

    The impact of transaction costs on the early emissions trading market is examined by applying an agent-based model and simulation (ABMS) approach. For a realistic model set up, bounded rationality, stochastic characteristics, and learning-by-doing are considered in our search processes. Marginal abatement cost parameters are obtained from Yoo et al. (2010), which is an experimental study on the emissions trading in the Korean power sector. Sensitivity analyses are performed on market performance indices with regard to transaction cost parameters, which represent scales and the learning elasticities of transaction costs. A total of 960 simulations were run in this sensitivity analysis. Sensitivity analysis results consistently show that higher transaction costs worsen market performance. The most remarkable finding in these results is that welfare performance of all the transactions decreases by up to 50% as the scale parameters of transaction costs increase, implying that welfare gain from introducing emissions trading disappears significantly. However, with learning curve effect, welfare performance could be regained by up to 26%. In sum, although transaction costs significantly encroach upon trade gains at the early stage, based on our simulation results, the welfare loss by way of transaction costs is lessened as the knowledge of market participants progresses. - Highlights: • Impact of transaction costs on small and early, primitive emissions trading market • Bounded Rationality (BR) and Zero Intelligence Plus (ZIP) agents concept • Marginal Abatement Cost (MAC) parameters delineate Korean power companies • With transaction costs, welfare gain from trade found to be shrunken • As learning proceeds, welfare loss is reduced

  7. An improved IEEE 802.11 protocol for reliable data transmission in power distribution fault diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Campoccia, F.; Di Silvestre, M.L.; Sanseverino, E.R.; Zizzo, G. [Palermo Univ., Palermo (Italy)

    2010-10-15

    In power systems, on-line transmission between local units and the central unit can be done by means of power line communications or wireless technology. During an electrical fault, the reliability of the distribution system depends on the security of the timely protective and restorative actions on the network. This paper focused on the WiFi system because of its economy and ease of installation. However, WiFi systems are typically managed by the IEEE 802.11 protocol, which is not reliable in terms of security in data communication. In WiFi networks, data is divided into packets and sent in succession to reduce errors within the radio channel. The IEEE 802.11 protocol has high probability for loss of packets or delay in their transmission. In order to ensure the reliability of data transmission times between two terminal units connected by WiFi stations, a new protocol was derived by modifying the IEEE 802.11. The improvements of the new protocol were highlighted and its capability for the diagnostic service was verified. The modified protocol eliminates the danger of collisions between packets and optimizes the transmission time for sending information. 6 refs., 7 tabs., 8 figs.

  8. Strategies for Optimal MAC Parameters Tuning in IEEE 802.15.6 Wearable Wireless Sensor Networks.

    Science.gov (United States)

    Alam, Muhammad Mahtab; Ben Hamida, Elyes

    2015-09-01

    Wireless body area networks (WBAN) has penetrated immensely in revolutionizing the classical heath-care system. Recently, number of WBAN applications has emerged which introduce potential limits to existing solutions. In particular, IEEE 802.15.6 standard has provided great flexibility, provisions and capabilities to deal emerging applications. In this paper, we investigate the application-specific throughput analysis by fine-tuning the physical (PHY) and medium access control (MAC) parameters of the IEEE 802.15.6 standard. Based on PHY characterizations in narrow band, at the MAC layer, carrier sense multiple access collision avoidance (CSMA/CA) and scheduled access protocols are extensively analyzed. It is concluded that, IEEE 802.15.6 standard can satisfy most of the WBANs applications throughput requirements by maximum achieving 680 Kbps. However, those emerging applications which require high quality audio or video transmissions, standard is not able to meet their constraints. Moreover, delay, energy efficiency and successful packet reception are considered as key performance metrics for comparing the MAC protocols. CSMA/CA protocol provides the best results to meet the delay constraints of medical and non-medical WBAN applications. Whereas, the scheduled access approach, performs very well both in energy efficiency and packet reception ratio.

  9. Understanding the application of OSC policy 9.1 during a takeover transaction

    International Nuclear Information System (INIS)

    Hayduk, M.F.; Rasmuson, M.A.

    1998-01-01

    Legal aspects of ownership of publicly traded companies in Canada are explored, with particular emphasis on transactions involving 'related parties'. In this context, Policy 9.1 of the Ontario Securities Commission is examined. The policy seeks to enhance minority shareholder protection by providing for independent valuation, majority of minority approval, enhanced disclosure and review of substantial transactions by independent directors. This paper focuses on four types of transactions governed by Policy 9.1, i.e. insider bids, issuer bids, going private transactions, related party transactions and the recent proposed rule reformulation proposed by the Ontario Securities Commission (OSC)

  10. Providing hedging protection for the transaction

    International Nuclear Information System (INIS)

    Richardson, D.W.

    1999-01-01

    This presentation dealt with methods for assessing commodity price risk in an asset transaction; the setting of risk management objectives; building hedging into the financing; and internal reporting and accounting to mitigate trading risks. It also provided some recent examples of successful hedging in gas asset transactions. The objectives of risk management and the nature of hedging and speculation were explored. An approach to price risk management was proposed. The development of price risk management tools, and techniques for managing risks involving interest rates, foreign exchange, and commodities were examined. figs

  11. A transactional framework for pediatric rehabilitation: shifting the focus to situated contexts, transactional processes, and adaptive developmental outcomes.

    Science.gov (United States)

    King, Gillian; Imms, Christine; Stewart, Debra; Freeman, Matt; Nguyen, Tram

    2018-07-01

    A paradigm shift is taking place in pediatric rehabilitation research, practice, and policy - a shift towards the real-life contexts of clients rather than requiring clients to navigate the world of pediatric rehabilitation. This article proposes a conceptual framework to bring about a broader awareness of clients' lives and transactional processes of change over the life course. The framework draws attention to transactional processes by which individuals, situated in life contexts, change and adapt over the life course and, in turn, influence their contextual settings and broader environments. This framework is based on (a) basic tenets derived from foundational theories taking a life course perspective to change, and (b) transactional processes identified from relevant pediatric rehabilitation models that bring these foundational theories into the pediatric rehabilitation sphere. The framework identifies three types of transactional processes relevant to pediatric rehabilitation: facilitative, resiliency, and socialization processes. These processes describe how contexts and people mutually influence each other via opportunities and situated experiences, thus facilitating capacity, adaptation to adversity, and socialization to new roles and life transitions. The utility of the framework is considered for research, practice, service organizations, and policy. Implications for Rehabilitation The framework supports practitioners going beyond person and environment as separate entities, to provide services to the "situated person" in real-life contexts The framework shifts the focus from "body structures/functions" and "person in activity" to "person in changing and challenging life contexts" Working from a transactional perspective, practitioner-client conversations will change; practitioners will view client situations through a lens of opportunities and experiences, assess client experiences in real-life contexts, and strive to create context-based therapy

  12. Michigan/Air Force Research Laboratory (AFRL) Collaborative Center in Control Science (MACCCS)

    Science.gov (United States)

    2016-09-01

    pp. 143-156, April 2014. 15. M. Faied and A. Girard. Game Formulation of Multi-Team Target Assignment and Suppression Mission. IEEE Transactions on...19. J. Jackson, M. Faied , P. Kabamba and A. Girard. Distributed Constrained Minimum-Time Schedules in Networks of Arbitrary Topology. IEEE...December 2012. 23. J. Jackson, M. Faied , A. Girard. Comparison of Tabu/2-opt Heuristic and Optimal Tree Search Method for Assignment Problems

  13. Wireless Power Control for Tactical MANET: Power Rate Bounds

    Science.gov (United States)

    2016-09-01

    J; P. Hande; T. Lan; C. W. Tan [2008] Power Control in Cellular Networks, Now Publishers Inc., Hanover, MA. 12. Chaves, Fabiano de Sousa; F. R. P...Asymptotically Fast Convergence, IEEE Selected Areas in Communications, 18(3). 36. Jian, Tao; Nicholas D. Sidiropoulos; Georgios B. Giannakis [2003] Kalman...Power Control and Its Imperfections in CDMA Cellular Systems, IEEE Transactions on Vehicular Technologies, 48, pages 1706–1777. 75. Tan , Chee Wei

  14. ESTIMATING LEAF AREA INDEX FOR AN ARID REGION USING ...

    African Journals Online (AJOL)

    Prof. Adipala Ekwamu

    Department of Geography and Earth Science, University of Nebraska at Kearney, Kearney, NE 68849, USA. 1CPWD, Nirman Bhawan, New Delhi-110011, India .... Research Institute, Jodhpur, Rajasthan following ..... IEEE Transactions on.

  15. A distributed scheme to manage the dynamic coexistence of IEEE 802.15.4-based health-monitoring WBANs.

    Science.gov (United States)

    Deylami, Mohammad N; Jovanov, Emil

    2014-01-01

    The overlap of transmission ranges between wireless networks as a result of mobility is referred to as dynamic coexistence. The interference caused by coexistence may significantly affect the performance of wireless body area networks (WBANs) where reliability is particularly critical for health monitoring applications. In this paper, we analytically study the effects of dynamic coexistence on the operation of IEEE 802.15.4-based health monitoring WBANs. The current IEEE 802.15.4 standard lacks mechanisms for effectively managing the coexistence of mobile WBANs. Considering the specific characteristics and requirements of health monitoring WBANs, we propose the dynamic coexistence management (DCM) mechanism to make IEEE 802.15.4-based WBANs able to detect and mitigate the harmful effects of coexistence. We assess the effectiveness of this scheme using extensive OPNET simulations. Our results indicate that DCM improves the successful transmission rates of dynamically coexisting WBANs by 20%-25% for typical medical monitoring applications.

  16. BOB-RED queue management for IEEE 802.15.4 wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Wu Jean-Lien

    2011-01-01

    Full Text Available Abstract Multimedia services over resource constrained wireless sensor networks (WSNs face a performance bottleneck issue from the gateway node to the sink node. Therefore, the queue management at the gateway node is crucial for diversified messages conveyed from the front nodes to the sink node. In this article, beacon order-based random early detection (BOB-RED queue management is proposed. BOB-RED is a dynamic adaptation scheme based on adjusting beacon interval and superframe duration in the IEEE 802.15.4 MAC superframe accompanied with RED queue management scheme to increase the transmission efficiency of multimedia over WSNs. We focus on the performance improvement upon different traffic loads over WSNs. Evaluation metrics include end-to-end delay, packet delivery ratio, and energy consumption in IEEE 802.15.4 beacon enabled mode. Simulation results show that BOB-RED can effectively decrease end-to-end delay and energy consumption compared to the DropTail scheme.

  17. Hybrid Polling Method for Direct Link Communication for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2008-10-01

    Full Text Available The direct link communication between STAtions (STAs is one of the techniques to improve the MAC performance of IEEE 802.11 infrastructure networks. For the efficient direct link communication, in the literature, the simultaneous polling method was proposed to allow the multiple direct data communication to be performed simultaneously. However, the efficiency of the simultaneous polling method is affected by the interference condition. To alleviate the problem of the lower polling efficiency with the larger interference range, the hybrid polling method is proposed for the direct link communication between STAs in IEEE 802.11 infrastructure networks. By the proposed polling method, we can integrate the sequential and simultaneous polling methods properly according to the interference condition. Numerical examples are also presented to show the medium access control (MAC performance improvement by the proposed polling method.

  18. DETERMINANTS OF RURAL FARMERS PREFERENCE FOR CASH-LESS TRANSACTIONS IN IMO STATE

    Directory of Open Access Journals (Sweden)

    Igwe Ikenna UKOHA

    2017-04-01

    Full Text Available The preference for cash-less transaction by Nigerians cannot be exaggerated, but despite its patronage, there exist limited access and utilization of the cash-less technologies among farmers in South-East Nigeria. The study analysed the determinants of rural farmers’ preference for cash-less transactions in Imo state, South-East Nigeria. Multi-stage sampling technique was employed in selection of 100 farmers for the study. The determinant of rural farmers’ preference for cash-less transactions in Imo State, was achieved using logit model. The result of the analysis showed that age (5%, gender (10% education levels of the farmers (1%, user friendliness of technologies (5%, transaction charge (5% and security of transactions (5% were found to be the major determinants of farmers preference for cash-less transactions based on their levels of significance. Centred on the findings, the study recommended the strengthening of the use of cash-less transaction by farmers by providing a favourable financial environment through better orientation programs, so as to enable a smooth transition from a cash-based economy to cash-less economy.

  19. Corporate Governance and Related Parties Transactions - Evidence from Romanian Listed Companies

    Directory of Open Access Journals (Sweden)

    Iuliana Oana MIHAI

    2017-06-01

    Full Text Available The objective of this work is to offer contributions to improve the understanding of related party transactions. Our goal is to explore the role of related party transactions from the perspective of company�s corporate governance environment. Even though there is a growing interest in related party transactions, there is little academic literature to understand the nature of related party transactions and their economic consequences. Our study was conducted on a sample of 40 companies listed companies on Bucharest Stock Exchange activating in manuafacuring sector. Our objective was to analyse the way the companies follow the requirements of transparency of related party transaction. Based on our observations on companies� financial reports and companies web-sites, the level of transparency between these companies was reflected by an index estimated from producers� scores on Likert-type scales (one to five that showed to what extent they disclose or not disclose information such as relationship between parents and subsidiaries, key management personnel compensation, the value of transactions with related parties or separate disclosure for the group entities.

  20. IEEE Std 649-1980: IEEE standard for qualifying Class 1E motor control centers for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic principles, requirements, and methods for qualifying Class 1E motor control centers for outside containment applications in nuclear power generating stations. Qualification of motor control centers located inside containment in a nuclear power generating station is beyond the scope of this standard. The purpose of this standard is (1) to define specific qualification requirements for Class 1E motor control centers in accordance with the more general qualification requirements of IEEE Std 323-1974, IEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations; (2) to provide guidance in establishing a qualification program for demonstrating the design adequacy of Class 1E motor control centers in nuclear power generating station applications

  1. A survey on the history of transaction management: from flat to grid transactions

    NARCIS (Netherlands)

    Wang, T.; Vonk, J.; Kratz, B.; Grefen, P.W.P.J.

    2008-01-01

    Transactions have been around since the Seventies to provide reliable information processing in automated information systems. Originally developed for simple ‘debit-credit’ style database operations in centralized systems, they have moved into much more complex application domains including aspects

  2. Context-aware Recommender Systems for Learning: a Survey and Future Challenges

    NARCIS (Netherlands)

    Verbert, Katrien; Manouselis, Nikos; Xavier, Ochoa; Wolpers, Martin; Drachsler, Hendrik; Ivana, Bosnic; Erik, Duval

    2011-01-01

    Verbert, K., Manouselis, N., Xavier, O., Wolpers, M., Drachsler, H., Bosnic, I., & Duval, E. (accepted). Context-aware Recommender Systems for Learning: a Survey and Future Challenges. IEEE Transactions on Learning Technologies (TLT).

