Security Enhanced EMV-Based Mobile Payment Protocol
2014-01-01
Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334
Security enhanced EMV-based mobile payment protocol.
Yang, Ming-Hour
2014-01-01
Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.
NASA Astrophysics Data System (ADS)
Johannessen, Sophia C.; Macdonald, Robie W.
2018-03-01
In their comment on the review paper, ‘Geoengineering with seagrasses: is credit due where credit is given?,’ Oreska et al 2018 state that some of the concerns raised in the review ‘warrant serious consideration by the seagrass research community,’ but they argue that these concerns are either not relevant to the Voluntary Carbon Standard protocol, VM0033, or are already addressed by specific provisions in the protocol. The VM0033 protocol is a strong and detailed document that includes much of merit, but the methodology for determining carbon sequestration in sediment is flawed, both in the carbon stock change method and in the carbon burial method. The main problem with the carbon stock change method is that the labile carbon in the surface layer of sediments is vulnerable to remineralization and resuspension; it is not sequestered on the 100 year timescale required for carbon credits. The problem with the carbon burial method is chiefly in its application. The protocol does not explain how to apply 210Pb-dating to a core, leaving project proponents to apply the inappropriate methods frequently reported in the blue carbon literature, which result in overestimated sediment accumulation rates. Finally, the default emission factors permitted by the protocol are based on literature values that are themselves too high. All of these problems can be addressed, which should result in clearer, more rigorous guidelines for awarding carbon credits for the protection or restoration of seagrass meadows.
Ocean fertilization, carbon credits and the Kyoto Protocol
NASA Astrophysics Data System (ADS)
Westley, M. B.; Gnanadesikan, A.
2008-12-01
Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization are unlikely to meet the Kyoto Protocol's verification and accounting standards for trading carbon credits on the regulated market. The marketability of ocean fertilization in the voluntary carbon marketplace will likely depend on companies' efforts to minimize environmental risks and consumers' willingness to accept remaining risks.
Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function
NASA Astrophysics Data System (ADS)
Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).
Carbon Offsets in California: What Role for Earth Scientists in the Policy Process? (Invited)
NASA Astrophysics Data System (ADS)
Cullenward, D.; Strong, A. L.
2013-12-01
This talk addresses the policy structure in California for developing and approving carbon offset protocols, which rely on findings from the environmental and earth sciences communities. In addition to providing an overview of the legal requirements of carbon offsets, we describe a series of case studies of how scientists can engage with policymakers. Based on those experiences, we suggest ways for the earth sciences community to become more involved in climate policy development. California's climate law, known as AB 32, requires that major sectors of the state's economy reduce their emissions to 1990 levels by 2020. As part of AB 32, the California Air Resources Board created a cap-and-trade market to ensure compliance with the statutory target. Under this system, regulated companies have to acquire tradable emissions permits (called 'compliance instruments') for the greenhouse gas emissions they release. The State allocates a certain number of allowances to regulated entities through a mixture of auctions and free transfers, with the total number equal to the overall emissions target; these allowances, along with approved offsets credits, are the compliance instruments that regulated entities are required to obtain by law. One of the key policy design issues in California's cap-and-trade market concerns the use of carbon offsets. Under AB 32, the Air Resources Board can issue offset credits to project developers who reduce emissions outside of the capped sectors (electricity, industry, and transportation)--or even outside of California--pursuant to approved offset protocols. Project developers then sell the credits to regulated companies in California. Essentially, offsets allow regulated entities in California to earn credit for emissions reductions that take place outside the scope of AB 32. Many regulated entities and economists are in favor of offsets because they view them as a source of low-cost compliance instruments. On the other hand, critics argue that some offset protocols award credits for activities that would have occurred anyway; by replacing a company's need to acquire an allowance in the carbon market, critics believe that poorly designed offset protocols increase greenhouse gas emissions. Thus, the effectiveness of the policy approach depends on the scientific integrity of the offset protocols. To date, California has approved offset protocols for emissions reductions in four applications: (1) forestry, (2) urban forestry, (3) livestock, and (4) destruction of ozone-depleting substances. In addition, the State is currently considering protocols that would address (5) methane emissions from mining and (6) greenhouse gas reductions from improved rice cultivation practices. These protocols rely heavily on findings from the environmental and earth sciences communities, especially when the protocol subject involves land use or land use change. Yet, due to budget constraints, the Air Resources Board is relying primarily on third-party protocol developers to design and propose the detailed structures under which offset credits will be issued. Despite the fact that any member of the public may participate in the governance regime that leads to protocol approvals, few scientists or scientific organizations provide input into the policy process. We use case studies from several of the California protocols to illustrate ways scientists can apply their skills to a crucial stage of climate policy development.
Maintenance of Certification Part 4 Credit and recruitment for practice-based research.
Gorzkowski, Julie A; Klein, Jonathan D; Harris, Donna L; Kaseeska, Kristen R; Whitmore Shaefer, Regina M; Bocian, Alison B; Davis, James B; Gotlieb, Edward M; Wasserman, Richard C
2014-10-01
Competing priorities in pediatric practice have created challenges for practice-based research. To increase recruitment success, researchers must design studies that provide added value to participants. This study evaluates recruitment of pediatricians into a study, before and after the development and addition of a quality improvement (QI) curriculum approved for American Board of Pediatrics Maintenance of Certification (MOC) Part 4 Credit as an enrollment incentive. Researchers implemented multiple outreach methods to enroll pediatric practices over 28 months. Field note review revealed that many physicians declined enrollment, stating that they prioritized MOC Part 4 projects over research studies. A QI curriculum meeting standards for MOC Part 4 Credit was developed and added to the study protocol as an enrollment incentive. Enrollment rates and characteristics of practitioners enrolled pre- and post-MOC were compared. Pre-MOC enrollment contributed 48% of practices in 22 months; post-MOC enrollment contributed 49% of practices in 6 months. An average of 3.5 practices enrolled per month pre-MOC, compared with 13.1 per month post-MOC (P < .001). Clinicians in pre- and post-MOC groups were similar in age, gender, race, and time spent on patient care; practices enrolled post-MOC were more likely to be located in federally designated Medically Underserved Areas than those enrolled pre-MOC (28.6% vs 12%, P = .03). Addition of MOC Part 4 Credit increased recruitment success and increased enrollment of pediatricians working in underserved areas. Including QI initiatives meeting MOC Part 4 criteria in practice-based research protocols may enhance participation and aid in recruiting diverse practice and patient populations. Copyright © 2014 by the American Academy of Pediatrics.
Spectrum Efficiency Through Dynamic Spectrum Access Techniques (Briefing Charts)
2014-06-01
Telemetry Data Sources IP BASED TELEMETRY STATION Flow control • Volume- based • Credit- based • Rate- based Signaling using custom protocols or standards...Responsible for all T&E infrastructure assessment within the Major Range and Test Facility Base (MRTFB) DoD Directive 3200.11 • Administer three...Memorandum Unleashing of the Wireless Broadband Revolution THE WHY: Based on the view that “we are now beginning the next transformation in
Market-based control mechanisms for patient safety
Coiera, E; Braithwaite, J
2009-01-01
A new model is proposed for enhancing patient safety using market-based control (MBC), inspired by successful approaches to environmental governance. Emissions trading, enshrined in the Kyoto protocol, set a carbon price and created a carbon market—is it possible to set a patient safety price and let the marketplace find ways of reducing clinically adverse events? To “cap and trade,” a regulator would need to establish system-wide and organisation-specific targets, based on the cost of adverse events, create a safety market for trading safety credits and then police the market. Organisations are given a clear policy signal to reduce adverse event rates, are told by how much, but are free to find mechanisms best suited to their local needs. The market would inevitably generate novel ways of creating safety credits, and accountability becomes hard to evade when adverse events are explicitly measured and accounted for in an organisation’s bottom line. PMID:19342522
Contingent feasibility for forest carbon credit: evidence from South Korean firms.
Roh, TaeWoo; Koo, Ja-Choon; Cho, Dong-Sung; Youn, Yeo-Chang
2014-11-01
Under the Kyoto Protocol, a global governmental response to climate change, protocol signatories make an effort to cut their greenhouse gas emissions. South Korea is not included in the list of Annex I countries; yet, South Korea is the seventh highest emitter of CO2. The South Korean government has enacted various institutional policies to encourage greenhouse gas reductions. While previous studies have focused on the guidance that reflects the stance of suppliers in the carbon market, this study focuses on South Korean firms' actual demand for forest carbon credits. By applying the contingent valuation method, we estimated domestic firms' willingness to pay for forest carbon credits. We then applied a rank-ordered logistic regression to confirm whether the rank of forest carbon credits, as compared to any other carbon credit, is influenced by a firm's characteristics. The results showed that Korean firms are willing to pay 5.45 USD/tCO2 and 7.77 USD/tCO2 for forest carbon credits in domestic and overseas forest carbon projects, respectively. Therefore, the introduction of forest carbon credits in the Korean carbon market seems reasonable. Analysis of the priority rankings of forest carbon credits, however, demonstrated that forestry projects were least likely to be ranked by firms as their first priority. Although relative preferences for forest carbon credits were influenced by individual firms' characteristics such as prior experience of environmental CSR related activities and whether the firm established an emissions reduction plan, the impact of perceived behavior control, whether the firm was included in the emissions target management scheme on forest carbon credits was negligible. Therefore, forest carbon credits are not a feasible solution without strong government support or institutional instruments. The results of this study are expected to provide policy makers with realistic approaches to formulate climatic change-related policies. Copyright © 2014 Elsevier Ltd. All rights reserved.
NREL Adds Eyes, Brains to Occupancy Detection | News | NREL
communicates this information with building automation systems via standard protocols. Credit: Dennis Schroeder microprocessor and the camera. Credit: Dennis Schroeder IPOS can detect with almost 100% accuracy the number of : Dennis Schroeder Brackney and Gentile Polese said they started working on the idea for IPOS because
NASA Astrophysics Data System (ADS)
Tonitto, C.; Gurwick, N. P.
2012-12-01
Policy initiatives to reduce greenhouse gas emissions (GHG) have promoted the development of agricultural management protocols to increase SOC storage and reduce GHG emissions. We review approaches for quantifying N2O flux from agricultural landscapes. We summarize the temporal and spatial extent of observations across representative soil classes, climate zones, cropping systems, and management scenarios. We review applications of simulation and empirical modeling approaches and compare validation outcomes across modeling tools. Subsequently, we review current model application in agricultural management protocols. In particular, we compare approaches adapted for compliance with the California Global Warming Solutions Act, the Alberta Climate Change and Emissions Management Act, and by the American Carbon Registry. In the absence of regional data to drive model development, policies that require GHG quantification often use simple empirical models based on highly aggregated data of N2O flux as a function of applied N - Tier 1 models according to IPCC categorization. As participants in development of protocols that could be used in carbon offset markets, we observed that stakeholders outside of the biogeochemistry community favored outcomes from simulation modeling (Tier 3) rather than empirical modeling (Tier 2). In contrast, scientific advisors were more accepting of outcomes based on statistical approaches that rely on local observations, and their views sometimes swayed policy practitioners over the course of policy development. Both Tier 2 and Tier 3 approaches have been implemented in current policy development, and it is important that the strengths and limitations of both approaches, in the face of available data, be well-understood by those drafting and adopting policies and protocols. The reliability of all models is contingent on sufficient observations for model development and validation. Simulation models applied without site-calibration generally result in poor validation results, and this point particularly needs to be emphasized during policy development. For cases where sufficient calibration data are available, simulation models have demonstrated the ability to capture seasonal patterns of N2O flux. The reliability of statistical models likewise depends on data availability. Because soil moisture is a significant driver of N2O flux, the best outcomes occur when empirical models are applied to systems with relevant soil classification and climate. The structure of current carbon offset protocols is not well-aligned with a budgetary approach to GHG accounting. Current protocols credit field-scale reduction in N2O flux as a result of reduced fertilizer use. Protocols do not award farmers credit for reductions in CO2 emissions resulting from reduced production of synthetic N fertilizer. To achieve the greatest GHG emission reductions through reduced synthetic N production and reduced landscape N saturation requires a re-envisioning of the agricultural landscape to include cropping systems with legume and manure N sources. The current focus on on-farm GHG sources focuses credits on simple reductions of N applied in conventional systems rather than on developing cropping systems which promote higher recycling and retention of N.
NASA Astrophysics Data System (ADS)
Naik, V.; Mauzerall, D. L.; Horowitz, L.; Schwarzkopf, D.; Ramaswamy, V.; Oppenheimer, M.
2004-12-01
The global distribution of tropospheric ozone (O3) depends on the location of emissions of its precursors in addition to chemical and dynamical factors. The global picture of O3 forcing is, therefore, a sum of regional forcings arising from emissions of precursors from different sources. The Kyoto Protocol does not include ozone as a greenhouse gas, and emission reductions of ozone precursors made under Kyoto or any similar agreement would presently receive no credit. In this study, we quantitatively estimate the contribution of emissions of nitrogen oxides (NOx), the primary limiting O3 precursor in the non-urban atmosphere, from specific countries and regions of the world to global O3 concentration distributions. We then estimate radiative forcing resulting from the regional perturbations of NOx emissions. This analysis is intended as an early step towards incorporating O3 into the Kyoto Protocol or any successor agreement. Under such a system countries could obtain credit for improvements in local air quality that result in reductions of O3 concentrations because of the associated reductions in radiative forcing. We use the global chemistry transport model, MOZART-2, to simulate the global O3 distribution for base year 1990 and perturbations to this distribution caused by a 10% percent reduction in the base emissions of NOx from the United States, Europe, East Asia, India, South America, and Africa. We calculate the radiative forcing for the simulated base and perturbed O3 distributions using the GFDL radiative transfer model. The difference between the radiative forcing from O3 for the base and perturbed distributions provides an estimate of the marginal radiative forcing from a region's emissions of NOx. We will present a quantitative analysis of the magnitude, spatial, and temporal distribution of radiative forcing resulting from marginal changes in the NOx emissions from each region.
British Columbia/Alberta Transfer System Protocol
ERIC Educational Resources Information Center
British Columbia Council on Admissions and Transfer, 2007
2007-01-01
The purpose of this agreement is to provide assurance to students that they will receive transfer credit for courses or programs they have successfully completed where the content/outcomes are demonstrably equivalent to those offered at the institution to which they transfer. This protocol is undertaken by the British Columbia Council on…
Overholser, Brian R; Foster, David R; Henry, Joshua R; Plake, Kimberly S; Sowinski, Kevin M
2010-11-10
To assess the impact of an elective clinical research course on second- and third-year pharmacy students' knowledge of clinical research methods, training programs, career options, and interest in pursuing postgraduate training. A 2-credit hour elective course in clinical research was designed that included lectures, discussions, workshops, and in-class presentations related to study design and implementation, protocol synthesis, research evaluation, ethical and legal considerations, data analysis, and professional opportunities involving clinical research. Learner knowledge of these topics was assessed using several methods, including 3 assignments related to research protocol, ethical documentation, and presentation. A survey instrument designed to evaluate the effect the course had on pharmacy students' knowledge of clinical research methods and interest in pursuing postgraduate training in clinical research was administered. Students who completed the elective had a greater level of familiarity with research-related topics, training options, and career opportunities (p < 0.05) and a greater interest in pursuing a career in clinical research (p < 0.05) than did students in a matched control group. Taking a 2-credit hour elective course in clinical research increased pharmacy students' interest in pursuing a career in clinical research.
Designing and application of SAN extension interface based on CWDM
NASA Astrophysics Data System (ADS)
Qin, Leihua; Yu, Shengsheng; Zhou, Jingli
2005-11-01
As Fibre Channel (FC) becomes the protocol of choice within corporate data centers, enterprises are increasingly deploying SANs in their data central. In order to mitigate the risk of losing data and improve the availability of data, more and more enterprises are increasingly adopting storage extension technologies to replicate their business critical data to a secondary site. Transmitting this information over distance requires a carrier grade environment with zero data loss, scalable throughput, low jitter, high security and ability to travel long distance. To address this business requirements, there are three basic architectures for storage extension, they are Storage over Internet Protocol, Storage over Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) and Storage over Dense Wavelength Division Multiplexing (DWDM). Each approach varies in functionality, complexity, cost, scalability, security, availability , predictable behavior (bandwidth, jitter, latency) and multiple carrier limitations. Compared with these connectiviy technologies,Coarse Wavelength Division Multiplexing (CWDM) is a Simplified, Low Cost and High Performance connectivity solutions for enterprises to deploy their storage extension. In this paper, we design a storage extension connectivity over CWDM and test it's electrical characteristic and random read and write performance of disk array through the CWDM connectivity, testing result show us that the performance of the connectivity over CWDM is acceptable. Furthermore, we propose three kinds of network architecture of SAN extension based on CWDM interface. Finally the credit-Based flow control mechanism of FC, and the relationship between credits and extension distance is analyzed.
Integration and Improvement of Geophysical Root Biomass Measurements for Determining Carbon Credits
NASA Astrophysics Data System (ADS)
Boitet, J. I.
2013-12-01
Carbon trading schemes fundamentally rely on accurate subsurface carbon quantification in order for governing bodies to grant carbon credits inclusive of root biomass (What is Carbon Credit. 2013). Root biomass makes up a large chunk of the subsurface carbon and is difficult, labor intensive, and costly to measure. This paper stitches together the latest geophysical root measurement techniques into site-dependent recommendations for technique combinations and modifications that maximize large-scale root biomass measurement accuracy and efficiency. "Accuracy" is maximized when actual root biomass is closest to measured root biomass. "Efficiency" is maximized when time, labor, and cost of measurement is minimized. Several combinations have emerged which satisfy both criteria under different site conditions. Use of ground penetrating radar (GPR) and/or electrical resistivity tomography (ERT) allow for large tracts of land to be surveyed under appropriate conditions. Among other characteristics, GPR does best with detecting coarse roots in dry soil. ERT does best in detecting roots in moist soils, but is especially limited by electrode configuration (Mancuso, S. 2012). Integration of these two technologies into a baseline protocol based on site-specific characteristics, especially soil moisture and plants species heterogeneity, will drastically theoretically increase efficiency and accuracy of root biomass measurements. Modifications of current measurement protocols using these existing techniques will also theoretically lead to drastic improvements in both accuracy and efficiency. These modifications, such as efficient 3D imaging by adding an identical electrode array perpendicular to the first array used in the Pulled Array Continuous Electrical Profiling (PACEP) technique for ERT, should allow for more widespread application of these techniques for understanding root biomass. Where whole-site measurement is not feasible either due to financial, equipment, or physical limitations, measurements from randomly selected plots must be assumed representative of the entire system and scaled up. This scaling introduces error roughly inversely proportional to the number and size of plots measured. References Mancuso, S. (2012). Measuring roots: An updated approach Springer. What is carbon credit. (2013). Retrieved 7/20, 2013, from http://carbontradexchange.com/knowledge/what-is-carbon-credit
Ruseva, T; Marland, E; Szymanski, C; Hoyle, J; Marland, G; Kowalczyk, T
2017-08-01
A key component of California's cap-and-trade program is the use of carbon offsets as compliance instruments for reducing statewide GHG emissions. Under this program, offsets are tradable credits representing real, verifiable, quantifiable, enforceable, permanent, and additional reductions or removals of GHG emissions. This paper focuses on the permanence and additionality standards for offset credits as defined and operationalized in California's Compliance Offset Protocol for U.S. Forest Projects. Drawing on a review of the protocol, interviews, current offset projects, and existing literature, we discuss how additionality and permanence standards relate to project participation and overall program effectiveness. Specifically, we provide an overview of offset credits as compliance instruments in California's cap-and-trade program, the timeline for a forest offset project, and the factors shaping participation in offset projects. We then discuss the implications of permanence and additionality at both the project and program levels. Largely consistent with previous work, we find that stringent standards for permanent and additional project activities can present barriers to participation, but also, that there may be a trade-off between project quality and quantity (i.e. levels of participation) when considering overall program effectiveness. We summarize what this implies for California's forest offset program and provide suggestions for improvements in light of potential program diffusion and policy learning. Copyright © 2017 Elsevier Ltd. All rights reserved.
Designing a carbon market that protects forests in developing countries.
Niesten, Eduard; Frumhoff, Peter C; Manion, Michelle; Hardner, Jared J
2002-08-15
Firmly incorporated into the Kyoto Protocol, market mechanisms offer an innovative and cost-effective means of controlling atmospheric concentrations of greenhouse gases. However, as with markets for many other goods and services, a carbon market may generate negative environmental externalities. Possible interpretations and application of Kyoto provisions under COP-6bis and COP-7 raise concerns that rules governing forestry with respect to the Kyoto carbon market may increase pressure on native forests and their biodiversity in developing countries. In this paper, we assess the following two specific concerns with Kyoto provisions for forestry measures. First, whether, under the Clean Development Mechanism (CDM), by restricting allowable forestry measures to afforestation and reforestation, and explicitly excluding protection of threatened native forests, the Kyoto Protocol will enhance incentives for degradation and clearing of forests in developing countries; second, whether carbon crediting for forest management in Annex I (industrialized) regions under Article 3.4 creates a dynamic that can encourage displacement of timber harvests from Annex I countries to developing nations. Given current timber extraction patterns in developing regions, additional harvest pressure would certainly entail a considerable cost in terms of biodiversity loss. In both cases, we find that the concerns about deleterious impacts to forests and biodiversity are justified, although the scale of such impacts is difficult to predict. Both to ensure reliable progress in managing carbon concentrations and to avoid unintended consequences with respect to forest biodiversity, the further development of the Kyoto carbon market must explicitly correct these perverse incentives. We recommend several steps that climate policymakers can take to ensure that conservation and restoration of biodiversity-rich natural forests in developing countries are rewarded rather than penalized. To correct incentives to clear natural forests through CDM crediting for afforestation and reforestation, we recommend for the first commitment period that policymakers establish an early base year, such as 1990, such that lands cleared after that year would be ineligible for crediting. We further recommend an exception to this rule for CDM projects that are explicitly designed to promote natural forest restoration and that pass rigorous environmental impact review. Restoration efforts are typically most effective on lands that are adjacent to standing forests and hence likely to have been recently cleared. Thus, we recommend for these projects establishing a more recent base year, such as 2000. For the second and subsequent commitment periods, we recommend that climate policymakers act to restrain inter-annex leakage and its impacts by ensuring that crediting for forest management in industrialized countries is informed by modelling efforts to anticipate the scale of leakage associated with different Annex I 'Land use, land-use change and forestry' policy options, and coupled with effective measures to protect natural forests in developing countries. The latter should include expanding the options permitted under the CDM to carbon crediting for projects that protect threatened forests from deforestation and forest degradation. Ultimately, carbon market incentives for forest clearing can be reduced and incentives for forest conservation most effectively strengthened by fully capturing carbon emissions associated with deforestation and forest degradation in developing countries under a future emissions cap. Finally, we note that these recommendations have broader relevance to any forest-based measures to reduce greenhouse-gas emissions developed outside of the specific context of the Kyoto Protocol.
Central FPGA-based destination and load control in the LHCb MHz event readout
NASA Astrophysics Data System (ADS)
Jacobsson, R.
2012-10-01
The readout strategy of the LHCb experiment is based on complete event readout at 1 MHz. A set of 320 sub-detector readout boards transmit event fragments at total rate of 24.6 MHz at a bandwidth usage of up to 70 GB/s over a commercial switching network based on Gigabit Ethernet to a distributed event building and high-level trigger processing farm with 1470 individual multi-core computer nodes. In the original specifications, the readout was based on a pure push protocol. This paper describes the proposal, implementation, and experience of a non-conventional mixture of a push and a pull protocol, akin to credit-based flow control. An FPGA-based central master module, partly operating at the LHC bunch clock frequency of 40.08 MHz and partly at a double clock speed, is in charge of the entire trigger and readout control from the front-end electronics up to the high-level trigger farm. One FPGA is dedicated to controlling the event fragment packing in the readout boards, the assignment of the farm node destination for each event, and controls the farm load based on an asynchronous pull mechanism from each farm node. This dynamic readout scheme relies on generic event requests and the concept of node credit allowing load control and trigger rate regulation as a function of the global farm load. It also allows the vital task of fast central monitoring and automatic recovery in-flight of failing nodes while maintaining dead-time and event loss at a minimum. This paper demonstrates the strength and suitability of implementing this real-time task for a very large distributed system in an FPGA where no random delays are introduced, and where extreme reliability and accurate event accounting are fundamental requirements. It was in use during the entire commissioning phase of LHCb and has been in faultless operation during the first two years of physics luminosity data taking.
Show, K Y; Ng, C A; Faiza, A R; Wong, L P; Wong, L Y
2011-01-01
Conventional aerobic and low-rate anaerobic processes such as pond and open-tank systems have been widely used in wastewater treatment. In order to improve treatment efficacy and to avoid greenhouse gas emissions, conventional treatment can be upgraded to a high performance anaerobic granular-sludge system. The anaerobic granular-sludge systems are designed to capture the biogas produced, rendering a potential for claims of carbon credits under the Kyoto Protocol for reducing emissions of greenhouse gases. Certified Emission Reductions (CERs) would be issued, which can be exchanged between businesses or bought and sold in international markets at the prevailing market prices. As the advanced anaerobic granular systems are capable of handling high organic loadings concomitant with high strength wastewater and short hydraulic retention time, they render more carbon credits than other conventional anaerobic systems. In addition to efficient waste degradation, the carbon credits can be used to generate revenue and to finance the project. This paper presents a scenario on emission avoidance based on a methane recovery and utilization project. An example analysis on emission reduction and an overview of the global emission market are also outlined.
Carbon Trading Protocols for Geologic Sequestration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoversten, Shanna
2008-08-07
Carbon capture and storage (CCS) could become an instrumental part of a future carbon trading system in the US. If the US starts operating an emissions trading scheme (ETS) similar to that of the European Union's then limits on CO{sub 2} emissions will be conservative in the beginning stages. The government will most likely start by distributing most credits for free; these free credits are called allowances. The US may follow the model of the EU ETS, which during the first five-year phase distributed 95% of the credits for free, bringing that level down to 90% for the second five-yearmore » phase. As the number of free allowances declines, companies will be forced to purchase an increasing number of credits at government auction, or else obtain them from companies selling surplus credits. In addition to reducing the number of credits allocated for free, with each subsequent trading period the number of overall credits released into the market will decline in an effort to gradually reduce overall emissions. Companies may face financial difficulty as the value of credits continues to rise due to the reduction of the number of credits available in the market each trading period. Governments operating emissions trading systems face the challenge of achieving CO{sub 2} emissions targets without placing such a financial burden on their companies that the country's economy is markedly affected.« less
Real-time distributed scheduling algorithm for supporting QoS over WDM networks
NASA Astrophysics Data System (ADS)
Kam, Anthony C.; Siu, Kai-Yeung
1998-10-01
Most existing or proposed WDM networks employ circuit switching, typically with one session having exclusive use of one entire wavelength. Consequently they are not suitable for data applications involving bursty traffic patterns. The MIT AON Consortium has developed an all-optical LAN/MAN testbed which provides time-slotted WDM service and employs fast-tunable transceivers in each optical terminal. In this paper, we explore extensions of this service to achieve fine-grained statistical multiplexing with different virtual circuits time-sharing the wavelengths in a fair manner. In particular, we develop a real-time distributed protocol for best-effort traffic over this time-slotted WDM service with near-optical fairness and throughput characteristics. As an additional design feature, our protocol supports the allocation of guaranteed bandwidths to selected connections. This feature acts as a first step towards supporting integrated services and quality-of-service guarantees over WDM networks. To achieve high throughput, our approach is based on scheduling transmissions, as opposed to collision- based schemes. Our distributed protocol involves one MAN scheduler and several LAN schedulers (one per LAN) in a master-slave arrangement. Because of propagation delays and limits on control channel capacities, all schedulers are designed to work with partial, delayed traffic information. Our distributed protocol is of the `greedy' type to ensure fast execution in real-time in response to dynamic traffic changes. It employs a hybrid form of rate and credit control for resource allocation. We have performed extensive simulations, which show that our protocol allocates resources (transmitters, receivers, wavelengths) fairly with high throughput, and supports bandwidth guarantees.
DOT National Transportation Integrated Search
2012-05-01
Carbon footprints, carbon credits and associated carbon sequestration techniques are rapidly becoming part : of how environmental mitigation business is conducted, not only in Texas but globally. Terrestrial carbon : sequestration is the general term...
Experimental investigation of practical unforgeable quantum money
NASA Astrophysics Data System (ADS)
Bozzio, Mathieu; Orieux, Adeline; Trigo Vidarte, Luis; Zaquine, Isabelle; Kerenidis, Iordanis; Diamanti, Eleni
2018-01-01
Wiesner's unforgeable quantum money scheme is widely celebrated as the first quantum information application. Based on the no-cloning property of quantum mechanics, this scheme allows for the creation of credit cards used in authenticated transactions offering security guarantees impossible to achieve by classical means. However, despite its central role in quantum cryptography, its experimental implementation has remained elusive because of the lack of quantum memories and of practical verification techniques. Here, we experimentally implement a quantum money protocol relying on classical verification that rigorously satisfies the security condition for unforgeability. Our system exploits polarization encoding of weak coherent states of light and operates under conditions that ensure compatibility with state-of-the-art quantum memories. We derive working regimes for our system using a security analysis taking into account all practical imperfections. Our results constitute a major step towards a real-world realization of this milestone protocol.
NASA Astrophysics Data System (ADS)
Koestner, Stefan
2009-09-01
With the increasing size and degree of complexity of today's experiments in high energy physics the required amount of work and complexity to integrate a complete subdetector into an experiment control system is often underestimated. We report here on the layered software structure and protocols used by the LHCb experiment to control its detectors and readout boards. The experiment control system of LHCb is based on the commercial SCADA system PVSS II. Readout boards which are outside the radiation area are accessed via embedded credit card sized PCs which are connected to a large local area network. The SPECS protocol is used for control of the front end electronics. Finite state machines are introduced to facilitate the control of a large number of electronic devices and to model the whole experiment at the level of an expert system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fachechi, Alessio; Mainetti, Luca; Palano, Laura
The continuously rising demand for electricity has prompted governments and industries to research more effective energy management systems. The Internet of Things paradigm is a valuable add-on for controlling and managing the energy appliances such as Plug-in Electrical Vehicles (PEV) charging stations. In this paper, we present a Demand Response implementation for PEV charging stations able to use Wireless Sensor Network technologies based on the Constrained Application Protocol (CoAP). We developed a self-service kiosk system by which the user can autonomously swipe his/her credit card and choose the charging station to enable. When a user plugs his/her vehicle to themore » station, s/he subscribes his availability to share a portion of its energy. When the grid requests a contribution from the PEVs, the kiosk sends a CoAP message to the available stations and the energy flow is inverted (Vehicle-to-Grid). At the end of the charging process, the user's credit card gets charged with a discounted bill.« less
When Is a Protocol Broken? (Transcript of Discussion)
NASA Astrophysics Data System (ADS)
Christianson, Bruce
Hello everyone, and welcome to the 15th International Security Protocols Workshop. I know that we're used to having these workshops in Cambridge, but we have a tradition that once every ten years we go to some far-off exotic place instead. The 5th Protocols Workshop was held in Paris, and now this being the 15th one, here we are in sunny Brno. The only credit I can claim for the excellence of the venue and all the arrangements, is that I made the decision to delegate all this to Vashek [Vaclav Matyas]. He and his team have worked extremely hard to do all the local arrangements, and I'm pathetically grateful to them.
PRESTO: online calculation of carbon in harvested wood products
Coeli M. Hoover; Sarah J. Beukema; Donald C.E. Robinson; Katherine M. Kellock; Diana A. Abraham
2014-01-01
Carbon stored in harvested wood products is recognized under international carbon accounting protocols, and some crediting systems may permit the inclusion of harvested wood products when calculating carbon sequestration. For managers and landowners, however, estimating carbon stored in harvested wood products may be difficult. PRESTO (PRoduct EStimation Tool Online)...
Protecting terrestrial ecosystems and the climate through a global carbon market.
Bonnie, Robert; Carey, Melissa; Petsonk, Annie
2002-08-15
Protecting terrestrial ecosystems through international environmental laws requires the development of economic mechanisms that value the Earth's natural systems. The major international treaties to address ecosystem protection lack meaningful binding obligations and the requisite financial instruments to affect large-scale conservation. The Kyoto Protocol's emissions-trading framework creates economic incentives for nations to reduce greenhouse-gas (GHG) emissions cost effectively. Incorporating GHG impacts from land-use activities into this system would create a market for an important ecosystem service provided by forests and agricultural lands: sequestration of atmospheric carbon. This would spur conservation efforts while reducing the 20% of anthropogenic CO(2) emissions produced by land-use change, particularly tropical deforestation. The Kyoto negotiations surrounding land-use activities have been hampered by a lack of robust carbon inventory data. Moreover, the Protocol's provisions agreed to in Kyoto made it difficult to incorporate carbon-sequestering land-use activities into the emissions-trading framework without undermining the atmospheric GHG reductions contemplated in the treaty. Subsequent negotiations since 1997 failed to produce a crediting system that provides meaningful incentives for enhanced carbon sequestration. Notably, credit for reducing rates of tropical deforestation was explicitly excluded from the Protocol. Ultimately, an effective GHG emissions-trading framework will require full carbon accounting for all emissions and sequestration from terrestrial ecosystems. Improved inventory systems and capacity building for developing nations will, therefore, be necessary.
ERIC Educational Resources Information Center
Allen, Robert; Layer, Geoff
This book discusses organizational, management and professional dimensions of change as credit-based systems are introduced in higher education institutions in the United Kingdom. Credit-based systems are taken to mean the flexible academic structures based around the parallel but interrelated concepts of credit and modularity. They are being…
NASA Astrophysics Data System (ADS)
Liu, Fang; Cao, San-xing; Lu, Rui
2012-04-01
This paper proposes a user credit assessment model based on clustering ensemble aiming to solve the problem that users illegally spread pirated and pornographic media contents within the user self-service oriented broadband network new media platforms. Its idea is to do the new media user credit assessment by establishing indices system based on user credit behaviors, and the illegal users could be found according to the credit assessment results, thus to curb the bad videos and audios transmitted on the network. The user credit assessment model based on clustering ensemble proposed by this paper which integrates the advantages that swarm intelligence clustering is suitable for user credit behavior analysis and K-means clustering could eliminate the scattered users existed in the result of swarm intelligence clustering, thus to realize all the users' credit classification automatically. The model's effective verification experiments are accomplished which are based on standard credit application dataset in UCI machine learning repository, and the statistical results of a comparative experiment with a single model of swarm intelligence clustering indicates this clustering ensemble model has a stronger creditworthiness distinguishing ability, especially in the aspect of predicting to find user clusters with the best credit and worst credit, which will facilitate the operators to take incentive measures or punitive measures accurately. Besides, compared with the experimental results of Logistic regression based model under the same conditions, this clustering ensemble model is robustness and has better prediction accuracy.
Science-based approach for credible accounting of mitigation in managed forests.
Grassi, Giacomo; Pilli, Roberto; House, Jo; Federici, Sandro; Kurz, Werner A
2018-05-17
The credibility and effectiveness of country climate targets under the Paris Agreement requires that, in all greenhouse gas (GHG) sectors, the accounted mitigation outcomes reflect genuine deviations from the type and magnitude of activities generating emissions in the base year or baseline. This is challenging for the forestry sector, as the future net emissions can change irrespective of actual management activities, because of age-related stand dynamics resulting from past management and natural disturbances. The solution implemented under the Kyoto Protocol (2013-2020) was accounting mitigation as deviation from a projected (forward-looking) "forest reference level", which considered the age-related dynamics but also allowed including the assumed future implementation of approved policies. This caused controversies, as unverifiable counterfactual scenarios with inflated future harvest could lead to credits where no change in management has actually occurred, or conversely, failing to reflect in the accounts a policy-driven increase in net emissions. Instead, here we describe an approach to set reference levels based on the projected continuation of documented historical forest management practice, i.e. reflecting age-related dynamics but not the future impact of policies. We illustrate a possible method to implement this approach at the level of the European Union (EU) using the Carbon Budget Model. Using EU country data, we show that forest sinks between 2013 and 2016 were greater than that assumed in the 2013-2020 EU reference level under the Kyoto Protocol, which would lead to credits of 110-120 Mt CO 2 /year (capped at 70-80 Mt CO 2 /year, equivalent to 1.3% of 1990 EU total emissions). By modelling the continuation of management practice documented historically (2000-2009), we show that these credits are mostly due to the inclusion in the reference levels of policy-assumed harvest increases that never materialized. With our proposed approach, harvest is expected to increase (12% in 2030 at EU-level, relative to 2000-2009), but more slowly than in current forest reference levels, and only because of age-related dynamics, i.e. increased growing stocks in maturing forests. Our science-based approach, compatible with the EU post-2020 climate legislation, helps to ensure that only genuine deviations from the continuation of historically documented forest management practices are accounted toward climate targets, therefore enhancing the consistency and comparability across GHG sectors. It provides flexibility for countries to increase harvest in future reference levels when justified by age-related dynamics. It offers a policy-neutral solution to the polarized debate on forest accounting (especially on bioenergy) and supports the credibility of forest sector mitigation under the Paris Agreement.
75 FR 2723 - Fair Credit Reporting Risk-Based Pricing Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-15
... application, grant, extension, or other provision of credit and, based in whole or in part on the consumer....\\1\\ \\1\\ Under Sec. 615(a) of the FCRA, creditors that deny a consumer's application for credit, based... with an application for, or a grant, extension, or other provision of, credit to a consumer; and (ii...
Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing
NASA Astrophysics Data System (ADS)
G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.
2012-04-01
Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... a credit available to all members, regardless of their trading volumes, that exceeds the base credit... million, shares of liquidity during the month, which is a higher rate than the base rate of $0.0007 per... credit exceeds the base rate of $0.0007, the difference is not unfairly discriminatory because the credit...
Diploma Recovery: High School Graduates' Perceptions of Online Credit Recovery Programming
ERIC Educational Resources Information Center
Currier, Clay W.
2017-01-01
This phenomenological case study explored student experiences in a technology-based credit recovery program at several central Texas high schools. Students shared their perceptions about utilizing technology-based credit recovery environments. Participants in this study were ten high school graduates who had completed credit recovery courses at…
Credit scoring analysis using weighted k nearest neighbor
NASA Astrophysics Data System (ADS)
Mukid, M. A.; Widiharih, T.; Rusgiyono, A.; Prahutama, A.
2018-05-01
Credit scoring is a quatitative method to evaluate the credit risk of loan applications. Both statistical methods and artificial intelligence are often used by credit analysts to help them decide whether the applicants are worthy of credit. These methods aim to predict future behavior in terms of credit risk based on past experience of customers with similar characteristics. This paper reviews the weighted k nearest neighbor (WKNN) method for credit assessment by considering the use of some kernels. We use credit data from a private bank in Indonesia. The result shows that the Gaussian kernel and rectangular kernel have a better performance based on the value of percentage corrected classified whose value is 82.4% respectively.
40 CFR 1054.740 - What special provisions apply for generating and using emission credits?
Code of Federal Regulations, 2012 CFR
2012-07-01
.... Calculate the value of transitional emission credits as described in § 1054.705, based on setting STD equal... enduring credits as described in § 1054.705, based on setting STD equal to 10.0 g/kW-hr and FEL to the... transitional emission credits as described in § 1054.705, based on setting STD equal to 11.0 g/kW-hr and FEL...
12 CFR 652.70 - Risk-based capital level.
Code of Federal Regulations, 2010 CFR
2010-01-01
... risk-based capital level is the sum of the following amounts: (a) Credit and interest rate risk. The... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Risk-based capital level. 652.70 Section 652.70 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE...
ERIC Educational Resources Information Center
Stephenson, Lisa G.
2013-01-01
Credit-based transition programs provide high school students with opportunities to jump start their college education. The Kentucky Community and Technical College System (KCTCS) offers college credit through dual-credit programs. While KCTCS dual-credit offerings have been successful in helping high school students start their college education…
20 CFR 211.14 - Maximum creditable compensation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Maximum creditable compensation. 211.14... CREDITABLE RAILROAD COMPENSATION § 211.14 Maximum creditable compensation. Maximum creditable compensation for calendar years after 1984 is the maximum annual taxable wage base defined in section 3231(e)(2)(B...
76 FR 79531 - Corporate Credit Unions
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-22
... exclude CLF stock subscriptions, based on the asset's negligible credit risk and to facilitate corporate... removing paragraphs (c)(3) and (f)(4) and adding paragraph (h) to read as follows: Sec. 704.6 Credit risk... NATIONAL CREDIT UNION ADMINISTRATION 12 CFR Part 704 RIN 3133-AD95 Corporate Credit Unions AGENCY...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2014 CFR
2014-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2013 CFR
2013-01-01
... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...
12 CFR 615.5210 - Risk-adjusted assets.
Code of Federal Regulations, 2010 CFR
2010-01-01
... appropriate credit conversion factor in § 615.5212, is assigned to one of the risk categories specified in... risk-based capital requirement for the credit-enhanced assets, the risk-based capital required under..., determine the appropriate risk weight for any asset or credit equivalent amount that does not fit wholly...
Expanding access and choice for health care consumers through tax reform.
Butler, S; Kendall, D B
1999-01-01
A refundable tax credit for the uninsured would complement the existing job-based health insurance system while letting people keep their job-based coverage if they wish. Among the wide variety of design options for a tax credit, policy and political analysis does not reveal an obvious choice, but a tax credit based on a percentage of spending may have a slight advantage. Congress should give states maximum flexibility to use existing funding sources to supplement the value of a federal tax credit and encourage the use of techniques to create stable insurance pools.
Evaluating and Mitigating Software Supply Chain Security Risks
2010-05-01
is returned for all employees. The risk associated with this defect is high; variants of it have been used in attacks that caused credit card data to...via Common Access Card (CAC) readers). 29 | CMU/SEI-2010-TN-016 4.2.1 Supplier Capability Because the project is already in development, the...ClearCase, Windows, Linux and Solaris, network administration, TCP/IP, X/Motif, DII COE, Simple Net- work Management Protocol (SNMP), Agent Technology
Large unbalanced credit scoring using Lasso-logistic regression ensemble.
Wang, Hong; Xu, Qingsong; Zhou, Lifeng
2015-01-01
Recently, various ensemble learning methods with different base classifiers have been proposed for credit scoring problems. However, for various reasons, there has been little research using logistic regression as the base classifier. In this paper, given large unbalanced data, we consider the plausibility of ensemble learning using regularized logistic regression as the base classifier to deal with credit scoring problems. In this research, the data is first balanced and diversified by clustering and bagging algorithms. Then we apply a Lasso-logistic regression learning ensemble to evaluate the credit risks. We show that the proposed algorithm outperforms popular credit scoring models such as decision tree, Lasso-logistic regression and random forests in terms of AUC and F-measure. We also provide two importance measures for the proposed model to identify important variables in the data.
12 CFR Appendix C to Part 202 - Sample Notification Forms
Code of Federal Regulations, 2010 CFR
2010-01-01
... creditor obtained information from a consumer reporting agency that played a part in the credit decision... information that has been obtained from an outside source. ___ Our credit decision was based in whole or in...] Telephone number: ___ Our credit decision was based in whole or in part on information obtained from an...
12 CFR Appendix C to Part 704 - Risk-Based Capital Credit Risk-Weight Categories
Code of Federal Regulations, 2011 CFR
2011-01-01
... corporate credit union must compute its risk-weighted assets for purposes of determining its capital ratios.... Depository institution means a financial institution that engages in the business of providing financial... substitute. Direct credit substitutes include: (1) Financial standby letters of credit that support financial...
76 FR 41602 - Fair Credit Reporting Risk-Based Pricing Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-15
... on and disclose the key factors provided with the scores purchased from consumer reporting agencies... making the credit decision, the creditor must disclose that score and certain information relating to the... following disclosures: (1) the credit score \\4\\ used by the person in making the credit decision; (2) the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
... Opportunity Tax Credit (WOTC) Program: Extension With Non-Substantive Revisions AGENCY: Employment and..., ``Certification Workload and Characteristics of Certified Individuals, Work Opportunity Tax Credit'' and provided... submit this report using the Internet-based Tax Credit Reporting System of the Enterprise Business...
Stepwise Analysis of Differential Item Functioning Based on Multiple-Group Partial Credit Model.
ERIC Educational Resources Information Center
Muraki, Eiji
1999-01-01
Extended an Item Response Theory (IRT) method for detection of differential item functioning to the partial credit model and applied the method to simulated data using a stepwise procedure. Then applied the stepwise DIF analysis based on the multiple-group partial credit model to writing trend data from the National Assessment of Educational…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... determine the credit allowable under section 45K for coke or coke gas (other than from petroleum based... credit, and reference price apply to coke or coke gas (other than from petroleum based products) sold during calendar year 2010. Inflation Adjustment Factor: The inflation adjustment factor for coke or coke...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
... determine the credit allowable under section 45K for coke or coke gas (other than from petroleum based... credit, and reference price apply to coke or coke gas (other than from petroleum based products) sold during calendar year 2012. Inflation Adjustment Factor: The inflation adjustment factor for coke or coke...
76 FR 13902 - Fair Credit Reporting Risk-Based Pricing Regulations
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
... consumer when the creditor uses a consumer report to grant or extend credit to the consumer on material.... Information from a consumer report is often used in evaluating the risk posed by the consumer. Creditors that... report in connection with an extension of credit and, based in whole or in part on the consumer report...
Large Unbalanced Credit Scoring Using Lasso-Logistic Regression Ensemble
Wang, Hong; Xu, Qingsong; Zhou, Lifeng
2015-01-01
Recently, various ensemble learning methods with different base classifiers have been proposed for credit scoring problems. However, for various reasons, there has been little research using logistic regression as the base classifier. In this paper, given large unbalanced data, we consider the plausibility of ensemble learning using regularized logistic regression as the base classifier to deal with credit scoring problems. In this research, the data is first balanced and diversified by clustering and bagging algorithms. Then we apply a Lasso-logistic regression learning ensemble to evaluate the credit risks. We show that the proposed algorithm outperforms popular credit scoring models such as decision tree, Lasso-logistic regression and random forests in terms of AUC and F-measure. We also provide two importance measures for the proposed model to identify important variables in the data. PMID:25706988
A online credit evaluation method based on AHP and SPA
NASA Astrophysics Data System (ADS)
Xu, Yingtao; Zhang, Ying
2009-07-01
Online credit evaluation is the foundation for the establishment of trust and for the management of risk between buyers and sellers in e-commerce. In this paper, a new credit evaluation method based on the analytic hierarchy process (AHP) and the set pair analysis (SPA) is presented to determine the credibility of the electronic commerce participants. It solves some of the drawbacks found in classical credit evaluation methods and broadens the scope of current approaches. Both qualitative and quantitative indicators are considered in the proposed method, then a overall credit score is achieved from the optimal perspective. In the end, a case analysis of China Garment Network is provided for illustrative purposes.
75 FR 49423 - Alternatives to the Use of External Credit Ratings in the Regulations of the OCC
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-13
..., Credit and Market Risk Division, (202) 874-5670; or Carl Kaminski, Senior Attorney, Legislative and... agencies' risk-based capital frameworks. II. OCC Regulations Referencing Credit Ratings The non-capital... interest rate, credit, liquidity, price and other risks presented by investments, and the investments must...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2011 CFR
2011-01-01
... SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End...) Evaluation of increased rate. If a card issuer increases an annual percentage rate that applies to a credit card account under an open-end (not home-secured) consumer credit plan, based on the credit risk of the...
12 CFR 226.59 - Reevaluation of rate increases.
Code of Federal Regulations, 2012 CFR
2012-01-01
... SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End...) Evaluation of increased rate. If a card issuer increases an annual percentage rate that applies to a credit card account under an open-end (not home-secured) consumer credit plan, based on the credit risk of the...
Expanding Choice: Tax Credits and Educational Access in Montana
ERIC Educational Resources Information Center
Carpenter, Dick M., II; Ross, John K.
2009-01-01
The evidence advanced in this report demonstrates that using tax credits to fund scholarships for students is both well-established and sound practice. Three existing credits allow taxpayer funds to flow to faith-based organizations, and one of those, the Qualified Endowment Credit, rewards contributions to more than a thousand charitable…
ERIC Educational Resources Information Center
Rochford, Joseph A.; O'Neill, Adrienne; Gelb, Adele
2009-01-01
This impact evaluation looks at three years of growth for "high school-based dual credit" courses exclusive of Canton's Early College High School in Stark and Wayne Counties. As "high school based dual credit" is increasingly implemented in low wealth and urban districts, accompanied by an increase in high school teachers…
Credit Where Credit Is Due: An Approach to Education Returns Based on Shapley Values
ERIC Educational Resources Information Center
Barakat, Bilal; Crespo Cuaresma, Jesus
2017-01-01
We propose the use of methods based on the Shapley value to assess the fact that private returns to lower levels of educational attainment should be credited with part of the returns from higher attainment levels, since achieving primary education is a necessary condition to enter secondary and tertiary educational levels. We apply the proposed…
Data-nonintrusive photonics-based credit card verifier with a low false rejection rate.
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
2010-02-10
We propose and experimentally demonstrate a noninvasive credit card verifier with a low false rejection rate (FRR). Our key idea is based on the use of three broadband light sources in our data-nonintrusive photonics-based credit card verifier structure, where spectral components of the embossed hologram images are registered as red, green, and blue. In this case, nine distinguishable variables are generated for a feed-forward neural network (FFNN). In addition, we investigate the center of mass of the image histogram projected onto the x axis (I(color)), making our system more tolerant of the intensity fluctuation of the light source. We also reduce the unwanted signals on each hologram image by simply dividing the hologram image into three zones and then calculating their corresponding I(color) values for red, green, and blue bands. With our proposed concepts, we implement our field test prototype in which three broadband white light light-emitting diodes (LEDs), a two-dimensional digital color camera, and a four-layer FFNN are used. Based on 249 genuine credit cards and 258 counterfeit credit cards, we find that the average of differences in I(color) values between genuine and counterfeit credit cards is improved by 1.5 times and up to 13.7 times. In this case, we can effectively verify credit cards with a very low FRR of 0.79%.
13 CFR 120.1000 - Risk-Based Lender Oversight.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Risk-Based Lender Oversight. 120.1000 Section 120.1000 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1000 Risk-Based Lender Oversight. (a) Risk-Based Lender...
A Mechanism for Anonymous Credit Card Systems
NASA Astrophysics Data System (ADS)
Tamura, Shinsuke; Yanase, Tatsuro
This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.
75 FR 63107 - Alternatives to the Use of External Credit Ratings in the Regulations of the OTS
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
..., savings associations must consider the interest rate, credit, liquidity, price and other risks presented... subject only to moderate credit risk, and for whom expectations of default risk over the term of the... securities activities based on the levels and types of risks in its portfolio. As with the credit quality...
40 CFR 86.1869-12 - CO2 credits for off-cycle CO2-reducing technologies.
Code of Federal Regulations, 2014 CFR
2014-07-01
... average over 5-cycle testing. (ii) High efficiency exterior lights. Credits may be accrued for high efficiency lighting as defined in paragraph (b)(4) of this section based on the lighting locations with such lighting installed. Credits for high efficiency lighting are the sum of the credits for the applicable...
A neural network model for credit risk evaluation.
Khashman, Adnan
2009-08-01
Credit scoring is one of the key analytical techniques in credit risk evaluation which has been an active research area in financial risk management. This paper presents a credit risk evaluation system that uses a neural network model based on the back propagation learning algorithm. We train and implement the neural network to decide whether to approve or reject a credit application, using seven learning schemes and real world credit applications from the Australian credit approval datasets. A comparison of the system performance under the different learning schemes is provided, furthermore, we compare the performance of two neural networks; with one and two hidden layers following the ideal learning scheme. Experimental results suggest that neural networks can be effectively used in automatic processing of credit applications.
la Fuente, Jesús De; Cardelle-Elawar, María; Peralta, F. Javier; Sánchez, M. Dolores; Martínez-Vicente, José Manuel; Zapata, Lucía
2010-01-01
Introduction: In the present study, we investigated the potential factors that influenced the level of students satisfaction with the teaching–learning process (TLP), from the perspective of students participating in the European Credit Transfer System (ECTS) experience. Method: A total of 1490 students from the Universities of Almería and Granada (Spain) participated in an evaluation of their class discipline area. They completed the new revised protocol for evaluating the ECTS experience. Analyses of variance were carried out, taking the following factors as independent variables: student's grade average, year in school, study discipline, credit load in terms of ECTS credits assigned to a subject, the e-learning approach. Perception of the TLP was used as the dependent variable. Results: The data analyses showed variability of the degree of statistically significance among the factors that influenced students’ perceptions of the TLP. These factors included: Student's grade average (in favor of high performers), year in school (in favor of earlier years), ECTS load (in favor of subjects with a medium load of credits), and e-learning (in favor of its use). These research findings provided evidence to explore the delineation of a potential profile of factors that trigger a favorable perception of the TLP. Discussion and Conclusion: The present findings certainly have implications to deepen our understanding of the core beliefs, commitment, and the experience in shaping the implementation of the European Higher Education Area through the ECTS. PMID:21713171
HCFC-142b emissions in China: An inventory for 2000 to 2050 basing on bottom-up and top-down methods
NASA Astrophysics Data System (ADS)
Han, Jiarui; Li, Li; Su, Shenshen; Hu, Jianxin; Wu, Jing; Wu, Yusheng; Fang, Xuekun
2014-05-01
1-Chloro-1,1-difluoroethane (HCFC-142b) is both ozone depleting substance included in the Montreal Protocol on Substances that Deplete the Ozone Layer (Montreal Protocol) and potent greenhouse gas with high global warming potential. As one of the major HCFC-142b consumption and production countries in the world, China's control action will contribute to both mitigating climate change and protecting ozone layer. Estimating China's HCFC-142b emission is a crucial step for understanding its emission status, drawing up phasing-out plan and evaluating mitigation effect. Both the bottom-up and top-down method were adopted in this research to estimate HCFC-142b emissions from China. Results basing on different methods were compared to test the effectiveness of two methods and validate inventory's reliability. Firstly, a national bottom-up emission inventory of HCFC-142b for China during 2000-2012 was established based on the 2006 IPCC Guidelines for National Greenhouse Gas Inventories and the Montreal Protocol, showing that in contrast to the downward trend revealed by existing results, HCFC-142b emissions kept increasing from 0.1 kt/yr in 2000 to the peak of 14.4 kt/yr in 2012. Meanwhile a top-down emission estimation was also developed using interspecies correlation method. By correlating atmospheric mixing ratio data of HCFC-142b and reference substance HCFC-22 sampled from four representative cities (Beijing, Hangzhou, Lanzhou and Guangzhou, for northern, eastern, western and southern China, respectively), China's HCFC-142b emission in 2012 was calculated. It was 16.24(13.90-18.58) kt, equivalent to 1.06 kt ODP and 37 Tg CO2-eq, taking up 9.78% (ODP) of total HCFCs emission in China or 30.5% of global HCFC-142b emission. This result was 12.7% higher than that in bottom-up inventory. Possible explanations were discussed. The consistency of two results lend credit to methods effectiveness and results reliability. Finally, future HCFC-142b emission was projected to 2050. Emission might experience a continuous increase from 14.9 kt/yr to 97.2 kt/yr under business-as-usual (BAU) scenario, while a 90% reduction would be obtained by fulfilling the Montreal Protocol, namely an accumulative mitigation of 1578 kt from 2013 to 2050, equal to 103 kt ODP, and 3504 Tg CO2 emissions. Therefore, China will contribute tremendously to the worldwide ozone protection and global warming mitigation by successfully phasing out HCFC-142b according to the Montreal Protocol schedule.
Sea King SHOL Support for Post-HCM/FELEX HALIFAX Class Ships
2014-05-01
correct this, a Network Time Protocol (NTP) time server was installed on two Raspberry - Pi computers3 (one used as a backup). Time was set to GPS time...data is needed, a wave buoy would be deployed for direct measurement. However, the launch & recovery of a 3The Raspberry Pi is an inexpensive credit...card-sized single-board computer developed in the UK by the Raspberry Pi Foundation. DRDC-RDDC-2014-R18 15 wave buoy was not practical in conjunction
ERIC Educational Resources Information Center
Stone, Geraldine Louise
2012-01-01
This study examined the perceived value of leadership development programs (LDPs) provided by continuing education for administrators in colleges and universities. Included in this study were questions about the perceived value of non-credit, credit, and blended (credit and non-credit) programs at the individual, institutional, and higher…
7 CFR 1980.392 - Mortgage Credit Certificates (MCCs) and Funded Buydown Accounts.
Code of Federal Regulations, 2010 CFR
2010-01-01
... under the Tax Reform Act of 1986 and allow the borrower to receive a Federal tax credit for a percentage... assisted loans when the amount of the tax credit is based on the amount of interest actually paid by the... of the tax credit is considered as an additional resource available for repayment of the loan when...
12 CFR 567.3 - Individual minimum capital requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... risk, credit risk, concentration of credit risk, certain risks arising from nontraditional activities... operating risks, particularly the risks presented by concentrations of credit and nontraditional activities... capital requirement for a savings association that varies from the risk-based capital requirement, the...
A health insurance tax credit for uninsured workers.
Zelenak, L
2001-01-01
This paper describes a new system of tax credits to help low-income workers pay for health insurance. The system would be designed to subsidize health insurance coverage for workers who are currently uninsured, or who pay high premiums for nongroup insurance. Anyone age 19 or older who is not covered by Medicaid, Medicare, or employer-sponsored health insurance would be eligible for a health insurance tax credit (HITC), administered through the Internal Revenue Service. The base amount of the proposed credit would be $2,000 per year for each covered individual, but this amount would be adjusted for the individual's age and sex, according to the effect of age and sex on the cost of insurance coverage. The base amount of the credit would be reduced by $150 for every $1,000 by which a person's income exceeded 200% of the federal poverty level, thus limiting HITC eligibility to lower-income workers. To encourage participation in the credit program, most of the credit would be available through an advance payment system, with final reconciliation after year's end.
Evolution of optically nondestructive and data-non-intrusive credit card verifiers
NASA Astrophysics Data System (ADS)
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
2010-04-01
Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.
75 FR 64785 - Corporate Credit Unions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
...NCUA is issuing final amendments to its rule governing corporate credit unions. The major revisions involve corporate credit union capital, investments, asset-liability management, governance, and credit union service organization (CUSO) activities. The amendments establish a new capital scheme, including risk-based capital requirements; impose new prompt corrective action requirements; place various new limits on corporate investments; impose new asset-liability management controls; amend some corporate governance provisions; and limit a corporate CUSO to categories of services preapproved by NCUA. In addition, this rulemaking contains conforming amendments to rules governing Prompt Corrective Action (for natural person credit unions); Investments and Deposit Activities (for federal credit unions); Administrative Actions, Adjudicative Hearings, Rules of Practice and Procedure, and Investigations; and Involuntary Liquidation of Federal Credit Unions and Adjudication of Creditor Claims Involving Federally Insured Credit Unions. These amendments will strengthen individual corporates and the corporate credit union system as a whole.
Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.
Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J
2010-11-01
Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.
Credit PSR. View looks south (180°) across North Base Road ...
Credit PSR. View looks south (180°) across North Base Road at foundations for Quarters "A", one arm of which appears at right. Bare earth at extreme left is entrance to parking lot between Quarters "A" and "B" - Edwards Air Force Base, North Base, Officers' Quarters B, North Base Road, Boron, Kern County, CA
NASA Astrophysics Data System (ADS)
Zhu, Wenlong; Ma, Shoufeng; Tian, Junfang
2017-01-01
This paper investigates the revenue-neutral tradable credit charge and reward scheme without initial credit allocations that can reassign network traffic flow patterns to optimize congestion and emissions. First, we prove the existence of the proposed schemes and further decentralize the minimum emission flow pattern to user equilibrium. Moreover, we design the solving method of the proposed credit scheme for minimum emission problem. Second, we investigate the revenue-neutral tradable credit charge and reward scheme without initial credit allocations for bi-objectives to obtain the Pareto system optimum flow patterns of congestion and emissions; and present the corresponding solutions are located in the polyhedron constituted by some inequalities and equalities system. Last, numerical example based on a simple traffic network is adopted to obtain the proposed credit schemes and verify they are revenue-neutral.
ERIC Educational Resources Information Center
Wang, Lih-Ching Chen
2002-01-01
Discusses the problems and successes encountered in implementing a Web-based registration and administration system for credit-by-examination in a required graduate course, detailing the ways in which this system improves upon its paper-based predecessor. (EV)
Lawrence, Steven L; Morzinski, Jeffrey A; Radjenovich, Mary Ellen
2008-07-01
Medical specialties are adopting methods to improve continuing medical education (CME). A "double credit" option, sponsored by the American Academy of Family Physicians, is now available for presentations submitted and approved as evidence based (EB). To compare usual and double-credit CME presentations to determine differences in preparation resources and time, and to compare conference attendees' satisfaction. Those not submitting double-credit applications were asked about perceived barriers. Three pretested, written surveys were administered at a 2.5 day CME conference held annually in Southeastern Wisconsin. Subjects were 38 presenters and 172 attendees, mostly primary care physicians. Twelve presentations were approved for double-credit; these presenters used a greater percentage of on-line EB resources to prepare their talks (64% versus 23%), and preparation required an additional 4.75 hours on average. Over 90% of attendees perceived greater conference quality due to the EB emphasis. Top barriers to double-credit EB applications were time limits and perceptions that topics were inappropriate. Double-credit presenters use a greater percentage of EB resources, while their counterparts used more professional experience to prepare CME presentations. Attendees reported improved quality and value with increased EB CME. Time is a perceived and real factor in preparing double-credit applications.
12 CFR 167.6 - Risk-based capital credit risk-weight categories.
Code of Federal Regulations, 2012 CFR
2012-01-01
... strips receivable, other than credit-enhancing interest-only strips; (N)-(O) [Reserved] (P) That portion... rating systems typically: (1) Are an integral part of the savings association's risk management system... rating grade, including subjective factors; (6) Employ independent credit risk management or loan review...
Credit PSR. View looks northeast (40°) across Imhoff Tank (Building ...
Credit PSR. View looks northeast (40°) across Imhoff Tank (Building 4331) Imhoff Tank. This World War II wooden structure served as a sewage treatment facility for North Base - Edwards Air Force Base, North Base, Imhoff Tank, Southwest of E Street, Boron, Kern County, CA
12 CFR 652.75 - Your responsibility for determining the risk-based capital level.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Your responsibility for determining the risk-based capital level. 652.75 Section 652.75 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital...
13 CFR 120.173 - Lead-based paint.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Lead-based paint. 120.173 Section 120.173 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Policies Applying to All Business Loans Requirements Imposed Under Other Laws and Orders § 120.173 Lead-based paint. If...
Credit BG. Interior of Deluge Water Booster Station displaying highcapacity ...
Credit BG. Interior of Deluge Water Booster Station displaying high-capacity electrically driven water pumps for fire fighting service - Edwards Air Force Base, North Base, Deluge Water Booster Station, Northeast of A Street, Boron, Kern County, CA
12 CFR 702.103 - Applicability of risk-based net worth requirement.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AFFECTING CREDIT UNIONS PROMPT CORRECTIVE ACTION Net Worth Classification § 702.103 Applicability of risk-based net worth requirement. For purposes of § 702.102, a credit union is defined as “complex” and a...
Credit BG. Northwest and southwest facades of Administration Building for ...
Credit BG. Northwest and southwest facades of Administration Building for Building 4505 area. Construction began on this building in 1967 - Edwards Air Force Base, North Base, Administration Building, Northeast of A Street, Boron, Kern County, CA
Comment on Geoengineering with seagrasses: is credit due where credit is given?
NASA Astrophysics Data System (ADS)
Oreska, Matthew P. J.; McGlathery, Karen J.; Emmer, Igino M.; Needelman, Brian A.; Emmett-Mattox, Stephen; Crooks, Stephen; Megonigal, J. Patrick; Myers, Doug
2018-03-01
In their recent review, ‘Geoengineering with seagrasses: is credit due where credit is given?,’ Johannessen and Macdonald (2016) invoke the prospect of carbon offset-credit over-allocation by the Verified Carbon Standard as a pretense for their concerns about published seagrass carbon burial rate and global stock estimates. Johannessen and Macdonald (2016) suggest that projects seeking offset-credits under the Verified Carbon Standard methodology VM0033: Methodology for Tidal Wetland and Seagrass Restoration will overestimate long-term (100 yr) sediment organic carbon (SOC) storage because issues affecting carbon burial rates bias storage estimates. These issues warrant serious consideration by the seagrass research community; however, VM0033 does not refer to seagrass SOC ‘burial rates’ or ‘storage.’ Projects seeking credits under VM0033 must document greenhouse gas emission reductions over time, relative to a baseline scenario, in order to receive credits. Projects must also monitor changes in carbon pools, including SOC, to confirm that observed benefits are maintained over time. However, VM0033 allows projects to conservatively underestimate project benefits by citing default values for specific accounting parameters, including CO2 emissions reductions. We therefore acknowledge that carbon crediting methodologies such as VM0033 are sensitive to the quality of the seagrass literature, particularly when permitted default factors are based in part on seagrass burial rates. Literature-derived values should be evaluated based on the concerns raised by Johannessen and Macdonald (2016), but these issues should not lead to credit over-allocation in practice, provided VM0033 is rigorously followed. These issues may, however, affect the feasibility of particular seagrass offset projects.
Credit BG. View looks south southwest (202°) across remains of ...
Credit BG. View looks south southwest (202°) across remains of concrete pad foundation for the mess hall. North Base Road (3rd Street) passes nearby. Building 4318 is in the distance at the extreme left of view - Edwards Air Force Base, North Base, Base Mess Hall T-27, Third Street, Boron, Kern County, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... Funding and Fiscal Affairs; Farmer Mac Risk-Based Capital Stress Test, Version 5.0 AGENCY: Farm Credit... credit rating agency) in regulations addressing the Risk-Based Capital Stress Test (RBCST or stress test... Act required FCA to establish a risk- based capital stress test for Farmer Mac's portfolio.\\3\\ This...