  3. 24 CFR 100.110 - Discriminatory practices in residential real estate-related transactions.

    Science.gov (United States)

    2010-04-01

    ... residential real estate-related transactions. 100.110 Section 100.110 Housing and Urban Development... Discrimination in Residential Real Estate-Related Transactions § 100.110 Discriminatory practices in residential real estate-related transactions. (a) This subpart provides the Department's interpretation of the...

  4. IEEE 802.11 ECG monitoring system.

    Science.gov (United States)

    Tejero-Calado, Juan; Lopez-Casado, Carmen; Bernal-Martin, Antonio; Lopez-Gomez, Miguel; Romero-Romero, Marco; Quesada, Guillermo; Lorca, Julio; Rivas, Ramon

    2005-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. This kind of devices favours at-home hospitalization, reducing the affluence to sanitary assistance centers to make routine controls. This fact causes a really favourable social impact, especially for elder people, rural-zone inhabitant, chronic patients and handicapped people. Furthermore, it offers new functionalities to physicians and will reduce the sanitary cost. Among these functionalities, biomedical signals can be sent to other devices (screen, PDA, PC...) or processing centers, without restricting the patients' mobility. The aim of this project is the development and implementation of a reduced size multi-channel electrocardiograph based on IEEE 802.11, which allows wireless monitoring of patients, and the insertion of the information into the TCP/IP Hospital network.

  5. A TRANSACTION COST ANALYSIS OF MICROPAYMENTS IN MOBILE COMMERCE

    Directory of Open Access Journals (Sweden)

    Daniel Gille

    2012-07-01

    Full Text Available Personalised, location-related and differentiated services in the mobile digitaleconomy create a demand for suitable pricing models. In the case of disaggregated“microservices” (e.g., small digitalized information or service units, as well as for theacquisition of low-value physical goods, the deployment of micropayments seemsappropriate.This paper analyzes the economic efficiency of marginal transaction amounts in the mcommercearea by applying the theoretical approach of transaction cost economics. Forthis purpose, a separation of technical and cognitive transaction costs is applied. Theinfluence of selected determinants such as specifity, uncertainty and bounded rationality ontransaction costs in mobile commerce micropayments is analyzed. The result is a morelikely application of micropayments for physical goods such as beverages or parking ticketsthan for digital goods and services, given the theoretical assumptions of the model. Inaddition, indicators for a significant above-zero lower limit of transaction amounts inmobile commerce are presented.

  6. Measuring the influence of networks on transaction costs using a non-parametric regression technique

    DEFF Research Database (Denmark)

    Henningsen, Géraldine; Henningsen, Arne; Henning, Christian H.C.A.

    All business transactions as well as achieving innovations take up resources, subsumed under the concept of transaction costs. One of the major factors in transaction costs theory is information. Firm networks can catalyse the interpersonal information exchange and hence, increase the access to non......-public information so that transaction costs are reduced. Many resources that are sacrificed for transaction costs are inputs that also enter the technical production process. As most production data do not distinguish between these two usages of inputs, high transaction costs result in reduced observed productivity...

  7. FASTBUS simulation tools

    International Nuclear Information System (INIS)

    Dean, T.D.; Haney, M.J.

    1991-10-01

    A generalized model of a FASTBUS master is presented. The model is used with simulation tools to aid in the specification, design, and production of FASTBUS slave modules. The model provides a mechanism to interact with the electrical schematics and software models to predict performance. The model is written in the IEEE std 1076-1987 hardware description language VHDL. A model of the ATC logic is also presented. VHDL was chosen to provide portability to various platforms and simulation tools. The models, in conjunction with most commercially available simulators, will perform all of the transactions specified in IEEE std 960-1989. The models may be used to study the behavior of electrical schematics and other software models and detect violations of the FASTBUS protocol. For example, a hardware design of a slave module could be studied, protocol violations detected and corrected before committing money to prototype development. The master model accepts a stream of high level commands from an ASCII file to initiate FASTBUS transactions. The high level command language is based on the FASTBUS standard routines listed in IEEE std 1177-1989. Using this standard-based command language to direct the model of the master, hardware engineers can simulate FASTBUS transactions in the language used by physicists and programmers to operate FASTBUS systems. 15 refs., 6 figs

  8. 31 CFR 585.513 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 585.513 Section 585.513 Money and Finance: Treasury Regulations Relating to Money and... Transactions related to telecommunications authorized. (a) All transactions of U.S. common carriers with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized...

  9. 31 CFR 586.510 - Transactions related to telecommunications authorized.

    Science.gov (United States)

    2010-07-01

    ... telecommunications authorized. 586.510 Section 586.510 Money and Finance: Treasury Regulations Relating to Money and... Licensing Policy § 586.510 Transactions related to telecommunications authorized. All transactions with respect to the receipt and transmission of telecommunications involving the FRY (S&M) are authorized. This...

  10. A Template Model for Multidimensional Inter-Transactional Association Rules

    NARCIS (Netherlands)

    Feng, L.; Yu, J.X.; Lu, H.J.; Han, J.W.

    2002-01-01

    Multidimensional inter-transactional association rules extend the traditional association rules to describe more general associations among items with multiple properties across transactions. “After McDonald and Burger King open branches, KFC will open a branch two months later and one mile away��?

  11. 31 CFR 515.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 515.404 Section 515.404 Money and Finance: Treasury Regulations Relating to Money and Finance... transaction were in no way affiliated or associated with each other. ...

  12. 31 CFR 500.404 - Transactions between principal and agent.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions between principal and agent. 500.404 Section 500.404 Money and Finance: Treasury Regulations Relating to Money and Finance... transaction were in no way affiliated or associated with each other. ...

  13. Modeling an Application's Theoretical Minimum and Average Transactional Response Times

    Energy Technology Data Exchange (ETDEWEB)

    Paiz, Mary Rose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    The theoretical minimum transactional response time of an application serves as a ba- sis for the expected response time. The lower threshold for the minimum response time represents the minimum amount of time that the application should take to complete a transaction. Knowing the lower threshold is beneficial in detecting anomalies that are re- sults of unsuccessful transactions. On the converse, when an application's response time falls above an upper threshold, there is likely an anomaly in the application that is causing unusual performance issues in the transaction. This report explains how the non-stationary Generalized Extreme Value distribution is used to estimate the lower threshold of an ap- plication's daily minimum transactional response time. It also explains how the seasonal Autoregressive Integrated Moving Average time series model is used to estimate the upper threshold for an application's average transactional response time.

  14. Hardware Timestamping for an Image Acquisition System Based on FlexRIO and IEEE 1588 v2 Standard

    Science.gov (United States)

    Esquembri, S.; Sanz, D.; Barrera, E.; Ruiz, M.; Bustos, A.; Vega, J.; Castro, R.

    2016-02-01

    Current fusion devices usually implement distributed acquisition systems for the multiple diagnostics of their experiments. However, each diagnostic is composed by hundreds or even thousands of signals, including images from the vessel interior. These signals and images must be correctly timestamped, because all the information will be analyzed to identify plasma behavior using temporal correlations. For acquisition devices without synchronization mechanisms the timestamp is given by another device with timing capabilities when signaled by the first device. Later, each data should be related with its timestamp, usually via software. This critical action is unfeasible for software applications when sampling rates are high. In order to solve this problem this paper presents the implementation of an image acquisition system with real-time hardware timestamping mechanism. This is synchronized with a master clock using the IEEE 1588 v2 Precision Time Protocol (PTP). Synchronization, image acquisition and processing, and timestamping mechanisms are implemented using Field Programmable Gate Array (FPGA) and a timing card -PTP v2 synchronized. The system has been validated using a camera simulator streaming videos from fusion databases. The developed architecture is fully compatible with ITER Fast Controllers and has been integrated with EPICS to control and monitor the whole system.

  15. The consequences of hospital autonomization in Colombia: a transaction cost economics analysis.

    Science.gov (United States)

    Castano, Ramon; Mills, Anne

    2013-03-01

    Granting autonomy to public hospitals in developing countries has been common over recent decades, and implies a shift from hierarchical to contract-based relationships with health authorities. Theory on transactions costs in contractual relationships suggests they stem from relationship-specific investments and contract incompleteness. Transaction cost economics argues that the parties involved in exchanges seek to reduce transaction costs. The objective of this research was to analyse the relationships observed between purchasers and the 22 public hospitals of the city of Bogota, Colombia, in order to understand the role of relationship-specific investments and contract incompleteness as sources of transaction costs, through a largely qualitative study. We found that contract-based relationships showed relevant transaction costs associated mainly with contract incompleteness, not with relationship-specific investments. Regarding relationships between insurers and local hospitals for primary care services, compulsory contracting regulations locked-in the parties to the contracts. For high-complexity services (e.g. inpatient care), no restrictions applied and relationships suggested transaction-cost minimizing behaviour. Contract incompleteness was found to be a source of transaction costs on its own. We conclude that transaction costs seemed to play a key role in contract-based relationships, and contract incompleteness by itself appeared to be a source of transaction costs. The same findings are likely in other contexts because of difficulties in defining, observing and verifying the contracted products and the underlying information asymmetries. The role of compulsory contracting might be context-specific, although it is likely to emerge in other settings due to the safety-net role of public hospitals.

  16. IEEE 802.3 Ethernet, Current Status and Future Prospects at the LHC

    CERN Document Server

    Dobinson, Robert W; Haas, S W; Martin, B; Le Vine, M J; Saka, F

    2000-01-01

    The status of the IEEE 802.3 standard is reviewed and prospects for the future, including the new 10 Gigabit version of Ethernet, are discussed. The relevance of Ethernet for experiments at the CERN Large Hadron Collider is considered, with emphasis on on-line applications and areas which are technically challenging.

  17. COULD SOCIOECONOMIC METABOLISM BE MOLDED BY TRANSACTION COSTS?

    Directory of Open Access Journals (Sweden)

    RALUCA I. IORGULESCU

    2017-06-01

    Full Text Available Two key issues that shape the economic development and growth of a country are the independence and effectiveness of the judicial system and the level of bureaucracy. The theory of transaction costs, developed, among others, by Douglass C. North, explores both. Increasing the independence and effectiveness of the judicial system reduces corruption and protects private property and economic freedom while reducing bureaucracy is absolutely necessary to increase a country's competitiveness by lowering the cost and increasing the speed of transactions. This paper introduces the transaction costs approach, the concept of ‘socioeconomic/societal metabolism’ and takes advantage of the Multi-Scale Integrated Analysis of Societal and Ecosystem Metabolism (MuSIASEM to examine how the ‘socioeconomic/societal metabolism’ could be impacted.

  18. 26 CFR 157.5891-1 - Imposition of excise tax on structured settlement factoring transactions.

    Science.gov (United States)

    2010-04-01

    ... settlement factoring transactions. 157.5891-1 Section 157.5891-1 Internal Revenue INTERNAL REVENUE SERVICE... SETTLEMENT FACTORING TRANSACTIONS Tax on Structured Settlement Factoring Transactions § 157.5891-1 Imposition of excise tax on structured settlement factoring transactions. (a) In general. Section 5891 imposes...

  19. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-03-07

    Mar 7, 2018 ... THREE-PHASE AC TO DC CIHRC WITH WIRELESS POWER TRANSFER. FUNCTION ... power wirelessly without any physical contacts [11-13]. The block diagram of ..... power transmission links. IEEE Transactions on ...

  20. The transaction costs driving captive power generation: Evidence from India

    International Nuclear Information System (INIS)

    Ghosh, Ranjan; Kathuria, Vinish

    2014-01-01

    The 2003 Indian Electricity Act incentivizes captive power production through open access in an attempt to harness all sources of generation. Yet, we observe that only some firms self-generate while others do not. In this paper we give a transaction cost explanation for such divergent behavior. Using a primary survey of 107 firms from India, we construct a distinct variable to measure the transaction-specificity of electricity use. The ‘make or buy’ decision is then econometrically tested using probit model. Results are highly responsive to transaction-specificity and the likelihood of captive power generation is positively related to it. At the industrial level, this explains why food and chemical firms are more likely to make their own electricity. Since the burden of poor grid supply is highest on smaller sized and high transaction-specific firms, the grid access policies need to account for firm-level characteristics if government wants to incentivize captive power generation. - Highlights: • We analyze why some firms opt for captive power generation while others do not. • We examine the role of transaction costs in this decision making using probit model. • Unique data from a primary survey of manufacturing firms in Andhra Pradesh, India. • Transaction-specificity significantly determines who installs captive power plant (CPP). • Firm-level characteristics crucial in policies incentivizing captive generation

  1. 31 CFR 515.511 - Transactions by certain business enterprises.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions by certain business enterprises. 515.511 Section 515.511 Money and Finance: Treasury Regulations Relating to Money and Finance... Licenses, Authorizations, and Statements of Licensing Policy § 515.511 Transactions by certain business...

  2. 31 CFR 500.511 - Transactions by certain business enterprises.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Transactions by certain business enterprises. 500.511 Section 500.511 Money and Finance: Treasury Regulations Relating to Money and Finance... Licenses, Authorizations and Statements of Licensing Policy § 500.511 Transactions by certain business...

  3. The price impact of block transactions in the Netherlands

    NARCIS (Netherlands)

    de Jong, Abe; Marra, Teye; van Beusichem, Herman Clasinus

    2016-01-01

    In this paper, the authors analyse the stock price effects of block transactions and the disclosure thereof for Dutch firms. The authors measure a significant positive price effect for block purchases directly around the transaction date, but not for block sales. The authors do not measure a

  4. Automated Measurement and Signaling Systems for the Transactional Network

    Energy Technology Data Exchange (ETDEWEB)

    Piette, Mary Ann; Brown, Richard; Price, Phillip; Page, Janie; Granderson, Jessica; Riess, David; Czarnecki, Stephen; Ghatikar, Girish; Lanzisera, Steven

    2013-12-31

    The Transactional Network Project is a multi-lab activity funded by the US Department of Energy?s Building Technologies Office. The project team included staff from Lawrence Berkeley National Laboratory, Pacific Northwest National Laboratory and Oak Ridge National Laboratory. The team designed, prototyped and tested a transactional network (TN) platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). PNNL was responsible for the development of the TN platform, with agents for this platform developed by each of the three labs. LBNL contributed applications to measure the whole-building electric load response to various changes in building operations, particularly energy efficiency improvements and demand response events. We also provide a demand response signaling agent and an agent for cost savings analysis. LBNL and PNNL demonstrated actual transactions between packaged rooftop units and the electric grid using the platform and selected agents. This document describes the agents and applications developed by the LBNL team, and associated tests of the applications.