ERIC Educational Resources Information Center
Walls, Sandra; Pardy, John
2010-01-01
This guide is intended for students, career counsellors and others assisting vocational education and training (VET) students in the credit transfer process. It is based on research that set out to identify the core elements required to negotiate successful pathways from VET to higher education. Credit transfer structures between Deakin University…
ERIC Educational Resources Information Center
Laitinen, Amy
2012-01-01
The basic currency of higher education--the credit hour--represents the root of many problems plaguing America's higher education system: the practice of measuring time rather than learning. "Cracking the Credit Hour" traces the history of this time-based unit, from the days of Andrew Carnegie to recent federal efforts to define a credit…
12 CFR 567.6 - Risk-based capital credit risk-weight categories.
Code of Federal Regulations, 2012 CFR
2012-01-01
... strips receivable, other than credit-enhancing interest-only strips; (N)-(O) [Reserved] (P) That portion...'s risk management system that explicitly incorporates the full range of risks arising from the... management or loan review personnel to assign or review the credit risk ratings; (7) Include an internal...
12 CFR 390.466 - Risk-based capital credit risk-weight categories.
Code of Federal Regulations, 2013 CFR
2013-01-01
... receivable, other than credit-enhancing interest-only strips; (N)-(O) [Reserved] (P) That portion of equity... integral part of the State savings association's risk management system that explicitly incorporates the... subjective factors; (6) Employ independent credit risk management or loan review personnel to assign or...
12 CFR 567.6 - Risk-based capital credit risk-weight categories.
Code of Federal Regulations, 2011 CFR
2011-01-01
... strips receivable, other than credit-enhancing interest-only strips; (N)-(O) [Reserved] (P) That portion...'s risk management system that explicitly incorporates the full range of risks arising from the... management or loan review personnel to assign or review the credit risk ratings; (7) Include an internal...
12 CFR 614.4260 - Evaluation requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... evaluated on the five basic credit factors, without considering the subject real estate, would support the credit decision that was based on other sources of repayment or collateral; (4) A lien on real estate is..., even with the advancement of new loan funds; (6) A Farm Credit System institution purchases a loan or...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... Appraiser Roster regulations by replacing the obsolete references to the Credit Alert Interactive Voice Response System (CAIVRS) with references to its successor, the online-based Credit Alert Verification... propose the elimination references to the Credit Alert Interactive Voice Response System (CAIVRS). On July...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... the FHA Appraiser Roster by replacing the obsolete references to the Credit Alert Interactive Voice Response System with references to its successor, the online-based Credit Alert Verification Reporting...'s Limited Denial of Participation list, or in HUD's Credit Alert Interactive Voice Response System...
12 CFR 706.5 - State exemptions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... between a consumer and a federal credit union. Person means an individual, corporation, or other business... balances on a consumer credit card account based on balances for days in billing cycles that precede the most recent billing cycle as a result of the loss of any time period provided by the federal credit...
Forecasting the value of credit scoring
NASA Astrophysics Data System (ADS)
Saad, Shakila; Ahmad, Noryati; Jaffar, Maheran Mohd
2017-08-01
Nowadays, credit scoring system plays an important role in banking sector. This process is important in assessing the creditworthiness of customers requesting credit from banks or other financial institutions. Usually, the credit scoring is used when customers send the application for credit facilities. Based on the score from credit scoring, bank will be able to segregate the "good" clients from "bad" clients. However, in most cases the score is useful at that specific time only and cannot be used to forecast the credit worthiness of the same applicant after that. Hence, bank will not know if "good" clients will always be good all the time or "bad" clients may become "good" clients after certain time. To fill up the gap, this study proposes an equation to forecast the credit scoring of the potential borrowers at a certain time by using the historical score related to the assumption. The Mean Absolute Percentage Error (MAPE) is used to measure the accuracy of the forecast scoring. Result shows the forecast scoring is highly accurate as compared to actual credit scoring.
12 CFR 702.103 - Applicability of risk-based net worth requirement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AFFECTING CREDIT UNIONS PROMPT CORRECTIVE ACTION Net Worth Classification § 702.103 Applicability of risk... risk-based net worth requirement is applicable only if the credit union meets both of the following... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Applicability of risk-based net worth...
12 CFR 652.85 - When to report the risk-based capital level.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false When to report the risk-based capital level. 652.85 Section 652.85 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.85 When to...
12 CFR 652.90 - How to report your risk-based capital determination.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false How to report your risk-based capital determination. 652.90 Section 652.90 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.90 How to...
Summers, Sarah K.; Rainey, Rochelle; Kaur, Maneet; Graham, Jay P.
2015-01-01
Background Carbon credits are an increasingly prevalent market-based mechanism used to subsidize household water treatment technologies (HWT). This involves generating credits through the reduction of carbon emissions from boiling water by providing a technology that reduces greenhouse gas emissions linked to climate change. Proponents claim this process delivers health and environmental benefits by providing clean drinking water and reducing greenhouse gases. Selling carbon credits associated with HWT projects requires rigorous monitoring to ensure households are using the HWT and achieving the desired benefits of the device. Critics have suggested that the technologies provide neither the benefits of clean water nor reduced emissions. This study explores the perspectives of carbon credit and water, sanitation and hygiene (WASH) experts on HWT carbon credit projects. Methods Thirteen semi-structured, in-depth interviews were conducted with key informants from the WASH and carbon credit development sectors. The interviews explored perceptions of the two groups with respect to the procedures applied in the Gold Standard methodology for trading Voluntary Emission Reduction (VER) credits. Results Agreement among the WASH and carbon credit experts existed for the concept of suppressed demand and parameters in the baseline water boiling test. Key differences, however, existed. WASH experts’ responses highlighted a focus on objectively verifiable data for monitoring carbon projects while carbon credit experts called for contextualizing observed data with the need for flexibility and balancing financial viability with quality assurance. Conclusions Carbon credit projects have the potential to become an important financing mechanism for clean energy in low- and middle-income countries. Based on this research we recommend that more effort be placed on building consensus on the underlying assumptions for obtaining carbon credits from HWT projects, as well as the approved methods for monitoring correct and consistent use of the HWT technologies in order to support public health impacts. PMID:25928139
Summers, Sarah K; Rainey, Rochelle; Kaur, Maneet; Graham, Jay P
2015-01-01
Carbon credits are an increasingly prevalent market-based mechanism used to subsidize household water treatment technologies (HWT). This involves generating credits through the reduction of carbon emissions from boiling water by providing a technology that reduces greenhouse gas emissions linked to climate change. Proponents claim this process delivers health and environmental benefits by providing clean drinking water and reducing greenhouse gases. Selling carbon credits associated with HWT projects requires rigorous monitoring to ensure households are using the HWT and achieving the desired benefits of the device. Critics have suggested that the technologies provide neither the benefits of clean water nor reduced emissions. This study explores the perspectives of carbon credit and water, sanitation and hygiene (WASH) experts on HWT carbon credit projects. Thirteen semi-structured, in-depth interviews were conducted with key informants from the WASH and carbon credit development sectors. The interviews explored perceptions of the two groups with respect to the procedures applied in the Gold Standard methodology for trading Voluntary Emission Reduction (VER) credits. Agreement among the WASH and carbon credit experts existed for the concept of suppressed demand and parameters in the baseline water boiling test. Key differences, however, existed. WASH experts' responses highlighted a focus on objectively verifiable data for monitoring carbon projects while carbon credit experts called for contextualizing observed data with the need for flexibility and balancing financial viability with quality assurance. Carbon credit projects have the potential to become an important financing mechanism for clean energy in low- and middle-income countries. Based on this research we recommend that more effort be placed on building consensus on the underlying assumptions for obtaining carbon credits from HWT projects, as well as the approved methods for monitoring correct and consistent use of the HWT technologies in order to support public health impacts.
5. Credit USAF, ca. 1942. Original housed in the Photograph ...
5. Credit USAF, ca. 1942. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. View of Bell Aircraft XP-59A Airacomet in flight. This was the United States military's first jet propelled aircraft which was extensively flight tested in secrecy at the Muroc Flight Test Base (North Base). - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
Credit BG. View looks southwest (236°) at the warehouse's southeast ...
Credit BG. View looks southwest (236°) at the warehouse's southeast and northeast facades. This building retains its original World War II era materials and appearance - Edwards Air Force Base, North Base, Warehouse, Second & C Streets, Boron, Kern County, CA
3. Credit BG. Interior view looks northeast (46°) at fire ...
3. Credit BG. Interior view looks northeast (46°) at fire pumps, valves, and emergency generator (powered by an internal combustion engine). - Edwards Air Force Base, North Base, Deluge Water Pumping Station, Near Second & D Streets, Boron, Kern County, CA
Credit BG. Southeast and northeast facades of concrete block structure ...
Credit BG. Southeast and northeast facades of concrete block structure built in the late 1960s. It is now used to store miscellaneous equipment - Edwards Air Force Base, North Base, Liquid Oxygen Storage Facility, Second Street, Boron, Kern County, CA
Sustainability Criteria for Planning, Constructing, and Operating Contingency Bases
2012-05-22
Planning 14 and airfields. Don’t want to clean up a site to use i t. Too risky, takes CREDIT 2 Brownfield Redevelopment no Planning N/A too long. Base...clean up a site to use i t. Too risky, takes CREDIT 2 Brownfield Redevelopment no Planning N/A too long. Base camp site location is chosen based on
Trade-based carbon sequestration accounting.
King, Dennis M
2004-04-01
This article describes and illustrates an accounting method to assess and compare "early" carbon sequestration investments and trades on the basis of the number of standardized CO2 emission offset credits they will provide. The "gold standard" for such credits is assumed to be a relatively riskless credit based on a CO2 emission reduction that provides offsets against CO2 emissions on a one-for-one basis. The number of credits associated with carbon sequestration needs to account for time, risk, durability, permanence, additionality, and other factors that future trade regulators will most certainly use to assign "official" credits to sequestration projects. The method that is presented here uses established principles of natural resource accounting and conventional rules of asset valuation to "score" projects. A review of 20 "early" voluntary United States based CO2 offset trades that involve carbon sequestration reveals that the assumptions that buyers, sellers, brokers, and traders are using to characterize the economic potential of their investments and trades vary enormously. The article develops a "universal carbon sequestration credit scoring equation" and uses two of these trades to illustrate the sensitivity of trade outcomes to various assumptions about how future trade auditors are likely to "score" carbon sequestration projects in terms of their "equivalency" with CO2 emission reductions. The article emphasizes the importance of using a standard credit scoring method that accounts for time and risk to assess and compare even unofficial prototype carbon sequestration trades. The scoring method illustrated in this article is a tool that can protect the integrity of carbon sequestration credit trading and can assist buyers and sellers in evaluating the real economic potential of prospective trades.
Credit and Attendance Alternatives for a Competency-Based Instructional Program.
ERIC Educational Resources Information Center
Georgia State Dept. of Education, Atlanta. Office of Planning and Development.
Credit alternatives allow local school systems to take advantage of community learning resources as an enrichment for, or supplement to, school learning experiences. The first part of this handbook describes credit alternatives that may be used by local school systems to provide individualized curricula for diagnostic and prescriptive instruction.…
Credit Cards on Campus: Academic Inquiry, Objective Empiricism, or Advocacy Research?
ERIC Educational Resources Information Center
Manning, Robert D.; Kirshak, Ray
2005-01-01
Professors John M. Barron and Michael E. Staten's article in Vol. 34, No. 3 of this journal, "Usage of Credit Cards Received through College Student-Marketing Programs," purports to "provide benchmark measures of college student credit card usage." Based on empirical analyses of proprietary industry data, they conclude that "There is no…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... interest rate risk requirements. The amended IRPS increases the asset threshold that identifies credit... asset threshold used to define a ``complex'' credit union for determining whether risk-based net worth... or credit unions) with assets of $50 million or less from interest rate risk rule requirements. To...
40 CFR 86.449 - Averaging provisions.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... (e)(1) Maintain and keep five types of properly organized and indexed records for each group and for... you project a credit deficit, state the source of credits needed to offset the credit deficit. (g) At... begin labeling motorcycles with the new FEL. (2) Manufacturers may ask to lower FELs based on test data...
40 CFR 86.449 - Averaging provisions.
Code of Federal Regulations, 2012 CFR
2012-07-01
.... (e)(1) Maintain and keep five types of properly organized and indexed records for each group and for... you project a credit deficit, state the source of credits needed to offset the credit deficit. (g) At... begin labeling motorcycles with the new FEL. (2) Manufacturers may ask to lower FELs based on test data...
40 CFR 86.449 - Averaging provisions.
Code of Federal Regulations, 2014 CFR
2014-07-01
.... (e)(1) Maintain and keep five types of properly organized and indexed records for each group and for... you project a credit deficit, state the source of credits needed to offset the credit deficit. (g) At... begin labeling motorcycles with the new FEL. (2) Manufacturers may ask to lower FELs based on test data...
Credits, Curriculum, and Control in Higher Education: Cross-National Perspectives.
ERIC Educational Resources Information Center
Mason, Terrence C.; Arnove, Robert F.; Sutton, Margaret
2001-01-01
Examines higher education in Indonesia, Nicaragua, and Vietnam to illustrate how use of a credit system is linked to policies and institutions associated with capitalist, market-based economies, and how the credit system, embedded within a network of other educational practices, has transformed the university into an institution focused more on…
28 CFR 523.2 - Good time credit for violators.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...
28 CFR 523.2 - Good time credit for violators.
Code of Federal Regulations, 2012 CFR
2012-07-01
..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...
28 CFR 523.2 - Good time credit for violators.
Code of Federal Regulations, 2013 CFR
2013-07-01
..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...
28 CFR 523.2 - Good time credit for violators.
Code of Federal Regulations, 2011 CFR
2011-07-01
..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...
28 CFR 523.2 - Good time credit for violators.
Code of Federal Regulations, 2010 CFR
2010-07-01
..., CLASSIFICATION, AND TRANSFER COMPUTATION OF SENTENCE Good Time § 523.2 Good time credit for violators. (a) An... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Good time credit for violators. 523.2... good time, upon being returned to custody for violation of supervised release, based on the number of...
ERIC Educational Resources Information Center
Maxwell, James A.; And Others
This report is comprised of two separate papers, "A Tax Credit for Certain Educational Expenses" by James A. Maxwell and Bernard L. Weinstein and "Income Tax Credits for Tuitions and Gifts in Nonpublic School Education" by Roger A. Freeman. The first paper is based on the assumption that provision of financial relief to parents who send their…
7 CFR 1962.19 - Claims against Commodity Credit Corporation (CCC).
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 14 2013-01-01 2013-01-01 false Claims against Commodity Credit Corporation (CCC... Liquidation of Chattel Security § 1962.19 Claims against Commodity Credit Corporation (CCC). This section is based on a Memorandum of Understanding between CCC and FmHA or its successor agency under Public Law 103...
7 CFR 1962.19 - Claims against Commodity Credit Corporation (CCC).
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 14 2014-01-01 2014-01-01 false Claims against Commodity Credit Corporation (CCC... Liquidation of Chattel Security § 1962.19 Claims against Commodity Credit Corporation (CCC). This section is based on a Memorandum of Understanding between CCC and FmHA or its successor agency under Public Law 103...
7 CFR 1962.19 - Claims against Commodity Credit Corporation (CCC).
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 14 2012-01-01 2012-01-01 false Claims against Commodity Credit Corporation (CCC... Liquidation of Chattel Security § 1962.19 Claims against Commodity Credit Corporation (CCC). This section is based on a Memorandum of Understanding between CCC and FmHA or its successor agency under Public Law 103...
7 CFR 1962.19 - Claims against Commodity Credit Corporation (CCC).
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 14 2010-01-01 2009-01-01 true Claims against Commodity Credit Corporation (CCC... Liquidation of Chattel Security § 1962.19 Claims against Commodity Credit Corporation (CCC). This section is based on a Memorandum of Understanding between CCC and FmHA or its successor agency under Public Law 103...
7 CFR 1962.19 - Claims against Commodity Credit Corporation (CCC).
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 14 2011-01-01 2011-01-01 false Claims against Commodity Credit Corporation (CCC... Liquidation of Chattel Security § 1962.19 Claims against Commodity Credit Corporation (CCC). This section is based on a Memorandum of Understanding between CCC and FmHA or its successor agency under Public Law 103...
NASA Astrophysics Data System (ADS)
Watford, M.; DeCusatis, C.
2005-09-01
With the advent of new regulations governing the protection and recovery of sensitive business data, including the Sarbanes-Oxley Act, there has been a renewed interest in business continuity and disaster recovery applications for metropolitan area networks. Specifically, there has been a need for more efficient bandwidth utilization and lower cost per channel to facilitate mirroring of multi-terabit data bases. These applications have further blurred the boundary between metropolitan and wide area networks, with synchronous disaster recovery applications running up to 100 km and asynchronous solutions extending to 300 km or more. In this paper, we discuss recent enhancements in the Nortel Optical Metro 5200 Dense Wavelength Division Multiplexing (DWDM) platform, including features recently qualified for data communication applications such as Metro Mirror, Global Mirror, and Geographically Distributed Parallel Sysplex (GDPS). Using a 10 Gigabit/second (Gbit/s) backbone, this solution transports significantly more Fibre Channel protocol traffic with up to five times greater hardware density in the same physical package. This is also among the first platforms to utilize forward error correction (FEC) on the aggregate signals to improve bit error rate (BER) performance beyond industry standards. When combined with encapsulation into wide area network protocols, the use of FEC can compensate for impairments in BER across a service provider infrastructure without impacting application level performance. Design and implementation of these features will be discussed, including results from experimental test beds which validate these solutions for a number of applications. Future extensions of this environment will also be considered, including ways to provide configurable bandwidth on demand, mitigate Fibre Channel buffer credit management issues, and support for other GDPS protocols.
Author Credit for Transdisciplinary Collaboration
Xu, Jian; Ding, Ying; Malic, Vincent
2015-01-01
Transdisciplinary collaboration is the key for innovation. An evaluation mechanism is necessary to ensure that academic credit for this costly process can be allocated fairly among coauthors. This paper proposes a set of quantitative measures (e.g., t_credit and t_index) to reflect authors’ transdisciplinary contributions to publications. These measures are based on paper-topic probability distributions and author-topic probability distributions. We conduct an empirical analysis of the information retrieval domain which demonstrates that these measures effectively improve the results of harmonic_credit and h_index measures by taking into account the transdisciplinary contributions of authors. The definitions of t_credit and t_index provide a fair and effective way for research organizations to assign credit to authors of transdisciplinary publications. PMID:26375678
Measuring the coupled risks: A copula-based CVaR model
NASA Astrophysics Data System (ADS)
He, Xubiao; Gong, Pu
2009-01-01
Integrated risk management for financial institutions requires an approach for aggregating risk types (such as market and credit) whose distributional shapes vary considerably. The financial institutions often ignore risks' coupling influence so as to underestimate the financial risks. We constructed a copula-based Conditional Value-at-Risk (CVaR) model for market and credit risks. This technique allows us to incorporate realistic marginal distributions that capture essential empirical features of these risks, such as skewness and fat-tails while allowing for a rich dependence structure. Finally, the numerical simulation method is used to implement the model. Our results indicate that the coupled risks for the listed company's stock maybe are undervalued if credit risk is ignored, especially for the listed company with bad credit quality.
12 CFR 652.80 - When you must determine the risk-based capital level.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false When you must determine the risk-based capital level. 652.80 Section 652.80 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.80 When you...
Credit PSR. View looks east southeast (118°) across foundations of ...
Credit PSR. View looks east southeast (118°) across foundations of North Base Administration Building (originally numbered T-50) toward Building 4318 (Warehouse) and Building 4305 (Unicon Portable Hangar). Building 4401 (Hangar No. 1) appears in extreme left background - Edwards Air Force Base, North Base, Administration Building T-50, D Street, Boron, Kern County, CA
Credit USAF, 7 September 1945. Original housed in the Muroc ...
Credit USAF, 7 September 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View of the mess hall, looking to the north. Sign over door reads "MFTB Muroc Flight Test Base Base Mess." - Edwards Air Force Base, North Base, Base Mess Hall T-27, Third Street, Boron, Kern County, CA
Credit BG. View looks south southeast (162°) across foundation of ...
Credit BG. View looks south southeast (162°) across foundation of Building 4332 Warehouse "B" (formerly T-81). Top of foundation for Building 4332 Warehouse "A" is visible at extreme left of view. In remote distance are buildings at Main Base, Edwards Air Force Base - Edwards Air Force Base, North Base, Warehouse B, Second Street at E Street, Boron, Kern County, CA
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false General. 652.55 Section 652.55 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.55 General. You must hold risk-based capital...
12 CFR 652.95 - Failure to meet capital requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 652.95 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.95 Failure to meet... your risk-based capital level calculated according to § 652.65, your minimum capital requirements...
7. Credit PSR. Interior of Building 4401, looking 200° (south ...
7. Credit PSR. Interior of Building 4401, looking 200° (south southwest), showing original interior wooden construction of walls and roof trusses. Hangar is presently used for storage. - Edwards Air Force Base, North Base, Hangar No. 1, First & B Streets, Boron, Kern County, CA
Credit BG. View looks north northwest (325°) towards Administration Building ...
Credit BG. View looks north northwest (325°) towards Administration Building across aircraft apron east of Building 4505. Building 4507 (Storage Building) appears at extreme right of view - Edwards Air Force Base, North Base, Administration Building, Northeast of A Street, Boron, Kern County, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-26
... threshold is used to define a ``complex'' credit union for determining whether risk-based net worth... credit union (FICU) is subject to certain interest rate risk rule requirements. \\1\\ IRPS 03-2, 68 FR... multiple applications, while avoiding undue risk to the National Credit Union Share Insurance Fund (NCUSIF...
75 FR 75724 - Agency Information Collection Activities: Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-06
... of the OCC. The OCC requires independent credit card banks to pay an additional assessment based on receivables attributable to accounts owned by the bank. Independent credit card banks are national banks that primarily engage in credit card operations and are not affiliated with a full service national bank. The OCC...
Code of Federal Regulations, 2014 CFR
2014-07-01
... and the in-use emission rate without the technology. Multiply this difference by the number of engines... HEAVY-DUTY HIGHWAY ENGINES Special Compliance Provisions § 1036.610 Innovative technology credits and... judgment. We recommend that you base your credit/adjustment on A to B testing of pairs of engines/vehicles...
Code of Federal Regulations, 2013 CFR
2013-07-01
... and the in-use emission rate without the technology. Multiply this difference by the number of engines... HEAVY-DUTY HIGHWAY ENGINES Special Compliance Provisions § 1036.610 Innovative technology credits and... judgment. We recommend that you base your credit/adjustment on A to B testing of pairs of engines/vehicles...
Code of Federal Regulations, 2012 CFR
2012-07-01
... and the in-use emission rate without the technology. Multiply this difference by the number of engines... HEAVY-DUTY HIGHWAY ENGINES Special Compliance Provisions § 1036.610 Innovative technology credits and... judgment. We recommend that you base your credit/adjustment on A to B testing of pairs of engines/vehicles...
ERIC Educational Resources Information Center
Raffe, David
2011-01-01
The Scottish Credit and Qualifications Framework (SCQF) was formally launched in 2001. It is a comprehensive credit-based National Qualifications Framework (NQF) with twelve levels, intended to accommodate all qualifications and assessed learning in Scotland. It aims to support access to learning and to make the education and training system more…
The Fiscal Impact of Tax-Credit Scholarships in Oklahoma. State Research
ERIC Educational Resources Information Center
Gottlob, Brian
2011-01-01
This study seeks to provide outcomes-based information on Oklahoma's proposal to give tax credits for contributing to organizations that provide scholarships to K-12 private schools. The study constructs a model to determine the fiscal impact of tax-credit scholarships on the state and on local school districts. The author estimates the impact…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fell, Harrison; Kaffine, Daniel; Steinberg, Daniel
We investigate the role of energy efficiency in rate-based emissions intensity standards, a particularly policy-relevant consideration given that the Environmental Protection Agency's Clean Power Plan allows crediting of electricity savings as a means of complying with state-specific emissions standards. We show that with perfectly inelastic energy services demand, crediting efficiency measures can recover the first-best allocation. However, when demand for energy services exhibits some elasticity, crediting energy efficiency can no longer recover first-best. While crediting removes the relative distortion between energy generation and energy efficiency, it distorts the absolute level of energy services. Building on these results, we derive themore » conditions determining the second-best intensity standard and crediting rule. Simulations calibrated to the electricity sector in Texas find that while some form of crediting is generally welfare-improving, the proposed one-for-one crediting of energy savings is unlikely to achieve efficient outcomes.« less
8. Credit PSR. Interior of Building 4305, looking west under ...
8. Credit PSR. Interior of Building 4305, looking west under elliptical laminated wooden roof arches. Lower surfaces are ceilings of offices built within structure; cylindrical and rectangular ducts are for air conditioning. - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
Non-Religion-Based State Constitutional Challenges to Educational Voucher and Tax Credit Programs
ERIC Educational Resources Information Center
Green, Preston C., III
2016-01-01
This article provides an overview of non-religion-based state constitutional challenges to educational voucher and tax credit/scholarship programs. The first section discusses litigation examining whether education voucher programs violate constitutional provisions requiring the legislature to provide an efficient system of public schools. The…
Credit BG. Interior view of the building displays temporary wooden ...
Credit BG. Interior view of the building displays temporary wooden building construction, pump, and water piping arrangements. The well is currently used as an observation post for changes in ground water levels - Edwards Air Force Base, North Base, Well No. 2, East of Second Street, Boron, Kern County, CA
Credit BG. View looking northeast (42°) at storage building used ...
Credit BG. View looking northeast (42°) at storage building used to store equipment near southeast edge of aircraft apron in the vicinity of Building 4305 (Unicon Portable Hangar) - Edwards Air Force Base, North Base, Equipment Storage Building, East of Second Street, Boron, Kern County, CA
Credit USAF. Original housed in the Muroc Flight Test Base, ...
Credit USAF. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View captioned as "7 Sept 1945, BH-5 Base Ordinance Motor Repair Shop" with gas station and gasoline pump. View looks roughly northwest - Edwards Air Force Base, North Base, Motor Repair Shop T-16, Third & C Streets, Boron, Kern County, CA
Credit PSR. View looks south southeast (160°) across top of ...
Credit PSR. View looks south southeast (160°) across top of Imhoff Tank. Bare earth directly beyond tank demarks sewage canal which conducted wastes to a sewage lagoon at the edge of Rogers Dry Lake. Main Base at Edwards AFB appears across the lakebed - Edwards Air Force Base, North Base, Imhoff Tank, Southwest of E Street, Boron, Kern County, CA
Credit risk evaluation based on social media.
Yang, Yang; Gu, Jing; Zhou, Zongfang
2016-07-01
Social media has been playing an increasingly important role in the sharing of individuals' opinions on many financial issues, including credit risk in investment decisions. This paper analyzes whether these opinions, which are transmitted through social media, can accurately predict enterprises' future credit risk. We consider financial statements oriented evaluation results based on logit and probit approaches as the benchmarks. We then conduct textual analysis to retrieve both posts and their corresponding commentaries published on two of the most popular social media platforms for financial investors in China. Professional advice from financial analysts is also investigated in this paper. We surprisingly find that the opinions extracted from both posts and commentaries surpass opinions of analysts in terms of credit risk prediction. Copyright © 2015 Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Ganzglass, Evelyn; Bird, Keith; Prince, Heath
2011-01-01
The national goal of increasing postsecondary credentials, to improve both equity and economic competitiveness, requires a fresh look at how to recognize learning in noncredit workforce education and training. The credit hour has long been the standard academic currency in postsecondary education. Despite its weakness as a measure of learning, in…
ERIC Educational Resources Information Center
Hu, Jiayi; Hagedorn, Linda Serra
2015-01-01
This study analyzes data from one of the larger credit-based college transition programs for international students, the U.S. Bound College Credit Program or USBC2 Program (a pseudonym), mainly offered to high school students around the globe who are planning on attending American colleges or universities. Upon successful program completion, these…
Binford, Michael W.; Lee, Tae Jeong; Townsend, Robert M.
2004-01-01
Environmental variability is an important risk factor in rural agricultural communities. Testing models requires empirical sampling that generates data that are representative in both economic and ecological domains. Detrended correspondence analysis of satellite remote sensing data were used to design an effective low-cost sampling protocol for a field study to create an integrated socioeconomic and ecological database when no prior information on ecology of the survey area existed. We stratified the sample for the selection of tambons from various preselected provinces in Thailand based on factor analysis of spectral land-cover classes derived from satellite data. We conducted the survey for the sampled villages in the chosen tambons. The resulting data capture interesting variations in soil productivity and in the timing of good and bad years, which a purely random sample would likely have missed. Thus, this database will allow tests of hypotheses concerning the effect of credit on productivity, the sharing of idiosyncratic risks, and the economic influence of environmental variability. PMID:15254298
Credit PSR. Northeast and southwest facades of Sewage Pumping Station ...
Credit PSR. Northeast and southwest facades of Sewage Pumping Station (Building 4330). Building retains its World War II construction materials and character. In the background at the extreme left is Building 4305 (Unicon Portable Hangar) - Edwards Air Force Base, North Base, Sewage Pumping Station, Southwest of E Street, Boron, Kern County, CA
38 CFR 36.4279 - Extensions and reamortizations.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... (a) Provided the debtor(s) is (are) a reasonable credit risk(s), as determined by the holder based... debtor(s), be extended in the event of default, to avoid imminent default, or in any other case where the...) is (are) a reasonable credit risk(s), as determined by the holder based upon review of the debtor's...
13 CFR 106.303 - Who has authority to approve and sign a Fee Based Record?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Who has authority to approve and sign a Fee Based Record? 106.303 Section 106.303 Business Credit and Assistance SMALL BUSINESS.../her written delegation, the Deputy Administrator, an associate or assistant administrator, after...
13 CFR 107.507 - Violations based on false filings and nonperformance of agreements with SBA.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 107.507 Section 107.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES Managing the Operations of a Licensee...
13 CFR 108.507 - Violations based on false filings and nonperformance of agreements with SBA.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Violations based on false filings and nonperformance of agreements with SBA. 108.507 Section 108.507 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Managing the Operations of a...
5. Credit BG. View looking northeast at southwest facade of ...
5. Credit BG. View looking northeast at southwest facade of Building 4505 as seen from top of Building 4500 (Control Tower). A warehouse wing adjoins southeast side of hangar at right. In far right background is Building 4511, Jet Fuel Depot for grade JP-5 fuel. - Edwards Air Force Base, North Base, Hangar, End of North Base Road, Boron, Kern County, CA
ERIC Educational Resources Information Center
Kelchen, Robert
2015-01-01
Competency-based education (CBE), broadly defined as a form of higher education in which credit is provided on the basis of student learning rather than credit or clock hours, has begun to catch the attention of federal and state policymakers, foundations, and colleges. Among the model's promising features are its potential to lower college costs…
1. Credit PSR. View looks north northeast (18°) down typical ...
1. Credit PSR. View looks north northeast (18°) down typical dust ditch paralleling First Street. Building 4401 (Hangar No. 1) appears at the extreme right of the view. Building 4456 (Fire House No. 4), Building 4444 (Communications Building), and Building 4505 appear in the background. - Edwards Air Force Base, North Base, Dust Ditch System, Traversing North Base, Boron, Kern County, CA
76 FR 20350 - Farm Credit Administration Board; Sunshine Act; Regular Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
.... New Business Operating and Strategic Business Planning--Proposed Rule Farmer Mac Risk-Based Capital... business. FOR FURTHER INFORMATION CONTACT: Dale L. Aultman, Secretary to the Farm Credit Administration...
7. Credit USAF, 1945. Original housed in the Muroc Flight ...
7. Credit USAF, 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Interior view in shop wing on south side of hangar. Original caption reads "7 Sept. 1945, BH-10, Hangar No. 4 4505 Machine Shop." - Edwards Air Force Base, North Base, Hangar, End of North Base Road, Boron, Kern County, CA
Variables Influencing Credit Card Balances of Students at a Midwestern University
ERIC Educational Resources Information Center
Mattson, Lucretia; Sahlhoff, Kathleen; Blackstone, Judith; Peden, Blaine; Nahm, Abraham Y.
2004-01-01
This research used a Web-based survey of students at a Midwest regional university to measure the extent of credit card use by first-year students and seniors. The results indicate that the variables influencing credit card use and the carrying of a balance from one month to the next include the number of cards held by the student, the student's…
Code of Federal Regulations, 2014 CFR
2014-01-01
... Credit Score Disclosure Exception Notices B Appendix B to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. B Appendix B to Part 698... set of circumstances as indicated by the title of that model form. 2. Model form B-1 is for use in...
Combining Outdoor Education and Anishnaabe Culture in a Four-Credit Semester Program in Blind River
ERIC Educational Resources Information Center
Thomson, Alexandra
2011-01-01
This article describes a four-credit semester program at Elliot Lake Secondary School in the late 1990s. This New Trails program is based around physical education and leadership, geography, Native studies, and English credits. The students are outside much of the time. The students become certified in the use of GPS and in map and compass work,…
9. Credit USAF, ca. 1945. Original housed in the Muroc ...
9. Credit USAF, ca. 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View of concrete base and brackets of jet engine rotor balancing machine. Location where photograph was taken not determined, but presumed to be in shops of Building 4505. - Edwards Air Force Base, North Base, Hangar, End of North Base Road, Boron, Kern County, CA
8. Credit USAF, ca. 1945. Original housed in the Muroc ...
8. Credit USAF, ca. 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View of concrete base for jet engine rotor balancing machine. Location where photograph was taken not determined, but presumed to be in shops of Building 4505 which had a sizeable machine shop. - Edwards Air Force Base, North Base, Hangar, End of North Base Road, Boron, Kern County, CA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radulescu, Georgeta; Gauld, Ian C; Ilas, Germina
2011-01-01
The expanded use of burnup credit in the United States (U.S.) for storage and transport casks, particularly in the acceptance of credit for fission products, has been constrained by the availability of experimental fission product data to support code validation. The U.S. Nuclear Regulatory Commission (NRC) staff has noted that the rationale for restricting the Interim Staff Guidance on burnup credit for storage and transportation casks (ISG-8) to actinide-only is based largely on the lack of clear, definitive experiments that can be used to estimate the bias and uncertainty for computational analyses associated with using burnup credit. To address themore » issues of burnup credit criticality validation, the NRC initiated a project with the Oak Ridge National Laboratory to (1) develop and establish a technically sound validation approach for commercial spent nuclear fuel (SNF) criticality safety evaluations based on best-available data and methods and (2) apply the approach for representative SNF storage and transport configurations/conditions to demonstrate its usage and applicability, as well as to provide reference bias results. The purpose of this paper is to describe the isotopic composition (depletion) validation approach and resulting observations and recommendations. Validation of the criticality calculations is addressed in a companion paper at this conference. For isotopic composition validation, the approach is to determine burnup-dependent bias and uncertainty in the effective neutron multiplication factor (keff) due to bias and uncertainty in isotopic predictions, via comparisons of isotopic composition predictions (calculated) and measured isotopic compositions from destructive radiochemical assay utilizing as much assay data as is available, and a best-estimate Monte Carlo based method. This paper (1) provides a detailed description of the burnup credit isotopic validation approach and its technical bases, (2) describes the application of the approach for representative pressurized water reactor and boiling water reactor safety analysis models to demonstrate its usage and applicability, (3) provides reference bias and uncertainty results based on a quality-assurance-controlled prerelease version of the Scale 6.1 code package and the ENDF/B-VII nuclear cross section data.« less
NASA Astrophysics Data System (ADS)
Shahzad, Syed Jawad Hussain; Nor, Safwan Mohd; Kumar, Ronald Ravinesh; Mensi, Walid
2017-01-01
This study examines the interdependence and contagion among US industry-level credit markets. We use daily data of 11 industries from 17 December 2007 to 31 December 2014 for the time-frequency, namely, wavelet squared coherence analysis. The empirical analysis reveals that Basic Materials (Utilities) industry credit market has the highest (lowest) interdependence with other industries. Basic Materials credit market passes cyclical effect to all other industries. The little ;shift-contagion; as defined by Forbes and Rigobon (2002) is examined using elliptical and Archimedean copulas on the short-run decomposed series obtained through Variational Mode Decomposition (VMD). The contagion effects between US industry-level credit markets mainly occurred during the global financial crisis of 2007-08.
4. Credit USAF, ca. 1945. Original housed in the Muroc ...
4. Credit USAF, ca. 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Photographic copy of photograph captioned "Hangar No. 2 Hydraulics Room." Location within Building 4402 not determined. - Edwards Air Force Base, North Base, Hangar No. 2, First & A Streets, Boron, Kern County, CA
ERIC Educational Resources Information Center
Howerter, Wendy Lou
2011-01-01
This correlational study samples twelfth grade (senior) students in one central Midwest high school and examines their participation in credit-based transition programs and their changes in educational aspirations. Surveys and community college data are used to collect quantitative data to address six research questions. Using Hossler and…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... Alternatives to the Use of Credit Ratings in the Risk-Based Capital Guidelines of the Federal Banking Agencies... Ratings in the Risk-Based Capital Guidelines of the Federal Banking Agencies'' to facilitate the... docket and publish them on the Regulations.gov Web site without change, including any business or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-12
... credit allowable under section 45K for coke or coke gas (other than from petroleum based products) for... apply to coke or coke gas (other than from petroleum based products) sold during calendar year 2011. Inflation Adjustment Factor: The inflation adjustment factor for coke or coke gas for calendar year 2011 is...
7. Credit PSR. Detail view looks east at Building 4306 ...
7. Credit PSR. Detail view looks east at Building 4306 (Boiler House) and at the south facade of Building 4305. Ground disturbance in foreground was a pit lined with plastic film for placement of a temporary fuel tank. - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
13 CFR 106.402 - What provisions must be set forth in a Non-Fee Based Record?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What provisions must be set forth in a Non-Fee Based Record? 106.402 Section 106.402 Business Credit and Assistance SMALL BUSINESS... endorsement by SBA of the Donor, or the Donor's products or services. ...
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
1. Credit PSR. View looks north from aircraft apron at ...
1. Credit PSR. View looks north from aircraft apron at south and east facades of the first hangar built at North Base in 1942. Note Building 4306 attached to hangar in distance; this structure is the boiler house to heat hangar during winters. Cable reels in foreground are from fiber optic and electrical cable installations ongoing at Edwards Air Force Base. - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
Determinants affecting consumer adoption of contactless credit card: an empirical study.
Wang, Yu-Min
2008-12-01
The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.
An Anonymous Credit Card System
NASA Astrophysics Data System (ADS)
Androulaki, Elli; Bellovin, Steven
Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.
Buy It Now and Pay for It Later: An Experimental Study of Student Credit Card Use
ERIC Educational Resources Information Center
Fagerstrom, Asle; Hantula, Donald A.
2013-01-01
Credit card debt is of increasing concern among college students, but reasons for it are not well understood. In a simulated shopping experiment based on a hyperbolic discounted utility model, 21 participants could either save money for a new model of their favorite mobile phone brand and get it in the future or buy the product on credit and get…
QUICR-learning for Multi-Agent Coordination
NASA Technical Reports Server (NTRS)
Agogino, Adrian K.; Tumer, Kagan
2006-01-01
Coordinating multiple agents that need to perform a sequence of actions to maximize a system level reward requires solving two distinct credit assignment problems. First, credit must be assigned for an action taken at time step t that results in a reward at time step t > t. Second, credit must be assigned for the contribution of agent i to the overall system performance. The first credit assignment problem is typically addressed with temporal difference methods such as Q-learning. The second credit assignment problem is typically addressed by creating custom reward functions. To address both credit assignment problems simultaneously, we propose the "Q Updates with Immediate Counterfactual Rewards-learning" (QUICR-learning) designed to improve both the convergence properties and performance of Q-learning in large multi-agent problems. QUICR-learning is based on previous work on single-time-step counterfactual rewards described by the collectives framework. Results on a traffic congestion problem shows that QUICR-learning is significantly better than a Q-learner using collectives-based (single-time-step counterfactual) rewards. In addition QUICR-learning provides significant gains over conventional and local Q-learning. Additional results on a multi-agent grid-world problem show that the improvements due to QUICR-learning are not domain specific and can provide up to a ten fold increase in performance over existing methods.
Foreign currency exchange network topology across the 2008 credit crisis
NASA Astrophysics Data System (ADS)
Sharif, Shamshuritawati; Ap, Nuraisah Che; Ruslan, Nuraimi
2017-05-01
A stable world currency exchange rate is a very important aspect to be considered for a developed country, i.e Malaysia. A better understanding about the currencies itself is needed nowadays. This project is about to understanding the fluctuation and to identify the most influential world currencies in the three different cases; before credit crisis, during credit crisis and after credit crisis. A network topology approach is use to examine the interrelationship between currencies based on correlation analysis. With this point of view, those relationships can be measured by a correlation structure among the currencies. The network can be analyse by filtering the important information using minimum spanning tree (MST) and interpret it using degree centrality as the centrality measure. This topology will give a useful guide to understand the behaviour and determine the most influential currency in the network as a part of a complex system. All currencies are compared among the three different cases; before credit crisis, during credit crisis and after credit crisis period. The result of this project shows that Unites State Dollar (USD), Brazilian Real (BRL), United Kingdom Pound (EUR) and Danish Krone (DKK) are the most influential currencies before the credit crisis period. With respect to during the credit crisis, New Zealand Dollar (NZD) dominates the network and it is followed by Singapore Dollar (SGD) for after the credit crisis period.
The Research on the Loan-to-Value of Inventory Pledge Loan Based Upon the Unified Credit Mode
NASA Astrophysics Data System (ADS)
Peng, Yang
This paper focus on loan limit indicator of seasonal inventory financing in supply chain financial innovation based on the logistics features of unified credit mode. According to the "corporate and debt" method in trade credit, this paper analyzes the cash flow properties of borrowing firm and the profit level of logistics enterprise, then it assumes downside-risk-averse logistics enterprise instead of risk-neutral logistics enterprise and takes the method of VaR to figure out the maximum loan-to-value ratio of inventory which is in accord with the risk tolerance level of logistics enterprise in seasonal inventory impawn financing.
75 FR 60651 - Corporate Credit Unions
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-01
... for the corporate credit union and availability of proposed financial services from alternative depository institutions); Summary of survey results and/or customer base analysis; Proposed financial...; Semiannual pro-forma financial statements for the first three years, [[Page 60653
7 CFR 3550.160 - Refinancing with private credit.
Code of Federal Regulations, 2010 CFR
2010-01-01
... expected to meet when borrowing for similar purposes. Differences in interest rates and terms between RHS... protect the Government's interest. ... has the ability to obtain other credit at reasonable rates and terms based on their income, assets...
10. Credit BG. Interior of control and observation room at ...
10. Credit BG. Interior of control and observation room at Control and Recording Center Building 4221/E-22. - Jet Propulsion Laboratory Edwards Facility, Control & Recording Center, Edwards Air Force Base, Boron, Kern County, CA
The Effects of Low Income Housing Tax Credit Developments on Neighborhoods.
Baum-Snow, Nathaniel; Marion, Justin
2009-06-01
This paper evaluates the impacts of new housing developments funded with the Low Income Housing Tax Credit (LIHTC), the largest federal project based housing program in the U.S., on the neighborhoods in which they are built. A discontinuity in the formula determining the magnitude of tax credits as a function of neighborhood characteristics generates pseudo-random assignment in the number of low income housing units built in similar sets of census tracts. Tracts where projects are awarded 30 percent higher tax credits receive approximately six more low income housing units on a base of seven units per tract. These additional new low income developments cause homeowner turnover to rise, raise property values in declining areas and reduce incomes in gentrifying areas in neighborhoods near the 30th percentile of the income distribution. LIHTC units significantly crowd out nearby new rental construction in gentrifying areas but do not displace new construction in stable or declining areas.
Pinto, Mary Beth; Mansfield, Phylis M; Parente, Diane H
2004-06-01
College-age consumers are one of the groups most highly targeted by credit card marketers. While some college students use their credit cards wisely, others are unable to control their spending. The objective of this study was to investigate differences in attitude toward credit cards and the psychological factors of self-esteem and locus of control among college students who possess one or more credit cards. Attitude was operationalized to include three underlying components: cognitive, affective, and behavioral. We separated credit users into subcategories based on amount of installment debt. Convenience users were defined as those consumers who paid the credit-card balance in full each month. Installment users were classified as consumers who carried a balance month-to-month. Convenience users were compared to mild and heavy installment users to assess significance of differences in attitudinal and psychological factors. There were no significant differences in the psychological factors across the credit-card user groups. In addition, there was a statistically significant difference on each of the attitude components (knowledge/beliefs, affect, and behavior) across user groups; convenience users, mild installment, and heavy installment users.
The Proposal of a BDS Syllabus Framework to Suit Choice Based Credit System (CBCS).
Manivasakan, Shivasakthy; Sethuraman, K R; Narayan, K A
2016-08-01
Higher education takes a new dimension universally in the form of choice based Credit System (CBCS). In India, the University Grants Commission (UGC) has made CBCS mandatory in all fields except for Health Profession. Not much attempts were made in designing a BDS syllabus to suit CBCS. Aim of the study was to propose a model dental syllabus to fit into choice based credit system. A model BDS syllabus Prototype for CBCS was designed based on the UGC guidelines for terms as well as calculations for CBCS. Engineering curriculum models from IIT and Anna University were also referred to. Semester based BDS syllabus was designed without changing the norms of Dental Council of India (DCI). All the must know areas of the subjects were considered as "core" areas and the desirable and nice to know areas are left for "electives" by the students. By this method, none of the subject was left out at the same time students are provided with electives to learn deeper on their topics of choice. The existing BDS syllabus can be effectively modified by incorporating few changes based on the UGC regulations for Choice based credit system. The proposed framework gives an insight on the nature of modifications that are needed. By adopting this, BDS Course regulations can also follow CBCS without neglecting or reducing the weightage of any subject.
2. Credit BG. View down dust ditch at northeast side ...
2. Credit BG. View down dust ditch at northeast side of A Street, looking north northwest in "the loop". Note culverts used to give vehicular and pedestrian access to buildings northeast of A Street, some foundations of which may be seen at right of view. Structures in background belong to Jet Propulsion Laboratory Edwards Facility. - Edwards Air Force Base, North Base, Dust Ditch System, Traversing North Base, Boron, Kern County, CA
Scalable Multicast Protocols for Overlapped Groups in Broker-Based Sensor Networks
NASA Astrophysics Data System (ADS)
Kim, Chayoung; Ahn, Jinho
In sensor networks, there are lots of overlapped multicast groups because of many subscribers, associated with their potentially varying specific interests, querying every event to sensors/publishers. And gossip based communication protocols are promising as one of potential solutions providing scalability in P(Publish)/ S(Subscribe) paradigm in sensor networks. Moreover, despite the importance of both guaranteeing message delivery order and supporting overlapped multicast groups in sensor or P2P networks, there exist little research works on development of gossip-based protocols to satisfy all these requirements. In this paper, we present two versions of causally ordered delivery guaranteeing protocols for overlapped multicast groups. The one is based on sensor-broker as delegates and the other is based on local views and delegates representing subscriber subgroups. In the sensor-broker based protocol, sensor-broker might lead to make overlapped multicast networks organized by subscriber's interests. The message delivery order has been guaranteed consistently and all multicast messages are delivered to overlapped subscribers using gossip based protocols by sensor-broker. Therefore, these features of the sensor-broker based protocol might be significantly scalable rather than those of the protocols by hierarchical membership list of dedicated groups like traditional committee protocols. And the subscriber-delegate based protocol is much stronger rather than fully decentralized protocols guaranteeing causally ordered delivery based on only local views because the message delivery order has been guaranteed consistently by all corresponding members of the groups including delegates. Therefore, this feature of the subscriber-delegate protocol is a hybrid approach improving the inherent scalability of multicast nature by gossip-based technique in all communications.
Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young
2016-01-01
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786
Evaluation of Achieving a College Education Plus: A Credit-Based Transition Program
ERIC Educational Resources Information Center
Luna, Gaye; Fowler, Michael
2011-01-01
This ex post facto study evaluated Achieving a College Education (ACE) Plus program, a credit-based transition program between a high school district and a community college. Achieving a College Education Plus is an early outreach program. It is designed to aid at-risk students in graduating from high school and making a smooth transition to…
Credit BG. Northeast and northwest facades of Building 4496 (Security ...
Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA
2. Credit BG. View looks west southwest (245°) at Building ...
2. Credit BG. View looks west southwest (245°) at Building 4317, Deluge Water Pumping Station. The machinery in this structure draws water from an inground reservoir, Building 4316, whose round roof is visible at left rear of this view. - Edwards Air Force Base, North Base, Deluge Water Pumping Station, Near Second & D Streets, Boron, Kern County, CA
Credit BG. Northwest facade of Building 4504 (Deluge Water Booster ...
Credit BG. Northwest facade of Building 4504 (Deluge Water Booster Station) is in view at left, with 500,000 gallon water tank (Building 4503) at right. Fenced electrical substation in view between the above structures is Building 4510. Building 4505 is in background - Edwards Air Force Base, North Base, Deluge Water Booster Station, Northeast of A Street, Boron, Kern County, CA
Credit BG. View looks southwest (236°) across concrete foundations towards ...
Credit BG. View looks southwest (236°) across concrete foundations towards Building 4402 (Hangar No. 2). Building 4412 (Liquid Oxygen Repair Facility) and Building 4444 (Communications Building) appear in center background. Trees in view are locusts (Robinia pseudoacacia L.) - Edwards Air Force Base, North Base, Old Firehouse T-41, South end of A Street, Boron, Kern County, CA
13 CFR 106.302 - What provisions must be set forth in a Fee Based Record?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What provisions must be set forth in a Fee Based Record? 106.302 Section 106.302 Business Credit and Assistance SMALL BUSINESS... does not constitute or imply an endorsement by SBA of the Donor or the Donor's products or services. ...
Comparison of answer-until-correct and full-credit assessments in a team-based learning course.
Farland, Michelle Z; Barlow, Patrick B; Levi Lancaster, T; Franks, Andrea S
2015-03-25
To assess the impact of awarding partial credit to team assessments on team performance and on quality of team interactions using an answer-until-correct method compared to traditional methods of grading (multiple-choice, full-credit). Subjects were students from 3 different offerings of an ambulatory care elective course, taught using team-based learning. The control group (full-credit) consisted of those enrolled in the course when traditional methods of assessment were used (2 course offerings). The intervention group consisted of those enrolled in the course when answer-until-correct method was used for team assessments (1 course offering). Study outcomes included student performance on individual and team readiness assurance tests (iRATs and tRATs), individual and team final examinations, and student assessment of quality of team interactions using the Team Performance Scale. Eighty-four students enrolled in the courses were included in the analysis (full-credit, n=54; answer-until-correct, n=30). Students who used traditional methods of assessment performed better on iRATs (full-credit mean 88.7 (5.9), answer-until-correct mean 82.8 (10.7), p<0.001). Students who used answer-until-correct method of assessment performed better on the team final examination (full-credit mean 45.8 (1.5), answer-until-correct 47.8 (1.4), p<0.001). There was no significant difference in performance on tRATs and the individual final examination. Students who used the answer-until-correct method had higher quality of team interaction ratings (full-credit 97.1 (9.1), answer-until-correct 103.0 (7.8), p=0.004). Answer-until-correct assessment method compared to traditional, full-credit methods resulted in significantly lower scores for iRATs, similar scores on tRATs and individual final examinations, improved scores on team final examinations, and improved perceptions of the quality of team interactions.
An Introduction to the Partial Credit Model for Developing Nursing Assessments.
ERIC Educational Resources Information Center
Fox, Christine
1999-01-01
Demonstrates how the partial credit model, a variation of the Rasch Measurement Model, can be used to develop performance-based assessments for nursing education. Applies the model using the Practical Knowledge Inventory for Nurses. (SK)
159. Credit PG&E. Using mules and horses to transport generator ...
159. Credit PG&E. Using mules and horses to transport generator base plate from Anderson, CA, to Northern California's Kilarc powerhouse, c. 1903. - Battle Creek Hydroelectric System, Battle Creek & Tributaries, Red Bluff, Tehama County, CA
12 CFR 615.5360 - Reconsideration based on change in circumstances.
Code of Federal Regulations, 2012 CFR
2012-01-01
... circumstances. 615.5360 Section 615.5360 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Issuance of a Capital... shall continue in full force and effect. ...
12 CFR 615.5360 - Reconsideration based on change in circumstances.
Code of Federal Regulations, 2013 CFR
2013-01-01
... circumstances. 615.5360 Section 615.5360 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Issuance of a Capital... shall continue in full force and effect. ...
12 CFR 615.5360 - Reconsideration based on change in circumstances.
Code of Federal Regulations, 2014 CFR
2014-01-01
... circumstances. 615.5360 Section 615.5360 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Issuance of a Capital... shall continue in full force and effect. ...
12 CFR 615.5360 - Reconsideration based on change in circumstances.
Code of Federal Regulations, 2010 CFR
2010-01-01
... circumstances. 615.5360 Section 615.5360 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Issuance of a Capital... shall continue in full force and effect. ...
12 CFR 615.5360 - Reconsideration based on change in circumstances.
Code of Federal Regulations, 2011 CFR
2011-01-01
... circumstances. 615.5360 Section 615.5360 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL AFFAIRS, LOAN POLICIES AND OPERATIONS, AND FUNDING OPERATIONS Issuance of a Capital... shall continue in full force and effect. ...
ERIC Educational Resources Information Center
Barclay, Lizabeth A.; Wagner-Marsh, Fraya; Loewe, G. Michael
2002-01-01
Surveyed a human resource professional association about training and interest in international human resources management. Based on results, offers recommendations for expanding coverage of this topic in credit and non-credit courses. (EV)
A randomized trial of protocol-based care for early septic shock.
Yealy, Donald M; Kellum, John A; Huang, David T; Barnato, Amber E; Weissfeld, Lisa A; Pike, Francis; Terndrup, Thomas; Wang, Henry E; Hou, Peter C; LoVecchio, Frank; Filbin, Michael R; Shapiro, Nathan I; Angus, Derek C
2014-05-01
In a single-center study published more than a decade ago involving patients presenting to the emergency department with severe sepsis and septic shock, mortality was markedly lower among those who were treated according to a 6-hour protocol of early goal-directed therapy (EGDT), in which intravenous fluids, vasopressors, inotropes, and blood transfusions were adjusted to reach central hemodynamic targets, than among those receiving usual care. We conducted a trial to determine whether these findings were generalizable and whether all aspects of the protocol were necessary. In 31 emergency departments in the United States, we randomly assigned patients with septic shock to one of three groups for 6 hours of resuscitation: protocol-based EGDT; protocol-based standard therapy that did not require the placement of a central venous catheter, administration of inotropes, or blood transfusions; or usual care. The primary end point was 60-day in-hospital mortality. We tested sequentially whether protocol-based care (EGDT and standard-therapy groups combined) was superior to usual care and whether protocol-based EGDT was superior to protocol-based standard therapy. Secondary outcomes included longer-term mortality and the need for organ support. We enrolled 1341 patients, of whom 439 were randomly assigned to protocol-based EGDT, 446 to protocol-based standard therapy, and 456 to usual care. Resuscitation strategies differed significantly with respect to the monitoring of central venous pressure and oxygen and the use of intravenous fluids, vasopressors, inotropes, and blood transfusions. By 60 days, there were 92 deaths in the protocol-based EGDT group (21.0%), 81 in the protocol-based standard-therapy group (18.2%), and 86 in the usual-care group (18.9%) (relative risk with protocol-based therapy vs. usual care, 1.04; 95% confidence interval [CI], 0.82 to 1.31; P=0.83; relative risk with protocol-based EGDT vs. protocol-based standard therapy, 1.15; 95% CI, 0.88 to 1.51; P=0.31). There were no significant differences in 90-day mortality, 1-year mortality, or the need for organ support. In a multicenter trial conducted in the tertiary care setting, protocol-based resuscitation of patients in whom septic shock was diagnosed in the emergency department did not improve outcomes. (Funded by the National Institute of General Medical Sciences; ProCESS ClinicalTrials.gov number, NCT00510835.).
A credit card verifier structure using diffraction and spectroscopy concepts
NASA Astrophysics Data System (ADS)
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
2008-04-01
We propose and experimentally demonstrate an angle-multiplexing based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we choose to shine one at a time a number of broadband lightsources, each at different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam is diffracted and separated in space. In this way, the number of pixels of each color plane is investigated. Then we apply a feed forward back propagation neural network configuration to separate the counterfeit credit card from the real one. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, a 3-layer neural network, and a notebook computer can identify all 69 counterfeit credit cards from eight real credit cards.
Evaluation of portfolio credit risk based on survival analysis for progressive censored data
NASA Astrophysics Data System (ADS)
Jaber, Jamil J.; Ismail, Noriszura; Ramli, Siti Norafidah Mohd
2017-04-01
In credit risk management, the Basel committee provides a choice of three approaches to the financial institutions for calculating the required capital: the standardized approach, the Internal Ratings-Based (IRB) approach, and the Advanced IRB approach. The IRB approach is usually preferred compared to the standard approach due to its higher accuracy and lower capital charges. This paper use several parametric models (Exponential, log-normal, Gamma, Weibull, Log-logistic, Gompertz) to evaluate the credit risk of the corporate portfolio in the Jordanian banks based on the monthly sample collected from January 2010 to December 2015. The best model is selected using several goodness-of-fit criteria (MSE, AIC, BIC). The results indicate that the Gompertz distribution is the best model parametric model for the data.
Perverse effects of carbon markets on HFC-23 and SF6 abatement projects in Russia
NASA Astrophysics Data System (ADS)
Schneider, Lambert; Kollmuss, Anja
2015-12-01
Carbon markets are considered a key policy tool to achieve cost-effective climate mitigation. Project-based carbon market mechanisms allow private sector entities to earn tradable emissions reduction credits from mitigation projects. The environmental integrity of project-based mechanisms has been subject to controversial debate and extensive research, in particular for projects abating industrial waste gases with a high global warming potential (GWP). For such projects, revenues from credits can significantly exceed abatement costs, creating perverse incentives to increase production or generation of waste gases as a means to increase credit revenues from waste gas abatement. Here we show that all projects abating HFC-23 and SF6 under the Kyoto Protocol’s Joint Implementation mechanism in Russia increased waste gas generation to unprecedented levels once they could generate credits from producing more waste gas. Our results suggest that perverse incentives can substantially undermine the environmental integrity of project-based mechanisms and that adequate regulatory oversight is crucial. Our findings are critical for mechanisms in both national jurisdictions and under international agreements.
Validation of a Formula for Assigning Continuing Education Credit to Printed Home Study Courses
Hanson, Alan L.
2007-01-01
Objectives To reevaluate and validate the use of a formula for calculating the amount of continuing education credit to be awarded for printed home study courses. Methods Ten home study courses were selected for inclusion in a study to validate the formula, which is based on the number of words, number of final examination questions, and estimated difficulty level of the course. The amount of estimated credit calculated using the a priori formula was compared to the average amount of time required to complete each article based on pharmacists' self-reporting. Results A strong positive relationship between the amount of time required to complete the home study courses based on the a priori calculation and the times reported by pharmacists completing the 10 courses was found (p < 0.001). The correlation accounted for 86.2% of the total variability in the average pharmacist reported completion times (p < 0.001). Conclusions The formula offers an efficient and accurate means of determining the amount of continuing education credit that should be assigned to printed home study courses. PMID:19503705
Agent-Based Mapping of Credit Risk for Sustainable Microfinance
Lee, Joung-Hun; Jusup, Marko; Podobnik, Boris; Iwasa, Yoh
2015-01-01
By drawing analogies with independent research areas, we propose an unorthodox framework for mapping microfinance credit risk---a major obstacle to the sustainability of lenders outreaching to the poor. Specifically, using the elements of network theory, we constructed an agent-based model that obeys the stylized rules of microfinance industry. We found that in a deteriorating economic environment confounded with adverse selection, a form of latent moral hazard may cause a regime shift from a high to a low loan payment probability. An after-the-fact recovery, when possible, required the economic environment to improve beyond that which led to the shift in the first place. These findings suggest a small set of measurable quantities for mapping microfinance credit risk and, consequently, for balancing the requirements to reasonably price loans and to operate on a fully self-financed basis. We illustrate how the proposed mapping works using a 10-year monthly data set from one of the best-known microfinance representatives, Grameen Bank in Bangladesh. Finally, we discuss an entirely new perspective for managing microfinance credit risk based on enticing spontaneous cooperation by building social capital. PMID:25945790
Agent-based mapping of credit risk for sustainable microfinance.
Lee, Joung-Hun; Jusup, Marko; Podobnik, Boris; Iwasa, Yoh
2015-01-01
By drawing analogies with independent research areas, we propose an unorthodox framework for mapping microfinance credit risk--a major obstacle to the sustainability of lenders outreaching to the poor. Specifically, using the elements of network theory, we constructed an agent-based model that obeys the stylized rules of microfinance industry. We found that in a deteriorating economic environment confounded with adverse selection, a form of latent moral hazard may cause a regime shift from a high to a low loan payment probability. An after-the-fact recovery, when possible, required the economic environment to improve beyond that which led to the shift in the first place. These findings suggest a small set of measurable quantities for mapping microfinance credit risk and, consequently, for balancing the requirements to reasonably price loans and to operate on a fully self-financed basis. We illustrate how the proposed mapping works using a 10-year monthly data set from one of the best-known microfinance representatives, Grameen Bank in Bangladesh. Finally, we discuss an entirely new perspective for managing microfinance credit risk based on enticing spontaneous cooperation by building social capital.
Credit USAF, ca. 1945. Original housed in the Muroc Flight ...
Credit USAF, ca. 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View looks north at a hutment typical of several structures erected at the Muroc Flight Test Base (North Base) ca. 1943-1945. Similar structures, Buildings T-61, T-62 and T-63, lie in the distance behind T-40 - Edwards Air Force Base, North Base, Barracks T-40, Second & A Streets, Boron, Kern County, CA
8. Credit USAF, ca. 1952. Original housed in the Photograph ...
8. Credit USAF, ca. 1952. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. Oblique low-level aerial view of North Base looking northeast. Based on positions and types of aircraft and automobiles, this photo taken same day as HAER photo CA-170-7. Most temporary structures in this view have been demolished with the exception of the hangars. The concrete foundations remain of many structures, while no trace was found of others. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
Connectedness between US industry level credit markets and determinants
NASA Astrophysics Data System (ADS)
Shahzad, Syed Jawad Hussain; Kayani, Ghulam Mujtaba; Raza, Syed Ali; Shah, Nida; Al-Yahyaee, Khamis H.
2018-02-01
We examine the connectedness between US industry-level credit markets, using both Credit Default Spread (CDS) changes and volatilities, over the period from December 17, 2007, to November 13, 2015. The total, net directional and pairwise spillovers are estimated based on the generalized VAR framework developed by Diebold and Yilmaz (2012). The empirical analysis shows strong interactions for CDS spread change and volatility among all ten industries. Consumer Services and Basic Materials are the significant risk transmitters. Economic policy uncertainty and different market volatilities significantly determine credit market risk spillovers which also increase during market turbulence situations indicating a possible contagion effect. Implications of the findings are discussed.
Beyond "banking for the poor": credit mechanisms and women's empowerment.
Albee, A
1996-10-01
This article describes some strengths and limitations of credit programs for women in developing countries. It is urged that development planners recognize the importance of the selection of the type of credit mechanism in the long term. Ethical issues should be decided upon before the credit mechanism is operable. Organizations should make clear what level of commitment there is to empower borrowers. Most organizations give loans to women and assume empowerment will take place without devising strategies to ensure empowerment. Credit mechanisms include credit for the poor and credit by the poor. A sound financial portfolio and 100% repayment are not the appropriate criteria for securing the empowerment of women. Empowerment of women is related to "building the capacity of borrowers to manage and control decision making." UNICEF's framework of gender equality and women's empowerment identifies levels of empowerment as "welfare, access, conscientisation, participation, and control." Development planners should be aware that provision of credit also has the potential to increase a poor family's debt. Delinquency may be hidden by overlapping loans that trap borrowers. Fewer installment payments increase the chances of a debt trap. Reducing the number of installments may reduce administrative costs and conform to production processes, but may also lead to a debt trap. There is now considerable emphasis on investing in low-income women entrepreneurs as a highly efficient means of achieving social and economic objectives. Credit programs aim to support the growth of small, self-sustaining businesses, to improve women's opportunities, and to provide alternatives to exploitation by local money-lenders. This article describes the following credit mechanisms: bank guarantee systems, government credit schemes, intermediary projects, direct lending projects, banks for the poor, credit unions, and village-based banks.
NASA Astrophysics Data System (ADS)
Aidi, Muhammad Nur; Sari, Resty Indah
2012-05-01
A decision of credit that given by bank or another creditur must have a risk and it called credit risk. Credit risk is an investor's risk of loss arising from a borrower who does not make payments as promised. The substantial of credit risk can lead to losses for the banks and the debtor. To minimize this problem need a further study to identify a potential new customer before the decision given. Identification of debtor can using various approaches analysis, one of them is by using discriminant analysis. Discriminant analysis in this study are used to classify whether belonging to the debtor's good credit or bad credit. The result of this study are two discriminant functions that can identify new debtor. Before step built the discriminant function, selection of explanatory variables should be done. Purpose of selection independent variable is to choose the variable that can discriminate the group maximally. Selection variables in this study using different test, for categoric variable selection of variable using proportion chi-square test, and stepwise discriminant for numeric variable. The result of this study are two discriminant functions that can identify new debtor. The selected variables that can discriminating two groups of debtor maximally are status of existing checking account, credit history, credit amount, installment rate in percentage of disposable income, sex, age in year, other installment plans, and number of people being liable to provide maintenance. This classification produce a classification accuracy rate is good enough, that is equal to 74,70%. Debtor classification using discriminant analysis has risk level that is small enough, and it ranged beetwen 14,992% and 17,608%. Based on that credit risk rate, using discriminant analysis on the classification of credit status can be used effectively.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kats, G.H.; Rosenfield, A.H.; McIntosh, T.A.