  5. The IEEE-SA patent policy update under the lens of EU competition law

    NARCIS (Netherlands)

    Kanevskaia, Olia; Zingales, Nicolo

    2016-01-01

    In 2015, the Institute of Electrical and Electronics Engineers (IEEE) Standardization Association made some controversial changes to its patent policy. The changes include a recommended method of calculation of FRAND royalty rates, and a request to members holding a standard essential patent (SEP)

  6. R&D Cooperation Between Firms---A Perceived Transaction Cost Perspective

    OpenAIRE

    Klaus Brockhoff

    1992-01-01

    Transaction cost is considered as an explanatory variable for the choice between markets and various organizational arrangements for performing some predefined tasks, such as engaging in private R&D. With respect to R&D cooperation between firms, we show that the perception of high transaction cost is related to certain characteristics of the firm and to the type of R&D task. We also show a relationship between the perception of transaction cost and the perceived success of the cooperation. T...

  7. A network architecture for precision formation flying using the IEEE 802.11 MAC Protocol

    Science.gov (United States)

    Clare, Loren P.; Gao, Jay L.; Jennings, Esther H.; Okino, Clayton

    2005-01-01

    Precision Formation Flying missions involve the tracking and maintenance of spacecraft in a desired geometric formation. The strong coupling of spacecraft in formation flying control requires inter-spacecraft communication to exchange information. In this paper, we present a network architecture that supports PFF control, from the initial random deployment phase to the final formation. We show that a suitable MAC layer for the application protocol is IEEE's 802.11 MAC protocol. IEEE 802.11 MAC has two modes of operations: DCF and PCF. We show that DCF is suitable for the initial deployment phase while switching to PCF when the spacecraft are in formation improves jitter and throughput. We also consider the effect of routing on protocol performance and suggest when it is profitable to turn off route discovery to achieve better network performance.

  8. 2011 IEEE Visualization Contest Winner: Visualizing Unsteady Vortical Behavior of a Centrifugal Pump

    KAUST Repository

    Otto, Mathias

    2012-09-01

    In the 2011 IEEE Visualization Contest, the dataset represented a high-resolution simulation of a centrifugal pump operating below optimal speed. The goal was to find suitable visualization techniques to identify regions of rotating stall that impede the pump\\'s effectiveness. The winning entry split analysis of the pump into three parts based on the pump\\'s functional behavior. It then applied local and integration-based methods to communicate the unsteady flow behavior in different regions of the dataset. This research formed the basis for a comparison of common vortex extractors and more recent methods. In particular, integration-based methods (separation measures, accumulated scalar fields, particle path lines, and advection textures) are well suited to capture the complex time-dependent flow behavior. This video (http://youtu.be/ oD7QuabY0oU) shows simulations of unsteady flow in a centrifugal pump. © 2012 IEEE.

  9. A Novel IEEE 802.15.4e DSME MAC for Wireless Sensor Networks.

    Science.gov (United States)

    Sahoo, Prasan Kumar; Pattanaik, Sudhir Ranjan; Wu, Shih-Lin

    2017-01-16

    IEEE 802.15.4e standard proposes Deterministic and Synchronous Multichannel Extension (DSME) mode for wireless sensor networks (WSNs) to support industrial, commercial and health care applications. In this paper, a new channel access scheme and beacon scheduling schemes are designed for the IEEE 802.15.4e enabled WSNs in star topology to reduce the network discovery time and energy consumption. In addition, a new dynamic guaranteed retransmission slot allocation scheme is designed for devices with the failure Guaranteed Time Slot (GTS) transmission to reduce the retransmission delay. To evaluate our schemes, analytical models are designed to analyze the performance of WSNs in terms of reliability, delay, throughput and energy consumption. Our schemes are validated with simulation and analytical results and are observed that simulation results well match with the analytical one. The evaluated results of our designed schemes can improve the reliability, throughput, delay, and energy consumptions significantly.

  10. Design Optimization of Cyber-Physical Distributed Systems using IEEE Time-sensitive Networks (TSN)

    DEFF Research Database (Denmark)

    Pop, Paul; Lander Raagaard, Michael; Craciunas, Silviu S.

    2016-01-01

    to the optimization of distributed cyber-physical systems using real-time Ethernet for communication. Then, we formulate two novel optimization problems related to the scheduling and routing of TT and AVB traffic in TSN. Thus, we consider that we know the topology of the network as well as the set of TT and AVB flows......In this paper we are interested in safety-critical real-time applications implemented on distributed architectures supporting the Time-SensitiveNetworking (TSN) standard. The ongoing standardization of TSN is an IEEE effort to bring deterministic real-time capabilities into the IEEE 802.1 Ethernet...... standard supporting safety-critical systems and guaranteed Quality-of-Service. TSN will support Time-Triggered (TT) communication based on schedule tables, Audio-Video-Bridging (AVB) flows with bounded end-to-end latency as well as Best-Effort messages. We first present a survey of research related...

  11. Adaptive salinity management in the Murray-Darling Basin: a transaction cost study

    Science.gov (United States)

    Loch, A. J.

    2017-12-01

    Transaction costs hinder or promote effective management of common good resource intertemporal externalities. Appropriate policy choices may reduce externalities and improve social welfare, and transaction cost analysis can help to evaluate policy choices. However, without measurement of relevant transaction costs such policy evaluation remains challenging. This article uses a time series dataset of salinity management program to test theory aimed at transaction cost-based policy evaluation and adaptive resource management over a period of 30 years worth of data. We identify peaks and troughs in transaction costs over time, lag-effects in program expenditure, and calculate the decay in transaction cost impacts. We conclude that Australian salinity management programs are achieving flexible institutional outcomes and effective policy arrangements with long-term benefits. Proposed changes to the program moving forward add weight to our assertions of adaptive strategies, and illustrate the value of the novel data-driven tracnsaction cost analysis approach for other jurisdictions.

  12. INTER-BANK CALL MONEY MARKET TRANSACTION IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Aries Haryadi

    2013-10-01

    Full Text Available AbstractThis study analyzes the effect of Indonesian Bank loan, the amount of demand deposits, and the Indonesia economic crisis in 1997 on the interbank call money market transactions in Indonesia using a multiple linear regression method. This study finds that the variables influencing the interbank call money market transactions are the interest rate of interbank call money market and the check money. Both variables have positive effect on the interbank money market transactions in Indonesia.Keywords: Loans, Interest Rate, Check Money, Monetary Crisis, Interbank Money Market TransactionsJEL Classification Numbers: G21, G28AbstrakPenelitian ini menganalisis pengaruh pinjaman Bank Indonesia terhadap tingkat bunga pasar uang antar bank, jumlah uang giral, dan krisis ekonomi Indonesia tahun 1997 terhadap transaksi pasar uang antar bank di Indonesia menggunakan metode regresi linier berganda. Penelitian ini menemukan bahwa variabel yang berpengaruh terhadap transaksi pasar uang antar bank tersebut adalah tingkat bunga pasar uang antar bank dan jumlah uang giral. Dua variabel tersebut berpengaruh positif terhadap transaksi pasar uang antar bank di Indonesia.Keywords: Pinjaman, Tingkat Bunga, Uang Giral, Krisis Moneter, Transaksi Pasar Uang antar BankJEL Classification Numbers: G21, G28

  13. Disclosure requirements for merger and acquisition transactions

    International Nuclear Information System (INIS)

    Holm, D.I.

    1998-01-01

    The legal disclosure requirements for merger and acquisition transactions involving Canadian public companies are described. The focus is on issues regarding merger and acquisition related disclosure, including the potential consequences of failing to provide proper information, Ontario Securities Commission Policy 9.1 considerations regarding valuation, review, and approval, cross border considerations and financing a merger and acquisition transaction. Legal and practical consequences for failing to provide proper disclosure, including the steps involved in establishing the due diligence defence, are also discussed

  14. 17 CFR 32.11 - Suspension of commodity option transactions.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Suspension of commodity option... REGULATION OF COMMODITY OPTION TRANSACTIONS § 32.11 Suspension of commodity option transactions. (a... accept money, securities or property in connection with, the purchase or sale of any commodity option, or...

  15. DoS detection in IEEE 802.11 with the presence of hidden nodes

    Directory of Open Access Journals (Sweden)

    Joseph Soryal

    2014-07-01

    Full Text Available The paper presents a novel technique to detect Denial of Service (DoS attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS and Frequency Hopping Spread Spectrum (FHSS and the results are presented to validate the algorithm.

  16. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    Science.gov (United States)

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  17. IEEE recommended practices for seismic qualification of Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    The IEEE has developed this document to provide direction for developing programs to seismically qualify Class 1E equipment for nuclear power generating stations. It supplements IEEE Std 323-1974, IEEE Standard for Qualifying Class 1E Equipment for Nuclear Power Generating Stations, which describes the basic requirements for equipment qualification. The Class 1E equipment to be qualified by produres or standards established by this document are of many forms, characteristics, and materials; therefore, the document presents many acceptable methods with the intent of permitting the user to make a judicious selection from among the various options. In making such a selection, the user should choose those that best meet a particular equipment's requirements. Further, in using this document as a specification for the purchase of equipment, the many options should also be recognized and the document invoked accordingly. It is recommended that the need for specific standards for the seismic qualifiction of particular kinds of equipment be evaluated by those responsible for such documents and that consideration be given to the application of particular methods from these documents which are most suitable

  18. Transaction Costs, the Phenomenon of the Trading House and Economic Organization

    Directory of Open Access Journals (Sweden)

    Kiryanov Igor, V.

    2015-12-01

    Full Text Available The present paper contains a study of the phenomenon of company’s specific internal divisions called “trading house”. The analysis of different approaches (based on results obtained by R. Coase and O. Williamson towards the problem of impact of transaction cost on company size leads to the following conclusion: the company size mostly depends on its institutional architecture which includes specific divisions that ensure outsourcing of intergroup transaction cost. I propose to call these divisions centers of transaction cost. I suppose that the wide popularity of trading houses among companies belonging to different branches can be explained by the fact that a trading house is mostly used not as selling and purchasing division, but as a center of transaction cost that concentrates the biggest transaction cost (by its share within company’s general expenses. This reasoning leads to possibility of existence of a set of methodological principles that allow to build up an a priori model of expanding company. The process of expansion represents a series of inclusion of centers of transactions cost by the company after institutional advantages of an earlier institutional architecture disappear. This methodology allows to set up a classification between a classical company as a structure with low level of integration and frozen institutional architecture and an economic organization that represents an explicitly constructed composition including centers of transaction cost that help to extend the transformational space of an expanding company.

  19. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-01-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  20. Energy-aware path selection metric for IEEE 802.11s wireless mesh networking

    CSIR Research Space (South Africa)

    Mhlanga, MM

    2009-08-01

    Full Text Available The IEEE 802.11s working group has commenced activities, which would lead to the development of a standard for wireless mesh networks (WMNs). The draft of 802.11s introduces a new path selection metric called airtime link metric. However...

  1. A 1-GHz charge pump PLL frequency synthesizer for IEEE 1394b PHY

    DEFF Research Database (Denmark)

    Ji, J.; Liu, H.; Li, Q.

    2012-01-01

    This paper presents an implementation of multi-rate SerDes transceiver for IEEE 1394b applications. Simple and effective pre-emphasis and equalizer circuits are used at transmitter and receiver, respectively. A phase interpolator based clock and data recovery circuit with optimized linearity is a...

  2. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  3. Modelling Real Property Transactions

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2002-01-01

    for more elaborated concept sets - for a theoretical basis - was among the motives for proposing a concerted research project: Modelling Real Property Transactions. Researchers from 11 European countries co-operate in the project that gained status as a COST action as of March 1st 2001. The majority...

  4. Modelling Real Property Transactions

    DEFF Research Database (Denmark)

    Stubkjær, Erik

    2003-01-01

    Der er store forskelle i financieringsomkostningerne ved hussalg i forskellige lande. Er disse forskelle nødvendige? og kan udgifterne reduceres? Sådanne spørgsmål søger forskningsprojektet ?Modelling Real Property Transactions?, officielt sat i værk indenfor rammerne af COST (European Co...

  5. Tax-driven Bunching of Housing Market Transactions: The Case of Hong Kong

    OpenAIRE

    Charles Ka Yui Leung; Tin Cheuk Leung; Kwok Ping Tsang

    2015-01-01

    We study the implications of a property market transaction tax. As property buyers are obligated to pay a transaction tax (¡§stamp duty¡¨ or SD) where the rate increases with the value of the transaction, there are incentives to trade at the cutoff points of the tax schedule or just below them. Thus, both ¡§bunching in transactions¡¨ and ¡§underpricing¡¨ should be observed near those cutoffs. Furthermore, the bunching points should change with the tax schedule. We confirm these conjectures wi...

  6. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  7. Transactional Mechanism of Territorial Administration: Conceptualisation and Systematization of Elements

    Directory of Open Access Journals (Sweden)

    Elena Аleksandrovna Petrova

    2016-12-01

    Full Text Available The concept of transaction expenses developed by R. Coase allows to consider functioning of economy and its agents from the information viewpoint. This viewpoint implies that information exchange between agents and the urge to overcome information incompleteness start playing the crucial role. Transaction expenses are information exchange costs for the purpose of elimination (reduction of its incompleteness and the related uncertainty. R. Coase showed that creation and the size of firms are closely connected with the urge to minimize transaction expenses. Traditionally transaction expenses are associated with functioning of firms, however, the state actively participates in economy, for example, through formation of tax policy. Besides, financing of the public benefits takes place on the basis of collective decisions. But collective character of the decision causes interest, though smaller in comparison with the private choice, in the maximum efficiency of the decision. It is ensured by two factors: firstly, the position of an individual is not of great importance at collective decision-making; secondly, an individual is responsible for a small part of benefits and expenses which are formed in the course of decision implementation. The article deals with the concept of transaction costs, and systematically occurring types of transaction costs in the following groups: search information costы, the cost of negotiating, measuring costs, the costs of specification and protection of property rights, the costs of opportunistic behavior, the cost of “politicizing”, the costs of collective decisionmaking, influence costs. The authors propose a model of transaction mechanism of territorial administration, which includes the following elements: economic entities; a goal determined by system of indicators; methods; instruments; channels; forms of target use; landmark feedback on the system; subject to the experience stage of modernization; criteria

  8. IEEE Xplore® Digital Library - Evolving to Meet YOUR Changing Needs

    OpenAIRE

    2014-01-01

    Представлена презентация доклада "Использование платформы IEEE Digital Library: уникальные научные публикации в области электроники, радиосвязи, вычислительной техники, информационных технологий, энергетики, машиностроения, физики, химии, геологии, нанотехнологий" Эстер Лукаш, специалиста по обучению IEEE (Германия), на семинаре «Использование платформы IEEE Digital Library», прошедшем 02 октября 2014 года в УрФУ, на английском языке....

  9. Emissions trading to combat climate change: The impact of scheme design on transaction costs

    OpenAIRE

    Betz, Regina

    2006-01-01

    This paper explores the likely impact of emissions trading design on transaction costs. Transaction costs include both the costs for the private sector to comply with the scheme rules and the costs of scheme administration. In economic theory transaction costs are often assumed to be zero. But transaction costs are real costs and there is no reason for treating them differently to other costs. Thus, in setting up an emissions trading scheme, transaction costs have to be taken into account in ...