1997-06-01
The energy efficiency industry is constrained by lack of financing. For example, in the United States, commercial and public buildings need an investment of $100 billion for cost-effective retrofits with an average payback of about four years. But the current level of financing is stagnant at only about 34% of this level per year. The U.S. Department of Energy (DOE) has led the development of the North American Energy Measurement and Verification Protocol (NEMVP). This Protocol will increase the reliability and quality of estimated efficiency savings and improve realized savings. A critical element in the development of low cost financingmore » and a secondary market--whether for homes or credit card debt--is the adoption of protocols to provide uniformity and reliability of the product. This is also true of energy efficiency installations, which have been characterized by inconsistency in the installation methodologies and, frequently, unreliability of savings. This Protocol, published in April 1996, is a DOE-led effort involving American Society of Heating, Refrigerating, and Air-Conditioning Engineers, Inc. ASHRAE, National Association of Energy Service Companies NAESCO, National Association of Regulatory Utility Commissioners NARUC, National Association of State Energy Officials NASEO, US Environmental Protection Agency EPA, Canada`s Canadian Association of Energy Service Companies CAESCO, and Mexico`s Comision Nacional Para El Ahorro De Energia CONAE and Fideicomiso De Apoyo Al Programa De Ahorro De Energia Del Sector Electrico FIDE. DOE has begun to build on this Protocol to develop new forms of lower-cost financing including, ultimately, development of a secondary market for energy efficiency. This could double financing for building energy efficiency within five years.« less
NASA Astrophysics Data System (ADS)
He, Fang; Chen, Xi
2016-11-01
The accelerating accumulation and risk concentration of Chinese local financing platforms debts have attracted wide attention throughout the world. Due to the network of financial exposures among institutions, the failure of several platforms or regions of systemic importance will probably trigger systemic risk and destabilize the financial system. However, the complex network of credit relationships in Chinese local financing platforms at the state level remains unknown. To fill this gap, we presented the first complex networks and hierarchical cluster analysis of the credit market of Chinese local financing platforms using the ;bottom up; method from firm-level data. Based on balance-sheet channel, we analyzed the topology and taxonomy by applying the analysis paradigm of subdominant ultra-metric space to an empirical data in 2013. It is remarked that we chose to extract the network of co-financed financing platforms in order to evaluate the effect of risk contagion from platforms to bank system. We used the new credit similarity measure by combining the factor of connectivity and size, to extract minimal spanning trees (MSTs) and hierarchical trees (HTs). We found that: (1) the degree distributions of credit correlation backbone structure of Chinese local financing platforms are fat tailed, and the structure is unstable with respect to targeted failures; (2) the backbone is highly hierarchical, and largely explained by the geographic region; (3) the credit correlation backbone structure based on connectivity and size is significantly heterogeneous; (4) key platforms and regions of systemic importance, and contagion path of systemic risk are obtained, which are contributed to preventing systemic risk and regional risk of Chinese local financing platforms and preserving financial stability under the framework of macro prudential supervision. Our approach of credit similarity measure provides a means of recognizing ;systemically important; institutions and regions for a targeted policy with risk minimization which gives a flexible and comprehensive consideration to both aspects of ;too big to fail; and ;too central to fail;.
Credit USAF, ca. 1943. Original housed in the Muroc Flight ...
Credit USAF, ca. 1943. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Historic view looking north across southwest end of swimming pool as army personnel work on finishing the pool bottom. View looks towards Mess Hall (T-10) on Second Street - Edwards Air Force Base, North Base, Swimming Pool, Second Street, Boron, Kern County, CA
Code of Federal Regulations, 2010 CFR
2010-01-01
... RETIREMENT COVERAGE BY CURRENT AND FORMER EMPLOYEES OF NONAPPROPRIATED FUND INSTRUMENTALITIES Additional... factor equal to the value of exponential function in which— (i) The base is one plus the assumed interest...
Code of Federal Regulations, 2011 CFR
2011-01-01
... RETIREMENT COVERAGE BY CURRENT AND FORMER EMPLOYEES OF NONAPPROPRIATED FUND INSTRUMENTALITIES Additional... factor equal to the value of exponential function in which— (i) The base is one plus the assumed interest...
11. Credit BG. Interior of control and observation room at ...
11. Credit BG. Interior of control and observation room at Control and Recording Center, showing detail of switchboard and closed circuit television monitors. - Jet Propulsion Laboratory Edwards Facility, Control & Recording Center, Edwards Air Force Base, Boron, Kern County, CA
1. Credit PSR. This view captures the main entrance to ...
1. Credit PSR. This view captures the main entrance to the Administration/Shops Building, constructed in 1963, looking north northeast (30°). The plaque at the base of the flagpole commemorates the first firing of a liquid-fueled rocket engine at Test Stand "A" in 1945. - Jet Propulsion Laboratory Edwards Facility, Administration & Shops Building, Edwards Air Force Base, Boron, Kern County, CA
ERIC Educational Resources Information Center
Tomasello, Jenna; Brand, Betsy
2016-01-01
How can states ensure that students who are overage or under-credit (OA/UC) not only graduate high school but are prepared for college or the workforce? Competency-based education (CBE) is one emerging strategy for addressing the needs of at-risk youth. CBE can address the needs of at-risk students because it is personalized to individual…
4. Credit PSR. View east at west and south facades ...
4. Credit PSR. View east at west and south facades of Unicon Portable Hangar with immediate ancillary structures. Building 4307 (Supply & Equipment Warehouse) appears at left, Building 4303 (Air Compressor Plant) in middle foreground, and Building 4306 (Boiler House) at the southwest corner of the hangar. - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
Credit BG. View looking north northeast at Guard House and ...
Credit BG. View looking north northeast at Guard House and entrance to Building 4505 complex. This Guard House was built in 1993 as a portable unit; it replaced an older structure. The Building 4505 complex is surrounded by a security fence. Building 4496 appears to immediate right of view - Edwards Air Force Base, North Base, Guard House, Northeast of A Street, Boron, Kern County, CA
Metrics-based assessments of research: incentives for 'institutional plagiarism'?
Berry, Colin
2013-06-01
The issue of plagiarism--claiming credit for work that is not one's own, rightly, continues to cause concern in the academic community. An analysis is presented that shows the effects that may arise from metrics-based assessments of research, when credit for an author's outputs (chiefly publications) is given to an institution that did not support the research but which subsequently employs the author. The incentives for what is termed here "institutional plagiarism" are demonstrated with reference to the UK Research Assessment Exercise in which submitting units of assessment are shown in some instances to derive around twice the credit for papers produced elsewhere by new recruits, compared to papers produced 'in-house'.
Preliminary design report: Babcock and Wilcox BR-100 100-ton rail/barge spent fuel shipping cask
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
1990-02-01
The purpose of this document is to provide information on burnup credit as applied to the preliminary design of the BR-100 shipping cask. There is a brief description of the preliminary basket design and the features used to maintain a critically safe system. Following the basket description is a discussion of various criticality analyses used to evaluate burnup credit. The results from these analyses are then reviewed in the perspective of fuel burnups expected to be shipped to either the final repository or a Monitored Retrievable Storage (MRS) facility. The hurdles to employing burnup credit in the certification of anymore » cask are then outlines and reviewed. the last section gives conclusions reached as to burnup credit for the BR-100 cask, based on our analyses and experience. All information in this study refers to the cask configured to transport PWR fuel. Boiling Water Reactor (BWR) fuel satisfies the criticality requirements so that burnup credit is not needed. All calculations generated in the preparation of this report were based upon the preliminary design which will be optimized during the final design. 8 refs., 19 figs., 16 tabs.« less
Hyperspectral imaging-based credit card verifier structure with adaptive learning.
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
2008-12-10
We propose and experimentally demonstrate a hyperspectral imaging-based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate, and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we shine a number of broadband light sources one at a time, each at a different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam are diffracted and separated in space. In this way, the center of mass of the histogram on each color plane is investigated by using a feed-forward backpropagation neural-network configuration. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, and a three-layer neural network can effectively identify 38 genuine and 109 counterfeit credit cards with false rejection rates of 5.26% and 0.92%, respectively. Key features include low cost, simplicity, no moving parts, no need of an additional decoding key, and adaptive learning.
NASA Astrophysics Data System (ADS)
Liu, Pengfei; Swallow, Stephen K.
2016-05-01
This paper develops a method that incorporates the public value for environmental cobenefits when a conservation buyer can purchase water quality credits based on nonmarket valuation results. We demonstrate this approach through an experiment with adult students in a classroom laboratory environment. Our application contributes to the study of individual preference and willingness to pay for cobenefits associated with the production of water quality credits in relation to the Ohio River Basin Trading Project. We use three different methods to elicit individuals' willingness to pay (WTP), including (1) a hypothetical referendum, (2) a real referendum lacking incentive compatibility, and (3) a real choice with incentive compatibility. Methodologically, our WTP estimates suggest individuals are more sensitive to the cost changes and reveal the lowest value in the real choice with incentive compatibility. Practically, we find individuals value certain cobenefits and credits as public goods. Incorporating public value toward cobenefits may improve the overall efficiency of a water quality trading market. Based on our specification of a planner's welfare function, results suggest a substantial welfare improvement after identifying an optimal allocation of a buyer's budget across credits derived from agricultural management practices producing different portfolios of cobenefits.
Community-based asthma care: trial of a "credit card" asthma self-management plan.
D'Souza, W; Crane, J; Burgess, C; Te Karu, H; Fox, C; Harper, M; Robson, B; Howden-Chapman, P; Crossland, L; Woodman, K
1994-07-01
Although asthma self-management plans are widely recommended as essential in the long-term treatment of adult asthma, there have been few studies examining their use. Our objective was to assess the effect of a "credit card" adult asthma self-management plan in a community experiencing major health problems from asthma, by means of a before and after intervention trial of the efficacy of the "credit card" plan, when introduced through community-based asthma clinics. The participants were 69 Maori people with asthma. The "credit card" plan consisted of written guidelines for the self-management of asthma, based on self-assessment of asthma severity, printed on a plastic card. On one side, management guidelines were based on the interpretation of peak expiratory flow rate (PEFR) recordings, whilst the reverse side was based on symptoms. The outcome measures used were before and after comparison of markers of asthma morbidity and requirement for acute medical treatment; and a structured questionnaire assessing the acceptability and use of the credit card plan. Following the introduction of the plan, the mean PEFR increased from 347 to 389 l.min-1, the percentage of nights woken fell from 30.4 to 16.9%, and the number of days "out of action" fell from 3.8 to 1.7%. The requirements for acute medical treatment also fell during the intervention period. Most participants commented favourably on the content and usefulness of the plan. In the situation of worsening asthma, 28% of subjects found the peak flow side of the card most helpful, 7% the symptoms side, and 48% found both sides equally helpful.(ABSTRACT TRUNCATED AT 250 WORDS)
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Definitions. 106.101 Section 106.101 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION COSPONSORSHIPS, FEE AND NON-FEE BASED SBA-SPONSORED ACTIVITIES AND GIFTS Scope and Definitions § 106.101 Definitions. The following...
U.S. regulatory research program for implementation of burnup credit in transport casks
DOT National Transportation Integrated Search
2001-09-10
In 1999 the U.S. Nuclear Regulatory Commission (U.S. NRC) initiated a research program to : support the development of technical bases and guidance that would facilitate the implementation of : burnup credit into licensing activities for transport an...
The Proposal of a BDS Syllabus Framework to Suit Choice Based Credit System (CBCS)
Sethuraman, KR; Narayan, KA
2016-01-01
Introduction Higher education takes a new dimension universally in the form of choice based Credit System (CBCS). In India, the University Grants Commission (UGC) has made CBCS mandatory in all fields except for Health Profession. Not much attempts were made in designing a BDS syllabus to suit CBCS. Aim Aim of the study was to propose a model dental syllabus to fit into choice based credit system. Materials and Methods A model BDS syllabus Prototype for CBCS was designed based on the UGC guidelines for terms as well as calculations for CBCS. Engineering curriculum models from IIT and Anna University were also referred to. Results Semester based BDS syllabus was designed without changing the norms of Dental Council of India (DCI). All the must know areas of the subjects were considered as “core” areas and the desirable and nice to know areas are left for “electives” by the students. By this method, none of the subject was left out at the same time students are provided with electives to learn deeper on their topics of choice. Conclusion The existing BDS syllabus can be effectively modified by incorporating few changes based on the UGC regulations for Choice based credit system. The proposed framework gives an insight on the nature of modifications that are needed. By adopting this, BDS Course regulations can also follow CBCS without neglecting or reducing the weightage of any subject. PMID:27656467
Credit USAF, 7 September 1945. Original housed in the Muroc ...
Credit USAF, 7 September 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Photo captioned "Oblique view of Recreation Hall/Chapel Bldg. T73." Movies on marquee were "Why Girls Leave Home" and "Blazing the Western Trail." View looks west from camera position across E Street - Edwards Air Force Base, North Base, Recreation Hall & Chapel T-73, E Street near North Base Road, Boron, Kern County, CA
Soloneski, Sonia; Ruiz de Arcaute, Celeste; Larramendy, Marcelo L
2016-09-01
The acute toxicity of two herbicide formulations, namely, the 57.71 % dicamba (DIC)-based Banvel(®) and the 48 % glyphosate (GLY)-based Credit(®), alone as well as the binary mixture of these herbicides was evaluated on late-stage Rhinella arenarum larvae (stage 36) exposed under laboratory conditions. Mortality was used as an endpoint for determining acute lethal effects, whereas the single-cell gel electrophoresis (SCGE) assay was employed as genotoxic endpoint to study sublethal effects. Lethality studies revealed LC5096 h values of 358.44 and 78.18 mg L(-1) DIC and GLY for Banvel(®) and Credit(®), respectively. SCGE assay revealed, after exposure for 96 h to either 5 and 10 % of the Banvel(®) LC5096 h concentration or 5 and 10 % of the Credit(®) LC5096 h concentration, an equal significant increase of the genetic damage index (GDI) regardless of the concentration of the herbicide assayed. The binary mixtures of 5 % Banvel(®) plus 5 % Credit(®) LC5096 h concentrations and 10 % Banvel(®) plus 10 % Credit(®) LC5096 h concentrations induced equivalent significant increases in the GDI in regard to GDI values from late-stage larvae exposed only to Banvel(®) or Credit(®). This study represents the first experimental evidence of acute lethal and sublethal effects exerted by DIC on the species, as well as the induction of primary DNA breaks by this herbicide in amphibians. Finally, a synergistic effect of the mixture of GLY and DIC on the induction of primary DNA breaks on circulating blood cells of R. arenarum late-stage larvae could be demonstrated.
Rethinking the NTCIP Design and Protocols - Analyzing the Issues
DOT National Transportation Integrated Search
1998-03-03
This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...
Credit BG. View looks southeast at west and south facades ...
Credit BG. View looks southeast at west and south facades of Building 4311. This is one of the World War II structures built in the second phase of North Base construction; it accompanied the Unicon Portable Hangar, situated behind the well house in this view. Function of metal rod with ball on end near ground in lower right corner of view not determined - Edwards Air Force Base, North Base, Well No. 2, East of Second Street, Boron, Kern County, CA
Blesch, Gregg
2008-04-14
The battle over health reform has a taxing angle, and the debate involves whether tax credits or deductions would work better in relation to health insurance. Some type of credit seems to be favored by the three major candidates. One major facet is how it affects employer-based plans. "It's the third-largest health program in the country, and no one knows about it," says Jonathan Gruber, left, of MIT.
Joseph, Galen; Beattie, Mary S; Lee, Robin; Braithwaite, Dejana; Wilcox, Carolina; Metrikin, Maya; Lamvik, Kate; Luce, Judith
2010-10-01
The Cancer Risk Education Intervention Tool (CREdIT) is a computer-based (non-interactive) slide presentation designed to educate low-literacy, and ethnically and racially diverse public hospital patients at risk of Hereditary Breast and Ovarian Cancer (HBOC) about genetics. To qualitatively evaluate participants' experience with and perceptions of a genetic education program as an adjunct to genetic counseling, we conducted direct observations of the intervention, semi-structured in person interviews with 11 women who viewed CREdIT, and post-counseling questionnaires with the two participating genetic counselors. Five themes emerged from the analysis of interviews: (1) genetic counseling and testing for breast/ovarian cancer was a new concept; (2) CREdIT's story format was particularly appealing; (3) changes in participants' perceived risk for breast cancer varied; (4) some misunderstandings about individual risk and heredity persisted after CREdIT and counseling; (5) the context for viewing CREdIT shaped responses to the presentation. Observations demonstrated ways to make the information provided in CREdIT and by genetic counselors more consistent. In a post-session counselor questionnaire, counselors' rating of the patient's preparedness before the session was significantly higher for patients who viewed CREdIT prior to their appointments than for other patients. This novel educational tool fills a gap in HBOC education by tailoring information to women of lower literacy and diverse ethnic/racial backgrounds. The tool was well received by interview participants and counselors alike. Further study is needed to examine the varied effects of CREdIT on risk perception. In addition, the implementation of CREdIT in diverse clinical settings and the cultural adaptation of CREdIT to specific populations reflect important areas for future work.
6. Credit BG. Detail view looking north at Building 4306 ...
6. Credit BG. Detail view looking north at Building 4306 (Boiler House) located at southwest corner of Building 4305 (Unicon Portable Hangar). Building retains its original World War II wooden construction and finish. Number sign for Building 4302 belongs to nearby sump pump structure (See HAER photo number CA-170-RR-1) - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
ERIC Educational Resources Information Center
Banker, Nancy Sirmay
This case study of a small suburban school district in the San Francisco Bay Area examines the interplay among individuals and groups within the district who make and implement policy decisions. The issue of awarding credit for experience-based learning focuses and directs the study. As an introduction to examination of the ways decisions are…
Code of Federal Regulations, 2011 CFR
2011-04-01
...-sum death payment based on World War II or post-World War II wage credits after we receive notice from... War II or post-World War II active service, our payments to you are erroneous to the extent the payments are based on the World War II or post-World War II wage credits. The payments are erroneous...
Code of Federal Regulations, 2013 CFR
2013-04-01
...-sum death payment based on World War II or post-World War II wage credits after we receive notice from... War II or post-World War II active service, our payments to you are erroneous to the extent the payments are based on the World War II or post-World War II wage credits. The payments are erroneous...
10. Credit USAF, 1945. Original housed in the Muroc Flight ...
10. Credit USAF, 1945. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. View of jet engine rotor balancing machine with engine rotor in place for balancing operations. Original caption reads "Balancing bucket wheel of jet engine, Muroc Flight Test Base, Oct. 1945"; personnel not identified. Location where photograph was taken not determined, but presumed to be in shops of Building 4505. - Edwards Air Force Base, North Base, Hangar, End of North Base Road, Boron, Kern County, CA
4. Credit USAF, ca. 1945. Original housed in the Photograph ...
4. Credit USAF, ca. 1945. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. Low level oblique aerial view of Muroc Flight Test Base (North Base), looking southwest along flightline. HANG-P-A hangar (Building 4505) is in the right foreground. A Bell XP-59A Airacomet, the United States military's first jet propelled aircraft, is being towed on the apron toward the control tower. Other aircraft in the foreground include Douglas DC-3s, North American Aviation P-51 Mustangs, and Lockheed P-38 Lightnings. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
75 FR 60347 - Information Sharing Among Federal Home Loan Banks
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... examiners' assessment of the strength of the Bank's corporate governance, its management of market risk, credit risk and operational risk, and its overall financial condition and performance. Based on these... enhancing the availability of residential mortgage and community lending credit through its member...
CONTROLLING STORM WATER RUNOFF WITH TRADABLE CREDITS FOR IMPERVIOUS SURFACES
Storm water flow off impervious surface in a watershed can lead to stream degradation, habitat alteration, low base flows and toxic leading. We show that a properly designed tradable runoff credit (TRC) system creates economic incentives for landowners to employ best management p...
Curriculum Development through YTS Modular Credit Accumulation.
ERIC Educational Resources Information Center
Further Education Unit, London (England).
This document reports the evaluation of the collaborately developed Modular Training Framework (MainFrame), a British curriculum development project, built around a commitment to a competency-based, modular credit accumulation program. The collaborators were three local education authorities (LEAs), those of Bedfordshire, Haringey, and Sheffield,…
The Effects of Low Income Housing Tax Credit Developments on Neighborhoods
Baum-Snow, Nathaniel; Marion, Justin
2013-01-01
This paper evaluates the impacts of new housing developments funded with the Low Income Housing Tax Credit (LIHTC), the largest federal project based housing program in the U.S., on the neighborhoods in which they are built. A discontinuity in the formula determining the magnitude of tax credits as a function of neighborhood characteristics generates pseudo-random assignment in the number of low income housing units built in similar sets of census tracts. Tracts where projects are awarded 30 percent higher tax credits receive approximately six more low income housing units on a base of seven units per tract. These additional new low income developments cause homeowner turnover to rise, raise property values in declining areas and reduce incomes in gentrifying areas in neighborhoods near the 30th percentile of the income distribution. LIHTC units significantly crowd out nearby new rental construction in gentrifying areas but do not displace new construction in stable or declining areas. PMID:24235779
Application of a micro-credit scheme to some ecological activities
NASA Astrophysics Data System (ADS)
Hakoyama, F.
2017-03-01
Micro-credit schemes are expanding very rapidly worldwide in ecological activities. Providing gas-cooking equipments in Burkina Faso is a successful example in which the micro-credit system contributes to improve not only poor women’s life but also ecological environment. In Bangladesh, a solar PV system program through micro-credit has been implemented widely and successfully: big NGOs act as equipment dealers and provide micro-credit loans to individual poor households. In contrast, there are very few cases which showed positive results in sanitation projects. Micro-credit schemes are, in principle, based on the income generated through the fund. But in usual cases, sanitation activities do not yield any income. High cost of latrine construction is another barrier. In this paper, we reviewed why we could not apply a micro-credit scheme to our “Améli-eaur project” in Burkina Faso. Common features for the success in ecological activities are 1) enough income yielded from the activity itself, 2) the strong needs from population side, and 3) established system support, both technically and administratively. If we find a way to fulfill these elements in a sanitation project, it can be a long, sustainable project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubin, Jonathan; Leiby, Paul N.
2012-06-11
This research examines the economic implications of different designs for a national low carbon fuel standard (NLCFS) for the road transportation sector. A NLCFS based on the average Carbon Intensity (CI) of all fuels sold in the gasoline and diesel markets will generate an incentive for fuel suppliers to reduce the measured CI of their petroleum fuels. The economic impacts of a NLCFS are fundamentally determined by: the availability of low carbon fuels; the compliance path; the reference level CI of the fuel baseline; and the degree of flexibility in the credit system. To quantitatively examine the implications of amore » NLCFS, we created the Transportation Regulation and Credit Trading (TRACT) Model. With TRACT, we model a NLCFS credit trading system among profit maximizing fuel suppliers for light- and heavy-duty vehicle fuel use for the United States from 2012 - 2030. Given the wide range of cost and availability of biofuels, we find that credit trading across gasoline and diesel fuel markets combined with credit banking can significantly reduce compliance costs and stabilize credit prices. We make policy recommendations on how to combine a NLCFS with other existing regulations for transportation fuels.« less
Barriers to participation in clinical trials: a physician survey.
Mahmud, A; Zalay, O; Springer, A; Arts, K; Eisenhauer, E
2018-04-01
Clinical trials are vital for evidence-based cancer care. Oncologist engagement in clinical trials has an effect on patient recruitment, which in turn can affect trial success. Identifying barriers to clinical trial participation might enable interventions that could help to increase physician participation. To assess factors affecting physician engagement in oncology trials, a national survey was conducted using the online SurveyMonkey tool (SurveyMonkey, San Mateo, CA, U.S.A.; http://www.surveymonkey.com). Physicians associated with the Canadian Cancer Clinical Trials Network and the Canadian Cancer Trials Group were asked about their specialty, years of experience, barriers to participation, and motivating interventions, which included an open-ended question inviting survey takers to suggest interventions. The survey collected 207 anonymous responses. Respondents were predominantly medical oncologists (46.4%), followed by radiation oncologists (24.6%). Almost 70% of the respondents had more than 10 years of experience. Significant time constraints included extra paperwork (77%), patient education (54%), and extended follow-up or clinic visits (53%). Timing of events within trials was also a barrier to participation (55%). Most respondents favoured clinical work credits (72%), academic credits (67%), a clinical trial alert system (75%), a regular meeting to review trial protocols (65%), and a screening log to aid in patient accrual (67%) as motivational strategies. Suggested interventions included increased support staff, streamlined regulatory burden, and provision of greater funding for trials and easier access to ancillary services. The present study confirms that Canadian oncologists are willing to participate in clinical research, but face multiple barriers to trial participation. Those barriers could be mitigated by the implementation of several interventions identified in the study.
Why credit risk markets are predestined for exhibiting log-periodic power law structures
NASA Astrophysics Data System (ADS)
Wosnitza, Jan Henrik; Leker, Jens
2014-01-01
Recent research has established the existence of log-periodic power law (LPPL) patterns in financial institutions’ credit default swap (CDS) spreads. The main purpose of this paper is to clarify why credit risk markets are predestined for exhibiting LPPL structures. To this end, the credit risk prediction of two variants of logistic regression, i.e. polynomial logistic regression (PLR) and kernel logistic regression (KLR), are firstly compared to the standard logistic regression (SLR). In doing so, the question whether the performances of rating systems based on balance sheet ratios can be improved by nonlinear transformations of the explanatory variables is resolved. Building on the result that nonlinear balance sheet ratio transformations hardly improve the SLR’s predictive power in our case, we secondly compare the classification performance of a multivariate SLR to the discriminative powers of probabilities of default derived from three different capital market data, namely bonds, CDSs, and stocks. Benefiting from the prompt inclusion of relevant information, the capital market data in general and CDSs in particular increasingly outperform the SLR while approaching the time of the credit event. Due to the higher classification performances, it seems plausible for creditors to align their investment decisions with capital market-based default indicators, i.e., to imitate the aggregate opinion of the market participants. Since imitation is considered to be the source of LPPL structures in financial time series, it is highly plausible to scan CDS spread developments for LPPL patterns. By establishing LPPL patterns in governmental CDS spread trajectories of some European crisis countries, the LPPL’s application to credit risk markets is extended. This novel piece of evidence further strengthens the claim that credit risk markets are adequate breeding grounds for LPPL patterns.
Considering WTO law in the design of climate change regimes beyond Kyoto
NASA Astrophysics Data System (ADS)
Gaines, Sanford E.
2009-11-01
This article describes the most important provisions of World Trade Organization (WTO) agreements that should be considered in designing laws and regulations under likely post-Kyoto climate change mitigation regimes. The Kyoto Protocol and the expected post-Kyoto international climate agreement depend on national measures to implement market-based mitigation measures. This market strategy promotes international exchanges of goods, investments, and services such as cross-border trading of credits for emissions reductions and transnational financing for projects that avoid emissions through the Clean Development Mechanism. Moreover, the United States and other countries, concerned over "leakage" of greenhouse gas (GHG) emissions through relocation of industry to other countries coupled with political worry over manufacturing competitiveness, have proposed national climate legislation containing border adjustments on imported goods or implicit subsidies for national producers, raising additional WTO considerations. The article assesses the likely effectiveness of such trade-related measures in achieving climate change mitigation goals and the potential trade policy infringements and trade distortions that they might bring about. Alternative strategies for achieving GHG mitigation goals in closer conformity with WTO law and policy will be suggested.
SPP: A data base processor data communications protocol
NASA Technical Reports Server (NTRS)
Fishwick, P. A.
1983-01-01
The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.
Assessment of credit risk based on fuzzy relations
NASA Astrophysics Data System (ADS)
Tsabadze, Teimuraz
2017-06-01
The purpose of this paper is to develop a new approach for an assessment of the credit risk to corporate borrowers. There are different models for borrowers' risk assessment. These models are divided into two groups: statistical and theoretical. When assessing the credit risk for corporate borrowers, statistical model is unacceptable due to the lack of sufficiently large history of defaults. At the same time, we cannot use some theoretical models due to the lack of stock exchange. In those cases, when studying a particular borrower given that statistical base does not exist, the decision-making process is always of expert nature. The paper describes a new approach that may be used in group decision-making. An example of the application of the proposed approach is given.
Procurement Cards Pave the Way to Efficient Purchasing.
ERIC Educational Resources Information Center
Enos, Eileen D.
1999-01-01
As educators battle restricted budgets, inflation, and enrollment changes, strategic sourcing management is replacing traditional transaction-based procurement. Procurement-card programs, allowing organizations to use credit cards for small purchases or low-value items, save time and enhance controls over merchants, credit limits, issuance limits,…
national preservation organizations, also urged adjustments to the Federal Rehabilitation Tax Credit (Historic Tax Credit) in affected areas. (See the letter conveying the resolution here.) The ACHP based its . Text of the legislation can be found here. The same week the Hurricane Sandy and Natural Disaster Tax
12 CFR 652.60 - Corporation board guidelines.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Corporation board guidelines. 652.60 Section 652.60 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.60 Corporation board guidelines...
12 CFR 652.60 - Corporation board guidelines.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Corporation board guidelines. 652.60 Section 652.60 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.60 Corporation board guidelines...
12 CFR 652.60 - Corporation board guidelines.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Corporation board guidelines. 652.60 Section 652.60 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FEDERAL AGRICULTURAL MORTGAGE CORPORATION FUNDING AND FISCAL AFFAIRS Risk-Based Capital Requirements § 652.60 Corporation board guidelines...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-21
... FARM CREDIT ADMINISTRATION 12 CFR Parts 651 and 652 RIN 3052-AC51 Federal Agricultural Mortgage Corporation Governance and Federal Agricultural Mortgage Corporation Funding and Fiscal Affairs; Risk- Based Capital Requirements; Effective Date AGENCY: Farm Credit Administration. ACTION: Notice of effective date...
13 CFR 120.1510 - Other Regulated SBLCs.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Other Regulated SBLCs. 120.1510 Section 120.1510 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1510 Other Regulated SBLCs. Other Regulated SBLCs are exempt...
13 CFR 120.1055 - Review and examination results.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Review and examination results. 120.1055 Section 120.1055 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1055 Review and examination results. (a) Written Reports...
Credit Recovery Hits the Mainstream
ERIC Educational Resources Information Center
Carr, Sarah
2014-01-01
In communities including New Orleans, Los Angeles, and Chicago, educators are creating alternative schools for struggling students that employ online credit-recovery programs as a core portion, or all, of their curriculum. The growth in online learning generally, including blended learning, has fueled the proliferation of computer-based credit…
Code of Federal Regulations, 2010 CFR
2010-07-01
... emission credits among engine families within a given manufacturer's product line. Banking means the... credits” refer to emission credits based on the projected applicable production/sales volume of the engine... applicable production/sales volume as contained in the end-of-year reports submitted to EPA. Some or all of...
Price Elasticity of Per-Credit-Hour Tuition Charges and the Effects on Four-Year Graduation Rates.
ERIC Educational Resources Information Center
DeMoranville, Carol W.; O'Donnell, Paula Bogott
2001-01-01
Examined whether changing tuition rates to a sliding scale based on the number of credit hours taken will increase 4-year graduation rates. Found that a sliding tuition rate scale does not increase 4-year graduation rates. (EV)
Nutrient Credit Trading--a Market-based Approach for Improving Water Quality
USDA-ARS?s Scientific Manuscript database
Farmers are getting financial rewards for implementing conservation measures on their farms. Industrial wastewater treatment plants are buying credits generated from these measures to meet their NPDES permit regulatory requirements. This is referred to as “water quality trading.” The treatment p...
Turner, D; Levine, A; Weiss, B; Hirsh, A; Shamir, R; Shaoul, R; Berkowitz, D; Bujanover, Y; Cohen, S; Eshach-Adiv, O; Jamal, Gera; Kori, M; Lerner, A; On, A; Rachman, L; Rosenbach, Y; Shamaly, H; Shteyer, E; Silbermintz, A; Yerushalmi, B
2010-12-01
There are no current recommendations for bowel cleansing before colonoscopy in children. The Israeli Society of Pediatric Gastroenterology and Nutrition (ISPGAN) established an iterative working group to formulate evidence-based guidelines for bowel cleansing in children prior to colonoscopy. Data were collected by systematic review of the literature and via a national-based survey of all endoscopy units in Israel. Based on the strength of evidence, the Committee reached consensus on six recommended protocols in children. Guidelines were finalized after an open audit of ISPGAN members. Data on 900 colonoscopies per year were accrued, which represents all annual pediatric colonoscopies performed in Israel. Based on the literature review, the national survey, and the open audit, several age-stratified pediatric cleansing protocols were proposed: two PEG-ELS protocols (polyethylene-glycol with electrolyte solution); Picolax-based protocol (sodium picosulphate with magnesium citrate); sodium phosphate protocol (only in children over the age of 12 years who are at low risk for renal damage); stimulant laxative-based protocol (e. g. bisacodyl); and a PEG 3350-based protocol. A population-based analysis estimated that the acute toxicity rate of oral sodium phosphate is at most 3/7320 colonoscopies (0.041 %). Recommendations on diet and enema use are provided in relation to each proposed protocol. There is no ideal bowel cleansing regimen and, thus, various protocols are in use. We propose several evidence-based protocols to optimize bowel cleansing in children prior to colonoscopy and minimize adverse events. © Georg Thieme Verlag KG Stuttgart · New York.
Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
NASA Astrophysics Data System (ADS)
Yoon, Eun-Jun
2012-07-01
In 2011, Niu-Wang proposed an anonymous key agreement protocol based on chaotic maps in [Niu Y, Wang X. An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 2011;16(4):1986-92]. Niu-Wang's protocol not only achieves session key agreement between a server and a user, but also allows the user to anonymously interact with the server. Nevertheless, this paper points out that Niu-Wang's protocol has the following efficiency and security problems: (1) The protocol has computational efficiency problem when a trusted third party decrypts the user sending message. (2) The protocol is vulnerable to Denial of Service (DoS) attack based on illegal message modification by an attacker.
Comment on "flexible protocol for quantum private query based on B92 protocol"
NASA Astrophysics Data System (ADS)
Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min
2017-03-01
In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.
Impacts of Federal Tax Credit Extensions on Renewable Deployment and Power Sector Emissions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mai, Trieu; Cole, Wesley; Lantz, Eric
Federal tax credits for renewable energy (RE) have served as one of the primary financial incentives for RE deployment over the last two decades in the United States. In December 2015, the wind power production tax credit and solar investment tax credits were extended for five years as part of the Consolidated Appropriations Act of 2016. This report explores the impact that these tax credit extensions might have on future RE capacity deployment and power sector carbon dioxide (CO2) emissions. The analysis examines the impacts of the tax credit extensions under two distinct natural gas price futures as natural gasmore » prices have been key factors in influencing the economic competitiveness of new RE development. The analysis finds that, in both natural gas price futures, RE tax credit extensions can spur RE capacity investments at least through the early 2020s and can help lower emissions from the U.S. electricity system. More specifically, the RE tax credit extensions are estimated to drive a net peak increase of 48-53 GW in installed RE capacity in the early 2020s -- longer term impacts are less certain. In the longer term after the tax credits ramp down, greater RE capacity is driven by a combination of assumed RE cost declines, rising fossil fuel prices, and other clean energy policies such as the Clean Power Plan. The tax credit extension-driven acceleration in RE capacity development can reduce fossil fuel-based generation and lower electric sector CO2 emissions. Cumulative emissions reductions over a 15-year period (spanning 2016-2030) as a result of the tax credit extensions are estimated to range from 540 to 1420 million metric tonnes CO2. These findings suggest that tax credit extensions can have a measurable impact on future RE deployment and electric sector CO2 emissions under a range of natural gas price futures.« less
9. Credit PSR. Interior of Building 4305, looking east under ...
9. Credit PSR. Interior of Building 4305, looking east under elliptical laminated wooden roof arches. Lower surfaces are ceilings of offices built within structure by the National Aeronautics and Space Adminstration (NASA) in 1977; cylindrical and rectangular ducts are for air conditioning. Suspended lighting fixtures date from building's original use as an aircraft hangar. - Edwards Air Force Base, North Base, Unicon Portable Hangar, First & C Streets, Boron, Kern County, CA
A Novel Quantum Solution to Privacy-Preserving Nearest Neighbor Query in Location-Based Services
NASA Astrophysics Data System (ADS)
Luo, Zhen-yu; Shi, Run-hua; Xu, Min; Zhang, Shun
2018-04-01
We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.
Environmental and economic impacts of livestock productivity increase in sub-Saharan Africa.
Cardoso, Luis Alfaro
2012-12-01
Livestock production in sub-Saharan Africa (SSA) is not matching the annual 2.5 % growth of its population. Regional per capita meat and milk production corresponds, respectively, to about 13 and 8 % of developed countries indicators. Livestock performances in this region have decreased within the last 30 years. In fact, SSA, with a 12 % bovine extraction rate against a world average of 21 %, includes about 16 % of world cattle, only producing 6 and 2.6 % of global meat and milk, respectively. These low performances have economic and environmental consequences reflecting the necessity for upgrading livestock managing skills in the region. This effort includes various components such as sanitary prophylaxis, reproduction, nutrition, and in particular, substantial increase in livestock yield for human consumption. This will allow for an improved animal and pasture management and soil preservation, enhancing meat production and decreasing methane and nitrogen emissions from enteric fermentation and manure processing. These environmental gains due to increased livestock off-take rates can represent relevant credits in the global Environmental Carbon Market under the United Nations Framework Convention on Climate Change Kyoto protocol. These credits can be used for investments in livestock essential services and marketing facilities leading to improved productivity.
Carbon sequestration, optimum forest rotation and their environmental impact
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kula, Erhun, E-mail: erhun.kula@bahcesehir.edu.tr; Gunalay, Yavuz, E-mail: yavuz.gunalay@bahcesehir.edu.tr
2012-11-15
Due to their large biomass forests assume an important role in the global carbon cycle by moderating the greenhouse effect of atmospheric pollution. The Kyoto Protocol recognises this contribution by allocating carbon credits to countries which are able to create new forest areas. Sequestrated carbon provides an environmental benefit thus must be taken into account in cost-benefit analysis of afforestation projects. Furthermore, like timber output carbon credits are now tradable assets in the carbon exchange. By using British data, this paper looks at the issue of identifying optimum felling age by considering carbon sequestration benefits simultaneously with timber yields. Themore » results of this analysis show that the inclusion of carbon benefits prolongs the optimum cutting age by requiring trees to stand longer in order to soak up more CO{sub 2}. Consequently this finding must be considered in any carbon accounting calculations. - Highlights: Black-Right-Pointing-Pointer Carbon sequestration in forestry is an environmental benefit. Black-Right-Pointing-Pointer It moderates the problem of global warming. Black-Right-Pointing-Pointer It prolongs the gestation period in harvesting. Black-Right-Pointing-Pointer This paper uses British data in less favoured districts for growing Sitka spruce species.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rugh, John P; Kekelia, Bidzina; Kreutzer, Cory J
The U.S. uses 7.6 billion gallons of fuel per year for vehicle air conditioning (A/C), equivalent to 5.7 percent of the total national light-duty vehicle (LDV) fuel use. This equates to 30 gallons/year per vehicle, or 23.5 grams (g) of carbon dioxide (CO2) per mile, for an average U.S. vehicle. A/C is a significant contribution to national fuel use; therefore, technologies that reduce A/C loads may reduce operational costs, A/C fuel use, and CO2 emissions. Since A/C is not operated during standard EPA fuel economy testing protocols, EPA provides off-cycle credits to encourage OEMs to implement advanced A/C technologies thatmore » reduce fuel use in the real world. NREL researchers assessed thermal/solar off-cycle credits available in the U.S. Environmental Protection Agency's (EPA's) Final Rule for Model Year 2017 and Later Light-Duty Vehicle Greenhouse Gas Emissions and Corporate Average Fuel Economy. Credits include glazings, solar reflective paint, and passive and active cabin ventilation. Implementing solar control glass reduced CO2 emissions by 2.0 g/mi, and solar reflective paint resulted in a reduction of 0.8 g/mi. Active and passive ventilation strategies only reduced emissions by 0.1 and 0.2 g/mi, respectively. The national-level analysis process is powerful and general; it can be used to determine the impact of a wide range of new vehicle thermal technologies on fuel use, EV range, and CO2 emissions.« less
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Scope. 106.100 Section 106.100 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION COSPONSORSHIPS, FEE AND NON-FEE BASED SBA-SPONSORED ACTIVITIES AND GIFTS Scope and Definitions § 106.100 Scope. The regulations in this part apply to...
7. Credit BG. View looking west into small solid rocket ...
7. Credit BG. View looking west into small solid rocket motor testing bay of Test Stand 'E' (Building 4259/E-60). Motors are mounted on steel table and fired horizontally toward the east. - Jet Propulsion Laboratory Edwards Facility, Test Stand E, Edwards Air Force Base, Boron, Kern County, CA
The Professor-Librarian: Academic Librarians Teaching Credit-Bearing Courses
ERIC Educational Resources Information Center
Sobel, Karen; Ramsey, Peter; Jones, Galin
2018-01-01
Many academic librarians have ideas or opportunities for teaching information literacy courses for the library, outside the scope of their regular positions. Some additional librarians are asked to consider teaching credit-bearing courses for other departments at their institutions, based on graduate degrees they hold in fields besides library…
76 FR 48161 - Farm Credit Administration Board; Sunshine Act; Regular Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
.... New Business Capital Adequacy--Ratings-Based Approach--Advance Notice of Proposed Rulemaking C. Report... business. FOR FURTHER INFORMATION CONTACT: Dale L. Aultman, Secretary to the Farm Credit Administration..., McLean, Virginia 22102-5090. SUPPLEMENTARY INFORMATION: Parts of this meeting of the Board will be open...
20 CFR 210.2 - Definition of service.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Definition of service. 210.2 Section 210.2 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT CREDITABLE... which an employee is credited with compensation under § 211.12 of this chapter based on benefits paid...
Credit PSR. This view shows the north and west facades ...
Credit PSR. This view shows the north and west facades of the building as seen when looking east southeast (1100). This structure was used to test regenerative fuel cells in 1995 - Jet Propulsion Laboratory Edwards Facility, Weigh & Test Preparation Building, Edwards Air Force Base, Boron, Kern County, CA
13 CFR 120.1060 - Confidentiality of Reports, Risk Ratings and related Confidential Information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Confidentiality of Reports, Risk Ratings and related Confidential Information. 120.1060 Section 120.1060 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1060...
13 CFR 120.1005 - Bureau of PCLP Oversight.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Bureau of PCLP Oversight. 120.1005 Section 120.1005 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1005 Bureau of PCLP Oversight. SBA's Bureau of PCLP Oversight within...
13 CFR 120.1025 - Off-site reviews and monitoring.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Off-site reviews and monitoring. 120.1025 Section 120.1025 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1025 Off-site reviews and monitoring. SBA may conduct off...
13 CFR 120.1015 - Risk Rating System.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Risk Rating System. 120.1015 Section 120.1015 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1015 Risk Rating System. (a) Risk Rating. SBA may assign a Risk Rating...
13 CFR 120.1400 - Grounds for enforcement actions-SBA Lenders.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Grounds for enforcement actions-SBA Lenders. 120.1400 Section 120.1400 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1400 Grounds for enforcement actions...
13 CFR 120.1500 - Types of enforcement actions-SBA Lenders.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Types of enforcement actions-SBA Lenders. 120.1500 Section 120.1500 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1500 Types of enforcement actions—SBA...
13 CFR 120.1070 - Lender oversight fees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Lender oversight fees. 120.1070 Section 120.1070 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1070 Lender oversight fees. Lenders are required to pay to SBA fees to...
12 CFR 615.5205 - Minimum permanent capital standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Minimum permanent capital standards. 615.5205 Section 615.5205 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM FUNDING AND FISCAL... least 7 percent of its risk-adjusted asset base. [62 FR 4446, Jan. 30, 1997] ...
75 FR 68393 - Data Collection Available for Public Comments and Recommendations
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
... and to properly evaluate the merits of each loan request based on reasonable and customary underwriting criteria such as character, capacity, credit collateral, etc. This information is collected for the purpose of extending credit under the 504 loan program. Title: U.S. Small Business Administration...
Problem-based learning biotechnology courses in chemical engineering.
Glatz, Charles E; Gonzalez, Ramon; Huba, Mary E; Mallapragada, Surya K; Narasimhan, Balaji; Reilly, Peter J; Saunders, Kevin P; Shanks, Jacqueline V
2006-01-01
We have developed a series of upper undergraduate/graduate lecture and laboratory courses on biotechnological topics to supplement existing biochemical engineering, bioseparations, and biomedical engineering lecture courses. The laboratory courses are based on problem-based learning techniques, featuring two- and three-person teams, journaling, and performance rubrics for guidance and assessment. Participants initially have found them to be difficult, since they had little experience with problem-based learning. To increase enrollment, we are combining the laboratory courses into 2-credit groupings and allowing students to substitute one of them for the second of our 2-credit chemical engineering unit operations laboratory courses.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steinberg, Daniel C.; Boyd, Erin
2015-08-28
In this report, we examine and compare how tradable mass-based polices and tradable rate-based policies create different incentives for energy efficiency investments. Through a generalized demonstration and set of examples, we show that as a result of the output subsidy they create, traditional rate-based policies, those that do not credit energy savings from efficiency measures, reduce the incentive for investment in energy efficiency measures relative to an optimally designed mass-based policy or equivalent carbon tax. We then show that this reduced incentive can be partially addressed by modifying the rate-based policy such that electricity savings from energy efficiency measures aremore » treated as a source of zero-carbon generation within the framework of the standard, or equivalently, by assigning avoided emissions credit to the electricity savings at the rate of the intensity target. These approaches result in an extension of the output subsidy to efficiency measures and eliminate the distortion between supply-side and demand-side options for GHG emissions reduction. However, these approaches do not address electricity price distortions resulting from the output subsidy that also impact the value of efficiency measures. Next, we assess alternative approaches for crediting energy efficiency savings within the framework of a rate-based policy. Finally, we identify a number of challenges that arise in implementing a rate-based policy with efficiency crediting, including the requirement to develop robust estimates of electricity savings in order to assess compliance, and the requirement to track the regionality of the generation impacts of efficiency measures to account for their interstate effects.« less
Beattie, Mary S.; Lee, Robin; Braithwaite, Dejana; Wilcox, Carolina; Metrikin, Maya; Lamvik, Kate; Luce, Judith
2010-01-01
The Cancer Risk Education Intervention Tool (CREdIT) is a computer-based (non-interactive) slide presentation designed to educate low-literacy, and ethnically and racially diverse public hospital patients at risk of Hereditary Breast and Ovarian Cancer (HBOC) about genetics. To qualitatively evaluate participants’ experience with and perceptions of a genetic education program as an adjunct to genetic counseling, we conducted direct observations of the intervention, semi-structured in person interviews with 11 women who viewed CREdIT, and post-counseling questionnaires with the two participating genetic counselors. Five themes emerged from the analysis of interviews: (1) genetic counseling and testing for breast/ovarian cancer was a new concept; (2) CREdIT’s story format was particularly appealing; (3) changes in participants’ perceived risk for breast cancer varied; (4) some misunderstandings about individual risk and heredity persisted after CREdIT and counseling; (5) the context for viewing CREdIT shaped responses to the presentation. Observations demonstrated ways to make the information provided in CREdIT and by genetic counselors more consistent. In a post-session counselor questionnaire, counselors’ rating of the patient’s preparedness before the session was significantly higher for patients who viewed CREdIT prior to their appointments than for other patients. This novel educational tool fills a gap in HBOC education by tailoring information to women of lower literacy and diverse ethnic/racial backgrounds. The tool was well received by interview participants and counselors alike. Further study is needed to examine the varied effects of CREdIT on risk perception. In addition, the implementation of CREdIT in diverse clinical settings and the cultural adaptation of CREdIT to specific populations reflect important areas for future work. PMID:20490636
Credit USAF, ca. 1943. Original housed in the Muroc Flight ...
Credit USAF, ca. 1943. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Historic view looking northeast along southeast edge of swimming pool during construction. The wavy edge of the pool visible here remains as a ground surface feature in 1995. Building in the background is the second Bachelor Officers' Quarters (T-15) built in 1943 - Edwards Air Force Base, North Base, Swimming Pool, Second Street, Boron, Kern County, CA
Relativistic quantum private database queries
NASA Astrophysics Data System (ADS)
Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou
2015-04-01
Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
Synthesizing Existing CSMA and TDMA Based MAC Protocols for VANETs
Huang, Jiawei; Li, Qi; Zhong, Shaohua; Liu, Lianhai; Zhong, Ping; Wang, Jianxin; Ye, Jin
2017-01-01
Many Carrier Sense Multiple Access (CSMA) and Time Division Multiple Access (TDMA) based medium access control (MAC) protocols for vehicular ad hoc networks (VANETs) have been proposed recently. Contrary to the common perception that they are competitors, we argue that the underlying strategies used in these MAC protocols are complementary. Based on this insight, we design CTMAC, a MAC protocol that synthesizes existing strategies; namely, random accessing channel (used in CSMA-style protocols) and arbitral reserving channel (used in TDMA-based protocols). CTMAC swiftly changes its strategy according to the vehicle density, and its performance is better than the state-of-the-art protocols. We evaluate CTMAC using at-scale simulations. Our results show that CTMAC reduces the channel completion time and increases the network goodput by 45% for a wide range of application workloads and network settings. PMID:28208590
12 CFR Appendix C to Part 704 - Risk-Based Capital Credit Risk-Weight Categories
Code of Federal Regulations, 2012 CFR
2012-01-01
... determining its capital ratios. (2) Risk-weighted assets equal risk-weighted on-balance sheet assets (computed... similar transactions. Depository institution means a financial institution that engages in the business of providing financial services; that is recognized as a bank or a credit union by the supervisory or monetary...
12 CFR Appendix C to Part 704 - Risk-Based Capital Credit Risk-Weight Categories
Code of Federal Regulations, 2014 CFR
2014-01-01
... determining its capital ratios. (2) Risk-weighted assets equal risk-weighted on-balance sheet assets (computed... similar transactions. Depository institution means a financial institution that engages in the business of providing financial services; that is recognized as a bank or a credit union by the supervisory or monetary...
12 CFR Appendix C to Part 704 - Risk-Based Capital Credit Risk-Weight Categories
Code of Federal Regulations, 2013 CFR
2013-01-01
... determining its capital ratios. (2) Risk-weighted assets equal risk-weighted on-balance sheet assets (computed... similar transactions. Depository institution means a financial institution that engages in the business of providing financial services; that is recognized as a bank or a credit union by the supervisory or monetary...
6. Credit WCT. Photographic copy of photograph, Advanced Solid Rocket ...
6. Credit WCT. Photographic copy of photograph, Advanced Solid Rocket Motor (ASRM) test in progress at Test Stand 'E.' It was a JPL/Marshall Space Flight Center project. (JPL negative no. 344-4816 19 February 1982) - Jet Propulsion Laboratory Edwards Facility, Test Stand E, Edwards Air Force Base, Boron, Kern County, CA
Detecting Math Anxiety with a Mixture Partial Credit Model
ERIC Educational Resources Information Center
Ölmez, Ibrahim Burak; Cohen, Allan S.
2017-01-01
The purpose of this study was to investigate a new methodology for detection of differences in middle grades students' math anxiety. A mixture partial credit model analysis revealed two distinct latent classes based on homogeneities in response patterns within each latent class. Students in Class 1 had less anxiety about apprehension of math…
Factors Associated with Success in College Calculus II
ERIC Educational Resources Information Center
Rosasco, Margaret E.
2013-01-01
Students are entering college having earned credit for college Calculus 1 based on their scores on the College Board's Advanced Placement (AP) Calculus AB exam. Despite being granted credit for college Calculus 1, it is unclear whether these students are adequately prepared for college Calculus 2. College calculus classes are often taught from a…
Credit WCT. Original 2'" x 2'" color negative is housed ...
Credit WCT. Original 2-'" x 2-'" color negative is housed in the JPL Photography Laboratory, Pasadena, California. View shows small autoclave demonstrated by JPL staff member Milton Clay (JPL negative no. JPL-10286AC, 27 January 1989). - Jet Propulsion Laboratory Edwards Facility, Liner Laboratory, Edwards Air Force Base, Boron, Kern County, CA
18 CFR 367.2360 - Account 236, Taxes accrued.
Code of Federal Regulations, 2010 CFR
2010-04-01
... accrued. (a) This account must be credited with the amount of taxes accrued during the accounting period... date of the balance sheet, must be shown under account 165, Prepayments (§ 367.1650). (b) If accruals... accruals. (c) Accruals for taxes must be based upon the net amounts payable after credit for any discounts...
Credit PSR. This interior view of the building equipment room ...
Credit PSR. This interior view of the building equipment room displays heat exchangers and fan units with insulated piping for hot and cold water at left. Environmental controls and fire fighting system controls appear at right - Jet Propulsion Laboratory Edwards Facility, Propellant Curing Building, Edwards Air Force Base, Boron, Kern County, CA
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false General procedures for enforcement... Persons, Intermediaries, and NTAPs. 120.1600 Section 120.1600 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120.1600 General...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Grounds for enforcement actions-Intermediaries participating in the Microloan Program and NTAPs. 120.1425 Section 120.1425 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Certification and other reporting and notification requirements for Other Regulated SBLCs. 120.1511 Section 120.1511 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120...
13 CFR 120.1010 - SBA access to SBA Lender, Intermediary, and NTAP files.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA access to SBA Lender, Intermediary, and NTAP files. 120.1010 Section 120.1010 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1010 SBA access to SBA Lender...
13 CFR 120.1051 - Frequency of on-site reviews and examinations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Frequency of on-site reviews and examinations. 120.1051 Section 120.1051 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Supervision § 120.1051 Frequency of on-site reviews and examinations...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Types of enforcement actions-Intermediaries participating in the Microloan Program and NTAPs. 120.1540 Section 120.1540 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS LOANS Risk-Based Lender Oversight Enforcement Actions § 120...
13 CFR 120.412 - Other services Lenders may provide Borrowers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... providing such services must do so under a written contract with the small business, based on time and... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Other services Lenders may provide Borrowers. 120.412 Section 120.412 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION BUSINESS...
13 CFR 106.204 - Who has the authority to approve and sign a Cosponsorship Agreement?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Who has the authority to approve and sign a Cosponsorship Agreement? 106.204 Section 106.204 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION COSPONSORSHIPS, FEE AND NON-FEE BASED SBA-SPONSORED ACTIVITIES AND GIFTS...
13 CFR 120.101 - Credit not available elsewhere.
Code of Federal Regulations, 2014 CFR
2014-01-01
... available on reasonable terms from non-Federal sources. SBA requires the Lender or CDC to certify or... periods of time. Submission of an application to SBA by a Lender or CDC constitutes certification by the Lender or CDC that it has examined the availability of credit to the applicant, has based its...
13 CFR 120.101 - Credit not available elsewhere.
Code of Federal Regulations, 2010 CFR
2010-01-01
... available on reasonable terms from non-Federal sources. SBA requires the Lender or CDC to certify or... periods of time. Submission of an application to SBA by a Lender or CDC constitutes certification by the Lender or CDC that it has examined the availability of credit to the applicant, has based its...
13 CFR 120.101 - Credit not available elsewhere.
Code of Federal Regulations, 2012 CFR
2012-01-01
... available on reasonable terms from non-Federal sources. SBA requires the Lender or CDC to certify or... periods of time. Submission of an application to SBA by a Lender or CDC constitutes certification by the Lender or CDC that it has examined the availability of credit to the applicant, has based its...
13 CFR 120.101 - Credit not available elsewhere.
Code of Federal Regulations, 2013 CFR
2013-01-01
... available on reasonable terms from non-Federal sources. SBA requires the Lender or CDC to certify or... periods of time. Submission of an application to SBA by a Lender or CDC constitutes certification by the Lender or CDC that it has examined the availability of credit to the applicant, has based its...
13 CFR 120.101 - Credit not available elsewhere.
Code of Federal Regulations, 2011 CFR
2011-01-01
... available on reasonable terms from non-Federal sources. SBA requires the Lender or CDC to certify or... periods of time. Submission of an application to SBA by a Lender or CDC constitutes certification by the Lender or CDC that it has examined the availability of credit to the applicant, has based its...
Credit PSR. Interior view shows the building equipment room as ...
Credit PSR. Interior view shows the building equipment room as seen looking south southwest (206°) from the doorway. The control console contains switches for chiller pumps, fans, heaters, temperature controls, and alarms - Jet Propulsion Laboratory Edwards Facility, Solid Propellant Conditioning Building, Edwards Air Force Base, Boron, Kern County, CA
2. Credit GE. Photographic copy of photograph, refractory brick lining ...
2. Credit GE. Photographic copy of photograph, refractory brick lining being laid in Test Stand 'A' flame pit to protect concrete from heat of rocket engine flames. (JPL negative no. 383-764, 8 March 1945) - Jet Propulsion Laboratory Edwards Facility, Test Stand A, Edwards Air Force Base, Boron, Kern County, CA
32 CFR 231.7 - Procedures-domestic credit unions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... maintenance (such as grass cutting and snow removal), heating and air conditioning, utilities (i.e... service shall do so in accordance with § 231.4(d). (h) Staffing. (1) On-base credit unions shall provide... counselor available to serve members during operating hours. (2) Exceptions to paragraph (h)(1)(i) of this...
32 CFR 231.7 - Procedures-domestic credit unions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... maintenance (such as grass cutting and snow removal), heating and air conditioning, utilities (i.e... service shall do so in accordance with § 231.4(d). (h) Staffing. (1) On-base credit unions shall provide... counselor available to serve members during operating hours. (2) Exceptions to paragraph (h)(1)(i) of this...
78 FR 69113 - Statutorily Mandated Designation of Difficult Development Areas for 2014
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... that an individual can claim depends on the individual's marginal tax rate). For buildings placed in... agencies allocate the state's credit ceiling among low-income housing buildings whose owners have applied... provide IRC Section 42 credits to owners of buildings based on the percentage of certain building costs...
77 FR 20011 - Fair Credit Reporting Act Disclosures
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-03
... Credit Reporting Act (``FCRA'') will increase from $11.00 to $11.50 effective April 3, 2012. The Bureau is required to increase the $8.00 amount referred to in Section 612(f)(1)(A)(i) of the FCRA on January 1 of each year, based proportionally on changes in the Consumer Price Index (``CPI''), with...
The Futility of Propensity Score Methods in a Statewide Study of International Baccalaureate (IB)
ERIC Educational Resources Information Center
May, Henry; Rodriguez, Awilda; Sirinides, Philip M.; Perna, Laura W.; Yee, April; Ransom, Tafaya
2014-01-01
With the goal of increasing students' academic readiness for college, high schools in the United States are increasingly offering "credit-based transition programs," including International Baccalaureate (IB), Advanced Placement (AP), and dual enrollment. Existing research points to the promise of IB, AP, and other credit-based…
Code of Federal Regulations, 2011 CFR
2011-01-01
... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Definitions. 500.2 Section 500.2 Business Credit and Assistance EMERGENCY OIL AND GAS GUARANTEED LOAN BOARD EMERGENCY OIL AND GAS GUARANTEED... small business concern under section 3 of the Small Business Act, 15 U.S.C. 632, (or a company based in...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Definitions. 500.2 Section 500.2 Business Credit and Assistance EMERGENCY OIL AND GAS GUARANTEED LOAN BOARD EMERGENCY OIL AND GAS GUARANTEED... small business concern under section 3 of the Small Business Act, 15 U.S.C. 632, (or a company based in...
Credit PSR. This view shows the south and east facades ...
Credit PSR. This view shows the south and east facades of this concrete block facility as seen when looking northwest (320°). Note the outdoor emergency shower; the roof has lightning rods installed at corners - Jet Propulsion Laboratory Edwards Facility, Oxidizer Weigh & Storage Building, Edwards Air Force Base, Boron, Kern County, CA
Wong, Anthony F; Pielmeier, Ulrike; Haug, Peter J; Andreassen, Steen
2016-01-01
Objective Develop an efficient non-clinical method for identifying promising computer-based protocols for clinical study. An in silico comparison can provide information that informs the decision to proceed to a clinical trial. The authors compared two existing computer-based insulin infusion protocols: eProtocol-insulin from Utah, USA, and Glucosafe from Denmark. Materials and Methods The authors used eProtocol-insulin to manage intensive care unit (ICU) hyperglycemia with intravenous (IV) insulin from 2004 to 2010. Recommendations accepted by the bedside clinicians directly link the subsequent blood glucose values to eProtocol-insulin recommendations and provide a unique clinical database. The authors retrospectively compared in silico 18 984 eProtocol-insulin continuous IV insulin infusion rate recommendations from 408 ICU patients with those of Glucosafe, the candidate computer-based protocol. The subsequent blood glucose measurement value (low, on target, high) was used to identify if the insulin recommendation was too high, on target, or too low. Results Glucosafe consistently provided more favorable continuous IV insulin infusion rate recommendations than eProtocol-insulin for on target (64% of comparisons), low (80% of comparisons), or high (70% of comparisons) blood glucose. Aggregated eProtocol-insulin and Glucosafe continuous IV insulin infusion rates were clinically similar though statistically significantly different (Wilcoxon signed rank test P = .01). In contrast, when stratified by low, on target, or high subsequent blood glucose measurement, insulin infusion rates from eProtocol-insulin and Glucosafe were statistically significantly different (Wilcoxon signed rank test, P < .001), and clinically different. Discussion This in silico comparison appears to be an efficient nonclinical method for identifying promising computer-based protocols. Conclusion Preclinical in silico comparison analytical framework allows rapid and inexpensive identification of computer-based protocol care strategies that justify expensive and burdensome clinical trials. PMID:26228765
A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350
Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi
2012-01-01
The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.
Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
6. Credit USAF, ca. 1947. Original housed in the Photograph ...
6. Credit USAF, ca. 1947. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. Interior of Building 4401 (or possibly 4402) looking east at hangar doors with a North American Aviation XB-45 Tornado jet aircraft in the foreground. This view illustrates why the series of sliding doors and wide, high interior clearances were necessary to accommodate large aircraft. Note configuration of wooden trusses supporting the roof. - Edwards Air Force Base, North Base, Hangar No. 1, First & B Streets, Boron, Kern County, CA
Credit BG. View looks south southeast toward tank farm, Rogers ...
Credit BG. View looks south southeast toward tank farm, Rogers Dry Lake is in the background. Each cylindrical tank is labeled for jet fuel grade JP5. Two 2,000 gallon capacity rectangular tanks in midground are fabricated of concrete for storing hydrocarbons; they were constructed in 1993. Structure at extreme right of view is Building 4515, Jet Fuel Testing Laboratory - Edwards Air Force Base, North Base, Aircraft Fuel Tank Farm, Northeast of A Street, Boron, Kern County, CA
Credit BG. View looks south (174°) at Deluge Water Supply ...
Credit BG. View looks south (174°) at Deluge Water Supply complex, including Water Pumping Booster Station (Building 4317) in foreground, with Deluge Water Storage (Building 4316) in background at right. Pole on roof of Building 4316 is a gauge board used to indicate water level in the reservoir. Structure in left background is Building 4311 (Well No. 2) - Edwards Air Force Base, North Base, Deluge Water Storage Building, Near Second & D Streets, Boron, Kern County, CA
Credit PSR. View looks north northeast (20°) at the concrete ...
Credit PSR. View looks north northeast (20°) at the concrete pad which forms the top of the sump pump facility. In the background stand Building 4303 (Air Compressor Building), Building 4307 (Supply and Equipment Warehouse) at left, Building 4305 (Unicon Portable Hangar) at center, and Building 4306 (Boiler House) at right. Sign marking Building 4302 was made from a disused road sign from somewhere on Edwards AFB - Edwards Air Force Base, North Base, Sump Pump, East of Second Street, Boron, Kern County, CA
7. Credit USAF, ca. 1952. Original housed in the Photograph ...
7. Credit USAF, ca. 1952. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. Oblique aerial view of North Base AFFTC (Air Force Flight Test Center) looking west northwest. The flight line at the edge of Rogers Dry Lake appears in the foreground, served by the facility's four hangars. Temporary structures beyond the hangars were demolished later in the 1950s. The fence that formerly surrounded the swimming pool in earlier photos has been taken down. In the distance lies the Jet Propulsion Laboratory Edwards Test Station, in its pre-1953 configuration. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
A secure RFID-based WBAN for healthcare applications.
Ullah, Sana; Alamri, Atif
2013-10-01
A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.
O'Neill-Kerr, Alex; Yassin, Anhar; Rogers, Stephen; Cornish, Janie
2017-09-01
The aim of this study was to test the proposition that adoption of a dose titration protocol may be associated with better patient outcomes, at lower treatment dose, and with comparable cumulative dose to that in patients treated using an age-based stimulus dosing protocol. This was an analysis of data assembled from archived records and based on cohorts of patients treated respectively on an age-based stimulus dosing protocol and on a dose titration protocol in the National Health Service in England. We demonstrated a significantly better response in the patient cohort treated with dose titration than with age-based stimulus dosing. Peak doses were less and the total cumulative dose was less in the dose titration group than in the age-based stimulus dosing group. Our findings are consistent with superior outcomes in patients treated using a dose titration protocol when compared with age-based stimulus dosing in a similar cohort of patients.