  10. Investigating the efficiency of IEEE 802.15.4 for medical monitoring applications.

    Science.gov (United States)

    Pelegris, P; Banitsas, K

    2011-01-01

    Recent advancements in wireless communications technologies bring us one step closer to provide reliable Telecare services as an alternative to patients staying in a hospital mainly for monitoring purposes. In this research we investigate the efficiency of IEEE 802.15.4 in a simple scenario where a patient is being monitored using an ECG and a blood analysis module. This approach binds well with assisted living solutions, by sharing the network infrastructure for both monitoring and control while taking advantage of the low power features of the protocol. Such applications are becoming more and more realistic to implement as IEEE 802.15.4 compatible hardware becomes increasingly available. Our aim is to examine the impact of Beacon and Superframe Order in the medium access delay, dropped packets, end to end delay, average retransmission attempts and consumed power focusing on this bandwidth demanding situation where the network load does not allow low duty cycles, in order to draw some conclusions on the effect that this will have to telemonitoring applications.

  11. steady state and transient analysis of induction motor driving a pump

    African Journals Online (AJOL)

    Dr Obe

    The importance of using a digital computer in studying the performance of Induction machine under steady .... transformation to that given in equation (7) .... Drive. IEEE Transactions on Industry ... Machinery" McGraw-Hill Book company, New.

  12. Dynamic subframe allocation for mobile broadband m-health using IEEE 802.16j mobile multihop relay networks.

    Science.gov (United States)

    Alinejad, Ali; Istepanian, R S H; Philip, N

    2012-01-01

    The concept of 4G health will be one of the key focus areas of future m-health research and enterprise activities in the coming years. WiMAX technology is one of the constituent 4G wireless technologies that provides broadband wireless access (BWA). Despite the fact that WiMAX is able to provide a high data rate in a relatively large coverage; this technology has specific limitations such as: coverage, signal attenuation problems due to shadowing or path loss, and limited available spectrum. The IEEE 802.16j mobile multihop relay (MMR) technology is a pragmatic solution designed to overcome these limitations. The aim of IEEE 802.16j MMR is to expand the IEEE 802.16e's capabilities with multihop features. In particular, the uplink (UL) and downlink (DL) subframe allocation in WiMAX network is usually fixed. However, dynamic frame allocation is a useful mechanism to optimize uplink and downlink subframe size dynamically based on the traffic conditions through real-time traffic monitoring. This particular mechanism is important for future WiMAX based m-health applications as it allows the tradeoff in both UL and DL channels. In this paper, we address the dynamic frame allocation issue in IEEE 802.16j MMR network for m-health applications. A comparative performance analysis of the proposed approach is validated using the OPNET Modeler(®). The simulation results have shown an improved performance of resource allocation and end-to-end delay performance for typical medical video streaming application.

  13. 25 CFR 117.23 - Transactions between guardian and ward.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Transactions between guardian and ward. 117.23 Section... COMPETENCY § 117.23 Transactions between guardian and ward. Business dealings between the guardian and his ward involving the sale or purchase of any property, real or personal, by the guardian to or from the...

  14. Analysis of transaction costs for the supply and demand for wood fuels

    International Nuclear Information System (INIS)

    Roos, A.; Bohlin, F.; Hektor, B.; Hillring, B.; Parikka, M.

    2001-12-01

    The objective of the project was to analyse the importance of transaction costs for the supply and demand for woodfuels in Sweden. The project covered the period of great expansion of woodfuel use in the district heating sector, from 1980 until present. It uses literature studies, case studies and surveys. New institutional theory and transaction cost theory was applied. Several transaction costs have influenced both supply from the forest owners and demand from the main users, the district heating plants. Many of these transaction costs have been reduced by the market players, through learning, technical improvements and institutional innovations. Actions to reduce transaction costs have accompanied technical improvements of handling and transport. Strategies for woodfuel procurement have also been analysed. Important conclusions of the project for a change in the energy system are presented

  15. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    Science.gov (United States)

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  16. Realisation of functions of planning and organisation in the system of management of transaction expenses

    Directory of Open Access Journals (Sweden)

    Krush Peter V.

    2014-01-01

    Full Text Available The goal of the article lies in building a functional model of management of transaction expenses of an enterprise with specification of stages of realisation of planning functions in an organisation. In the result of the study the article marks out functions of management of transaction expenses, which ensure transformation of incoming (financial resources into outgoing ones (optimised transaction expenses. The article identifies stages of realisation of “Planning transaction expenses” and “Organisation of management of transaction expenses” functions. It characterises in detail responsibilities of enterprise subdivisions that deal with management of transaction expenses. It establishes that the original element of the planning function is the budget of transaction expenses for a planning period and organisation – job descriptions of employees with detailed description of their duties and authorities, rights and obligations. The prospect of further scientific developments is study of stages of realisation of such management functions as “Motivation of personnel on rational use of funds and management of transaction expenses”, “Control over the state of management of transaction expenses” and “Regulation of the process of management of transaction expenses” of enterprises.

  17. 7 CFR 1927.53 - Costs of title clearance and closing of transactions.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Costs of title clearance and closing of transactions... and Loan Closing § 1927.53 Costs of title clearance and closing of transactions. The borrower or the... payment of all costs of title clearance and closing of the transaction and will arrange for payment before...

  18. A Mechanically Proved and an Incremental Development of the Session Initiation Protocol INVITE Transaction

    Directory of Open Access Journals (Sweden)

    Rajaa Filali

    2014-01-01

    Full Text Available The Session Initiation Protocol (SIP is an application layer signaling protocol used to create, manage, and terminate sessions in an IP based network. SIP is considered as a transactional protocol. There are two main SIP transactions, the INVITE transaction and the non-INVITE transaction. The SIP INVITE transaction specification is described in an informal way in Request for Comments (RFC 3261 and modified in RFC 6026. In this paper we focus on the INVITE transaction of SIP, over reliable and unreliable transport mediums, which is used to initiate a session. In order to ensure the correctness of SIP, the INVITE transaction is modeled and verified using event-B method and its Rodin platform. The Event-B refinement concept allows an incremental development by defining the studied system at different levels of abstraction, and Rodin discharges almost all proof obligations at each level. This interaction between modeling and proving reduces the complexity and helps in assuring that the INVITE transaction SIP specification is correct, unambiguous, and easy to understand.

  19. Real-Time Support on IEEE 802.11 Wireless Ad-Hoc Networks: Reality vs. Theory

    Science.gov (United States)

    Kang, Mikyung; Kang, Dong-In; Suh, Jinwoo

    The usable throughput of an IEEE 802.11 system for an application is much less than the raw bandwidth. Although 802.11b has a theoretical maximum of 11Mbps, more than half of the bandwidth is consumed by overhead leaving at most 5Mbps of usable bandwidth. Considering this characteristic, this paper proposes and analyzes a real-time distributed scheduling scheme based on the existing IEEE 802.11 wireless ad-hoc networks, using USC/ISI's Power Aware Sensing Tracking and Analysis (PASTA) hardware platform. We compared the distributed real-time scheduling scheme with the real-time polling scheme to meet deadline, and compared a measured real bandwidth with a theoretical result. The theoretical and experimental results show that the distributed scheduling scheme can guarantee real-time traffic and enhances the performance up to 74% compared with polling scheme.

  20. Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin

    Science.gov (United States)

    Rizky Fauzi, Muhammad Reza; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of today’s emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.

  1. 27 CFR 555.127 - Daily summary of magazine transactions.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Daily summary of magazine....127 Daily summary of magazine transactions. In taking the inventory required by §§ 555.122, 555.123... transactions to be kept at each magazine of an approved storage facility; however, these records may be kept at...

  2. 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf | 01 ...

    Indian Academy of Sciences (India)

    Home; public; Volumes; reso; 021; 01; 0011-0030.IEEE 754: 64 Bit Double Precision FloatsThis.pdf. 404! error. The page your are looking for can not be found! Please check the link or use the navigation bar at the top. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 ...

  3. Plural Governance: A Modified Transaction Cost Model

    DEFF Research Database (Denmark)

    Mols, Niels Peter; Menard, Claude

    2014-01-01

    Plural governance is a form of governance where a firm both makes and buys similar goods or services. Despite a widespread use of plural governance there are no transaction cost models of how plural governance affects performance. This paper reviews the literature about plural forms and proposes...... a model relating transaction cost and resource-based variables to the cost of the plural form. The model is then used to analyze when the plural form is efficient compared to alternative governance structures. We also use the model to discuss the strength of three plural form synergies....

  4. Determinants of Transactions Costs in the Brazilian Stock Market

    Directory of Open Access Journals (Sweden)

    Antonio Zoratto Sanvicente

    2012-06-01

    Full Text Available The Lesmond (2005 method for estimating transactions costs, based on a limited-dependent variable model, is used in order to test for the significance of plausible explanations for cross sectional cost differences. Variables such as liquidity, volatility, firm size, quality of corporate governance and participation in ADR programs are considered, in addition to the possible impact of the 2008 crisis. Daily data for 1999-2009 are used, covering at least 250 securities each year. The average total transaction cost declined from 2.95% in 1999 to 1.22% in 2009. Stock volatility and quality of corporate governance appear to be the most relevant factors associated with the measure of transactions cost.

  5. A filter bank for rotationally invariant image recognition

    African Journals Online (AJOL)

    2005-07-18

    Jul 18, 2005 ... random noise as well as an interesting, less known impact of noise ..... IEEE Transactions on Pattern Analysis and Machine Intelligence, ... [23] Thuillard M, 2001, Wavelets in Soft Computing, World scientific series in robotics.

  6. Revisión del estado del arte deIR-Ultra-Wideband y simulación de la respuesta impulsiva del canal IEEE802.15.4a Review of the state of art of IR-Ultra-Wideband and simulation of Impulse Responce of the IEEE 802.15.4a channel

    Directory of Open Access Journals (Sweden)

    Julio Suárez Páez

    2010-06-01

    Full Text Available Este artículo realiza una revisión del estado del arte de la tecnología basada en canales de Banda Ultra Ancha (UWB, Ultra–Wideband enfocándose en su regulación, estandarización, aplicaciones básicas, modelo de canal IEEE 802.15.4a y simulación de la respuesta impulsiva de este tipo de canal. También se pretende introducir al lector en las tecnologías basadas en canales IR–UWB y en los parámetros para el modelamiento y simulación del canal UWB IEEE 802.15.4a.This paper reviews the state of the art of the technology based in channels of Ultra Wide band (UWB Ultra–Wideband focusing on its regulation, standardization, basic applications, IEEE 802.15.4a channel model and simulation of the impulsive response of this type of channel. Also, it aims to introduce the reader to the technologies based on IR–UWB channels and the parameters for modeling and simulation of IEEE 802.15.4a UWB channel.

  7. 78 FR 56769 - Genesee & Wyoming Inc.-Corporate Family Transaction Exemption

    Science.gov (United States)

    2013-09-13

    ... unnecessary intermediate subsidiaries, which will save unnecessary accounting and corporate maintenance. This... Inc.--Corporate Family Transaction Exemption Genesee & Wyoming Inc. (GWI), a noncarrier holding company, filed a verified notice of exemption under 49 CFR 1180.2(d)(3) for a corporate family transaction...

  8. Parallel transaction processing in functional languages, towards practical functional databases

    NARCIS (Netherlands)

    Wevers, L.; Huisman, Marieke; de Keijzer, Ander

    2013-01-01

    This paper shows how functional languages can be adapted for transaction processing, and discusses the implementation of a parallel runtime system for such functional transaction processing languages. We extend functional languages with current state variables and result state variables to allow the

  9. Proceedings of the 1988 IEEE international conference on robotics and automation. Volume 1

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    These proceedings compile the papers presented at the international conference (1988) sponsored by IEEE Council on ''Robotics and Automation''. The subjects discussed were: automation and robots of nuclear power stations; algorithms of multiprocessors; parallel processing and computer architecture; and U.S. DOE research programs on nuclear power plants

  10. An Introduction to Rapid System Prototyping

    OpenAIRE

    Luqi; Kordon, Fabrice

    2002-01-01

    IEEE Transactions on Software Engineering, Vol. 28, No. 9, pp. 817–821. The implementation and maintenance of industrial applications have continuously become more and more difficult. In this context, one problem is the evaluation of complex systems. The IEEE defines Prototyping as a development approach promoting the implementation of a pilot version of the intended product. This approach is a potential solution to the early evaluation of a system. It can also be used to avoid th...

  11. Transaction aware tape-infrastructure monitoring

    International Nuclear Information System (INIS)

    Nikolaidis, Fotios; Kruse, Daniele Francesco

    2014-01-01

    Administrating a large scale, multi protocol, hierarchical tape infrastructure like the CERN Advanced STORage manager (CASTOR)[2], which stores now 100 PB (with an increasing step of 25 PB per year), requires an adequate monitoring system for quick spotting of malfunctions, easier debugging and on demand report generation. The main challenges for such system are: to cope with CASTOR's log format diversity and its information scattered among several log files, the need for long term information archival, the strict reliability requirements and the group based GUI visualization. For this purpose, we have designed, developed and deployed a centralized system consisting of four independent layers: the Log Transfer layer for collecting log lines from all tape servers to a single aggregation server, the Data Mining layer for combining log data into transaction context, the Storage layer for archiving the resulting transactions and finally the Web UI layer for accessing the information. Having flexibility, extensibility and maintainability in mind, each layer is designed to work as a message broker for the next layer, providing a clean and generic interface while ensuring consistency, redundancy and ultimately fault tolerance. This system unifies information previously dispersed over several monitoring tools into a single user interface, using Splunk, which also allows us to provide information visualization based on access control lists (ACL). Since its deployment, it has been successfully used by CASTOR tape operators for quick overview of transactions, performance evaluation, malfunction detection and from managers for report generation.

  12. Parallel-Architecture Simulator Development Using Hardware Transactional Memory

    OpenAIRE

    Armejach Sanosa, Adrià

    2009-01-01

    To address the need for a simpler parallel programming model, Transactional Memory (TM) has been developed and promises good parallel performance with easy-to-write parallel code. Unlike lock-based approaches, with TM, programmers do not need to explicitly specify and manage the synchronization among threads. However, programmers simply mark code segments as transactions, and the TM system manages the concurrency control for them. TM can be implemented either in software (STM) or hardware (HT...

  13. THE IMPACT OF MERGER AND ACQUISITION TRANSACTIONS AT THE COMPANY AND INDUSTRY LEVEL

    Directory of Open Access Journals (Sweden)

    Elif Akben Selçuk

    2016-04-01

    Full Text Available The objective of this study is to provide a literature review consisting of studies investigating the impact of mergers and acquisition (M&A transactions at the micro and macro levels. The review has three different parts. In the first part, the focus is on the macro effects of M&A transactions and the impact of these transactions at the industry and market levels as well as their determinants are investigated. The second part comprises studies analyzing the effects of M&A transactions on the financial performance of the acquirer and target companies. In the third and final section, the factors affecting the financial performance changes as a result of M&A transactions are discussed.

  14. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  15. NIH-IEEE 2015 Strategic Conference on Healthcare Innovations and Point-of-Care Technologies for Prec

    Science.gov (United States)

    NIH and the Institute for Electrical and Electronics Engineering, Engineering in Medicine and Biology Society (IEEE/EMBS) hosted the third iteration of the Healthcare Innovations and Point-of-Care Technologies Conference last week.

  16. Primo vessel inside a lymph vessel emerging from a cancer tissue.

    Science.gov (United States)

    Lee, Sungwoo; Ryu, Yeonhee; Cha, Jinmyung; Lee, Jin-Kyu; Soh, Kwang-Sup; Kim, Sungchul; Lim, Jaekwan

    2012-10-01

    Primo vessels were observed inside the lymph vessels near the caudal vena cava of a rabbit and a rat and in the thoracic lymph duct of a mouse. In the current work we found a primo vessel inside the lymph vessel that came out from the tumor tissue of a mouse. A cancer model of a nude mouse was made with human lung cancer cell line NCI-H460. We injected fluorescent nanoparticles into the xenografted tumor tissue and studied their flow in blood, lymph, and primo vessels. Fluorescent nanoparticles flowed through the blood vessels quickly in few minutes, and but slowly in the lymph vessels. The bright fluorescent signals of nanoparticles disappeared within one hour in the blood vessels but remained much longer up to several hours in the case of lymph vessels. We found an exceptional case of lymph vessels that remained bright with fluorescence up to 24 hours. After detailed examination we found that the bright fluorescence was due to a putative primo vessel inside the lymph vessel. This rare observation is consistent with Bong-Han Kim's claim on the presence of a primo vascular system in lymph vessels. It provides a significant suggestion on the cancer metastasis through primo vessels and lymph vessels. Copyright © 2012. Published by Elsevier B.V.

  17. Components of the costs of controlling quality: a transaction cost economics approach.

    Science.gov (United States)

    Stiles, R A; Mick, S S

    1997-01-01

    This article identifies the components that contribute to a healthcare organization's costs in controlling quality. A central tenet of our argument is that at its core, quality is the result of a series of transactions among members of a diverse network. Transaction cost economics is applied internally to analyze intraorganizational transactions that contribute to quality control, and questions for future research are posed.

  18. 17 CFR 210.3A-04 - Intercompany items and transactions.

    Science.gov (United States)

    2010-04-01

    ... Financial Statements § 210.3A-04 Intercompany items and transactions. In general, there shall be eliminated intercompany items and transactions between persons included in the (a) consolidated financial statements being... FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES...

  19. Transaction Costs, Property Rights, and Organizational Culture: An Exchange Perspective.

    Science.gov (United States)

    Jones, Gareth R.

    1983-01-01

    Applying the language of exchange theory, this paper analyses how organizational culture emerges out of the institutional arrangements developed to regulate the transactions between members. Transaction costs of social exchange, the characteristics and etiology of those institutional arrangements, and three ideal-typical cultural forms are…

  20. Fulltext PDF

    Indian Academy of Sciences (India)

    College gave a public demonstration of wireless communication, using wireless waves to ring a bell ... There he managed to interest the British Post Office in his ideas. .... subsequently published in the December 1997 IEEE Transactions on ...

  1. Optimization-based sale transactions and hydrothermal scheduling

    International Nuclear Information System (INIS)

    Prasannan, B.; Luh, P.B.; Zhang, L.

    1996-01-01

    Selling and purchasing power are important activities for utilities because of potential savings. When a selling utility presents an offer including prices, power levels and durations, a purchasing utility selects power levels and durations within the offered range subject to relevant constraints. The decisionmaking process is complicated because transactions are coupled with system demand and reserve, therefore decisions have to be made in conjunction with the commitment and dispatching of units. Furthermore, transaction decisions have to be made in almost real time in view of the competitiveness of the power market caused by deregulation. In this paper, transactions are analyzed from a selling utility's viewpoint for a system consisting of thermal, hydro and pumped-storage units. To effectively solve the problem, linear sale revenues are approximated by nonlinear functions, and non-profitable options are identified and eliminated from consideration. The multipliers are then updated at the high level by using a modified subgradient method to obtain near optimal solutions quickly. Testing results show that the algorithm produces good sale offers efficiently

  2. Transaction costs of raising energy efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Ostertag, K.

    2003-07-01

    Part of the debate evolves around the existence and importance of energy saving potentials to reduce CO{sub 2} emissions that may be available at negative net costs, implying that the energy cost savings of one specific technology can actually more than offset the costs of investing into this technology and of using it. This so called ''no-regret'' potential would comprise measures that from a pure economic efficiency point of view would be ''worth undertaking whether or not there are climate-related reasons for doing so''. The existence of the no-regret potential is often denied by arguing, that the economic evaluation of the energy saving potentials did not take into account transaction costs. This paper will re-examine in more detail the concept of transaction costs as it is used in the current debate on no-regret potentials (section 1). Four practical examples are presented to illustrate how transaction costs and their determinants can be identified, measured and possibly influenced (section 2). In order to link the presented cases to modelling based evaluation approaches the implications for cost evaluations of energy saving measures, especially in the context of energy system modelling, will be shown (section 3). (author)

  3. Status of the IEEE P896 Future Backplane Bus

    International Nuclear Information System (INIS)

    Gustavson, D.B.

    1983-10-01

    The IEEE P896 Future Backplane Bus project has been influenced by and has influenced FASTBUS and several other contemporary bus designs. This paper summarizes the current status of that project, which is directed toward the needs of modern 32-bit microprocessor systems with multiple processors. Some of the technology developed for P896 will be important for future non-ECL implementations of FASTBUS and other buses. In particular, new bus drivers and receivers should greatly improve the performance and reliability of backplane buses and cable buses. The current status of the P896 serial bus is also summarized

  4. 15th IEEE International Conference on Intelligent Engineering Systems

    CERN Document Server

    Živčák, Jozef; Aspects of Computational Intelligence Theory and Applications

    2013-01-01

    This volume covers the state-of-the art of the research and development in various aspects of computational intelligence and gives some perspective directions of development. Except the traditional engineering areas that contain theoretical knowledge, applications, designs and projects, the book includes the area of use of computational intelligence in biomedical engineering. „Aspects of Computational Intelligence: Theory and Applications” is a compilation of carefully selected extended papers written on the basis of original contributions presented at the 15th IEEE International Conference on Intelligent Engineering Systems 2011, INES 2011 held at June 23.-26. 2011 in AquaCity Poprad, Slovakia.    

  5. International business transactions

    OpenAIRE

    Buczkowski, Bogdan

    2016-01-01

    Running a business on an international scale requires not only a substantial body of knowledge but also the ability to apply it in practice. That is why our textbook, with a vast collection of practical examples, discusses a wide variety of pertinent issues connected with business operations in international markets, from international market analysis, drafting business plans, concluding business transactions and the insurance of goods through to customs clearance procedures and professional ...

  6. IEEE Std 323-1983: IEEE standard for qualifying Class 1E equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This standard describes the basic requirements for qualifying Class 1E equipment with interfaces that are to be used in nuclear power generating stations. The requirements presented include the principles, procedures, and methods of qualification. These qualification requirements, when met, will confirm the adequacy of the equipment design under normal, abnormal, design basis event, post design basis event, and in-service test conditions for the performance of safety function(s). The purpose of this standard is to identify requirements for the qualification of Class 1E equipment, including those interfaces whose failure could adversely affect the performance of Class 1E equipment and systems. The methods described shall be used for qualifying equipment, extending qualification, and updating qualification if the equipment is modified. Other issued IEEE standards which present qualification methods for specific equipment or components, or both, and those that deal with parts of the qualification program, may be used to supplement this standard, as applicable

  7. Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCA in Non-saturation Condition

    Science.gov (United States)

    Kim, Tae Ok; Kim, Kyung Jae; Choi, Bong Dae

    We analyze the MAC performance of the IEEE 802.11 DCF and 802.11e EDCA in non-saturation condition where device does not have packets to transmit sometimes. We assume that a flow is not generated while the previous flow is in service and the number of packets in a flow is geometrically distributed. In this paper, we take into account the feature of non-saturation condition in standards: possibility of transmission performed without preceding backoff procedure for the first packet arriving at the idle station. Our approach is to model a stochastic behavior of one station as a discrete time Markov chain. We obtain four performance measures: normalized channel throughput, average packet HoL (head of line) delay, expected time to complete transmission of a flow and packet loss probability. Our results can be used for admission control to find the optimal number of stations with some constraints on these measures.

  8. Improving Energy Efficiency in Idle Listening of IEEE 802.11 WLANs

    Directory of Open Access Journals (Sweden)

    Muhammad Adnan

    2016-01-01

    Full Text Available This paper aims to improve energy efficiency of IEEE 802.11 wireless local area networks (WLANs by effectively dealing with idle listening (IL, which is required for channel sensing and is unavoidable in a contention-based channel access mechanism. Firstly, we show that IL is a dominant source of energy drain in WLANs and it cannot be effectively alleviated by the power saving mechanism proposed in the IEEE 802.11 standard. To solve this problem, we propose an energy-efficient mechanism that combines three schemes in a systematic way: downclocking, frame aggregation, and contention window adjustment. The downclocking scheme lets a station remain in a semisleep state when overhearing frames destined to neighbor stations, whereby the station consumes the minimal energy without impairing channel access capability. As well as decreasing the channel access overhead, the frame aggregation scheme prolongs the period of semisleep time. Moreover, by controlling the size of contention window based on the number of stations, the proposed mechanism decreases unnecessary IL time due to collision and retransmission. By deriving an analysis model and performing extensive simulations, we confirm that the proposed mechanism significantly improves the energy efficiency and throughput, by up to 2.8 and 1.8 times, respectively, compared to the conventional power saving mechanisms.

  9. Do transactive memory and participative teamwork improve nurses' quality of work life?

    Science.gov (United States)

    Brunault, Paul; Fouquereau, Evelyne; Colombat, Philippe; Gillet, Nicolas; El-Hage, Wissam; Camus, Vincent; Gaillard, Philippe

    2014-03-01

    Improvement in nurses' quality of work life (QWL) has become a major issue in health care organizations. We hypothesized that the level of transactive memory (defined as the way groups collectively encode, store, and retrieve knowledge) and participative teamwork (an organizational model of care based on vocational training, a specific service's care project, and regular interdisciplinary staffing) positively affect nurses' QWL. This cross-sectional study enrolled 84 ward-based psychiatric nurses. We assessed transactive memory, participative teamwork, perceived organizational justice, perceived organizational support, and QWL using psychometrically reliable and valid scales. Participative teamwork and transactive memory were positively associated with nurses' QWL. Perceived organizational support and organizational justice fully mediated the relationship between participative teamwork and QWL, but not between transactive memory and QWL. Improved transactive memory could directly improve nurses' QWL. Improved participative teamwork could improve nurses' QWL through better perceived organizational support and perceived organizational justice.

  10. Real-Time Wait-Free Queues using Micro-Transactions

    OpenAIRE

    Meawad, Fadi; Iyer, Karthik; Schoeberl, Martin; Vitek, Jan

    2011-01-01

    This paper evaluates the applicability of transactional mem- ory to the implementation of dierent non-blocking data structures in the context of the Real-time Specication for Java. In particular, we argue that hardware support for micro-transaction allows us to implement eciently data structures that are often dicult to realize with the atomic operations provided by stock hardware. Our main imple- mentation platform is the Java Optimized Processor sys- tem. We report on the performance of dat...

  11. Protecting Online Transactions with Unique Embedded Key Generators

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Zenner, Erik

    2007-01-01

    We present a novel approach for protecting transactions over networks. While we use the example of a netbank application, the proposal is relevant for many security-critical transactions. The approach is based on two major changes compared to current solutions. The first one is the use...... difficult. In combination, these techniques allow to build a secure channel between the client program and the server, while current solutions only build such a channel between the client computer and the server....

  12. 17 CFR 31.13 - Financial reports of leverage transaction merchants.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Financial reports of leverage... COMMISSION LEVERAGE TRANSACTIONS § 31.13 Financial reports of leverage transaction merchants. (a) Each... person must include with such financial report a statement describing the source of his current assets...

  13. Transactive memory in organizational groups: the effects of content, consensus, specialization, and accuracy on group performance.

    Science.gov (United States)

    Austin, John R

    2003-10-01

    Previous research on transactive memory has found a positive relationship between transactive memory system development and group performance in single project laboratory and ad hoc groups. Closely related research on shared mental models and expertise recognition supports these findings. In this study, the author examined the relationship between transactive memory systems and performance in mature, continuing groups. A group's transactive memory system, measured as a combination of knowledge stock, knowledge specialization, transactive memory consensus, and transactive memory accuracy, is positively related to group goal performance, external group evaluations, and internal group evaluations. The positive relationship with group performance was found to hold for both task and external relationship transactive memory systems.

  14. Transactional Sex among Noninjecting Illicit Drug Users: Implications for HIV Transmission

    OpenAIRE

    Guimar?es, Rafael Alves; Rodovalho, Aur?lio Goulart; Fernandes, Inaina Lara; Silva, Graciele Cristina; de Felipe, Rodrigo Lopes; Vera, Iv?nia; Greg?rio, Val?ria Duarte; Lucchese, Roselma

    2016-01-01

    Noninjecting illicit drug users (NIDUs) present high risk for HIV infection, due especially to transactional sex. This study aimed to estimate the prevalence and risk factors for transactional sex among NIDUs in the Southwest region of Goi?s State, Central Brazil. The prevalence of self-reported transactional sex was 22.8%. Prevalence in women and men was 52.7% and 16.8%, respectively, a significant difference (p < 0.001). Crack use and history of sexually transmitted infections (STI) were ri...

  15. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    Science.gov (United States)

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  16. From Intra-transaction to Generalized Inter-transaction: Landscaping Multidimensional Contexts in Association Rule Mining

    NARCIS (Netherlands)

    Li, Q; Feng, L.; Wong, A.K.Y.

    The problem of mining multidimensional inter-transactional association rules was recently introduced in [ACM Trans. Inform. Syst. 18(4) (2000) 423; Proc. of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Seattle, Washington, June 1998, p. 12:1]. It extends the

  17. A high-linearity InGaP/GaAs HBT power amplifier for IEEE 802.11a/n

    International Nuclear Information System (INIS)

    Cui Jie; Chen Lei; Kang Chunlei; Shi Jia; Zhang Xuguang; Ai Baoli; Liu Yi

    2013-01-01

    A three-stage 4.8–6 GHz monolithic power amplifier (PA) compatible with IEEE 802.11a/n designed based on an advanced 2 μm InGaP/GaAs hetero-junction bipolar transistor (HBT) process is presented. The PA integrates input matching and closed-loop power control circuits on chip. Under 3.3 V DC bias, the amplifier achieves a ∼31 dB small signal gain, excellent wide band input and output matching among overall 1.2 GHz bandwidth, and up to 24.5 dBm linear output power below EVM 3% with IEEE 802.11a 64QAM OFDM input signal. (semiconductor integrated circuits)

  18. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    International Nuclear Information System (INIS)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing

    2011-01-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm 2 area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  19. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 μm CMOS

    Science.gov (United States)

    Bin, Wu; Yumei, Zhou; Yongxu, Zhu; Zhengdong, Zhang; Jingjing, Cai

    2011-05-01

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 μm 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 × 2.6 mm2 area and consumes 83 mW under typical work modes.