3. Credit USAF, ca. 1945. Original housed in the Records ...
3. Credit USAF, ca. 1945. Original housed in the Records of the Defense Intelligence Agency. Record Group 373. National Archives. Cartographic and Architectural Branch. Washington, D.C. Aerial orthophoto map 16PS5M79-IV23 of Muroc Flight Test Base (North Base), north faces up with runway at the top and Rogers Dry Lake at the lower right. Ammunition huts (not extant in 1995) appear in a cluster just south of the west end of the runway. Note runway markings on lakebed. Linear feature at very top of image is rocket sled test track designed and built 1944-1945. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
6. Credit USAF, April, 1945. Original in the possession of ...
6. Credit USAF, April, 1945. Original in the possession of Ken G. Oldfield, Laguna Hills, California. View looking west across North Base flightline of XP-80s Shooting Stars undergoing accelerated service tests. HANG-N-A hangars No. 1 (Building 4401) and No. 2 (Building 4402) appear at left of view, with runway control tower (T-65, or Building 4500) at far right. Flight operations offices were in T-42 (Building 4502) at base of control tower; this structure was not extant in 1995. In the background between the control tower and Building 4402 lies T-15, officer's quarters. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
Financial sustainability in savings and credit programmes.
Havers, M
1996-05-01
This article provides a framework for determining, justifying, and improving financial sustainability of savings and credit programs. Credit programs have income from interest and fees. Income must pay for the cost of funds, loan write-offs, operating costs, and inflation. Reference is made to Otero and Rhyne's four levels of self-sufficiency in credit programs. The Grameen Bank is an example of Level 3 and most credit unions are level 4. Nongovernmental groups in the United Kingdom are level 1 or 2. Experience has shown that removal of subsidies did not affect the quality of services or shift benefits away from the poor. Success in serving poorer people better is attributed 1) to more money being available for lending under tighter management practices, 2) to greater openness to a variety of clients from removal of subsidy restrictions, 3) to a shift to higher interest rates that eliminate richer borrowers, and 4) to a shift to serious collection of loans which is a disincentive to more privileged borrowers. Percentages of loan loss, administration costs, cost of funds, and inflation are useful in measuring the sustainability of credit programs. Interest and fee income must also be measured. Fee repayment rates do not have a common definition of arrears, default, and write-off. A simple measure is the percentage of total costs covered by income. The World Bank recommends the Subsidy Dependence Index. Women tend to be better at repaying loans. Loan size should be related to borrowers' ability to handle the amount of the loan. Low and subsidized interest rates deter depositors and attract richer borrowers. Poorer borrowers are attracted by access to credit and not the cost of credit. Interest rates should be based on market rates. The loan payment should be no longer than necessary. Small groups of borrowers can guarantee each others loans. Group-based loan schemes work best. NGOs must project an image of being serious about loan collections and must take action immediately when a payment is missed. Good repayers should be rewarded with quick repeat loans.
Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach
NASA Astrophysics Data System (ADS)
Rizos, G. E.; Vasiliadis, D. C.
2007-12-01
We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.
Bankruptcy cascades in interbank markets.
Tedeschi, Gabriele; Mazloumian, Amin; Gallegati, Mauro; Helbing, Dirk
2012-01-01
We study a credit network and, in particular, an interbank system with an agent-based model. To understand the relationship between business cycles and cascades of bankruptcies, we model a three-sector economy with goods, credit and interbank market. In the interbank market, the participating banks share the risk of bad debits, which may potentially spread a bank's liquidity problems through the network of banks. Our agent-based model sheds light on the correlation between bankruptcy cascades and the endogenous economic cycle of booms and recessions. It also demonstrates the serious trade-off between, on the one hand, reducing risks of individual banks by sharing them and, on the other hand, creating systemic risks through credit-related interlinkages of banks. As a result of our study, the dynamics underlying the meltdown of financial markets in 2008 becomes much better understandable.
Bankruptcy Cascades in Interbank Markets
Tedeschi, Gabriele; Mazloumian, Amin; Gallegati, Mauro; Helbing, Dirk
2012-01-01
We study a credit network and, in particular, an interbank system with an agent-based model. To understand the relationship between business cycles and cascades of bankruptcies, we model a three-sector economy with goods, credit and interbank market. In the interbank market, the participating banks share the risk of bad debits, which may potentially spread a bank’s liquidity problems through the network of banks. Our agent-based model sheds light on the correlation between bankruptcy cascades and the endogenous economic cycle of booms and recessions. It also demonstrates the serious trade-off between, on the one hand, reducing risks of individual banks by sharing them and, on the other hand, creating systemic risks through credit-related interlinkages of banks. As a result of our study, the dynamics underlying the meltdown of financial markets in 2008 becomes much better understandable. PMID:23300760
Credit PSR. View looks west southwest (238°) at the north ...
Credit PSR. View looks west southwest (238°) at the north and east elevations of the liner lab. Solid rocket motor casings receive specially formulated rubber insulating liners that protect the casings from the heat generated by burning solid motors - Jet Propulsion Laboratory Edwards Facility, Liner Laboratory, Edwards Air Force Base, Boron, Kern County, CA
ERIC Educational Resources Information Center
Gomez, Rapson
2012-01-01
Objective: Generalized partial credit model, which is based on item response theory (IRT), was used to test differential item functioning (DIF) for the "Diagnostic and Statistical Manual of Mental Disorders" (4th ed.), inattention (IA), and hyperactivity/impulsivity (HI) symptoms across boys and girls. Method: To accomplish this, parents completed…
ERIC Educational Resources Information Center
Lee, HwaYoung; Dodd, Barbara G.
2012-01-01
This study investigated item exposure control procedures under various combinations of item pool characteristics and ability distributions in computerized adaptive testing based on the partial credit model. Three variables were manipulated: item pool characteristics (120 items for each of easy, medium, and hard item pools), two ability…
Credit WCT. Photographic copy of photograph, view west into Dd ...
Credit WCT. Photographic copy of photograph, view west into Dd or Dy ejector, showing steam nozzles which drive the ejector to evacuate the test cell to which it is connected. (JPL negative no. 344-2516-B, 29 August 1977) - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
Level of Student Effort Should Replace Contact Time in Course Design
ERIC Educational Resources Information Center
McDaniel, Elizabeth A.
2011-01-01
The academic credit hour, developed over 100 years ago, does not accommodate online and other instructional innovations. The academic credit hour is an Industrial Age metric based on seat-time, or contact time that faculty and students spend together in a classroom. Online education does not require that students and faculty be in the same place…
4. Credit WCT. Photographic copy of photograph, test Stand 'B' ...
4. Credit WCT. Photographic copy of photograph, test Stand 'B' set up for shock tube and research on ship-to-ship fueling problems for the U.S. Coast Guard. (JPL negative no. 344-3743-A, October or November 1980) - Jet Propulsion Laboratory Edwards Facility, Test Stand B, Edwards Air Force Base, Boron, Kern County, CA
Credit WCT. Photographic copy of photograph, oxidizer and fuel tank ...
Credit WCT. Photographic copy of photograph, oxidizer and fuel tank assembly for engine tests being raised by crane for permanent installation in Test Stand "D" tower. Each tank held 170 gallons of propellants. (JPL negative 384-2029-B, 7 August 1959) - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
School Counselors' Role in Dropout Prevention and Credit Recovery
ERIC Educational Resources Information Center
Tromski-Klingshirn, Donna; Miura, Yoko
2017-01-01
This article introduces credit recovery (CR) programs to school counseling. Traditionally the school counselors' role in CR has been limited to referring students who are, or who have, failed courses. Based on our own findings from a study of a large Midwest high school (N = 2,000) CR program, we make specific recommendations for school counselors…
ERIC Educational Resources Information Center
Sanyal, Paromita
2009-01-01
Can economic ties positively influence social relations and actions? If so, how does this influence operate? Microfinance programs, which provide credit through a group-based lending strategy, provide the ideal setting for exploring these questions. This article examines whether structuring socially isolated women into peer-groups for an…
ERIC Educational Resources Information Center
Radford, Alexandria Walton; Horn, Laura
2012-01-01
These Web Tables provide an overview of classes taken and credits earned by a nationwide sample of first-time beginning postsecondary students based on data from the Postsecondary Education Transcript Study (PETS) of the 2004/09 Beginning Postsecondary Students Longitudinal Study. PETS collected transcripts from all the postsecondary institutions…
The Tax-Credit Scholarship Audit: Do Publicly Funded Private School Choice Programs Save Money?
ERIC Educational Resources Information Center
Lueken, Martin F.
2016-01-01
This report follows up on previous work that examined the fiscal effects of private school voucher programs. It estimates the total fiscal effects of tax-credit scholarship programs--another type of private school choice program--on state governments, state and local taxpayers, and school districts combined. Based on a range of assumptions, these…
9. Credit WCT. Photographic copy of photograph, interior view of ...
9. Credit WCT. Photographic copy of photograph, interior view of control room under construction in Control and Recording Center Building 4221/E-22. Stairway to tunnel system is in left background. (JPL negative no. 384-1927, 26 May 1959) - Jet Propulsion Laboratory Edwards Facility, Control & Recording Center, Edwards Air Force Base, Boron, Kern County, CA
12 CFR 2.4 - Bonus and incentive plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... plan based on the sale of credit life insurance if payments to the employee or officer in any one year... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Bonus and incentive plans. 2.4 Section 2.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SALES OF CREDIT LIFE INSURANCE...
Nanda, P
1999-08-01
Within the overall aim of poverty alleviation, development efforts have included credit and self-employment programmes. In Bangladesh, the major beneficiaries of such group-based credit programmes are rural women who use the loans to initiate small informal income-generating activities. This paper explores the benefits of women's participation in credit programmes on their own health seeking. Using data from a sample of 1798 households from rural Bangladesh, conducted in 1991-1992 through repeated random sampling of 87 districts covered by Grameen Bank, Bangladesh Rural Advancement Committee (BRAC) and Bangladesh Rural Development Board (BRDB), this paper addresses the question: does women's participation in credit programmes significantly affect their use of formal health care? A non-unitary household preference model is suggested to test the hypothesis that women's empowerment through participation in these programmes results in greater control of resources for their own demand for formal health care. The analysis controls for endogeneity due to self-selection and other unobserved village level factors through the use of a weighted two stage instrumental variable approach with village level fixed effects. The findings indicate a positive impact of women's participation in credit programmes on their demand for formal health care. The policy simulations on the results of this study highlight the importance of credit programmes as a health intervention in addition to being a mechanism for women's economic empowerment.
1992-12-21
in preparation). Foundations of artificial intelligence. Cambridge, MA: MIT Press. O’Reilly, R. C. (1991). X3DNet: An X- Based Neural Network ...2.2.3 Trace based protocol analysis 19 2.2A Summary of important data features 21 2.3 Tools related to process model testing 23 2.3.1 Tools for building...algorithm 57 3. Requirements for testing process models using trace based protocol 59 analysis 3.1 Definition of trace based protocol analysis (TBPA) 59
Generalized Teleportation and Entanglement Recycling
NASA Astrophysics Data System (ADS)
Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan
2013-01-01
We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.
Generalized teleportation and entanglement recycling.
Strelchuk, Sergii; Horodecki, Michał; Oppenheim, Jonathan
2013-01-04
We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of N singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bulk.
A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.
A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen
2011-01-01
User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874
Credit Risk Evaluation Using a C-Variable Least Squares Support Vector Classification Model
NASA Astrophysics Data System (ADS)
Yu, Lean; Wang, Shouyang; Lai, K. K.
Credit risk evaluation is one of the most important issues in financial risk management. In this paper, a C-variable least squares support vector classification (C-VLSSVC) model is proposed for credit risk analysis. The main idea of this model is based on the prior knowledge that different classes may have different importance for modeling and more weights should be given to those classes with more importance. The C-VLSSVC model can be constructed by a simple modification of the regularization parameter in LSSVC, whereby more weights are given to the lease squares classification errors with important classes than the lease squares classification errors with unimportant classes while keeping the regularized terms in its original form. For illustration purpose, a real-world credit dataset is used to test the effectiveness of the C-VLSSVC model.
New Protocol for Skin Landmark Registration in Image-Guided Neurosurgery: Technical Note.
Gerard, Ian J; Hall, Jeffery A; Mok, Kelvin; Collins, D Louis
2015-09-01
Newer versions of the commercial Medtronic StealthStation allow the use of only 8 landmark pairs for patient-to-image registration as opposed to 9 landmarks in older systems. The choice of which landmark pair to drop in these newer systems can have an effect on the quality of the patient-to-image registration. To investigate 4 landmark registration protocols based on 8 landmark pairs and compare the resulting registration accuracy with a 9-landmark protocol. Four different protocols were tested on both phantoms and patients. Two of the protocols involved using 4 ear landmarks and 4 facial landmarks and the other 2 involved using 3 ear landmarks and 5 facial landmarks. Both the fiducial registration error and target registration error were evaluated for each of the different protocols to determine any difference between them and the 9-landmark protocol. No difference in fiducial registration error was found between any of the 8-landmark protocols and the 9-landmark protocol. A significant decrease (P < .05) in target registration error was found when using a protocol based on 4 ear landmarks and 4 facial landmarks compared with the other protocols based on 3 ear landmarks. When using 8 landmarks to perform the patient-to-image registration, the protocol using 4 ear landmarks and 4 facial landmarks greatly outperformed the other 8-landmark protocols and 9-landmark protocol, resulting in the lowest target registration error.
Wirth, K; Zielinski, P; Trinter, T; Stahl, R; Mück, F; Reiser, M; Wirth, S
2016-08-01
In hospitals, the radiological services provided to non-privately insured in-house patients are mostly distributed to requesting disciplines through internal cost allocation (ICA). In many institutions, computed tomography (CT) is the modality with the largest amount of allocation credits. The aim of this work is to compare the ICA to respective DRG (Diagnosis Related Groups) shares for diagnostic CT services in a university hospital setting. The data from four CT scanners in a large university hospital were processed for the 2012 fiscal year. For each of the 50 DRG groups with the most case-mix points, all diagnostic CT services were documented including their respective amount of GOÄ allocation credits and invoiced ICA value. As the German Institute for Reimbursement of Hospitals (InEK) database groups the radiation disciplines (radiology, nuclear medicine and radiation therapy) together and also lacks any modality differentiation, the determination of the diagnostic CT component was based on the existing institutional distribution of ICA allocations. Within the included 24,854 cases, 63,062,060 GOÄ-based performance credits were counted. The ICA relieved these diagnostic CT services by € 819,029 (single credit value of 1.30 Eurocent), whereas accounting by using DRG shares would have resulted in € 1,127,591 (single credit value of 1.79 Eurocent). The GOÄ single credit value is 5.62 Eurocent. The diagnostic CT service was basically rendered as relatively inexpensive. In addition to a better financial result, changing the current ICA to DRG shares might also mean a chance for real revenues. However, the attractiveness considerably depends on how the DRG shares are distributed to the different radiation disciplines of one institution.
A Simple XML Producer-Consumer Protocol
NASA Technical Reports Server (NTRS)
Smith, Warren; Gunter, Dan; Quesnel, Darcy
2000-01-01
This document describes a simple XML-based protocol that can be used for producers of events to communicate with consumers of events. The protocol described here is not meant to be the most efficient protocol, the most logical protocol, or the best protocol in any way. This protocol was defined quickly and it's intent is to give us a reasonable protocol that we can implement relatively easily and then use to gain experience in distributed event services. This experience will help us evaluate proposals for event representations, XML-based encoding of information, and communication protocols. The next section of this document describes how we represent events in this protocol and then defines the two events that we choose to use for our initial experiments. These definitions are made by example so that they are informal and easy to understand. The following section then proceeds to define the producer-consumer protocol we have agreed upon for our initial experiments.
Quantum Private Query Based on Bell State and Single Photons
NASA Astrophysics Data System (ADS)
Gao, Xiang; Chang, Yan; Zhang, Shi-Bin; Yang, Fan; Zhang, Yan
2018-03-01
Quantum private query (QPQ) can protect both user's and database holder's privacy. In this paper, we propose a novel quantum private query protocol based on Bell state and single photons. As far as we know, no one has ever proposed the QPQ based on Bell state. By using the decoherence-free (DF) states, our protocol can resist the collective noise. Besides that, our protocol is a one-way quantum protocol, which can resist the Trojan horse attack and reduce the communication complexity. Our protocol can not only guarantee the participants' privacy but also stand against an external eavesdropper.
ERIC Educational Resources Information Center
Davis, Laurie Laughlin; Pastor, Dena A.; Dodd, Barbara G.; Chiang, Claire; Fitzpatrick, Steven J.
2003-01-01
Examined the effectiveness of the Sympson-Hetter technique and rotated content balancing relative to no exposure control and no content rotation conditions in a computerized adaptive testing system based on the partial credit model. Simulation results show the Sympson-Hetter technique can be used with minimal impact on measurement precision,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-08
... Liquidity Provider (``SLP'') credits in its Price List. The Exchange proposes to implement the fee change... Statutory Basis for, the Proposed Rule Change 1. Purpose The Exchange proposes to amend one of the SLP... credit is determined by the ``tier'' that the SLP qualifies for, which is generally based on the SLP's...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
...\\ SLPs in the original class (``SLP-Props'') are eligible for credits when adding liquidity on the Exchange. The amount of the credit is determined by the ``tier'' for which the SLP-Prop qualifies, which is based on (i) whether the SLP-Prop meets the 10% average or more quoting requirement in all assigned...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-08
...\\ The amount of the credit is currently determined by the ``tier'' that the SLP qualifies for, which is based on the SLP's level of quoting and the average daily volume (``ADV'') \\4\\ of liquidity added by the SLP in assigned securities. \\3\\ SLP credits are not applicable to executions of securities with a per...
Credit WCT. Photographic copy of photograph, view north across "neutralization ...
Credit WCT. Photographic copy of photograph, view north across "neutralization pond" at Test Stand "D," showing complete Dd station with new Y-Stage and Z-Stage steam-driven ejectors, and "Hyprox" steam generator which powered ejectors. (JPL negative no. 384-3356-B, 20 November 1962) - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
Factors in the Determination of Cost Effective Class Sizes. Report No. 009-79.
ERIC Educational Resources Information Center
Woods, Nancy A.
A system to determine cost effectiveness of class size should be based on both budgeted and actual expenditures and credit hours at the individual course section level. These two factors, in combination, are often expressed as cost per credit hour, and this statistic forms the primary means of evaluating planned "inputs" against actual "outputs."…
From Policy to Practice: How Competency-Based Education Is Evolving in New Hampshire
ERIC Educational Resources Information Center
Freeland, Julia
2014-01-01
In 2005, New Hampshire abolished the Carnegie unit--the core unit around which schools typically measure credit hours. In its place, the state mandated that all high schools measure credit according to students' mastery of material, rather than time spent in class. This policy shift created the first-ever state-wide effort to create a…
Code of Federal Regulations, 2010 CFR
2010-01-01
... the Currency, such term shall also include any liability of a national banking association to advance... or extensions of credit are approved by the Comptroller of the Currency, shall not be subject to any... limitation based on capital and surplus. Authority of Comptroller of the Currency (d)(1) The Comptroller of...
26 CFR 1.50A-2 - Carryback and carryover of unused credit.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 1.50A-2 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY INCOME TAX INCOME TAXES Rules for Computing Credit for Expenses of Work Incentive Programs § 1.50A-2 Carryback and... limitation based on amount of tax for such taxable year (as determined under paragraph (b) of § 1.50A-1...
ERIC Educational Resources Information Center
Ashmore, M. Catherine; Pritz, Sandra G.
This individualized, competency-based unit on managing customer credit and collection, the 17th of 18 modules, is on the third level of the revised Program for Acquiring Competence in Entrepreneurship (PACE). Intended for the advanced secondary and postsecondary levels and for adults wanting training or retraining, this unit, together with the…
ERIC Educational Resources Information Center
Daun-Barnet, Nathan; Hermsen, Albert; Vedder, Lori; Mabry, Beth
2013-01-01
In 2006, Michigan changed their traditional merit award to a credit contingent program based upon successful completion of 60 college credits. The Michigan Promise Scholarship was crafted by state policymakers without input from the financial aid community. This case study suggests that the change in policy resulted in two unintended consequences:…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... balance to the credit of the Railroad Unemployment Insurance (RUI) Account, as of June 30, 2013, is $204,247,991.98; 2. The September 30, 2013, balance of any new loans to the RUI Account, including accrued... cumulative system unallocated charge balance is ($363,515,181.06) as of June 30, 2013; 5. The pooled credit...
ERIC Educational Resources Information Center
Sulzman, Elizabeth W.
2004-01-01
An optional 1-credit recitation course was developed to supplement a traditionally taught 4-credit lecture-plus-laboratory course in soil science at Oregon State University. Popular, competitive games that would be familiar to students were revised to be "soils-based" and were employed in the recitation class. These games were seen as a…
Credit WCT. Original 4" x 5" black and white negative ...
Credit WCT. Original 4" x 5" black and white negative is housed in the JPL Archives, Pasadena, California. This view shows the original furnace for burning scrap propellant, the surrounding incinerator pit, and the earth mound personnel shield (JPL negative no. 381-2737, 11 February 1963) - Jet Propulsion Laboratory Edwards Facility, Incinerator, Edwards Air Force Base, Boron, Kern County, CA
20 CFR 404.1341 - Wage credits for a member of a uniformed service.
Code of Federal Regulations, 2010 CFR
2010-04-01
... continuous active duty or the full period that you were called to active duty to receive these wage credits... continuous active duty or the full period you were called or ordered to active duty to receive these wage... sum death payment) based on your wages while on active duty as a member of the uniformed service from...
20 CFR 404.1341 - Wage credits for a member of a uniformed service.
Code of Federal Regulations, 2011 CFR
2011-04-01
... continuous active duty or the full period that you were called to active duty to receive these wage credits... continuous active duty or the full period you were called or ordered to active duty to receive these wage... sum death payment) based on your wages while on active duty as a member of the uniformed service from...
Credit BG. View looking west down into Test Stand "D" ...
Credit BG. View looking west down into Test Stand "D" vertical vacuum cell with top removed. Access to cell is normally through large round port seen in view. Piping and cradling toward bottom of cell was last used in tests of Viking space probe engines - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
Credit BG. View looks west (286°) at the east facade. ...
Credit BG. View looks west (286°) at the east facade. This structure stands between two blast barricades, which protect surrounding structures from damage in case an explosion were to occur while propellants were being mixed in the 150 gallon Baker-Perkins mixer - Jet Propulsion Laboratory Edwards Facility, Mixer, Edwards Air Force Base, Boron, Kern County, CA
Predicting financial trouble using call data—On social capital, phone logs, and financial trouble
Lin, Chia-Ching; Chen, Kuan-Ta; Singh, Vivek Kumar
2018-01-01
An ability to understand and predict financial wellbeing for individuals is of interest to economists, policy designers, financial institutions, and the individuals themselves. According to the Nilson reports, there were more than 3 billion credit cards in use in 2013, accounting for purchases exceeding US$ 2.2 trillion, and according to the Federal Reserve report, 39% of American households were carrying credit card debt from month to month. Prior literature has connected individual financial wellbeing with social capital. However, as yet, there is limited empirical evidence connecting social interaction behavior with financial outcomes. This work reports results from one of the largest known studies connecting financial outcomes and phone-based social behavior (180,000 individuals; 2 years’ time frame; 82.2 million monthly bills, and 350 million call logs). Our methodology tackles highly imbalanced dataset, which is a pertinent problem with modelling credit risk behavior, and offers a novel hybrid method that yields improvements over, both, a traditional transaction data only approach, and an approach that uses only call data. The results pave way for better financial modelling of billions of unbanked and underbanked customers using non-traditional metrics like phone-based credit scoring. PMID:29474411
Predicting financial trouble using call data-On social capital, phone logs, and financial trouble.
Agarwal, Rishav Raj; Lin, Chia-Ching; Chen, Kuan-Ta; Singh, Vivek Kumar
2018-01-01
An ability to understand and predict financial wellbeing for individuals is of interest to economists, policy designers, financial institutions, and the individuals themselves. According to the Nilson reports, there were more than 3 billion credit cards in use in 2013, accounting for purchases exceeding US$ 2.2 trillion, and according to the Federal Reserve report, 39% of American households were carrying credit card debt from month to month. Prior literature has connected individual financial wellbeing with social capital. However, as yet, there is limited empirical evidence connecting social interaction behavior with financial outcomes. This work reports results from one of the largest known studies connecting financial outcomes and phone-based social behavior (180,000 individuals; 2 years' time frame; 82.2 million monthly bills, and 350 million call logs). Our methodology tackles highly imbalanced dataset, which is a pertinent problem with modelling credit risk behavior, and offers a novel hybrid method that yields improvements over, both, a traditional transaction data only approach, and an approach that uses only call data. The results pave way for better financial modelling of billions of unbanked and underbanked customers using non-traditional metrics like phone-based credit scoring.
Desai, Jaikishan; Tarozzi, Alessandro
2011-05-01
The impact of community-based family planning programs and access to credit on contraceptive use, fertility, and family size preferences has not been established conclusively in the literature. We provide additional evidence on the possible effect of such programs by describing the results of a randomized field experiment whose main purpose was to increase the use of contraceptive methods in rural areas of Ethiopia. In the experiment, administrative areas were randomly allocated to one of three intervention groups or to a fourth control group. In the first intervention group, both credit and family planning services were provided and the credit officers also provided information on family planning. Only credit or family planning services, but not both, were provided in the other two intervention groups, while areas in the control group received neither type of service. Using pre- and post-intervention surveys, we find that neither type of program, combined or in isolation, led to an increase in contraceptive use that is significantly greater than that observed in the control group. We conjecture that the lack of impact has much to do with the mismatch between women's preferred contraceptive method (injectibles) and the contraceptives provided by community-based agents (pills and condoms).
A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.
ERIC Educational Resources Information Center
Lee, M. C.; Fung, Chun-Kan
2003-01-01
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
1. Credit USAF, 1943. Original housed in the Photograph Files, ...
1. Credit USAF, 1943. Original housed in the Photograph Files, AFFTC/HO, Edwards AFB, California. View west showing eastern elevation of wooden hangar while under construction. Building 4401 was also historically designated Hangar No. 1. The north side of the Unicon Portable Hangar (Building 4305) appears at the extreme left of the view. Concrete apron is under construction in the foreground. Building 4402 is same design and construction as Building 4401. - Edwards Air Force Base, North Base, Hangar No. 1, First & B Streets, Boron, Kern County, CA
Credit BG. Interior view of Building 4316, showing internal construction ...
Credit BG. Interior view of Building 4316, showing internal construction of water reservoir, roof, and monitor. View looks southeast (142°). The pipe which hangs from the roof structure and turns downward under the monitor supplies water to the reservoir; the plate suspended on chains beneath the pipe end deflects water stream so it does not erode the bottom of the reservoir. The intake pipe for the pumps is not visible in this view - Edwards Air Force Base, North Base, Deluge Water Storage Building, Near Second & D Streets, Boron, Kern County, CA
Developing an evidence-based practice protocol: implications for midwifery practice.
Carr, K C
2000-01-01
Evidence-based practice is defined and its importance to midwifery practice is presented. Guidelines are provided for the development of an evidence-based practice protocol. These include: identifying the clinical question, obtaining the evidence, evaluating the validity and importance of the evidence, synthesizing the evidence and applying it to the development of a protocol or clinical algorithm, and, finally, developing an evaluation plan or measurement strategy to see if the new protocol is effective.
NASA Astrophysics Data System (ADS)
Jiang, Dong-Huan; Xu, Guang-Bao
2018-07-01
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of the protocol with small amount of decoy particles, the different particles of each product state are transmitted separately. This protocol not only can make each participant fairly negotiate a shared key, but also can avoid information leakage in the maximum extent. We give a detailed security proof of this protocol. From comparison result with the existing QKA protocols, we can know that the new protocol is more efficient.
Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo
2015-08-01
This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P < 0.05). The total duration of antibiotic use decreased significantly from 80.7 ± 17.6 h (mean ± SD) in the control group to 55.5 ± 14.9 h in the protocol group (P < 0.05). Similarly, introduction of the protocol significantly decreased the total antibiotic dose used in the perioperative period (P < 0.05). Furthermore, antibiotic regimens were changed under suspicion of infection in 5 of 30 control group patients, whereas none of the protocol group patients required this additional change in the antibiotic regimen (P < 0.05). Our novel antibiotic prophylaxis protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.
5. Credit USAF, ca. 1944. Original housed in the Muroc ...
5. Credit USAF, ca. 1944. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Interior view of hangar, looking north northwest. Note exposed wooden construction. Two jet engines lie partially concealed by tarpaulins in the background, along with a combustion chamber assembly (horizontal cylinders in a circular array). On the workbench in the foreground lie an engine rotor hub and what appears to be an engine fuel line assembly. - Edwards Air Force Base, North Base, Hangar No. 1, First & B Streets, Boron, Kern County, CA
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Multiparty Quantum Key Agreement Based on Quantum Search Algorithm
Cao, Hao; Ma, Wenping
2017-01-01
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Amaral, Mariana; Matias, Filipa; Massena, Lígia; Cardoso, Nuno
2016-12-30
Motivated by the contracting nature of the Portuguese age pyramid, and thereby the ever increasing geriatric population, the aim of this study was to compare the number of European Credit Transfer and Accumulation System Credits dedicated to Geriatrics with Pediatrics in Portuguese Medical Schools. An observational, descriptive and cross-sectional study was conducted and included six Portuguese Medical Schools that have six years of training and a total of 360 credits. The study plans were obtained from the medical schools' websites or requested. Schools were grouped in modular/classic teaching methodology and the courses were categorized in mandatory/optional and specific/related. The credits of Geriatrics and Pediatrics were compared. Four schools had classical methodology and two had a modular one. Overall, they had more credits dedicated to Pediatrics than Geriatrics. Three schools offered mandatory courses specifically oriented to Geriatrics (1.5 - 8 credits) compared to all schools mandatory courses courses on Pediatrics (5.7 - 26.5 credits). The ratio of averages of mandatory specific courses (Pediatrics/Geriatrics) was 12.4 in the classical and 1.5 in the modular group. Pediatrics teaching has revealed to be superior to Geriatrics in all categories. Based on our results, we consider the Portuguese Geriatrics' undergraduate teaching sub-optimal. Nowadays, geriatric population is quantitatively similar to pediatric population. Efforts should be made to adequate Geriatrics teaching to our reality in order to provide a more adequate health care to this age group.
An introduction to the partial credit model for developing nursing assessments.
Fox, C
1999-11-01
The partial credit model, which is a special case of the Rasch measurement model, was presented as a useful way to develop and refine complex nursing assessments. The advantages of the Rasch model over the classical psychometric model were presented including the lack of bias in the measurement process, the ability to highlight those items in need of refinement, the provision of information on congruence between the data and the model, and feedback on the usefulness of the response categories. The partial credit model was introduced as a way to develop complex nursing assessments such as performance-based assessments, because of the model's ability to accommodate a variety of scoring procedures. Finally, an application of the partial credit model was illustrated using the Practical Knowledge Inventory for Nurses, a paper-and-pencil instrument that measures on-the-job decision-making for nurses.
Estimation of transition probabilities of credit ratings
NASA Astrophysics Data System (ADS)
Peng, Gan Chew; Hin, Pooi Ah
2015-12-01
The present research is based on the quarterly credit ratings of ten companies over 15 years taken from the database of the Taiwan Economic Journal. The components in the vector mi (mi1, mi2,⋯, mi10) may first be used to denote the credit ratings of the ten companies in the i-th quarter. The vector mi+1 in the next quarter is modelled to be dependent on the vector mi via a conditional distribution which is derived from a 20-dimensional power-normal mixture distribution. The transition probability Pkl (i ,j ) for getting mi+1,j = l given that mi, j = k is then computed from the conditional distribution. It is found that the variation of the transition probability Pkl (i ,j ) as i varies is able to give indication for the possible transition of the credit rating of the j-th company in the near future.
College and Career Readiness: Course Taking Of Deaf and Hard of Hearing Secondary School Students.
Nagle, Katherine; Newman, Lynn A; Shaver, Debra M; Marschark, Marc
2016-01-01
Research shows that deaf and hard of hearing (DHH) students frequently enter college and the workplace relatively unprepared for success in math, science, and reading. Based on data from the National Longitudinal Transition Study-2 (NLTS2), the present study focused on DHH students' college and career readiness by investigating their opportunities in secondary school to acquire college and career skills. DHH students earned more credits overall than hearing peers; both groups earned a similar number of credits in academic courses. However, DHH students took more vocational and nonacademic courses and fewer courses in science, social science, and foreign languages. There was evidence that DHH students' academic courses in math lacked the rigor of those taken by hearing peers, as DHH students earned more credits in basic math and fewer credits in midlevel math courses, and even fewer in advanced math courses, than hearing peers.
Modelling utility-scale wind power plants. Part 2: Capacity credit
NASA Astrophysics Data System (ADS)
Milligan, Michael R.