  20. Design and implementation of an IEEE 802.11 baseband OFDM transceiver in 0.18 {mu}m CMOS

    Energy Technology Data Exchange (ETDEWEB)

    Wu Bin; Zhou Yumei; Zhu Yongxu; Zhang Zhengdong; Cai Jingjing, E-mail: wubin@ime.ac.cn [Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029 (China)

    2011-05-15

    An SISO IEEE 802.11 baseband OFDM transceiver ASIC is implemented. The chip can support all of the SISO IEEE 802.11 work modes by optimizing the key module and sharing the module between the transmitter and receiver. The area and power are decreased greatly compared with other designs. The baseband prototype has been verified under the WLAN baseband test equipment and through transferring the video. The 0.18 {mu}m 1P/6M CMOS technology layout is finished and the chip is fabricated in SMIC, which occupies a 2.6 x 2.6 mm{sup 2} area and consumes 83 mW under typical work modes. (semiconductor integrated circuits)

  1. Research Article Special Issue

    African Journals Online (AJOL)

    2018-02-01

    Feb 1, 2018 ... 2018, 10(2S), 1-10. 2. Since these applications often demand massive computation requirements and due to the ... and distribute data chunks to the computing nodes. Fig.1. .... IEEE Transactions on Automation Science and.

  2. Trust and Control Dynamics in Agrifood Supply Networks: Communication Strategies for Electronic Transaction Environments

    OpenAIRE

    Fritz, Melanie; Hausen, Tobias

    2006-01-01

    Agrifood supply networks are dynamic structures where firms regularly face the need to search for new market partners. A decision for a transaction with a new partner requires the existence of appropriate control and safeguard mechanisms as well as trust to overcome perceived risk and uncertainties. Electronic transaction environments offer new potentials for the identification of new transaction partners. However, trust and control need to be communicated appropriately in electronic transact...

  3. Analysis of Adaptive Control Scheme in IEEE 802.11 and IEEE 802.11e Wireless LANs

    Science.gov (United States)

    Lee, Bih-Hwang; Lai, Hui-Cheng

    In order to achieve the prioritized quality of service (QoS) guarantee, the IEEE 802.11e EDCAF (the enhanced distributed channel access function) provides the distinguished services by configuring the different QoS parameters to different access categories (ACs). An admission control scheme is needed to maximize the utilization of wireless channel. Most of papers study throughput improvement by solving the complicated multidimensional Markov-chain model. In this paper, we introduce a back-off model to study the transmission probability of the different arbitration interframe space number (AIFSN) and the minimum contention window size (CWmin). We propose an adaptive control scheme (ACS) to dynamically update AIFSN and CWmin based on the periodical monitoring of current channel status and QoS requirements to achieve the specific service differentiation at access points (AP). This paper provides an effective tuning mechanism for improving QoS in WLAN. Analytical and simulation results show that the proposed scheme outperforms the basic EDCAF in terms of throughput and service differentiation especially at high collision rate.

  4. Human exposure standards in the frequency range 1 Hz To 100 kHz: the case for adoption of the IEEE standard.

    Science.gov (United States)

    Patrick Reilly, J

    2014-10-01

    Differences between IEEE C95 Standards (C95.6-2002 and C95.1-2005) in the low-frequency (1 Hz-100 kHz) and the ICNIRP-2010 guidelines appear across the frequency spectrum. Factors accounting for lack of convergence include: differences between the IEEE standards and the ICNIRP guidelines with respect to biological induction models, stated objectives, data trail from experimentally derived thresholds through physical and biological principles, selection and justification of safety/reduction factors, use of probability models, compliance standards for the limbs as distinct from the whole body, defined population categories, strategies for central nervous system protection below 20 Hz, and correspondence of environmental electric field limits with contact currents. This paper discusses these factors and makes the case for adoption of the limits in the IEEE standards.

  5. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  6. A Java Reference Model of Transacted Memory for Smart Cards

    NARCIS (Netherlands)

    Poll, Erik; Hartel, Pieter H.; de Jong, Eduard

    2002-01-01

    Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part

  7. Deregulated model and locational marginal pricing

    International Nuclear Information System (INIS)

    Sood, Yog Raj; Padhy, N.P.; Gupta, H.O.

    2007-01-01

    This paper presents a generalized optimal model that dispatches the pool in combination with privately negotiated bilateral and multilateral contracts while maximizing social benefit has been proposed. This model determines the locational marginal pricing (LMP) based on marginal cost theory. It also determines the size of non-firm transactions as well as pool demand and generations. Both firms as well as non-firm transactions are considered in this model. The proposed model has been applied to IEEE-30 bus test system. In this test system different types of transactions are added for analysis of the proposed model. (author)

  8. Adaptive Radio Resource Allocation in Hierarchical QoS Scheduling for IEEE 802.16 Systems

    DEFF Research Database (Denmark)

    Wang, Hua; Dittmann, Lars

    2007-01-01

    Future mobile communication systems such as IEEE 802.16 are expected to deliver a variety of multimedia services with diverse QoS requirements. To guarantee the QoS provision, appropriate scheduler architecture and scheduling algorithms have to be carefully designed. In this paper, we propose...

  9. Transaction costs of unilateral CDM projects in India-results from an empirical survey

    International Nuclear Information System (INIS)

    Krey, Matthias

    2005-01-01

    Recently, transaction costs in the context of the Clean Development Mechanism (CDM) gained considerable attention as they were generally perceived to be significantly higher than for the other Kyoto Mechanisms. However, empirical evidence on the amount of transaction costs of CDM projects is very scarce. This paper presents the results from an empirical survey designed to quantify transaction costs of potential non-sink CDM projects in India. The definition of transaction costs of CDM projects was derived from recent literature and observations made in the current market for Certified Emission Reductions (CERs). During the survey, parts of transaction costs of 15 projects were quantified. An assessment of the results showed that specific transaction costs depend, to a large extent, on economies of scale in terms of total amount of CERs generated over the crediting period. Total transaction costs were quantified for seven projects. The costs range from 0.07 to 0.47 dollar/t CO 2 . As the projects have an emission reduction between 0.24 Mt CO 2 and 5.00 Mt CO 2 over the crediting period, the results support the assumption of Michaelowa et al. (Climate Policy 3 (2003) 273) that projects with emission reductions smaller than 0.20 Mt CO 2 are not economically viable at current CER prices

  10. IEEE 1394 CAMERA IMAGING SYSTEM FOR BROOKHAVENS BOOSTER APPLICATION FACILITY BEAM DIAGNOSTICS

    International Nuclear Information System (INIS)

    BROWN, K.A.; FRAK, B.; GASSNER, D.; HOFF, L.; OLSEN, R.H.; SATOGATA, T.; TEPIKIAN, S.

    2002-01-01

    Brookhaven's Booster Applications Facility (BAF) will deliver resonant extracted heavy ion beams from the AGS Booster to short-exposure fixed-target experiments located at the end of the BAF beam line. The facility is designed to deliver a wide range of heavy ion species over a range of intensities from 10 3 to over 10 8 ions/pulse, and over a range of energies from 0.1 to 3.0 GeV/nucleon. With these constraints we have designed instrumentation packages which can deliver the maximum amount of dynamic range at a reasonable cost. Through the use of high quality optics systems and neutral density light filters we will achieve 4 to 5 orders of magnitude in light collection. By using digital IEEE1394 camera systems we are able to eliminate the frame-grabber stage in processing and directly transfer data at maximum rates of 400 Mb/set. In this note we give a detailed description of the system design and discuss the parameters used to develop the system specifications. We will also discuss the IEEE1394 camera software interface and the high-level user interface

  11. Analysis of e-commerce transaction system’s division of labor based on essential services quantity

    Directory of Open Access Journals (Sweden)

    Li Wang

    2017-09-01

    Full Text Available Purpose – The division of labor of e-commerce transaction system is an important research topic. However, there is a certain disparity between the current mainstream research model and the reality, which leads to a biased result. This paper aims to find the effects of transaction efficiency on the evolution of e-commerce transaction system’s division of labor and the relationships between the results and other parameters. Design/methodology/approach – This paper puts forward a definition of transaction efficiency based on transaction services and establishes a model of middleman’s specialized production decision of transaction services on this basis. Findings – The research results show that the transaction efficiency plays an important role on the change of middlemen’s division of labor level. The degree of economic specialization, price of commodities and transaction services and other associated factors also affect middlemen’s division of labor. Originality/value – This paper is of great significance for evaluating the development level and forecast the development direction of e-commerce.

  12. The relationship between trading volumes, number of transactions, and stock volatility in GARCH models

    Science.gov (United States)

    Takaishi, Tetsuya; Chen, Ting Ting

    2016-08-01

    We examine the relationship between trading volumes, number of transactions, and volatility using daily stock data of the Tokyo Stock Exchange. Following the mixture of distributions hypothesis, we use trading volumes and the number of transactions as proxy for the rate of information arrivals affecting stock volatility. The impact of trading volumes or number of transactions on volatility is measured using the generalized autoregressive conditional heteroscedasticity (GARCH) model. We find that the GARCH effects, that is, persistence of volatility, is not always removed by adding trading volumes or number of transactions, indicating that trading volumes and number of transactions do not adequately represent the rate of information arrivals.

  13. Personality-Relationship transaction in young adulthood.

    Science.gov (United States)

    Neyer, F J; Asendorpf, J B

    2001-12-01

    Personality and social relationships were assessed twice across a 4-year period in a general population sample of 489 German young adults. Two kinds of personality-relationship transaction were observed. First, mean-level change in personality toward maturity (e.g., increase in Conscientiousness and decrease in Neuroticism) was moderated by the transition to partnership but was independent of other developmental transitions. Second, individual differences in personality traits predicted social relationships much better than vice versa. Specifically, once initial correlations were controlled for, Extraversion, Shyness, Neuroticism, self-esteem, and Agreeableness predicted change in various qualities of relationships (especially with friends and colleagues), whereas only quality of relationships with preschool children predicted later Extraversion and Neuroticism. Consequences for the transactional view of personality in young adulthood are discussed.

  14. Dynamic Portfolio Optimization with Transaction Costs and State-Dependent Drift

    DEFF Research Database (Denmark)

    Palczewski, Jan; Poulsen, Rolf; Schenk-Hoppe, Klaus Reiner

    2015-01-01

    The problem of dynamic portfolio choice with transaction costs is often addressed by constructing a Markov Chain approximation of the continuous time price processes. Using this approximation, we present an efficient numerical method to determine optimal portfolio strategies under time- and state......-dependent drift and proportional transaction costs. This scenario arises when investors have behavioral biases or the actual drift is unknown and needs to be estimated. Our numerical method solves dynamic optimal portfolio problems with an exponential utility function for time-horizons of up to 40 years....... It is applied to measure the value of information and the loss from transaction costs using the indifference principle....

  15. 17 CFR 229.1004 - (Item 1004) Terms of the transaction.

    Science.gov (United States)

    2010-04-01

    ... to the accounting treatment of the transaction, if material; and (xii) The federal income tax... security holders as a result of the transaction, if material; (vi) A brief statement as to the accounting... access to the corporate files of the filing person or to obtain counsel or appraisal services at the...

  16. 25 CFR 141.36 - Maximum finance charges on pawn transactions.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Maximum finance charges on pawn transactions. 141.36... PRACTICES ON THE NAVAJO, HOPI AND ZUNI RESERVATIONS Pawnbroker Practices § 141.36 Maximum finance charges on pawn transactions. No pawnbroker may impose an annual finance charge greater than twenty-four percent...

  17. 26 CFR 1.356-5 - Transactions involving gift or compensation.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 4 2010-04-01 2010-04-01 false Transactions involving gift or compensation. 1... involving gift or compensation. With respect to transactions described in sections 354, 355, or 356, but which— (a) Result in a gift, see section 2501 and following, and the regulations pertaining thereto, or...

  18. Zero tolerance for incorrect data: Best practices in SQL transaction programming

    Science.gov (United States)

    Laiho, M.; Skourlas, C.; Dervos, D. A.

    2015-02-01

    DBMS products differ in the way they support even the basic SQL transaction services. In this paper, a framework of best practices in SQL transaction programming is given and discussed. The SQL developers are advised to experiment with and verify the services supported by the DBMS product used. The framework has been developed by DBTechNet, a European network of teachers, trainers and ICT professionals. A course module on SQL transactions, offered by the LLP "DBTech VET Teachers" programme, is also presented and discussed. Aims and objectives of the programme include the introduction of the topics and content of SQL transactions and concurrency control to HE/VET curricula and addressing the need for initial and continuous training on these topics to in-company trainers, VET teachers, and Higher Education students. An overview of the course module, its learning outcomes, the education and training (E&T) content, virtual database labs with hands-on self-practicing exercises, plus instructions for the teacher/trainer on the pedagogy and the usage of the course modules' content are briefly described. The main principle adopted is to "Learn by verifying in practice" and the transactions course motto is: "Zero Tolerance for Incorrect Data".

  19. [Pay for performance explained by transaction costs theory].

    Science.gov (United States)

    Gorbaneff, Yuri; Cortes, Ariel; Torres, Sergio; Yepes, Francisco

    2011-01-01

    To evaluate the ability of transaction costs theory to explain incentives in the health care chain. We performed a case study of CPS, a health insurance company in Bogota (Colombia), which preferred not to publish its name. CPS moves in the environment of high transaction costs and uses the hybrid form of governance at the outpatient level. Incentive intensity, administrative control and the contract all agree with the theory. At the hospital level, the market is used, despite greater uncertainty. Because of the discrete form (1.0) of the incentives and the absence of administrative control, it is difficult for CPS to relate payment to hospital performance. Transaction costs theory explains the configuration of incentives. Another contribution made by this theory to the literature is the criterion to differentiate between the market and the hybrid. We propose that the market uses discrete-type (1.0) incentives, while the hybrid uses continuous, commission-like incentives. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  20. From Transactional to Transformational Accounting.

    Science.gov (United States)

    Cooper, Bruce S.; Randall, E. Vance

    1998-01-01

    Accurate transactional financial data are necessary for governmental compliance; transformational information is crucial for measuring and improving school performance. Some districts are shifting from a systems to a service, focus, from partial to full-cost accounting, from centralized to decentralized reporting procedures and facilities, and…

  1. IEEE standard for qualifying class IE equipment for nuclear power generating stations

    International Nuclear Information System (INIS)

    Anon.

    1974-01-01

    The Institute of Electrical and Electrical Engineers, Inc. (IEEE) standards for electrical equipment (Class IE) for nuclear power generating stations are given. The standards are to provide guidance for demonstrating and documenting the adequacy of electric equipment used in all Class IE and interface systems. Representative in containment design basis event conditions for the principal reactor types are included in the appendixes for guidance in enviromental simulation

  2. Predictable and reliable ECG monitoring over IEEE 802.11 WLANs within a hospital.

    Science.gov (United States)

    Park, Juyoung; Kang, Kyungtae

    2014-09-01

    Telecardiology provides mobility for patients who require constant electrocardiogram (ECG) monitoring. However, its safety is dependent on the predictability and robustness of data delivery, which must overcome errors in the wireless channel through which the ECG data are transmitted. We report here a framework that can be used to gauge the applicability of IEEE 802.11 wireless local area network (WLAN) technology to ECG monitoring systems in terms of delay constraints and transmission reliability. For this purpose, a medical-grade WLAN architecture achieved predictable delay through the combination of a medium access control mechanism based on the point coordination function provided by IEEE 802.11 and an error control scheme based on Reed-Solomon coding and block interleaving. The size of the jitter buffer needed was determined by this architecture to avoid service dropout caused by buffer underrun, through analysis of variations in transmission delay. Finally, we assessed this architecture in terms of service latency and reliability by modeling the transmission of uncompressed two-lead electrocardiogram data from the MIT-BIH Arrhythmia Database and highlight the applicability of this wireless technology to telecardiology.

  3. 12 CFR 223.33 - What rules apply to derivative transactions?

    Science.gov (United States)

    2010-01-01

    ... Requirements Under Section 23A § 223.33 What rules apply to derivative transactions? (a) Market terms... with affiliates comply with the market terms requirement of § 223.51. (c) Credit derivatives. A credit... 12 Banks and Banking 3 2010-01-01 2010-01-01 false What rules apply to derivative transactions...

  4. 37 CFR 1.2 - Business to be transacted in writing.

    Science.gov (United States)

    2010-07-01

    ... Correspondence § 1.2 Business to be transacted in writing. All business with the Patent and Trademark Office... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Business to be transacted in writing. 1.2 Section 1.2 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE...

  5. 37 CFR 2.191 - Business to be transacted in writing.

    Science.gov (United States)

    2010-07-01

    ... Trademark Cases § 2.191 Business to be transacted in writing. All business with the Office should be... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Business to be transacted in writing. 2.191 Section 2.191 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE...

  6. Continuous time Black-Scholes equation with transaction costs in subdiffusive fractional Brownian motion regime

    Science.gov (United States)

    Wang, Jun; Liang, Jin-Rong; Lv, Long-Jin; Qiu, Wei-Yuan; Ren, Fu-Yao

    2012-02-01

    In this paper, we study the problem of continuous time option pricing with transaction costs by using the homogeneous subdiffusive fractional Brownian motion (HFBM) Z(t)=X(Sα(t)), 0transaction costs of replicating strategies. We also give the total transaction costs.

  7. Economic and Mathematical Modelling of Optimisation of Transaction Expenses of Engineering Enterprises

    OpenAIRE

    Makaliuk Iryna V.

    2014-01-01

    The article identifies stages of the process of optimisation of transaction expenses. It develops an economic and mathematical model of optimisation of transaction expenses of engineering enterprises by the criterion of maximisation of income from realisation of products and system of restrictions, which envisages exceeding income growth rate over the expenses growth rate. The article offers to use types of expenses by accounting accounts as indicators of transaction expenses. In the result o...

  8. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    Science.gov (United States)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  9. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  10. Transaction hubs: can tame energy market communications

    Energy Technology Data Exchange (ETDEWEB)

    Hamilos, C.

    2002-07-01

    The nature and function of transaction hubs is described in view of their growing usefulness as electric industry deregulation takes hold and with it the urgent requirement for trading partners to exchange information quickly and efficiently. The paper stresses the many difficulties involved in communications between trading partners since each partner operates under a different set of business rules, with the result that there are 'language differences' to overcome, not to mention the sheer volume of data that must be handled. To make it all work, companies turn increasingly to products like communication hubs. They are able to overcome the fact that different companies have different systems, different data formats and different business rules, and are able to help companies to package, transmit, receive and process information. The principal advantage of a hub is that no one has to learn anyone else's interface. Everyone can continue to use their own data format and transaction models. The hub supplies the protocols and processing rules needed to work with any of the partners connected to the hub. In order to achieve the level of efficiency and reliability required in a hub, certain design principles must be satisfied. These are : scalability, facilities for load balancing, availability of standard routine services, ability to recognize a process as consisting of various transactions, and a transaction as belonging to a specific process, ability to allow the user to configure expiration times around the business processes according to market rules, facility to easily configure validation rules, ability to handle exceptions, ability to interoperate with many middle-ware products, and to manage work flow in a manner that is transparent to operating personnel.

  11. Trans-acting translational regulatory RNA binding proteins.

    Science.gov (United States)

    Harvey, Robert F; Smith, Tom S; Mulroney, Thomas; Queiroz, Rayner M L; Pizzinga, Mariavittoria; Dezi, Veronica; Villenueva, Eneko; Ramakrishna, Manasa; Lilley, Kathryn S; Willis, Anne E

    2018-05-01

    The canonical molecular machinery required for global mRNA translation and its control has been well defined, with distinct sets of proteins involved in the processes of translation initiation, elongation and termination. Additionally, noncanonical, trans-acting regulatory RNA-binding proteins (RBPs) are necessary to provide mRNA-specific translation, and these interact with 5' and 3' untranslated regions and coding regions of mRNA to regulate ribosome recruitment and transit. Recently it has also been demonstrated that trans-acting ribosomal proteins direct the translation of specific mRNAs. Importantly, it has been shown that subsets of RBPs often work in concert, forming distinct regulatory complexes upon different cellular perturbation, creating an RBP combinatorial code, which through the translation of specific subsets of mRNAs, dictate cell fate. With the development of new methodologies, a plethora of novel RNA binding proteins have recently been identified, although the function of many of these proteins within mRNA translation is unknown. In this review we will discuss these methodologies and their shortcomings when applied to the study of translation, which need to be addressed to enable a better understanding of trans-acting translational regulatory proteins. Moreover, we discuss the protein domains that are responsible for RNA binding as well as the RNA motifs to which they bind, and the role of trans-acting ribosomal proteins in directing the translation of specific mRNAs. This article is categorized under: RNA Interactions with Proteins and Other Molecules > RNA-Protein Complexes Translation > Translation Regulation Translation > Translation Mechanisms. © 2018 Medical Research Council and University of Cambridge. WIREs RNA published by Wiley Periodicals, Inc.

  12. WIH-based IEEE 802.11 ECG monitoring implementation.

    Science.gov (United States)

    Moein, A; Pouladian, M

    2007-01-01

    New wireless technologies make possible the implementation of high level integration wireless devices which allow the replacement of traditional large wired monitoring devices. It offers new functionalities to physicians and will reduce the costs. Among these functionalities, biomedical signals can be sent to other devices (PDA, PC . . . ) or processing centers, without restricting the patients' mobility. This article discusses the WIH (Ward-In-Hand) structure and the software required for its implementation before an operational example is presented with its results. The aim of this project is the development and implementation of a reduced size electrocardiograph based on IEEE 802.11 with high speed and more accuracy, which allows wireless monitoring of patients, and the insertion of the information into the Wi-Fi hospital networks.

  13. [Mobile Health: IEEE Standard for Wearable Cuffless Blood Pressure Measuring Devices].

    Science.gov (United States)

    Zhou, Xia; Wu, Wenli; Bao, Shudi

    2015-07-01

    IEEE Std 1708-2014 breaks through the traditional standards of cuff based blood pressure measuring devices and establishes a normative definition of wearable cuffless blood pressure measuring devices and the objective performance evaluation of this kind of devices. This study firstly introduces the background of the new standard. Then, the standard details will be described, and the impact of cuffless blood pressure measuring devices with the new standard on manufacturers and end users will be addressed.

  14. Fuzzy delay model based fault simulator for crosstalk delay fault test ...

    Indian Academy of Sciences (India)

    In this paper, a fuzzy delay model based crosstalk delay fault simulator is proposed. As design .... To find the quality of non-robust tests, a fuzzy delay ..... Dubois D and Prade H 1989 Processing Fuzzy temporal knowledge. IEEE Transactions ...

  15. Using Utility Functions to Control a Distributed Storage System

    Science.gov (United States)

    2008-05-01

    Pinheiro et al. [2007] suggest this is not an accurate assumption. Nicola and Goyal [1990] examined correlated failures across multiversion software...F. and Goyal, A. (1990). Modeling of correlated failures and community error recovery in multiversion software. IEEE Transactions on Software

  16. A spatiotemporal analysis of the effect of ambient temperatures on ...

    African Journals Online (AJOL)

    Julian Smit

    on the thermal behaviour of the Lunar Laser Ranging optical telescope at ... return the incident laser beam to its original direction and as a result, provide the only means ...... Propagation, IEEE Transactions on, 53(2), pp.851-860. Greve, A.

  17. 17 CFR 229.910 - (Item 910) Fairness of the transaction.

    Science.gov (United States)

    2010-04-01

    ... transaction is fair or unfair to investors and the reasons for such belief. Such discussion must address the fairness of the roll-up transaction to investors in each of the partnerships and as a whole. If the roll-up... the general partner that may affect materially the value of the consideration to be received by...

  18. The Problematic Aspects of Accounting the Transaction Costs and Ways to Address Them

    Directory of Open Access Journals (Sweden)

    Khorunzhak Nadiya M.

    2017-05-01

    Full Text Available The article is aimed at a theoretical generalization of the nature and causes of appearance of transaction costs, development of proposals on formation of an effective model for their management, including the proposals on the basis of improved accounting for brewery enterprises. According to the carried out analysis of the authors’ positions on accounting, including the positions related to reflection of transaction costs in the accounting records, it has been concluded about expediency to account such costs by types, although only in regard to the activities, directed toward sales of production. A goal tree graph has been built to ensure the rationality of research on elaborating the classification (grouping of transaction costs and on substantiating the composition of working accounts for their accounting. In order to ensure the continuity and timeliness of including the transaction costs into the prime cost of the production sold, it has been proposed to use planning and reporting calculations. An approach has been developed to determine the planned inclusion of transaction costs in the prime cost of the production sold (exponential average. An appropriate model for recording the transaction costs has been built. Prospect for further research will be construction of the efficient policy decisions concerning the enterprise’s activities, based on the above conception of the system of management of transaction costs together with its information base.

  19. A Novel Electricity Transaction Mode of Microgrids Based on Blockchain and Continuous Double Auction

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-11-01

    Full Text Available The installed capacity of distributed generation (DG based on renewable energy sources has increased continuously in power systems, and its market-oriented transaction is imperative. However, traditional transaction management based on centralized organizations has many disadvantages, such as high operation cost, low transparency, and potential risk of transaction data modification. Therefore, a decentralized electricity transaction mode for microgrids is proposed in this study based on blockchain and continuous double auction (CDA mechanism. A buyer and seller initially complete the transaction matching in the CDA market. In view of the frequent price fluctuation in the CDA market, an adaptive aggressiveness strategy is used to adjust the quotation timely according to market changes. DG and consumer exchange digital certificate of power and expenditure on the blockchain system and the interests of consumers are then guaranteed by multi-signature when DG cannot generate power due to failure or other reasons. The digital certification of electricity assets is replaced by the sequence number with specific tags in the transaction script, and the size of digital certification can be adjusted according to transaction energy quantity. Finally, the feasibility of market mechanism through specific microgrid case and settlement process is also provided.

  20. Emissions trading and transaction costs : analyzing the flaws in the discussion

    NARCIS (Netherlands)

    Woerdman, E.

    Although emissions trading lowers the costs of climate change mitigation, transaction costs (e.g. to find a trading partner) may reduce its cost-effectiveness. Some economists claim that transaction costs for Joint Implementation (JI) and Clean Development Mechanism (CDM) projects will be higher

  1. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    Energy Technology Data Exchange (ETDEWEB)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  2. Division of Labor, Transaction Cost, Emergence of the Firm and Firm Size

    OpenAIRE

    Pak-Wai Liu; Xiaokai Yang

    1999-01-01

    In this paper a general equilibrium model is constructed to explain the emergence of firms and change in firm size by the tradeoff between economies of specialization and transaction cost. We show that firms emerge from the development of division of labor if the transaction efficiency for labor is smaller than that for intermediate goods. Given the emergence of firms, change in the average size of firms (average employment) will depend on the change in transaction efficiency for intermediate...

  3. Performance Analysis of IEEE 802.15.6 CSMA/CA Protocol for WBAN Medical Scenario through DTMC Model.

    Science.gov (United States)

    Kumar, Vivek; Gupta, Bharat

    2016-12-01

    The newly drafted IEEE 802.15.6 standard for Wireless Body Area Networks (WBAN) has been concentrating on a numerous medical and non-medical applications. Such short range wireless communication standard offers ultra-low power consumption with variable data rates from few Kbps to Mbps in, on or around the proximity of the human body. In this paper, the performance analysis of carrier sense multiple access with collision avoidance (CSMA/CA) scheme based on IEEE 802.15.6 standard in terms of throughput, reliability, clear channel assessment (CCA) failure probability, packet drop probability, and end-to-end delay has been presented. We have developed a discrete-time Markov chain (DTMC) to significantly evaluate the performances of IEEE 802.15.6 CSMA/CA under non-ideal channel condition having saturated traffic condition including node wait time and service time. We also visualize that, as soon as the payload length increases the CCA failure probability increases, which results in lower node's reliability. Also, we have calculated the end-to-end delay in order to prioritize the node wait time cause by backoff and retransmission. The user priority (UP) wise DTMC analysis has been performed to show the importance of the standard especially for medical scenario.

  4. Academic Activities Transaction Extraction Based on Deep Belief Network

    Directory of Open Access Journals (Sweden)

    Xiangqian Wang

    2017-01-01

    Full Text Available Extracting information about academic activity transactions from unstructured documents is a key problem in the analysis of academic behaviors of researchers. The academic activities transaction includes five elements: person, activities, objects, attributes, and time phrases. The traditional method of information extraction is to extract shallow text features and then to recognize advanced features from text with supervision. Since the information processing of different levels is completed in steps, the error generated from various steps will be accumulated and affect the accuracy of final results. However, because Deep Belief Network (DBN model has the ability to automatically unsupervise learning of the advanced features from shallow text features, the model is employed to extract the academic activities transaction. In addition, we use character-based feature to describe the raw features of named entities of academic activity, so as to improve the accuracy of named entity recognition. In this paper, the accuracy of the academic activities extraction is compared by using character-based feature vector and word-based feature vector to express the text features, respectively, and with the traditional text information extraction based on Conditional Random Fields. The results show that DBN model is more effective for the extraction of academic activities transaction information.