2000-10-01
As the worldwide use of wind turbine generators in utility-scale applications continues to increase, it will become increasingly important to assess the economic and reliability impact of these intermittent resources. Although the utility industry appears to be moving towards a restructured environment, basic economic and reliability issues will continue to be relevant to companies involved with electricity generation. This article is the second in a two-part series that addresses modelling approaches and results that were obtained in several case studies and research projects at the National Renewable Energy Laboratory (NREL). This second article focuses on wind plant capacity credit as measured with power system reliability indices. Reliability-based methods of measuring capacity credit are compared with wind plant capacity factor. The relationship between capacity credit and accurate wind forecasting is also explored. Published in 2000 by John Wiley & Sons, Ltd.
Satellite Communications Using Commercial Protocols
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan
2000-01-01
NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.
Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality
ERIC Educational Resources Information Center
Schumacher, Gary; Grigsby, Bettye; Vesey, Winona
2011-01-01
This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…
A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.
Zhu, Xudong; Wang, Jinhang; Chen, Yunchao
2014-01-01
Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.
NASA Astrophysics Data System (ADS)
Guo, Rui; Zhou, Lan; Gu, Shi-Pu; Wang, Xing-Fu; Sheng, Yu-Bo
2017-03-01
The concatenated Greenberger-Horne-Zeilinger (C-GHZ) state is a new type of multipartite entangled state, which has potential application in future quantum information. In this paper, we propose a protocol of constructing arbitrary C-GHZ entangled state approximatively. Different from previous protocols, each logic qubit is encoded in the coherent state. This protocol is based on the linear optics, which is feasible in experimental technology. This protocol may be useful in quantum information based on the C-GHZ state.
A Model Based Security Testing Method for Protocol Implementation
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation. PMID:25105163
A model based security testing method for protocol implementation.
Fu, Yu Long; Xin, Xiao Long
2014-01-01
The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-09-18
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.
Sefuba, Maria; Walingo, Tom; Takawira, Fambirai
2015-01-01
This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols. PMID:26393608
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... adding liquidity to the NYSE.\\21\\ The amount of the credit is determined by the ``tier'' that the SLP qualifies for, which is based on the SLP's level of quoting and the ADV of liquidity added by the SLP in....0005 less than the current credit, which, going forward, would be applicable to the SLP's other...
ERIC Educational Resources Information Center
Pinto, Mary Beth; Mansfield, Phylis M.
2006-01-01
College students today face heavy student loan debt that is intensified by the amount of credit card debt they carry. This study provides a profile of financially at-risk students based on their credit card usage behavior. When compared to the non-financially at-risk students, those in the financially at-risk group were found to have higher…
Do At-Risk Students Benefit When NovaNET Is Used for Credit Recovery?
ERIC Educational Resources Information Center
Volkerding, Rebecca Lynn
2012-01-01
The purpose of this study was to determine if it is effective and appropriate to place all students needing credit recovery in computer-based classes regardless of age, risk ratio, and their previous failing grade. Driven by the NCLB mandate for schools to produce greater gains and graduate all students in 4.5 years, districts are now using online…
12. Credit BG. Typical view down one of the underground ...
12. Credit BG. Typical view down one of the underground tunnels connecting the Control and Recording Center with all the JPL Edwards Facility test stands. In addition to personnel traffic, the tunnel system carried electrical power cables, instrumentation and control circuits, and high pressure helium and nitrogen lines. - Jet Propulsion Laboratory Edwards Facility, Control & Recording Center, Edwards Air Force Base, Boron, Kern County, CA
4. Credit WCT. Original 2'" x 21" color negative is ...
4. Credit WCT. Original 2-'" x 2-1" color negative is housed in the JPL Photography Laboratory, Pasadena, California. This view shows the control room in use, with JPL employees Ron Wright, Harold Anderson, and John Morrow presiding. (JPL negative no. JPL-10288A, 27 January 1989.) - Jet Propulsion Laboratory Edwards Facility, Weigh & Control Building, Edwards Air Force Base, Boron, Kern County, CA
ERIC Educational Resources Information Center
Cox, H. A.; Stephens, L. J.
2006-01-01
A study was conducted on high school students, comparing those with some music credits to those with none. No statistically significant difference was found in their mean math grade point averages (GPA) or their mean cumulative GPAs. Students were then separated into two groups based on the number of music credits. Students who had earned at least…
ERIC Educational Resources Information Center
Paez-Blarrina, Marisa; Luciano, Carmen; Gutierrez-Martinez, Olga; Valdivia, Sonsoles; Rodriguez-Valverde, Miguel; Ortega, Jose
2008-01-01
This study compares the effect of an acceptance-based protocol (ACT) and a cognitive control-based (CONT) protocol on three measures of pain coping: tolerance, self-report, and believability. Specific methodological controls were employed to further isolate the role of the value of participating in a pain task, compared to previous investigations…
EON: a component-based approach to automation of protocol-directed therapy.
Musen, M A; Tu, S W; Das, A K; Shahar, Y
1996-01-01
Provision of automated support for planning protocol-directed therapy requires a computer program to take as input clinical data stored in an electronic patient-record system and to generate as output recommendations for therapeutic interventions and laboratory testing that are defined by applicable protocols. This paper presents a synthesis of research carried out at Stanford University to model the therapy-planning task and to demonstrate a component-based architecture for building protocol-based decision-support systems. We have constructed general-purpose software components that (1) interpret abstract protocol specifications to construct appropriate patient-specific treatment plans; (2) infer from time-stamped patient data higher-level, interval-based, abstract concepts; (3) perform time-oriented queries on a time-oriented patient database; and (4) allow acquisition and maintenance of protocol knowledge in a manner that facilitates efficient processing both by humans and by computers. We have implemented these components in a computer system known as EON. Each of the components has been developed, evaluated, and reported independently. We have evaluated the integration of the components as a composite architecture by implementing T-HELPER, a computer-based patient-record system that uses EON to offer advice regarding the management of patients who are following clinical trial protocols for AIDS or HIV infection. A test of the reuse of the software components in a different clinical domain demonstrated rapid development of a prototype application to support protocol-based care of patients who have breast cancer. PMID:8930854
NASA Astrophysics Data System (ADS)
Niemi, T. M.; Adegoke, J.; Stoddard, E.; Odom, L.; Ketchum, D.
2007-12-01
The GEOPATHS project is a partnership between the University of Missouri Kansas City (UMKC) and the Kansas City Missouri School District (KCMSD). The goal of GEOPATHS is to raise enrollment in the Geosciences, especially among populations that are traditionally underrepresented in the discipline. We are addressing this goal by expanding dual-credit and Advanced Placement (AP) opportunities for high school students and also by serving teachers through enhancing their understanding of geoscience content and inquiry teaching methods using GLOBE resources and protocols. Our focus in the first two years of the project is to increase the number of teachers that are certified to teach AP Environmental Science by offering specially designed professional development workshops for high school teachers in the Kansas City Metropolitan Area. The structure of the workshop for each year is divided into two weeks of content knowledge exploration using the learning cycle and concept mapping, and one week of inquiry-based experiments, field projects, and exercises. We are also supporting teachers in their use of these best-practice methods by providing materials and supplies along with lesson plans for inquiry investigations for their classes. The lesson plans include activities and experiments that are inquiry-based. The last two years of the project will include direct engagement/recruiting of promising minority high school students via paid summer research internships and scholarship offers.
Review of Technical Studies in the United States in Support of Burnup Credit Regulatory Guidance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wagner, John C; Parks, Cecil V; Mueller, Don
2010-01-01
Taking credit for the reduction in reactivity associated with fuel depletion can enable more cost-effective, higher-density storage, transport, disposal, and reprocessing of spent nuclear fuel (SNF) while maintaining sufficient subcritical margin to establish an adequate safety basis. Consequently, there continues to be considerable interest in the United States (U.S.), as well as internationally, in the increased use of burnup credit in SNF operations, particularly related to storage, transport, and disposal of commercial SNF. This interest has motivated numerous technical studies related to the application of burnup credit, both domestically and internationally, as well as the design of SNF storage, transportmore » and disposal systems that rely on burnup credit for maintaining subcriticality. Responding to industry requests and needs, the U.S. Nuclear Regulatory Commission (NRC) initiated a burnup credit research program in 1999, with support from the Oak Ridge National Laboratory (ORNL), to develop regulatory guidance and the supporting technical bases for allowing and expanding the use of burnup credit in pressurized-water reactor SNF storage and transport applications. Although this NRC research program has not been continuous since its inception, considerable progress has been achieved in many key areas in terms of increased understanding of relevant phenomena and issues, availability of relevant information and data, and subsequently updated regulatory guidance for expanded use of burnup credit. This paper reviews technical studies performed by ORNL for the U.S. NRC burnup credit research program. Examples of topics include reactivity effects associated with reactor operating characteristics, fuel assembly characteristics, burnable absorbers, control rods, spatial burnup distributions, cooling time, and assembly misloading; methods and data for validation of isotopic composition predictions; methods and data for validation of criticality calculations; and operational issues and data related to assembly burnup confirmation. The objective of this paper is to summarize the work and significant accomplishments, with references to the technical reports and publications for complete details, and provide a useful resource to others in the burnup credit community.« less
A native Bayesian classifier based routing protocol for VANETS
NASA Astrophysics Data System (ADS)
Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei
2016-12-01
Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.
Gabr, Mahmoud M; Zakaria, Mahmoud M; Refaie, Ayman F; Khater, Sherry M; Ashamallah, Sylvia A; Ismail, Amani M; El-Badri, Nagwa; Ghoneim, Mohamed A
2014-01-01
Many protocols were utilized for directed differentiation of mesenchymal stem cells (MSCs) to form insulin-producing cells (IPCs). We compared the relative efficiency of three differentiation protocols. Human bone marrow-derived MSCs (HBM-MSCs) were obtained from three insulin-dependent type 2 diabetic patients. Differentiation into IPCs was carried out by three protocols: conophylline-based (one-step protocol), trichostatin-A-based (two-step protocol), and β -mercaptoethanol-based (three-step protocol). At the end of differentiation, cells were evaluated by immunolabeling for insulin production, expression of pancreatic endocrine genes, and release of insulin and c-peptide in response to increasing glucose concentrations. By immunolabeling, the proportion of generated IPCs was modest ( ≃ 3%) in all the three protocols. All relevant pancreatic endocrine genes, insulin, glucagon, and somatostatin, were expressed. There was a stepwise increase in insulin and c-peptide release in response to glucose challenge, but the released amounts were low when compared with those of pancreatic islets. The yield of functional IPCs following directed differentiation of HBM-MSCs was modest and was comparable among the three tested protocols. Protocols for directed differentiation of MSCs need further optimization in order to be clinically meaningful. To this end, addition of an extracellular matrix and/or a suitable template should be attempted.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Multi-Hop Teleportation of an Unknown Qubit State Based on W States
NASA Astrophysics Data System (ADS)
Zhou, Xiang-Zhen; Yu, Xu-Tao; Zhang, Zai-Chen
2018-04-01
Quantum teleportation is important in quantum communication networks. Considering that quantum state information is also transmitted between two distant nodes, intermediated nodes are employed and two multi-hop teleportation protocols based on W state are proposed. One is hop-by-hop teleportation protocol and the other is the improved multi-hop teleportation protocol with centralized unitary transformation. In hop-by-hop protocol, the transmitted quantum state needs to be recovered at every node on the route. In improved multi-hop teleportation protocol with centralized unitary transformation, intermediate nodes need not to recover the transmitted quantum state. Compared to the hop-by-hop protocol, the improved protocol can reduce the transmission delay and improve the transmission efficiency.
Quantum private query based on single-photon interference
NASA Astrophysics Data System (ADS)
Xu, Sheng-Wei; Sun, Ying; Lin, Song
2016-08-01
Quantum private query (QPQ) has become a research hotspot recently. Specially, the quantum key distribution (QKD)-based QPQ attracts lots of attention because of its practicality. Various such kind of QPQ protocols have been proposed based on different technologies of quantum communications. Single-photon interference is one of such technologies, on which the famous QKD protocol GV95 is just based. In this paper, we propose two QPQ protocols based on single-photon interference. The first one is simpler and easier to realize, and the second one is loss tolerant and flexible, and more practical than the first one. Furthermore, we analyze both the user privacy and the database privacy in the proposed protocols.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., agricultural credit banks, Federal land bank associations, Federal land credit associations, production credit associations, and agricultural credit associations. 614.4070 Section 614.4070 Banks and Banking FARM CREDIT... land credit associations, production credit associations, and agricultural credit associations. (a) A...
Coexistence of WiFi and WiMAX systems based on PS-request protocols.
Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young
2011-01-01
We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.
Efficient model checking of network authentication protocol based on SPIN
NASA Astrophysics Data System (ADS)
Tan, Zhi-hua; Zhang, Da-fang; Miao, Li; Zhao, Dan
2013-03-01
Model checking is a very useful technique for verifying the network authentication protocols. In order to improve the efficiency of modeling and verification on the protocols with the model checking technology, this paper first proposes a universal formalization description method of the protocol. Combined with the model checker SPIN, the method can expediently verify the properties of the protocol. By some modeling simplified strategies, this paper can model several protocols efficiently, and reduce the states space of the model. Compared with the previous literature, this paper achieves higher degree of automation, and better efficiency of verification. Finally based on the method described in the paper, we model and verify the Privacy and Key Management (PKM) authentication protocol. The experimental results show that the method of model checking is effective, which is useful for the other authentication protocols.
Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-06-27
Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.
Credit PSR. View looking north northeast (12°) across surface remains ...
Credit PSR. View looking north northeast (12°) across surface remains of North Base swimming pool. The southeast edge of the pool appearing in the foreground may seem to be a sidewalk to the casual observer; the wavy inside edge of this walk matches the pool side visible in historic construction photos (See HAER photo CA-170-Q-2). The telephone pole in the midground of the view is inside the pool proper. Building 4312 (Liquid Oxygen Repair Facility) appears in left background, Building 4456 (Fire House No. 4) in middle background, and Building 4444 (Communications Building) in right background - Edwards Air Force Base, North Base, Swimming Pool, Second Street, Boron, Kern County, CA
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
A neural networks-based hybrid routing protocol for wireless mesh networks.
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.
A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
2012-01-01
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360
A Family of ACO Routing Protocols for Mobile Ad Hoc Networks.
Rupérez Cañas, Delfín; Sandoval Orozco, Ana Lucila; García Villalba, Luis Javier; Kim, Tai-Hoon
2017-05-22
In this work, an ACO routing protocol for mobile ad hoc networks based on AntHocNet is specified. As its predecessor, this new protocol, called AntOR, is hybrid in the sense that it contains elements from both reactive and proactive routing. Specifically, it combines a reactive route setup process with a proactive route maintenance and improvement process. Key aspects of the AntOR protocol are the disjoint-link and disjoint-node routes, separation between the regular pheromone and the virtual pheromone in the diffusion process and the exploration of routes, taking into consideration the number of hops in the best routes. In this work, a family of ACO routing protocols based on AntOR is also specified. These protocols are based on protocol successive refinements. In this work, we also present a parallelized version of AntOR that we call PAntOR. Using programming multiprocessor architectures based on the shared memory protocol, PAntOR allows running tasks in parallel using threads. This parallelization is applicable in the route setup phase, route local repair process and link failure notification. In addition, a variant of PAntOR that consists of having more than one interface, which we call PAntOR-MI (PAntOR-Multiple Interface), is specified. This approach parallelizes the sending of broadcast messages by interface through threads.
Credit PSR. This photograph displays the south and east facades ...
Credit PSR. This photograph displays the south and east facades of the storage facility as seen when looking to the west northwest (288°). The concrete pit in the foreground is a catch basin designed to hold run-off from spilled oxidizers or clean-up operations, thus preventing them from contaminating the soil - Jet Propulsion Laboratory Edwards Facility, Solid Oxidizer Storage, Edwards Air Force Base, Boron, Kern County, CA
ERIC Educational Resources Information Center
Anderson, Elizabeth
2017-01-01
Student engagement has been shown to be essential to the development of research-based best practices for K-12 education. It has been defined and measured in numerous ways. The purpose of this research study was to develop a measure of online student engagement for grades 3 through 8 using a partial credit Rasch model and validate the measure…
6. Credit WCT. Original 21" x 2Y" color negative is ...
6. Credit WCT. Original 2-1" x 2-Y" color negative is housed in the JPL Photography Laboratory, Pasadena, California. JPL staff members Harold Anderson and John Morrow weigh out small amounts of an undetermined substance according to a solid propellant formula (JPL negative no. JPL-10277AC, 27 January 1989). - Jet Propulsion Laboratory Edwards Facility, Weigh & Control Building, Edwards Air Force Base, Boron, Kern County, CA
Credit WCT. Photographic copy of photograph, view east showing the ...
Credit WCT. Photographic copy of photograph, view east showing the Y-stage ejector nozzle as the Y-stage ejector is being installed in the Dd ejector train in 1962. In the distance can be seen the western end of the Z-stage ejector. (JPL negative no. 384-3345-A, 8 November 1962) - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
6. Credit GE. Photographic copy of photograph, view looking east ...
6. Credit GE. Photographic copy of photograph, view looking east at Test Stand 'A' during test firing of a liquid-fueled Corporal engine. Structure in immediate left foreground of view appears to be a propellant tank enclosure (JPL negative no. 383-1225, July 1945); compare HAER CA-163-A-7 for enclosure. - Jet Propulsion Laboratory Edwards Facility, Test Stand A, Edwards Air Force Base, Boron, Kern County, CA
Consumer Education Resources: Credit, Credit Problems, Home Mortgages & Equity Loans.
ERIC Educational Resources Information Center
Eastern Michigan Univ., Ypsilanti. National Inst. for Consumer Education.
This document contains five lists of consumer resources pertaining to credit, credit problems, and home mortgages and equity loans. The first list, targeted at adults, provides information on general credit, applying for credit and contracts, seniors and women and credit, credit options and costs, credit protection, credit reports and bureaus, and…
NASA Astrophysics Data System (ADS)
Wang, Shuang; Yin, Zhen-Qiang; Chau, H. F.; Chen, Wei; Wang, Chao; Guo, Guang-Can; Han, Zheng-Fu
2018-04-01
In comparison to qubit-based protocols, qudit-based quantum key distribution ones generally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based protocol known as the Chau15 (Chau 2015 Phys. Rev. A 92 062324). Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Chau (2015 Phys. Rev. A 92 062324) relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.
Ilott, Irene; Booth, Andrew; Rick, Jo; Patterson, Malcolm
2010-06-01
To explore how nurses, midwives and health visitors contribute to the development, implementation and audit of protocol-based care. Protocol-based care refers to the use of documents that set standards for clinical care processes with the intent of reducing unacceptable variations in practice. Documents such as protocols, clinical guidelines and care pathways underpin evidence-based practice throughout the world. An interpretative review using the five-stage systematic literature review process. The data sources were the British Nursing Index, CINAHL, EMBASE, MEDLINE and Web of Science from onset to 2005. The Journal of Integrated Care Pathways was hand searched (1997-June 2006). Thirty three studies about protocol-based care in the United Kingdom were appraised using the Qualitative Assessment and Review Instrument (QARI version 2). The literature was synthesized inductively and deductively, using an official 12-step guide for development as a framework for the deductive synthesis. Most papers were descriptive, offering practitioner knowledge and positive findings about a locally developed and owned protocol-based care. The majority were instigated in response to clinical need or service re-design. Development of protocol-based care was a non-linear, idiosyncratic process, with steps omitted, repeated or completed in a different order. The context and the multiple purposes of protocol-based care influenced the development process. Implementation and sustainability were rarely mentioned, or theorised as a change. The roles and activities of nurses were so understated as to be almost invisible. There were notable gaps in the literature about the resource use costs, the engagement of patients in the decision-making process, leadership and the impact of formalisation and new roles on inter-professional relations. Documents that standardise clinical care are part of the history of nursing as well as contemporary evidence-based care and expanded roles. Considering the proliferation and contested nature of protocol-based care, the dearth of literature about the contribution, experience and outcomes for nurses, midwives and health visitors is noteworthy and requires further investigation. (c) 2010 Elsevier Ltd. All rights reserved.
Yang, Li; Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks.
Zheng, Zhiming
2018-01-01
According to advancements in the wireless technologies, study of biometrics-based multi-server authenticated key agreement schemes has acquired a lot of momentum. Recently, Wang et al. presented a three-factor authentication protocol with key agreement and claimed that their scheme was resistant to several prominent attacks. Unfortunately, this paper indicates that their protocol is still vulnerable to the user impersonation attack, privileged insider attack and server spoofing attack. Furthermore, their protocol cannot provide the perfect forward secrecy. As a remedy of these aforementioned problems, we propose a biometrics-based authentication and key agreement scheme for multi-server environments. Compared with various related schemes, our protocol achieves the stronger security and provides more functionality properties. Besides, the proposed protocol shows the satisfactory performances in respect of storage requirement, communication overhead and computational cost. Thus, our protocol is suitable for expert systems and other multi-server architectures. Consequently, the proposed protocol is more appropriate in the distributed networks. PMID:29534085
A Survey on Underwater Acoustic Sensor Network Routing Protocols.
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-03-22
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.
A Survey on Underwater Acoustic Sensor Network Routing Protocols
Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina
2016-01-01
Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Alanazi, Adwan; Elleithy, Khaled
2015-09-02
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis
Alanazi, Adwan; Elleithy, Khaled
2015-01-01
Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol. PMID:26364639
Bokulich, Nicholas A; Kaehler, Benjamin D; Rideout, Jai Ram; Dillon, Matthew; Bolyen, Evan; Knight, Rob; Huttley, Gavin A; Gregory Caporaso, J
2018-05-17
Taxonomic classification of marker-gene sequences is an important step in microbiome analysis. We present q2-feature-classifier ( https://github.com/qiime2/q2-feature-classifier ), a QIIME 2 plugin containing several novel machine-learning and alignment-based methods for taxonomy classification. We evaluated and optimized several commonly used classification methods implemented in QIIME 1 (RDP, BLAST, UCLUST, and SortMeRNA) and several new methods implemented in QIIME 2 (a scikit-learn naive Bayes machine-learning classifier, and alignment-based taxonomy consensus methods based on VSEARCH, and BLAST+) for classification of bacterial 16S rRNA and fungal ITS marker-gene amplicon sequence data. The naive-Bayes, BLAST+-based, and VSEARCH-based classifiers implemented in QIIME 2 meet or exceed the species-level accuracy of other commonly used methods designed for classification of marker gene sequences that were evaluated in this work. These evaluations, based on 19 mock communities and error-free sequence simulations, including classification of simulated "novel" marker-gene sequences, are available in our extensible benchmarking framework, tax-credit ( https://github.com/caporaso-lab/tax-credit-data ). Our results illustrate the importance of parameter tuning for optimizing classifier performance, and we make recommendations regarding parameter choices for these classifiers under a range of standard operating conditions. q2-feature-classifier and tax-credit are both free, open-source, BSD-licensed packages available on GitHub.
Enhancement of Beaconless Location-Based Routing with Signal Strength Assistance for Ad-Hoc Networks
NASA Astrophysics Data System (ADS)
Chen, Guowei; Itoh, Kenichi; Sato, Takuro
Routing in Ad-hoc networks is unreliable due to the mobility of the nodes. Location-based routing protocols, unlike other protocols which rely on flooding, excel in network scalability. Furthermore, new location-based routing protocols, like, e. g. BLR [1], IGF [2], & CBF [3] have been proposed, with the feature of not requiring beacons in MAC-layer, which improve more in terms of scalability. Such beaconless routing protocols can work efficiently in dense network areas. However, these protocols' algorithms have no ability to avoid from routing into sparse areas. In this article, historical signal strength has been added as a factor into the BLR algorithm, which avoids routing into sparse area, and consequently improves the global routing efficiency.
A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.
Yang, Wenlun; Fu, Minyue
2017-11-01
Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
NASA Astrophysics Data System (ADS)
Cai, Xiao-Qiu; Wei, Chun-Yan
2013-04-01
We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.
A two-hop based adaptive routing protocol for real-time wireless sensor networks.
Rachamalla, Sandhya; Kancherla, Anitha Sheela
2016-01-01
One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.
Microcomputer Nurse-Practitioner Protocols
Way, Anthony B.; Rowley, Blair A.; White, Melanie A.
1982-01-01
We have developed a set of protocols on a microcomputer to assist in the management of a geographically isolated nurse practitioner. If a mid-level practitioner is supervised by a physician, some system is needed to ensure that approved care is being provided. The currently available paper-based protocols do not adequately serve all the needs for training, auditing, and record keeping. Conversely, adequate systems based on large computers are not feasible for small clinics. We have therefore developed a microcomputer-based system of protocols for a small rural nurse-practitioner's clinic. Our programs are designed for direct use by the practitioners while the patient is in the clinic. The user is given immediate feedback about any errors. The supervisor is later provided with a summary of the protocol uses and errors, and a copy of any erroneous records. The system appears to be easy to use by the nurse practitioner. The protocols are quickly learned and auditing is facilitated.
Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks
Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram
2016-01-01
A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194
NASA Astrophysics Data System (ADS)
Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.
2017-02-01
The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.
An energy-aware routing protocol for query-based applications in wireless sensor networks.
Ahvar, Ehsan; Ahvar, Shohreh; Lee, Gyu Myoung; Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption.
An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks
Crespi, Noel
2014-01-01
Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, energy saving protocols are not necessarily good at balancing energy consumption and energy balancing protocols are not always good at reducing energy consumption. In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and supports a soft real time packet delivery. This is achieved by means of fuzzy sets and learning automata techniques along with zonal broadcasting to decrease total energy consumption. PMID:24696640
Communication protocol in chassis detecting wireless transmission system based on WiFi
USDA-ARS?s Scientific Manuscript database
In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...
2006-01-01
Systems, Thermal Comfort 1 Credit 3 Enhanced Commissioning 1 Credit 7.1 Thermal Comfort , Compliance 1 Credit 4 Enhanced Refrigerant Management 1 Credit 7.2... Thermal Comfort , Validation ? Credit 5 Measurement & Verification 1 Credit 8.1 Daylight & Views, Daylight 75% of Spaces 1 Credit 6 Green Power N...Systems, Thermal Comfort 1 Credit 3 Enhanced Commissioning 1 Credit 7.1 Thermal Comfort , Compliance 1 Credit 4 Enhanced Refrigerant Management 1 Credit 7.2
2. Credit USAF, ca. 1945. Original housed in the Records ...
2. Credit USAF, ca. 1945. Original housed in the Records of the Defense Intelligence Agency. Record Group 373. National Archives. Cartographic and Architectural Branch. Washington, D.C. Oblique aerial photo 16PS5M79-1-0-48-4:3:1152:12:120003500N11745W looking roughly north northeast across North Base from a position over Rogers Dry Lake. Largest structures are hangars, beginning with Building 4305 (Unicon Portable Hangar) at view center and continuing to right with Buildings 4401 and 4402 (Type HANG-N-A hangars), with Building 4505 (Type HANG-P-A hangar) in the distance. Bachelor Officers' Quarters known as the "Desert Rat Hotel" (T-l) was located adjacent to Building 4305. - Edwards Air Force Base, North Base, North Base Road, Boron, Kern County, CA
Furberg, Robert D; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A
2016-01-01
Background Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Objective Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. Methods The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care–related infections were reviewed to develop the infection control protocol to support tablet maintenance. Results This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. Conclusions These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings. PMID:27350013
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation
NASA Astrophysics Data System (ADS)
Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min
2016-05-01
In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.
Butler, Ashleigh; Hall, Helen; Copnell, Beverley
2016-06-01
The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the review results. © 2016 Sigma Theta Tau International.
Credit WCT. Original 21/4"x21/4" color negative is housed in the ...
Credit WCT. Original 2-1/4"x2-1/4" color negative is housed in the JPL Photography Laboratory, Pasadena, California. JPL staff member Leonard "Dutch" Sebring loads propellant grain into tube for a BATES (Ballistic And Test Evaluation System) test (JPL negative no. JPL-10279BC, 27 January 1989) - Jet Propulsion Laboratory Edwards Facility, Weigh & Test Preparation Building, Edwards Air Force Base, Boron, Kern County, CA
2011-01-01
industries as credit cards , health maintenance organizations (HMOs), travel reservations, video games, container shipping, music, and (remarkably) cement... iTunes . It is a software platform that is replacing the (nonplatform) strategy of selling CDs in retail stores. In other words, a platform-mediated...boundar- ies. Brokerage, mortgage, checking, savings, and credit cards are inte- grated around a major platform. This banking platform is even pen
Credit WCT. Photographic copy of photograph, view looking northwest at ...
Credit WCT. Photographic copy of photograph, view looking northwest at complete Test Stand "D" installation as of January 1962. Note closed-circuit television camera at extreme left, along with MMH (fuel) storage tank. Hatch of Dd test cell is open; nearby stand MMH run tanks for Dd station. (JPL negative no. 384-2591-A, 25 January 1961) - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
2. Credit PSR. The Administration/Shops Building appears here as the ...
2. Credit PSR. The Administration/Shops Building appears here as the camera looks east (84°). To the right in the view is the Guard House (Building 4279/E-80) which controls entry to the JPL facility. At left is a warehouse (Building 4287/E88). Overhead utility lines supply alternating current to the facility. - Jet Propulsion Laboratory Edwards Facility, Administration & Shops Building, Edwards Air Force Base, Boron, Kern County, CA
Credit WCT. Original 4"x5" black and white negative is housed ...
Credit WCT. Original 4"x5" black and white negative is housed in the JPL Archives, Pasadena, California. This view shows the underfloor ductwork of Building E-46 during construction. The ductwork conducts hot or cold air to maintain required temperatures in the curing chamber (JPL negative no. 381-2569, 12 December 1962) - Jet Propulsion Laboratory Edwards Facility, Solid Propellant Conditioning Building, Edwards Air Force Base, Boron, Kern County, CA
Credit BG. West elevation of Test Stand "D" tower, with ...
Credit BG. West elevation of Test Stand "D" tower, with workshop on left, and tunnel entrance at right. Tower is accessed by exterior steel stairway; the vertical vacuum cell (Dv Cell) is obscured behind large square sunscreen. Below the sunscreen can be seen the end of the horizontal vacuum duct leading from the vacuum cell - Jet Propulsion Laboratory Edwards Facility, Test Stand D, Edwards Air Force Base, Boron, Kern County, CA
Credit WCT. This view is an enlargement of an original ...
Credit WCT. This view is an enlargement of an original 2-A" x 2-Y4" color negative housed in the JPL Photography Laboratory, Pasadena, California. The doors of the conditioning chamber have been opened to reveal the arrangement of wrapped motors ready for treatment (JPL negative no. JPL-10281BC, 27 January 1989) - Jet Propulsion Laboratory Edwards Facility, Solid Propellant Conditioning Building, Edwards Air Force Base, Boron, Kern County, CA
Protocol for a Delay-Tolerant Data-Communication Network
NASA Technical Reports Server (NTRS)
Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin
2004-01-01
As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.
QKD-based quantum private query without a failure probability
NASA Astrophysics Data System (ADS)
Liu, Bin; Gao, Fei; Huang, Wei; Wen, QiaoYan
2015-10-01
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses. It maintains the advantages of the QKD-based QPQ, i.e., easy to implement and loss tolerant. In addition, different from the situations in the previous QKD-based QPQ protocols, in our protocol, the number of the items an honest user will obtain is always one and the failure probability is always zero. This characteristic not only improves the stability (in the sense that, ignoring the noise and the attack, the protocol would always succeed), but also benefits the privacy of the database (since the database will no more reveal additional secrets to the honest users). Furthermore, for the user's privacy, the proposed protocol is cheat sensitive, and for security of the database, we obtain an upper bound for the leaked information of the database in theory.
Optimization of the scan protocols for CT-based material extraction in small animal PET/CT studies
NASA Astrophysics Data System (ADS)
Yang, Ching-Ching; Yu, Jhih-An; Yang, Bang-Hung; Wu, Tung-Hsin
2013-12-01
We investigated the effects of scan protocols on CT-based material extraction to minimize radiation dose while maintaining sufficient image information in small animal studies. The phantom simulation experiments were performed with the high dose (HD), medium dose (MD) and low dose (LD) protocols at 50, 70 and 80 kVp with varying mA s. The reconstructed CT images were segmented based on Hounsfield unit (HU)-physical density (ρ) calibration curves and the dual-energy CT-based (DECT) method. Compared to the (HU;ρ) method performed on CT images acquired with the 80 kVp HD protocol, a 2-fold improvement in segmentation accuracy and a 7.5-fold reduction in radiation dose were observed when the DECT method was performed on CT images acquired with the 50/80 kVp LD protocol, showing the possibility to reduce radiation dose while achieving high segmentation accuracy.
Hsu, Becky Yang
2014-06-01
Academic and political discussions about micro-finance have been found lacking in predictive power, because they are based on orthodox economic theory, which does not properly comprehend the social components of credit. I take a better approach, utilizing credit theory--specifically, Ingham's explication of how the nature of money as credit leads to social inequality. I also expound the perspective that morality is not separate from considerations borrowers make in micro-finance programmes on the micro level. I draw upon illustrations from my fieldwork in rural China, where a group-lending micro-finance programme was administered as part of a larger government-initiated effort across the country. © London School of Economics and Political Science 2014.