  5. Research on e-commerce transaction networks using multi-agent modelling and open application programming interface

    Science.gov (United States)

    Piao, Chunhui; Han, Xufang; Wu, Harris

    2010-08-01

    We provide a formal definition of an e-commerce transaction network. Agent-based modelling is used to simulate e-commerce transaction networks. For real-world analysis, we studied the open application programming interfaces (APIs) from eBay and Taobao e-commerce websites and captured real transaction data. Pajek is used to visualise the agent relationships in the transaction network. We derived one-mode networks from the transaction network and analysed them using degree and betweenness centrality. Integrating multi-agent modelling, open APIs and social network analysis, we propose a new way to study large-scale e-commerce systems.

  6. Father Knows Best: Using Adam Smith to Teach Transactions Costs

    Science.gov (United States)

    Dupont, Brandon

    2014-01-01

    Adam Smith's moral philosophy can be used to introduce economics students to the important idea of transactions costs. The author provides a brief background in this article to Smith's moral philosophy and connects it to the costs of transacting in a way that fits easily into the standard principles of microeconomics classroom. By doing…

  7. Blockchain – The Gateway to Trust-Free Cryptographic Transactions

    DEFF Research Database (Denmark)

    Beck, Roman; Stenum Czepluch, Jacob; Lollike, Nikolaj

    2016-01-01

    Recently, the Bitcoin-underlying blockchain technology gained prominence as a solution that offers the realization of distributed trust-free systems, where economic transactions are guaranteed by the underlying blockchain. We are still at an early stage and thus require a deeper understanding...... of how the blockchain potentials can be realized, and what are the opportunities and challenges in so doing. Following a design science approach, we developed a proof of concept prototype that has the potential to replace a trust-based coffee shop payment solution that is based on an analogue, pre......-paid punch card solution. The demonstrator provides a starting point to evaluate the strengths and weaknesses of the blockchain technology when replacing a trust-based by a trust-free transaction system. We conclude that the secure and trust-free blockchain-based transaction has the potential to change many...

  8. 7th IEEE International Conference Intelligent Systems

    CERN Document Server

    Atanassov, KT; Doukovska, L; Hadjiski, M; Jotsov, V; Kacprzyk, J; Kasabov, N; Sotirov, S; Szmidt, E; Zadrożny, S; Filev, D; Jabłkowski, J; Kacprzyk, J; Krawczak, M; Popchev, I; Rutkowski, L; Sgurev, V; Sotirova, E; Szynkarczyk, P

    2015-01-01

    This two volume set of books constitutes the proceedings of the 2014  7th IEEE International Conference Intelligent Systems (IS), or IEEE IS’2014 for short, held on September 24‐26, 2014 in Warsaw, Poland. Moreover, it contains some selected papers from the collocated IWIFSGN'2014-Thirteenth International Workshop on Intuitionistic Fuzzy Sets and Generalized Nets.The conference was organized by the Systems Research Institute, Polish Academy of Sciences, Department IV of Engineering Sciences, Polish Academy of Sciences, and Industrial Institute of Automation and Measurements - PIAP.The papers included in the two proceedings volumes have been subject to a thorough review process by three highly qualified peer reviewers.Comments and suggestions from them have considerable helped improve the quality of the papers but also the division of the volumes into parts, and assignment of the papers to the best suited parts.  

  9. Reconsidering Money: Monetary Exchange with Additive Transaction Costs

    DEFF Research Database (Denmark)

    Schröder, Philipp

    2001-01-01

    Under the assumption of purely additive transaction costs in exchange, the literature on money has a standard example of direct exchange dominating indirect (monetary) exchange. From here it is frequently concluded that subadditive costs (e.g. search costs) must be examined in order to explain...... money. In contrast, this paper presents an additive transaction costs model in which the mere absence of double coincidences of wants suffices to motivate monetary exchange. Furthermore it is found that not all commodity moneys, that are collectively desirable, qualify for the core, but that all fiat...

  10. Concurrency Control in Distributed Systems with Applications to Long-Lived Transactions and Partitioned Networks.

    Science.gov (United States)

    1983-06-01

    i in partition Is ana transaction 󈧐 writes oata ooject a in partition 1I, then the conflict pair "TiTi : a" must ue Includea in tne glocal relation...It botn transactions naa written aatd ob]ect a tnen each control site woulu insert a conflict pair in the glocal relation. "TIT2 : a" and ൔii : a...DATA STUULTUhES 1. Transactions Transactions are implemented in the simulation design as a linked list structure pointed to oy a glocal variaole (TIA

  11. Allocation of Transaction Cost to Market Participants Using an Analytical Method in Deregulated Market

    Science.gov (United States)

    Jeyasankari, S.; Jeslin Drusila Nesamalar, J.; Charles Raja, S.; Venkatesh, P.

    2014-04-01

    Transmission cost allocation is one of the major challenges in transmission open access faced by the electric power sector. The purpose of this work is to provide an analytical method for allocating transmission transaction cost in deregulated market. This research work provides a usage based transaction cost allocation method based on line-flow impact factor (LIF) which relates the power flow in each line with respect to transacted power for the given transaction. This method provides the impact of line flows without running iterative power flow solution and is well suited for real time applications. The proposed method is compared with the Newton-Raphson (NR) method of cost allocation on sample six bus and practical Indian utility 69 bus systems by considering multilateral transaction.

  12. A transaction cost analysis of micropayments in mobile commerce

    OpenAIRE

    Gille, Daniel

    2005-01-01

    Personalised, location-related and differentiated services in the mobile digital economy create a demand for suitable pricing models. In the case of disaggregated “microservices” (e.g., small digitalized information or service units), as well as for the acquisition of low-value physical goods, the deployment of micropayments seems appropriate. This paper analyzes the economic efficiency of marginal transaction amounts in the m-commerce area by applying the theoretical approach of transact...

  13. IEEE transactions on vehicular technology, Vol. Vt-19, No. 1

    Science.gov (United States)

    1970-02-01

    This special issue deals not only with integrated electronic systems but with the technology that is required to achieve successful operation. To place some of the 1969 dimensions of the highway system in the United States in proper focus, we note th...

  14. Successfully navigating electricity transactions through jurisdictions in the northeast and midwest

    Energy Technology Data Exchange (ETDEWEB)

    Chappelle, H. [EES Group, Toronto, ON (Canada)

    2002-07-01

    This presentation described the framework of issues defining the effectiveness of inter-jurisdictional power transactions with reference to open market competition in Ontario and the current FERC initiative affecting transactions with adjacent markets in the United States. The opportunities and risks associated with inter-jurisdictional power transactions were pointed out, along with the interplay between forward and balancing markets. The future of the Regional Transmission Organizations (RTOs) and standard market design were also described. Inter-jurisdictional transactions were described as being a fundamental element of power markets in North America where consumers benefit from reliable supply and cost efficiency. Locational value of the delivered energy is reflected in transparent price which is determined by supply and demand. The efficient balancing markets promote liquid forward markets, as well as investment in power generation and transmission. Price risk is managed through market-based mechanisms by load-serving companies and capable consumers. Opportunities for Ontario buyers include increased reliability, increased competition among suppliers, and market drivers for demand response and innovation. Opportunities for suppliers include additional customers, hedge transactions across jurisdictions, and portfolio strategies. Opportunities for risk managers include broader, more liquid markets for standard products, robust markets for energy-linked commodities, and an increased need for customized, highly-structured financial products. 11 figs.

  15. Successfully navigating electricity transactions through jurisdictions in the northeast and midwest

    International Nuclear Information System (INIS)

    Chappelle, H.

    2002-01-01

    This presentation described the framework of issues defining the effectiveness of inter-jurisdictional power transactions with reference to open market competition in Ontario and the current FERC initiative affecting transactions with adjacent markets in the United States. The opportunities and risks associated with inter-jurisdictional power transactions were pointed out, along with the interplay between forward and balancing markets. The future of the Regional Transmission Organizations (RTOs) and standard market design were also described. Inter-jurisdictional transactions were described as being a fundamental element of power markets in North America where consumers benefit from reliable supply and cost efficiency. Locational value of the delivered energy is reflected in transparent price which is determined by supply and demand. The efficient balancing markets promote liquid forward markets, as well as investment in power generation and transmission. Price risk is managed through market-based mechanisms by load-serving companies and capable consumers. Opportunities for Ontario buyers include increased reliability, increased competition among suppliers, and market drivers for demand response and innovation. Opportunities for suppliers include additional customers, hedge transactions across jurisdictions, and portfolio strategies. Opportunities for risk managers include broader, more liquid markets for standard products, robust markets for energy-linked commodities, and an increased need for customized, highly-structured financial products. 11 figs

  16. Development of Spreadsheet-Based Integrated Transaction Processing Systems and Financial Reporting Systems

    Science.gov (United States)

    Ariana, I. M.; Bagiada, I. M.

    2018-01-01

    Development of spreadsheet-based integrated transaction processing systems and financial reporting systems is intended to optimize the capabilities of spreadsheet in accounting data processing. The purpose of this study are: 1) to describe the spreadsheet-based integrated transaction processing systems and financial reporting systems; 2) to test its technical and operational feasibility. This study type is research and development. The main steps of study are: 1) needs analysis (need assessment); 2) developing spreadsheet-based integrated transaction processing systems and financial reporting systems; and 3) testing the feasibility of spreadsheet-based integrated transaction processing systems and financial reporting systems. The technical feasibility include the ability of hardware and operating systems to respond the application of accounting, simplicity and ease of use. Operational feasibility include the ability of users using accounting applications, the ability of accounting applications to produce information, and control applications of the accounting applications. The instrument used to assess the technical and operational feasibility of the systems is the expert perception questionnaire. The instrument uses 4 Likert scale, from 1 (strongly disagree) to 4 (strongly agree). Data were analyzed using percentage analysis by comparing the number of answers within one (1) item by the number of ideal answer within one (1) item. Spreadsheet-based integrated transaction processing systems and financial reporting systems integrate sales, purchases, and cash transaction processing systems to produce financial reports (statement of profit or loss and other comprehensive income, statement of changes in equity, statement of financial position, and statement of cash flows) and other reports. Spreadsheet-based integrated transaction processing systems and financial reporting systems is feasible from the technical aspects (87.50%) and operational aspects (84.17%).

  17. How to increase the benefits of cooperation: Effects of training in transactive communication on cooperative learning.

    Science.gov (United States)

    Jurkowski, Susanne; Hänze, Martin

    2015-09-01

    Transactive communication means referring to and building on a learning partner's idea, by, for example, extending the partner's idea or interlinking the partner's idea with an idea of one's own. This transforms the partner's idea into a more elaborate one. Previous research found a positive relationship between students' transactive communication and their learning results when working in small groups. To increase the benefits of cooperation, we developed and tested a module for training students in transactive communication. We assumed that this training would enhance students' transactive communication and also increase their knowledge acquisition during cooperative learning. Further, we distinguished between an actor's transactive communication and a learning partner's transactive communication and expected both to be positively associated with an actor's knowledge acquisition. Participants were 80 university students. In an experiment with pre- and post-test measurements, transactive communication was measured by coding students' communication in a cooperative learning situation before training and in another cooperative learning situation after training. For the post-test cooperative learning situation, knowledge was pre-tested and post-tested. Trained students outperformed controls in transactive communication and in knowledge acquisition. Positive training effects on actors' knowledge acquisition were partially mediated by the improved actors' transactive communication. Moreover, actors' knowledge acquisition was positively influenced by learning partners' transactive communication. Results show a meaningful increase in the benefits of cooperation through the training in transactive communication. Furthermore, findings indicate that students benefit from both elaborating on their partner's ideas and having their own ideas elaborated on. © 2015 The British Psychological Society.

  18. Evaluation for In-Vessel Retention Capabilities with In-Vessel Injection and External Reactor Vessel Cooling

    International Nuclear Information System (INIS)

    Lee, Jeong Seong; Ryu, In Chul; Moon, Young Tae

    2016-01-01

    If the accident has not progressed to the point of substantial changes in the core geometry, establishing adequate cooling is as straightforward as re-establishing flow through the reactor core. However, if the accident has progressed to the point where the core geometry is substantially altered as a result of material melting and relocation, as was the case in the TMI-2 accident, the means of cooling the debris are not as straightforward. From this time on, the reactor core was either completely or nearly covered by water, with high pressure injection flow initiated shortly after three hours into the accident. However, the core debris was not coolable in this configuration and a substantial quantity of molten core material drained into the bypass region, with approximately twenty metric tons of molten debris draining into the reactor pressure vessel (RPV) lower head. Hence, the core configuration developed at approximately three hours into the accident was not coolable, even submerged in water. The purpose of this paper is to evaluate in-vessel retention capabilities with in-vessel injection (IVI) and external reactor vessel cooling (ERVC) available in a reactor application by using the integrated severe accident analysis code. The MAAP5 models were improved to facilitate evaluation of the in-vessel retention capability of APR1400. In-vessel retention capabilities have been analyzed for the APR1400 using the MAAP5.03 code. The results show that in-vessel retention is feasible when in-vessel injection is initiated within a relatively short time frame under the simulation condition used in the present study

  19. Evaluation for In-Vessel Retention Capabilities with In-Vessel Injection and External Reactor Vessel Cooling

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Seong; Ryu, In Chul; Moon, Young Tae [KEPCO Engineering and Construction Co. Ltd., Deajeon (Korea, Republic of)

    2016-10-15

    If the accident has not progressed to the point of substantial changes in the core geometry, establishing adequate cooling is as straightforward as re-establishing flow through the reactor core. However, if the accident has progressed to the point where the core geometry is substantially altered as a result of material melting and relocation, as was the case in the TMI-2 accident, the means of cooling the debris are not as straightforward. From this time on, the reactor core was either completely or nearly covered by water, with high pressure injection flow initiated shortly after three hours into the accident. However, the core debris was not coolable in this configuration and a substantial quantity of molten core material drained into the bypass region, with approximately twenty metric tons of molten debris draining into the reactor pressure vessel (RPV) lower head. Hence, the core configuration developed at approximately three hours into the accident was not coolable, even submerged in water. The purpose of this paper is to evaluate in-vessel retention capabilities with in-vessel injection (IVI) and external reactor vessel cooling (ERVC) available in a reactor application by using the integrated severe accident analysis code. The MAAP5 models were improved to facilitate evaluation of the in-vessel retention capability of APR1400. In-vessel retention capabilities have been analyzed for the APR1400 using the MAAP5.03 code. The results show that in-vessel retention is feasible when in-vessel injection is initiated within a relatively short time frame under the simulation condition used in the present study.

  20. 25 CFR 141.41 - Refinancing transaction.

    Science.gov (United States)

    2010-04-01

    ... keeping requirements of this part and requires the issuance of a new ticket or receipt. (c) The rate of... as extended. (e) The default and sale procedures of this part apply to a refinanced pawn transaction...